How to Attack and Defend NextG Radio Access Network Slicing With Reinforcement Learning

dc.contributor.authorShi, Yien
dc.contributor.authorSagduyu, Yalin E.en
dc.contributor.authorErpek, Tugbaen
dc.contributor.authorGursoy, M. Cenken
dc.date.accessioned2023-04-10T17:46:36Zen
dc.date.available2023-04-10T17:46:36Zen
dc.date.issued2023en
dc.description.abstractIn this paper, reinforcement learning (RL) for network slicing is considered in next generation (NextG) radio access networks, where the base station (gNodeB) allocates resource blocks (RBs) to the requests of user equipments and aims to maximize the total reward of accepted requests over time. Based on adversarial machine learning, a novel over-the-air attack is introduced to manipulate the RL algorithm and disrupt NextG network slicing. The adversary observes the spectrum and builds its own RL based surrogate model that selects which RBs to jam subject to an energy budget with the objective of maximizing the number of failed requests due to jammed RBs. By jamming the RBs, the adversary reduces the RL algorithm's reward. As this reward is used as the input to update the RL algorithm, the performance does not recover even after the adversary stops jamming. This attack is evaluated in terms of both the recovery time and the (maximum and total) reward loss, and it is shown to be much more effective than benchmark (random and myopic) jamming attacks. Different reactive and proactive defense schemes such as suspending the RL algorithm's update once an attack is detected, introducing randomness to the decision process in RL to mislead the learning process of the adversary, or manipulating the feedback (NACK) mechanism such that the adversary may not obtain reliable information are introduced to show that it is viable to defend NextG network slicing against this attack, in terms of improving the RL algorithm's reward.en
dc.description.notesThis effort is supported in part by the U.S. Army Research Office under contract W911NF-17-C-0090. The content of the information does not necessarily reflect the position or the policy of the U.S. Government, and no official endorsement should be inferred. This effort is also supported in part by the Commonwealth Cyber Initiative, an investment in the advancement of cyber RD, innovation, and workforce development. For more information about CCI, visit www.cyberinitiative.org.en
dc.description.sponsorshipU.S. Army Research Office [W911NF-17-C-0090]; Commonwealth Cyber Initiative, an investment in the advancement of cyber RD, innovation, and workforce developmenten
dc.description.versionPublished versionen
dc.format.mimetypeapplication/pdfen
dc.identifier.doihttps://doi.org/10.1109/OJVT.2022.3229229en
dc.identifier.eissn2644-1330en
dc.identifier.urihttp://hdl.handle.net/10919/114456en
dc.identifier.volume4en
dc.language.isoenen
dc.publisherIEEEen
dc.rightsCreative Commons Attribution 4.0 Internationalen
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/en
dc.subjectNextG securityen
dc.subjectnetwork slicingen
dc.subjectradio access networken
dc.subjectreinforcement learningen
dc.subjectadversarial machine learningen
dc.subjectjammingen
dc.subjectwireless attacken
dc.subjectdefenseen
dc.titleHow to Attack and Defend NextG Radio Access Network Slicing With Reinforcement Learningen
dc.title.serialIEEE Open Journal of Vehicular Technologyen
dc.typeArticle - Refereeden
dc.type.dcmitypeTexten

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
How_to_Attack_and_Defend_NextG.pdf
Size:
1.7 MB
Format:
Adobe Portable Document Format
Description:
Published version