Abstract: Artificial intelligence (AI) is projected to be a critical part of open radio access networks (O-RAN) to enable intelligence for connectivity management in smart vehicle-to-everything (V2X) networks and vehicle road cooperation systems. However, the openness and dependence of AI models on massive volumes of data render them subject to serious security vulnerabilities, such as adversarial attacks. This study investigates security issues in O-RAN's near real-time RAN intelligent controller (RIC), with an emphasis on deep reinforcement learning (DRL)-based resource allocation. We introduce a novel attack manipulating environmental observations to mislead AI agents, resulting in erroneous allocations and decreased physical resource block (PRB) transmission rates for various vehicular communications. We also discover flaws where compromised users or signal jammers can fake signal power to trick the AI agent's state observation. This can lead to a policy infiltration attack that makes the network performance drop significantly. Evaluation results show up to a 40% decline in user data rates, a 77.74% reduction in packet delivery rates, and significant disruptions in ultra-reliable and low-latency communications (uRLLC) services such as remote driving and connected automated vehicles. The policy infiltration attack causes a 20% increase in packet losses and up to 150% delay overall. The attack efficiency emphasizes the need for adversarial training in protecting AI-driven applications, which should be addressed in future O-RAN security specifications and AI-powered vehicular networks.
External IDs:doi:10.1109/tvt.2024.3466511
Loading