Efficient Adversarial Attacks Against DRL-Based Resource Allocation in Intelligent O-RAN for V2X

Yared Abera Ergu, Van-Linh Nguyen, Ren-Hung Hwang, Ying-Dar Lin, Chuan-Yu Cho, Hui-Kuo Yang, Hyundong Shin, Trung Q. Duong

Published: 01 Jan 2025, Last Modified: 24 Oct 2025IEEE Transactions on Vehicular TechnologyEveryoneRevisionsCC BY-SA 4.0
Abstract: Artificial intelligence (AI) is projected to be a critical part of open radio access networks (O-RAN) to enable intelligence for connectivity management in smart vehicle-to-everything (V2X) networks and vehicle road cooperation systems. However, the openness and dependence of AI models on massive volumes of data render them subject to serious security vulnerabilities, such as adversarial attacks. This study investigates security issues in O-RAN's near real-time RAN intelligent controller (RIC), with an emphasis on deep reinforcement learning (DRL)-based resource allocation. We introduce a novel attack manipulating environmental observations to mislead AI agents, resulting in erroneous allocations and decreased physical resource block (PRB) transmission rates for various vehicular communications. We also discover flaws where compromised users or signal jammers can fake signal power to trick the AI agent's state observation. This can lead to a policy infiltration attack that makes the network performance drop significantly. Evaluation results show up to a 40% decline in user data rates, a 77.74% reduction in packet delivery rates, and significant disruptions in ultra-reliable and low-latency communications (uRLLC) services such as remote driving and connected automated vehicles. The policy infiltration attack causes a 20% increase in packet losses and up to 150% delay overall. The attack efficiency emphasizes the need for adversarial training in protecting AI-driven applications, which should be addressed in future O-RAN security specifications and AI-powered vehicular networks.
Loading