How to Attack and Defend 5G Radio Access Network Slicing with Reinforcement Learning

01/14/2021
by   Yi Shi, et al.
0

Reinforcement learning (RL) for network slicing is considered in the 5G radio access network, where the base station, gNodeB, allocates resource blocks (RBs) to the requests of user equipments and maximizes the total reward of accepted requests over time. Based on adversarial machine learning, a novel over-the-air attack is introduced to manipulate the RL algorithm and disrupt 5G network slicing. Subject to an energy budget, the adversary observes the spectrum and builds its own RL-based surrogate model that selects which RBs to jam with the objective of maximizing the number of failed network slicing requests due to jammed RBs. By jamming the RBs, the adversary reduces the RL algorithm's reward. As this reward is used as the input to update the RL algorithm, the performance does not recover even after the adversary stops jamming. This attack is evaluated in terms of the recovery time and the (maximum and total) reward loss, and it is shown to be much more effective than benchmark (random and myopic) jamming attacks. Different reactive and proactive defense mechanisms (protecting the RL algorithm's updates or misleading the adversary's learning process) are introduced to show that it is viable to defend 5G network slicing against this attack.

READ FULL TEXT
research
01/21/2021

Adversarial Machine Learning for Flooding Attacks on 5G Radio Access Network Slicing

Network slicing manages network resources as virtual resource blocks (RB...
research
08/29/2022

Understanding the Limits of Poisoning Attacks in Episodic Reinforcement Learning

To understand the security threats to reinforcement learning (RL) algori...
research
03/03/2022

Can Authoritative Governments Abuse the Right to Access?

The right to access is a great tool provided by the GDPR to empower data...
research
05/29/2022

On the Robustness of Safe Reinforcement Learning under Observational Perturbations

Safe reinforcement learning (RL) trains a policy to maximize the task re...
research
11/20/2022

Adversarial Cheap Talk

Adversarial attacks in reinforcement learning (RL) often assume highly-p...
research
03/05/2023

Sparsity-Aware Intelligent Massive Random Access Control in Open RAN: A Reinforcement Learning Based Approach

Massive random access of devices in the emerging Open Radio Access Netwo...
research
04/01/2023

Recover Triggered States: Protect Model Against Backdoor Attack in Reinforcement Learning

A backdoor attack allows a malicious user to manipulate the environment ...

Please sign up or login with your details

Forgot password? Click here to reset