Machine Learning Threatens 5G Security

Machine learning (ML) is expected to solve many challenges in the fifth generation (5G) of mobile networks. However, ML will also open the network to several serious cybersecurity vulnerabilities. Most of the learning in ML happens through data gathered from the environment. Un-scrutinized data will...

Full description

Bibliographic Details
Main Authors: Jani Suomalainen, Arto Juhola, Shahriar Shahabuddin, Aarne Mammela, Ijaz Ahmad
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
5G
Online Access:https://ieeexplore.ieee.org/document/9229146/
id doaj-6169182e3a8c480e8c7f8c0fa99b92f1
record_format Article
spelling doaj-6169182e3a8c480e8c7f8c0fa99b92f12021-03-30T03:38:23ZengIEEEIEEE Access2169-35362020-01-01819082219084210.1109/ACCESS.2020.30319669229146Machine Learning Threatens 5G SecurityJani Suomalainen0https://orcid.org/0000-0001-7921-8667Arto Juhola1Shahriar Shahabuddin2https://orcid.org/0000-0002-7006-0928Aarne Mammela3https://orcid.org/0000-0002-6659-4126Ijaz Ahmad4https://orcid.org/0000-0003-1101-8698VTT Technical Research Center of Finland, Espoo, FinlandVTT Technical Research Center of Finland, Espoo, FinlandNokia, Oulu, FinlandVTT Technical Research Center of Finland, Oulu, FinlandVTT Technical Research Center of Finland, Espoo, FinlandMachine learning (ML) is expected to solve many challenges in the fifth generation (5G) of mobile networks. However, ML will also open the network to several serious cybersecurity vulnerabilities. Most of the learning in ML happens through data gathered from the environment. Un-scrutinized data will have serious consequences on machines absorbing the data to produce actionable intelligence for the network. Scrutinizing the data, on the other hand, opens privacy challenges. Unfortunately, most of the ML systems are borrowed from other disciplines that provide excellent results in small closed environments. The resulting deployment of such ML systems in 5G can inadvertently open the network to serious security challenges such as unfair use of resources, denial of service, as well as leakage of private and confidential information. Therefore, in this article we dig into the weaknesses of the most prominent ML systems that are currently vigorously researched for deployment in 5G. We further classify and survey solutions for avoiding such pitfalls of ML in 5G systems.https://ieeexplore.ieee.org/document/9229146/5Gcybersecuritymachine learningmobile networkssurveythreats
collection DOAJ
language English
format Article
sources DOAJ
author Jani Suomalainen
Arto Juhola
Shahriar Shahabuddin
Aarne Mammela
Ijaz Ahmad
spellingShingle Jani Suomalainen
Arto Juhola
Shahriar Shahabuddin
Aarne Mammela
Ijaz Ahmad
Machine Learning Threatens 5G Security
IEEE Access
5G
cybersecurity
machine learning
mobile networks
survey
threats
author_facet Jani Suomalainen
Arto Juhola
Shahriar Shahabuddin
Aarne Mammela
Ijaz Ahmad
author_sort Jani Suomalainen
title Machine Learning Threatens 5G Security
title_short Machine Learning Threatens 5G Security
title_full Machine Learning Threatens 5G Security
title_fullStr Machine Learning Threatens 5G Security
title_full_unstemmed Machine Learning Threatens 5G Security
title_sort machine learning threatens 5g security
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description Machine learning (ML) is expected to solve many challenges in the fifth generation (5G) of mobile networks. However, ML will also open the network to several serious cybersecurity vulnerabilities. Most of the learning in ML happens through data gathered from the environment. Un-scrutinized data will have serious consequences on machines absorbing the data to produce actionable intelligence for the network. Scrutinizing the data, on the other hand, opens privacy challenges. Unfortunately, most of the ML systems are borrowed from other disciplines that provide excellent results in small closed environments. The resulting deployment of such ML systems in 5G can inadvertently open the network to serious security challenges such as unfair use of resources, denial of service, as well as leakage of private and confidential information. Therefore, in this article we dig into the weaknesses of the most prominent ML systems that are currently vigorously researched for deployment in 5G. We further classify and survey solutions for avoiding such pitfalls of ML in 5G systems.
topic 5G
cybersecurity
machine learning
mobile networks
survey
threats
url https://ieeexplore.ieee.org/document/9229146/
work_keys_str_mv AT janisuomalainen machinelearningthreatens5gsecurity
AT artojuhola machinelearningthreatens5gsecurity
AT shahriarshahabuddin machinelearningthreatens5gsecurity
AT aarnemammela machinelearningthreatens5gsecurity
AT ijazahmad machinelearningthreatens5gsecurity
_version_ 1724183068930998272