<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.0.2) -->
<?rfc tocompact="yes"?>
<?rfc tocindent="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sarischo-6gip-aiml-security-privacy-00" category="std" consensus="true" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.4 -->
  <front>
    <title abbrev="AI/ML  security privacy implications">Security and Privacy Implications of 3GPP AI/ML Networking Studies for 6G</title>
    <seriesInfo name="Internet-Draft" value="draft-sarischo-6gip-aiml-security-privacy-00"/>
    <author initials="B." surname="Sarikaya" fullname="Behcet Sarikaya">
      <organization>Unaffiliated</organization>
      <address>
        <email>sarikaya@ieee.org</email>
      </address>
    </author>
    <author initials="R." surname="Schott" fullname="Roland Schott">
      <organization abbrev="Deutsche Telekom">Deutsche Telekom</organization>
      <address>
        <postal>
          <street>Ida-Rhodes-Strasse 2</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>Roland.Schott@telekom.de</email>
      </address>
    </author>
    <date year="2024" month="February" day="09"/>
    <abstract>
      <?line 88?>

<t>This document provides an overview of 3GPP work on Artificial Intelligence/ Machine Learning (AI/ML) networking. Application areas and corresponding proposed modifications to the architecture are identified. Security and privacy issues of these new applications need to be identified out of which IETF work could emerge.</t>
    </abstract>
  </front>
  <middle>
    <?line 93?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Artificial Intelligence (AI) has historically been defined as the science and engineering to build intelligent machines capable of carrying out tasks as humans do. Inspired from the way human brain works, machine learning (ML) is defined as the field of study that gives computers the ability to learn without being explicitly programmed. Since it is believed that the main computational elements in a human brain are 86 billion neurons, the more popular ML approaches are using “neural network” as the model. Neural networks (NN) take their inspiration from the notion that a neuron’s computation involves a weighted sum of the input values. A computational neural network contains the neurons in the input layer which receive some values and propagate them to the neurons in the middle layer of the network, which is also called a “hidden layer”. The weighted sums from one or more hidden layers are ultimately propagated to the output layer, which presents the final outputs of the network.</t>
      <t>Neural networks having more than three layers, i.e., more than one hidden layer are called deep neural networks (DNN). In contrast to the conventional shallow-structured NN architectures, DNNs, also referred to as deep learning, made amazing breakthroughs since 2010s in many essential application areas because they can achieve human-level accuracy or even exceed human accuracy. Deep learning techniques use supervised and/or unsupervised strategies to automatically learn hierarchical representations in deep architectures for classification. With a large number of hidden layers, the superior performance of DNNs comes from its ability to extract high-level features from raw sensory data after using statistical learning over a large amount of data to obtain an effective representation of an input space. In recent years, thanks to the big data obtained from the real world, the rapidly increased computation capacity and continuously-evolved algorithms, DNNs have become the most popular ML models for many AI applications.</t>
      <t>The performance of DNNs is gained at the cost of high computational complexity. Hence more efficient compute engines are often used, e.g. graphics processing units (GPU) and network processing units (NPU). Compared to the inference which only involves the feedforward process, the training often requires more computation and storage resources because it involves also the back propagation process.</t>
      <t>Many DNN models have been developed over the past two decades. Each of these models has a different “network architecture” in terms of number of layers, layer types, layer shapes (i.e., filter size, number of channels and filters), and connections between layers. Three popular structures of DNNs: multilayer perceptron (MLPs), convolution neural networks (CNNs), and recurrent neural networks (RNNs). Multilayer perceptron (MLP) model is the most basic DNN, which is composed of a series of fully connected layers. In a fully connected layer, all outputs are connected to all inputs. Hence MLP requires a significant amount of storage and computation.</t>
      <t>A convolution neural network (CNN) is composed of multiple convolutional layers. Applying various convolutional filters, CNN models can capture the high-level representation of the input data, making it popular for image classification and speech recognition tasks. Recurrent neural network (RNN) models are another type of DNNs, which use sequential data feeding. The input of RNN consists of the current input and the previous samples. RNN models have been widely used in the natural language processing task on mobile devices, e.g., language modeling, machine translation, question answering, word embedding, and document classification.</t>
      <t>AI/ML has very many applications, however, two areas have emerged that involve networking. One is the network optimization, time-series forecasting, predictive maintenance, Quality of Experience (QoE) modeling and the other is speech recognition, image recognition, video processing. In the former, the end device is the base station and the latter the UE <xref target="TR22.874"/>.</t>
      <t>This document aims to present Artificial Intelligence Machine Learning (AIML) networking issues that may require further protocol work, mostly on the security and privacy aspects of networking.</t>
    </section>
    <section anchor="training-and-federated-learning">
      <name>Training and Federated Learning</name>
      <t>Training is a process in which an AI/ML model learns to perform its given tasks, more specifically, by optimizing the value of the weights in the DNN. A DNN is trained by inputting a training set, which are often correctly-labelled training samples. Taking image classification for instance, the training set includes correctly-classified images. The training process is repeated iteratively to continuously reduce the overall loss. Until the loss is below a predefined threshold, the DNN with high precision is obtained. After a DNN is trained, it can perform its task by computing the output of the network using the weights determined during the training process, which is referred to as inference. In the model inference process, the inputs from the real world are passed through the DNN. Then the prediction for the task is output. For instance, the inputs can be pixels of an image, sampled amplitudes of an audio wave or the numerical representation of the state of some system or game. Correspondingly, the outputs of the network 
can be a probability that an image contains a particular object.</t>
      <t>With continuously improving capability of cameras and sensors on mobile devices, valuable training data, which are essential for AI/ML model training, are increasingly generated on the devices. For many AI/ML tasks, the fragmented data collected by mobile devices are essential for training a global model. In the traditional approaches, the training data gathered by mobile devices are centralized to the cloud datacenter for a centralized training.</t>
      <t>In Distributed Learning mode, each computing node trains its own DNN model locally with local data, which preserves private information locally. To obtain the global DNN model by sharing local training improvement, nodes in the network will communicate with each other to exchange the local model updates. In this mode, the global DNN model can be trained without the intervention of the cloud datacenter.</t>
      <t>In 3GPP Federated Learning (FL) mode, the cloud server trains a global model by aggregating local models partially-trained by each end devices. The most agreeable Federated Learning algorithm so far is based on the iterative model averaging whereby within each training iteration, a UE performs the training based on the model downloaded from the AI server using the local training data. Then the UE reports the interim training results (e.g., gradients for the DNN) to the cloud server via 5G uplink (UL) channels. The server aggregates the gradients from the UEs, and updates the global model. Next, the updated global model is distributed to the UEs via 5G Data Link (DL) channels. 
Then the UEs can perform the training for the next iteration.</t>
      <t>Summarizing, we can say that distributed learning  is about having centralized data but distributing the model training to different nodes, while federated learning (FL) is about having decentralized data and training and in effect having a central model <xref target="Srini21"/></t>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <t>A new framework for protocols called Service based architecture (SBA) comprises Network Functions (NFs) that expose services through RESTful APIs has been defined. There are providers and consumers (publishers and subscribers) which are new functions in the system <xref target="IsNo20"/>.</t>
      <t>3GPP core, i.e., 5GC network, aka mobile core network, which establishes reliable, secure connectivity to the network for end users and provides access to its services has a new server function: The Network Data Analytics Function (NWDAF) provides analytics to 5GC Network Functions (NFs) and Operations and Management (OAM). An NWDAF may contain the Analytics logical function (AnLF): A logical function in NWDAF, which performs inference, derives analytics information and Model Training logical function (MTLF) which trains Machine Learning (ML) models and exposes new training services. The Application AI/ML operation logic is controlled by an Application Function (AF). Any AF request to the 5G System in the context of 5G System (5GS) (which consists of the 5GC (5G Core Network), 5G-AN (5G Access Network) and UE) assistance to Application AI/ML operation should be authorized by the 5GC <xref target="TR23.700-80"/>.</t>
      <t>NWDAF relies on various sources of data input including data from 5G core NFs, AFs, 5G core repositories, e.g., Network Repository Function (NRF), Unified Data Management (UDM), etc., and OAM data, including performance measurements (PMs), Key Performance Indicators (KPIs), configuration management data and alarms. An NWDAF may provide in turn analytics output results to 5G core NF, AFs, and OAM. Optionally, Data Collection Coordination Function (DCCF) and Messaging Framework Adaptor Function (MFAF) may be involved to distribute and collect repeated data towards or from various data sources. Note that AF contains a Network Exposure Function (NEF) if it is an untrusted AF. NEF may assist the AI/ML application server in scheduling available UE(s) to participate in the AI/ML operation, e.g., Federated Learning. 
Also, 5GC may assist the selection of UEs to serve as FL clients, by providing a list of target member UE(s), then subscribing to the NEF to be notified about the subset list of UE(s) (i.e., list of candidate UE(s)) that fulfill certain filtering criteria <xref target="TR23.700-82"/>.</t>
      <t><xref target="TR23.700-82"/> expands upon the data analytics as a useful tool to optimize the service offering by predicting events related to the network or UE conditions. These services however can also assist the 3rd party AI/ML application service provider for the AI/ML model distribution, transfer, training for various applications (e.g., video/speech recognition, robot control, automotive). This takes us to the concept of the application enablement layer can play role on the exposure of AI/ML services from different 3GPP domains to the Application Service Providers (ASP) in a unified manner.</t>
    </section>
    <section anchor="security-and-privacy">
      <name>Security and Privacy</name>
      <t>AI/ML networking raises many security and privacy issues. <xref target="TR23.700-80"/> and <xref target="TR23.700-82"/> identify a number of key issues  and <xref target="TR33.898"/> presents a study on one of the key issues which will be detailed here.</t>
      <t><xref target="TR23.700-80"/> studies the exposure of different types of assistance information such as traffic rate, packet delay, packet loss rate, network condition changes, candidate FL members, geographical distribution information, etc., to AF for AI / ML operations. Some of assistance information could be user privacy sensitive, such as candidate FL members, geographical distribution information.
There is a need to study how to protect such privacy-related assistance information. In addition, 5GC needs to determine which assistance information is required by AF to complete AI/ML operation and to avoid exposing information that is unnecessary for AI/ML operations.</t>
      <t>Because of the use of Restful API which depend on the use of HTTP protocol, OAuth <xref target="RFC6749"/> protocol seems to be the natural choice here for authorization.</t>
      <t>One solution can be developed reusing existing mechanism for authorization of 5GC assistance information exposure to AF. The solution is based on reusing the OAuth-based authorization mechanism 
OAuth <xref target="RFC6749"/> protocol which extends traditional client-server authentication 
by providing a third-party client with a token.  Since such
   token resembles a different set of credentials compared to those of
   the resource owner, the device needs not be allowed to use the
   resource owner's credentials to access protected resources.</t>
      <t>UE privacy profile/local policies stored in a database can also be employed to authorize UE-related 5GC assistance information exposure. UE privacy profile/local policies may also contain protection policies that indicate how 5GC assistance information should be protected (e.g., encryption, integrity protection, etc.). NWDAF via Network Exposure Function (NEF) sends the UE-related 5GC assistance information to AF when the local policies/UE privacy profile authorize the AF to access the information. According to the local policies/UE privacy profiles, NWDAF may need to protect the 5GC assistance information with security mechanisms.</t>
      <t>Network Functions securely expose capabilities and events to 3rd party Application Functions (AF) via Network Exposure Function (NEF). The interface between the NEF and the Application Function needs integrity protection, replay protection, confidentiality protection for communication between the NEF and Application Function, and mutual authentication between the NEF and Application Function and protect internal 5G Core network information. The NEF also enable secure provision of information in the 3GPP network by authenticated and authorized AFs.</t>
      <t>Security should be provided to support the protection of user privacy sensitive assistance information being exposed to AF. TLS 1.3 <xref target="RFC8446"/> is used to provide integrity protection, replay protection and confidentiality protection for the interface between the NEF and the AF <xref target="TS33.501"/>.</t>
    </section>
    <section anchor="work-points">
      <name>Work Points</name>
      <t>Security and privacy of AI/ML Networking based services and applications need further work. <xref target="TR33.898"/> provides solutions to only one of many possible key issues. Each key issue has been in depth investigated in <xref target="TR23.700-80"/> and <xref target="TR23.700-82"/> from which new solutions can be developed.</t>
      <t>We list below only some of the key issues identified:</t>
      <ul spacing="normal">
        <li>
          <t>enhance the mobile core network to expose information to the UE to facilitate its Application AI/ML operation (e.g., Model Training, Splitting and inference feedback etc.)</t>
        </li>
        <li>
          <t>expose UE-related information to an AF  ensuring that privacy and security requirements are met.</t>
        </li>
        <li>
          <t>additional parameters to be provisioned to the mobile core network by an external party for the assistance to Application AI/ML operation.</t>
        </li>
        <li>
          <t>Whether and how the existing the mobile core network data transfer/traffic routing mechanisms are re-used or enhanced to support the transmission of the Application AI/ML traffic(s) between AI/ML endpoints (i.e., UE and AF)?</t>
        </li>
        <li>
          <t>information to be provided by the mobile core network to the AF can help the AF to select and manage the group of UEs which will be part of FL operation.</t>
        </li>
        <li>
          <t>enhancing the architecture and related functions to support application layer AI/ML services</t>
        </li>
        <li>
          <t>supporting federated learning at application enablement layers</t>
        </li>
        <li>
          <t>enhancing the architecture and related functions to support management and/or configuration for split AI/ML operation, and in-time transfer of AI/ML models. The management and configuration aspects including discovery of required nodes for split AI/ML operation and support of different models of AI/ML operation splitting in which the AI/ML operation/model is split into multiple parts according to the current task and environment.</t>
        </li>
      </ul>
      <section anchor="future-work">
        <name>Future Work</name>
        <t>A use case document is needed. So far 3GPP identified many use cases and some of which are described above in this document. New set of use cases on Rule Based Automation, Autonomous Networks, Automated Testing, Energy Efficiency and so on could be added to the existing use cases. All or some of these usage areas of AI/ML can further be elaborated in a use case document These use cases should make it clear why the security and privacy protocols are needed.</t>
        <t>A problem statement on AI/ML networking document is needed. Such a document should identify the problems that possibly need a new protocol to be developed or need to identify extensions to an existing protocol. One possibility in that direction could be refining the work points identified above and formulating them in terms of existing or to be defined in the future security and privacy protocols.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations of AI/ML Networking is TBD.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There are no IANA considerations for this document.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>We acknowledge useful comments from Hesham ElBakoury.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="TR22.874">
          <front>
            <title>Study on traffic characteristics and performance requirements for AI/ML model transfer in 5GS</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2021" month="December"/>
          </front>
        </reference>
        <reference anchor="TR23.700-80">
          <front>
            <title>Study on 5G System Support for AI/ML-based Services</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2022" month="December"/>
          </front>
        </reference>
        <reference anchor="TR23.700-82">
          <front>
            <title>Study on application layer support for AI/ML services</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
        <reference anchor="IsNo20" target="https://www.ericsson.com/en/reports-and-papers/research-papers/secure-federated-learning-5g">
          <front>
            <title>Secure Federated Learning in 5G Mobile Networks</title>
            <author initials="M." surname="Isaksson" fullname="Martin Isaksson">
              <organization/>
            </author>
            <author initials="C." surname="Norrman" fullname="Carl Norrman">
              <organization/>
            </author>
            <date year="2020" month="December"/>
          </front>
        </reference>
        <reference anchor="Srini21" target="https://www.kdnuggets.com/2021/11/difference-distributed-learning-federated-learning-algorithms.html">
          <front>
            <title>Difference between distributed learning versus federated learning algorithms</title>
            <author initials="A." surname="Srinivasan" fullname="Aishwarya Srinivasan">
              <organization/>
            </author>
            <date year="2021" month="November"/>
          </front>
        </reference>
        <reference anchor="TR33.898">
          <front>
            <title>Study on security and privacy of Artificial Intelligence/Machine Learning (AI/ML)-based services and applications in 5G</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2023" month="July"/>
          </front>
        </reference>
        <reference anchor="TS33.501" target="https://www.3gpp.org/ftp/Specs/archive/33_series/33.501/33501-i30.zip">
          <front>
            <title>Security Architecture and Procedures for 5G System</title>
            <author>
              <organization/>
            </author>
            <date year="2023" month="December"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
