60 research outputs found

    Split Federated Learning for 6G Enabled-Networks: Requirements, Challenges and Future Directions

    Full text link
    Sixth-generation (6G) networks anticipate intelligently supporting a wide range of smart services and innovative applications. Such a context urges a heavy usage of Machine Learning (ML) techniques, particularly Deep Learning (DL), to foster innovation and ease the deployment of intelligent network functions/operations, which are able to fulfill the various requirements of the envisioned 6G services. Specifically, collaborative ML/DL consists of deploying a set of distributed agents that collaboratively train learning models without sharing their data, thus improving data privacy and reducing the time/communication overhead. This work provides a comprehensive study on how collaborative learning can be effectively deployed over 6G wireless networks. In particular, our study focuses on Split Federated Learning (SFL), a technique recently emerged promising better performance compared with existing collaborative learning approaches. We first provide an overview of three emerging collaborative learning paradigms, including federated learning, split learning, and split federated learning, as well as of 6G networks along with their main vision and timeline of key developments. We then highlight the need for split federated learning towards the upcoming 6G networks in every aspect, including 6G technologies (e.g., intelligent physical layer, intelligent edge computing, zero-touch network management, intelligent resource management) and 6G use cases (e.g., smart grid 2.0, Industry 5.0, connected and autonomous systems). Furthermore, we review existing datasets along with frameworks that can help in implementing SFL for 6G networks. We finally identify key technical challenges, open issues, and future research directions related to SFL-enabled 6G networks

    On-Demand Security Framework for 5GB Vehicular Networks

    Get PDF
    Building accurate Machine Learning (ML) attack detection models for 5G and Beyond (5GB) vehicular networks requires collaboration between Vehicle-to-Everything (V2X) nodes. However, while operating collaboratively, ensuring the ML model's security and data privacy is challenging. To this end, this article proposes a secure and privacy-preservation on-demand framework for building attack-detection ML models for 5GB vehicular networks. The proposed framework emerged from combining 5GB technologies, namely, Federated Learning (FL), blockchain, and smart contracts to ensure fair and trusted interactions between FL servers (edge nodes) with FL workers (vehicles). Moreover, it also provides an efficient consensus algorithm with an intelligent incentive mechanism to select the best FL workers that deliver highly accurate local ML models. Our experiments demonstrate that the framework achieves higher accuracy on a well-known vehicular dataset with a lower blockchain consensus time than related solutions. Specifically, our framework enhances the accuracy by 14% and decreases the consensus time, at least by 50%, compared to related works. Finally, this article discusses the framework's key challenges and potential solutions

    A Lightweight 5G-V2X Intra-slice Intrusion Detection System Using Knowledge Distillation

    Get PDF
    As the automotive industry grows, modern vehicles will be connected to 5G networks, creating a new Vehicular-to-Everything (V2X) ecosystem. Network Slicing (NS) supports this 5G-V2X ecosystem by enabling network operators to flexibly provide dedicated logical networks addressing use case specific-requirements on top of a shared physical infrastructure. Despite its benefits, NS is highly vulnerable to privacy and security threats, which can put Connected and Automated Vehicles (CAVs) in dangerous situations. Deep Learning-based Intrusion Detection Systems (DL-based IDSs) have been proposed as the first defense line to detect and report these attacks. However, current DL-based IDSs are processing and memory-consuming, increasing security costs and jeopardizing 5G-V2X acceptance. To this end, this paper proposes a lightweight intrusion detection scheme for 5G-V2X sliced networks. Our scheme leverages DL and Knowledge Distillation (KD) for training in the cloud and offloading knowledge to slice-tailored lightweight DL models running on CAVs. Our results show that our scheme provides an optimal trade-off between detection accuracy and security overhead. Specifically, it can reduce security overhead in computation and memory complexity to more than 50% while keeping almost the same performance as heavy DL-based IDSs

    DRIVE-B5G: A Flexible and Scalable Platform Testbed for B5G-V2X Networks

    Get PDF
    Unlike previous mobile networks, 5G and beyond (B5G) networks are expected to be the key enabler of various vertical industries such as eHealth, intelligent transportation, and Industrial IoT verticals. To support that, B5G networks enable to sharing of common physical resources (radio, computation, network) among different tenants, thanks to network slicing concept and network softwarization technologies, including Software Defined Networking (SDN) and Network Function Virtualization (NFV). Therefore, new research challenges related to B5G networks have emerged, such as resources management and orchestration, service chaining, security, and QoS management. However, there is a lack of a realistic platform enabling researchers to design and validate their solutions effectively, since B5G networks are still in their early stages. In this paper, we first discuss the different methods for deploying realistic B5G platforms for the V2X vertical, including the key B5G technologies. Then, we describe DRIVE-B5G, a novel platform that serves as an end-to-end test-bed to emulate a vehicular network environment, allowing researchers to provide proof of concept, validate, and evaluate their research approaches

    Edge Computing enabled Intrusion Detection for C-V2X Networks using Federated Learning

    Get PDF
    Intrusion detection systems (IDS) have already demonstrated their effectiveness in detecting various attacks in cellular vehicle-to-everything (C-V2X) networks, especially when using machine learning (ML) techniques. However, it has been shown that generating ML-based models in a centralized way consumes a massive quantity of network resources, such as CPU/memory and bandwidth, which may represent a critical issue in such networks. To avoid this problem, the new concept of Federated Learning (FL) emerged to build ML-based models in a distributed and collaborative way. In such an approach, the set of nodes, e.g., vehicles or gNodeB, collaborate to create a global ML model trained across these multiple decentralized nodes, each one with its respective data samples that are not shared with any other nodes. In this way, FL enables, on the one hand, data privacy since sharing data with a central location is not always feasible and, on the other hand, network overhead reduction. This paper designs a new IDS for C-V2X networks based on FL. It leverages edge computing to not only build a prediction model in a distributed way but also to enable low-latency intrusion detection. Moreover, we build our FL-based IDS on top of the well-known CIC-IDS2018 dataset, which includes the main network attacks. Noting that, we first perform feature engineering on the dataset using the ANOVA method to consider only the most informative features. Simulation results show the efficiency of our system compared to the existing solutions in terms of attack detection accuracy while reducing network resource consumption

    Edge Computing-enabled Intrusion Detection for C-V2X Networks using Federated Learning

    Get PDF
    Intrusion detection systems (IDS) have already demonstrated their effectiveness in detecting various attacks in cellular vehicle-to-everything (C-V2X) networks, especially when using machine learning (ML) techniques. However, it has been shown that generating ML-based models in a centralized way consumes a massive quantity of network resources, such as CPU/memory and bandwidth, which may represent a critical issue in such networks. To avoid this problem, the new concept of Federated Learning (FL) emerged to build ML-based models in a distributed and collaborative way. In such an approach, the set of nodes, e.g., vehicles or gNodeB, collaborate to create a global ML model trained across these multiple decentralized nodes, each one with its respective data samples that are not shared with any other nodes. In this way, FL enables, on the one hand, data privacy since sharing data with a central location is not always feasible and, on the other hand, network overhead reduction. This paper designs a new IDS for C-V2X networks based on FL. It leverages edge computing to not only build a prediction model in a distributed way but also to enable low-latency intrusion detection. Moreover, we build our FL-based IDS on top of the well-known CIC-IDS2018 dataset, which includes the main network attacks. Noting that, we first perform feature engineering on the dataset using the ANOVA method to consider only the most informative features. Simulation results show the efficiency of our system compared to the existing solutions in terms of attack detection accuracy while reducing network resource consumption

    A Survey on Explainable AI for 6G O-RAN: Architecture, Use Cases, Challenges and Research Directions

    Full text link
    The recent O-RAN specifications promote the evolution of RAN architecture by function disaggregation, adoption of open interfaces, and instantiation of a hierarchical closed-loop control architecture managed by RAN Intelligent Controllers (RICs) entities. This paves the road to novel data-driven network management approaches based on programmable logic. Aided by Artificial Intelligence (AI) and Machine Learning (ML), novel solutions targeting traditionally unsolved RAN management issues can be devised. Nevertheless, the adoption of such smart and autonomous systems is limited by the current inability of human operators to understand the decision process of such AI/ML solutions, affecting their trust in such novel tools. eXplainable AI (XAI) aims at solving this issue, enabling human users to better understand and effectively manage the emerging generation of artificially intelligent schemes, reducing the human-to-machine barrier. In this survey, we provide a summary of the XAI methods and metrics before studying their deployment over the O-RAN Alliance RAN architecture along with its main building blocks. We then present various use-cases and discuss the automation of XAI pipelines for O-RAN as well as the underlying security aspects. We also review some projects/standards that tackle this area. Finally, we identify different challenges and research directions that may arise from the heavy adoption of AI/ML decision entities in this context, focusing on how XAI can help to interpret, understand, and improve trust in O-RAN operational networks.Comment: 33 pages, 13 figure

    DRIVE-B5G: A Flexible and Scalable Platform Testbed for B5G-V2X Networks

    Get PDF
    Unlike previous mobile networks, 5G and beyond (B5G) networks are expected to be the key enabler of various vertical industries such as eHealth, intelligent transportation, and Industrial IoT verticals. To support that, B5G networks enable to sharing of common physical resources (radio, computation, network) among different tenants, thanks to network slicing concept and network softwarization technologies, including Software Defined Networking (SDN) and Network Function Virtualization (NFV). Therefore, new research challenges related to B5G networks have emerged, such as resources management and orchestration, service chaining, security, and QoS management. However, there is a lack of a realistic platform enabling researchers to design and validate their solutions effectively, since B5G networks are still in their early stages. In this paper, we first discuss the different methods for deploying realistic B5G platforms for the V2X vertical, including the key B5G technologies. Then, we describe DRIVE-B5G, a novel platform that serves as an end-to-end test-bed to emulate a vehicular network environment, allowing researchers to provide proof of concept, validate, and evaluate their research approaches

    Deep Learning-based Intra-slice Attack Detection for 5G-V2X Sliced Networks

    Get PDF
    peer reviewedConnected and Automated Vehicles (CAVs) represent one of the main verticals of 5G to provide road safety, road traffic efficiency, and user convenience. As a key enabler of 5G, Network Slicing (NS) aims to create Vehicle-to-Everything (V2X) network slices with different network requirements on a shared and programmable physical infrastructure. However, NS has generated new network threats that might target CAVs leading to road hazards. More specifically, such attacks may target either the inner functioning of each V2X-NS (intra-slice) or break the NS isolation. In this paper, we aim to deal with the raised question of how to detect intra-slice V2X attacks. To do so, we leverage both Virtual Security as a Service (VSaS) concept and deep learning (DL) to deploy a set of DL-empowered security Virtual Network Functions (sVNFs) within V2X-NSs. These sVNFs are in charge of detecting such attacks, thanks to a DL model that we also build in this work. The proposed DL model is trained, validated, and tested using a publicly available dataset. The results show the efficiency and accuracy of our scheme to detect intra-slice V2X attacks

    5G Vehicle-to-Everything at the Cross-Borders: Security Challenges and Opportunities

    Get PDF
    5G Vehicle-to-Everything (5G-V2X) communications will play a vital role in the development of the automotive industry. Indeed and thanks to the Network Slicing (NS) concept of 5G and beyond networks (B5G), unprecedented new vehicular use–cases can be supported on top of the same physical network. NS promises to enable the sharing of common network infrastructure and resources while ensuring strict traffic isolation and providing necessary network resources to each NS. However, enabling NS in vehicular networks brings new security challenges and requirements that automotive or 5G standards have not yet addressed. Attackers can exploit the weakest link in the slicing chain, connected and automated vehicles, to violate the slice isolation and degrade its performance. Furthermore, these attacks can be more powerful, especially if they are produced in cross-border areas of two countries, which require an optimal network transition from one operator to another. Therefore, this article aims to provide an overview of newly enabled 5G-V2X slicing use cases and their security issues while focusing on cross-border slicing attacks. It also presents the open security issues of 5G-V2X slicing and identifies some opportunities
    corecore