5G

 

AI and 5G




Put to use in the context of 5G networks, AI can contribute to optimising network performance and resource allocation, detect and mitigate security threats, and enhance user experience, among other applications. But AI is also leveraged by bad actors for malicious purposes. 

AI in 5G network management 

Network operators can use AI in their network management and optimisation processes in various ways. AI systems can analyse data related to network performance metrics, user behaviour, and traffic patterns to optimise network resource allocation, predict and prevent traffic congestion, and improve overall network efficiency and quality of service. AI can also dynamically allocate network resources for different services and applications, ensuring adaptation to changing network conditions and user demands and facilitating efficient service delivery. AI tools can further be used to enable the integration of edge computing capabilities into 5G networks (allowing data to be processed as close to the data source as possible, to reduce latency and bandwidth use) by enabling real-time data processing, intelligent decision-making, and faster response times. AI is also useful for predicting, detecting, and mitigating security threats. For instance, AI-powered security solutions are often used to analyse network traffic patterns, identify anomalies and suspicious activities, and help enhance the overall resilience and security of 5G networks.

AI and network security threats

As 5G networks continue to be deployed around the world, malicious actors can leverage AI to craft powerful attacks threatening the integrity, stability, and security of such networks. AI techniques enable attackers to automate and optimise cyberattacks such as sophisticated malware propagation, evasion of security defences, and targeted exploitation of vulnerabilities in 5G infrastructures. In addition, the integration of AI within critical components of 5G networks introduces new vulnerabilities that adversaries can exploit; for instance, they can manipulate AI models, triggering erroneous processes that compromise network security and integrity.

 5G, the fifth generation mobile network, is key in unlocking the potential of artificial intelligence (AI), the Internet of Things, (IoT), virtual, augmented, and mixed reality, and more. The extent to which 5G will revolutionise many aspects of our lives is akin to the shift from the typewriter to the computer.

What makes 5G special compared to previous generations of mobile networks? It comes down to the differences in speed, latency, and bandwidth. 5G can be significantly faster than 4G, delivering speeds up to 10 Gigabits-per-second, while 4G tops out at 100 Megabits-per-second. Practically, 5G will allow us to download a high-resolution movie in 6 seconds at its peak download speeds. It will also essentially eliminate latency, enabling virtual interactions and conversations to be closer to real life. More importantly, this will enable real-time remote control of automated processes (in industrial or smart city environments, for instance) that involve sensors and smart devices. Furthermore, 5G comes with increased bandwidth, which allows for greater optimisation of network traffic and smooth handling of usage spikes. We will experience seamless connectivity even in crowded areas, such as concert halls and stadiums. 5G will allow billions (if not trillions) of smart devices around the world to connect and interact among themselves, and with us.

The infrastructure of 5G will look significantly different from past generations. 5G network infrastructure allows signal processing power to be moved away from transmitting ends and further into the cloud. Essentially, 5G networks can be virtualised and will open up wider market competition, as this virtualisation enables the use of end-equipments that are less technologically advanced and software solutions to operate a network. The market for 5G network infrastructure will include not only traditional telecom equipment vendors (e.g. Huawei and Ericsson), but also software-based companies such as Rakuten and Microsoft.

Benefits

First and foremost, 5G will enable IoT to reach its full potential. It will not be limited to smartphones and tablets – industrial sensors, wearables, medical devices, and vehicles will all be connected to the Internet once 5G networks are widely available. Factories will be ‘smart’ in the way that each sensor that collects and uses data will optimise production line efficiency, reduce energy consumption, and enable time-sensitive operational process controls. In smart cities, AI will adjust traffic signals and traffic flows by conducting video analytics to minimise the time cars idle at red lights, which can save time and frustration while helping reduce air pollution.

With the significantly reduced latency of 5G, virtual reality (VR) will be highly relevant in the field of medicine. For instance, surgeons can perform remote surgery by using a VR headset and a special glove to control a robot arm that performs an operation in another location. Teleconferences, which have become a new norm for office workers due to COVID-19, can also offer a closer-to-real life experience as people will experience fewer dropped connections, better video quality, and ubiquitous mobility thanks to the improved speed and bandwidth of 5G.

Broader context

The advent of 5G comes with edge analytics, a new model of data analysis, in which data processing occurs at a non-central location such as a device and sensors. Traditionally, AI has been equipped in the cloud; however, it will be fully distributed to each device and sensor to conduct data analysis. In theory, this approach enhances privacy and reliability because the data processing is conducted closer to the source.

Technonationalism is not new but has escalated with 5G. Many countries are racing to develop and deploy 5G networks because of two assumptions: (a) An early technological lead grants countries a first-mover advantage and (b) dominance in certain technologies grants them an edge in other fields. The ongoing confrontation between the USA and China is a prime example that illustrates how the world’s large economic and military powers see 5G as critical for the control of their economies and national security. 5G diplomacy based on uni- and bilateralism can lead to a fragmented world. The Eurasia Group warns that a bifurcated 5G ecosystem will increase the risk that the global technology ecosystem separates in two parts that are politically divided and potentially non-interoperable.

5G technology will transform military capabilities by: Improving intelligence, surveillance, and reconnaissance (ISR) systems and processing; enabling new methods of command and control (C2); and streamlining logistics systems for better efficiency. The low latency communication on 5G network will also enable unmanned and autonomous weapon systems.

Security

The virtualisation of 5G brings a new set of security vulnerabilities to the fore. As 5G infrastructure becomes more virtualised (i.e. detached), moving from signal processing at specific and complex transmitting ends to processing software in the cloud, the vulnerability of the cloud and underlying systems introduce vulnerabilities to the 5G network as well. In previous generations of mobile networks, specific hardware by specific vendors would need to have been targeted by specific attacks to exploit vulnerabilities.

As more and more devices and sensors are connected to the Internet and become integral to many aspects of our lives – such as water supply, traffic lights, and autonomous vehicles – the security of 5G is no longer just a technical issue but an economic, political, and trade issue. Protecting 5G networks from malicious attacks will become even more challenging due to the exponential growth in the number of connected devices and the large bandwidth inherent to the network. It highlights the importance of enforcing security standards for IoT devices because unsecure or compromised devices will lead to network breaches and hacking.

Just like 3G and 4G, a lack of transparency continues to be an issue with 5G, but to a greater extent. The amount of data that travels through current broadband networks will drastically increase with 5G. As more and more devices will be connected to 5G networks, the amount of data that travels through networks will exponentially grow, which makes it extremely difficult to detect suspicious activity.

Though no concrete evidence has been discovered yet, surveillance and espionage are key security concerns regarding 5G to nation states. In 2012, the US raised the potential risk of espionage by foreign adversaries through telecommunications infrastructure. Since then, trust has become an integral element to take into consideration in the procurement and deployment of equipment to build future generations of telecommunications networks, and even more so with 5G. To ensure the security of telecommunications networks and avoid equipment manufactured by ‘untrustworthy suppliers’, the EU and NATO agreed on a 5G cybersecurity framework, the Prague Proposal. Additionally, the EU released its 5G Toolbox to identify ‘a possible common set of measures which can mitigate the main cybersecurity risks of 5G networks’ and ensure a co-ordinated approach among its member states. In the London Declaration, NATO and its allies showed their commitment to ensure the security of 5G communications and recognised the need to rely on secure and resilient systems.

While governments seek to diversify vendors of 5G equipment, manufacturers aim to offer transparency. For instance, Huawei opened its Cyber Security Transparency Centre in Brussels and Oxfordshire. However, it is questionable to what extent transparency centres are useful because of limitations, such as the level of openness to code, available time, and depth of inspections. The UK government’s Huawei Cyber Security Evaluation Centre Oversight Board confirmed such limitations in its 2020 annual report. The board stated that through its inspection, it can provide only limited assurance that all risks to the UK’s national security by Huawei’s involvement in the UK’s critical communication infrastructure can be sufficiently mitigated long-term.

Trade and economics

The market of mobile network infrastructure is competitive. The three major players are Huawei, Ericsson, and Nokia, which own 80% of the market share in 3G and LTE networks. With 5G networks being rolled out globally, these three companies remain the most powerful. Out of 239 5G deals across the world, Huawei won 38% of contracts, Ericsson 34%, and Nokia 28%. Huawei’s edge in the 5G market lies in its 1500 patents on 5G-related technology. When combined with patents by ZTE, 36% of all 5G patents are owned by Chinese firms.

As mobile networks have evolved, the supply chain has become more complex than ever, with software and hardware components being manufactured all over the world. As technonationalism continues to rise, governments are attempting to place restrictions on access to key components that are manufactured by unfavorable foreign vendors. However, such measures can end up adversely affecting the market for all by slowing down competition and increasing costs.

To accelerate the development and deployment of virtualised 5G networks, service providers established the Open Access Radio Network (O-RAN) Alliance in 2018. The O-RAN Alliance’s open interface will allow small vendors to launch their own services and allow operators to customise their networks. The alliance was founded by AT&T (USA), China Mobile (Tawian), NTT Docomo (Japan), Orange (France), and others. While the O-RAN Alliance represents an alternative for countries that boycott Huawei, its open architecture 5G networks would be still built on Chinese patents with royalties being paid to Chinese firms, even should the networks be equipped entirely by vendors from the USA and its allies.

Comments

Popular posts from this blog

How are drones used in crop science?

This non-profit is using 3D-printing technology to give refugees the gift of hearing

Metaverse