<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.0.2) -->
<?rfc tocompact="yes"?>
<?rfc tocindent="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sarischo-6gip-aiml-security-privacy-01" category="std" consensus="true" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="AI/ML  security privacy implications">Security and Privacy Implications of 3GPP AI/ML Networking Studies for 6G</title>
    <seriesInfo name="Internet-Draft" value="draft-sarischo-6gip-aiml-security-privacy-01"/>
    <author initials="B." surname="Sarikaya" fullname="Behcet Sarikaya">
      <organization>Unaffiliated</organization>
      <address>
        <email>sarikaya@ieee.org</email>
      </address>
    </author>
    <author initials="R." surname="Schott" fullname="Roland Schott">
      <organization abbrev="Deutsche Telekom">Deutsche Telekom</organization>
      <address>
        <postal>
          <street>Ida-Rhodes-Strasse 2</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>Roland.Schott@telekom.de</email>
      </address>
    </author>
    <date year="2024" month="April" day="02"/>
    <abstract>
      <?line 95?>

<t>This document provides an overview of 3GPP work on Artificial Intelligence/ Machine Learning (AI/ML) networking. Application areas and corresponding proposed modifications to the architecture are identified. Security and privacy issues of these new applications need to be identified out of which IETF work could emerge.</t>
    </abstract>
  </front>
  <middle>
    <?line 100?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Artificial Intelligence (AI) has historically been defined as the science and engineering to build intelligent machines capable of carrying out tasks as humans do. Inspired from the way human brain works, machine learning (ML) is defined as the field of study that gives computers the ability to learn without being explicitly programmed. Since it is believed that the main computational elements in a human brain are 86 billion neurons, the more popular ML approaches are using “neural network” as the model. Neural networks (NN) take their inspiration from the notion that a neuron’s computation involves a weighted sum of the input values. A computational neural network contains the neurons in the input layer which receive some values and propagate them to the neurons in the middle layer of the network, which is also called a “hidden layer”. The weighted sums from one or more hidden layers are ultimately propagated to the output layer, which presents the final outputs of the network.</t>
      <t>Neural networks having more than three layers, i.e., more than one hidden layer are called deep neural networks (DNN). In contrast to the conventional shallow-structured NN architectures, DNNs, also referred to as deep learning, made amazing breakthroughs since 2010s in many essential application areas because they can achieve human-level accuracy or even exceed human accuracy. Deep learning techniques use supervised and/or unsupervised strategies to automatically learn hierarchical representations in deep architectures for classification. With a large number of hidden layers, the superior performance of DNNs comes from its ability to extract high-level features from raw sensory data after using statistical learning over a large amount of data to obtain an effective representation of an input space. In recent years, thanks to the big data obtained from the real world, the rapidly increased computation capacity and continuously-evolved algorithms, DNNs have become the most popular ML models for many AI applications.</t>
      <t>The performance of DNNs is gained at the cost of high computational complexity. Hence more efficient compute engines are often used, e.g. graphics processing units (GPU) and network processing units (NPU). Compared to the inference which only involves the feedforward process, the training often requires more computation and storage resources because it involves also the back propagation process.</t>
      <t>Many DNN models have been developed over the past two decades. Each of these models has a different “network architecture” in terms of number of layers, layer types, layer shapes (i.e., filter size, number of channels and filters), and connections between layers. Three popular structures of DNNs: multilayer perceptron (MLPs), convolution neural networks (CNNs), and recurrent neural networks (RNNs). Multilayer perceptron (MLP) model is the most basic DNN, which is composed of a series of fully connected layers. In a fully connected layer, all outputs are connected to all inputs. Hence MLP requires a significant amount of storage and computation.</t>
      <t>A convolution neural network (CNN) is composed of multiple convolutional layers. Applying various convolutional filters, CNN models can capture the high-level representation of the input data, making it popular for image classification and speech recognition tasks. Recurrent neural network (RNN) models are another type of DNNs, which use sequential data feeding. The input of RNN consists of the current input and the previous samples. RNN models have been widely used in the natural language processing task on mobile devices, e.g., language modeling, machine translation, question answering, word embedding, and document classification.</t>
      <t>AI/ML has very many applications, however, two areas have emerged that involve networking. One is the network optimization, time-series forecasting, predictive maintenance, Quality of Experience (QoE) modeling and the other is speech recognition, image recognition, video processing. In the former, the end device is the base station and the latter the UE <xref target="TR22.874"/>.</t>
      <t>This document aims to present Artificial Intelligence Machine Learning (AIML) networking issues that may require further protocol work, mostly on the security and privacy aspects of networking.</t>
    </section>
    <section anchor="training-and-federated-learning">
      <name>Training and Federated Learning</name>
      <t>Training is a process in which an AI/ML model learns to perform its given tasks, more specifically, by optimizing the value of the weights in the DNN. A DNN is trained by inputting a training set, which are often correctly-labelled training samples. Taking image classification for instance, the training set includes correctly-classified images. The training process is repeated iteratively to continuously reduce the overall loss. Until the loss is below a predefined threshold, the DNN with high precision is obtained. After a DNN is trained, it can perform its task by computing the output of the network using the weights determined during the training process, which is referred to as inference. In the model inference process, the inputs from the real world are passed through the DNN. Then the prediction for the task is output. For instance, the inputs can be pixels of an image, sampled amplitudes of an audio wave or the numerical representation of the state of some system or game. Correspondingly, the outputs of the network 
can be a probability that an image contains a particular object.</t>
      <t>With continuously improving capability of cameras and sensors on mobile devices, valuable training data, which are essential for AI/ML model training, are increasingly generated on the devices. For many AI/ML tasks, the fragmented data collected by mobile devices are essential for training a global model. In the traditional approaches, the training data gathered by mobile devices are centralized to the cloud datacenter for a centralized training.</t>
      <t>In Distributed Learning mode, each computing node trains its own DNN model locally with local data, which preserves private information locally. To obtain the global DNN model by sharing local training improvement, nodes in the network will communicate with each other to exchange the local model updates. In this mode, the global DNN model can be trained without the intervention of the cloud datacenter.</t>
      <t>In 3GPP Federated Learning (FL) mode, the cloud server trains a global model by aggregating local models partially-trained by each end devices. The most agreeable Federated Learning algorithm so far is based on the iterative model averaging whereby within each training iteration, a UE performs the training based on the model downloaded from the AI server using the local training data. Then the UE reports the interim training results (e.g., gradients for the DNN) to the cloud server via 5G uplink (UL) channels. The server aggregates the gradients from the UEs, and updates the global model. Next, the updated global model is distributed to the UEs via 5G Data Link (DL) channels. 
Then the UEs can perform the training for the next iteration.</t>
      <t>Summarizing, we can say that distributed learning  is about having centralized data but distributing the model training to different nodes, while federated learning (FL) is about having decentralized data and training and in effect having a central model <xref target="Srini21"/></t>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <t>A new framework for protocols called Service based architecture (SBA) comprises Network Functions (NFs) that expose services through RESTful APIs has been defined. There are providers and consumers (publishers and subscribers) which are new functions in the system <xref target="IsNo20"/>.</t>
      <t>3GPP core, i.e., 5GC network, aka mobile core network, which establishes reliable, secure connectivity to the network for end users and provides access to its services has a new server function: The Network Data Analytics Function (NWDAF) provides analytics to Mobile Core Network Functions (NFs) and Operations and Management (OAM). An NWDAF may contain the Analytics logical function (AnLF): A logical function in NWDAF, which performs inference, derives analytics information and Model Training logical function (MTLF) which trains Machine Learning (ML) models and exposes new training services. The Application AI/ML operation logic is controlled by an Application Function (AF). Any AF request to the 5G System in the context of 5G System (5GS) (which consists of the 5GC (5G Core Network), 5G-AN (5G Access Network) and UE) assistance to Application AI/ML operation should be authorized by the Mobile Core Network <xref target="TR23.700-80"/>.</t>
      <t>NWDAF relies on various sources of data input including data from 5G core NFs, AFs, 5G core repositories, e.g., Network Repository Function (NRF), Unified Data Management (UDM), etc., and OAM data, including performance measurements (PMs), Key Performance Indicators (KPIs), configuration management data and alarms. An NWDAF may provide in turn analytics output results to 5G core NF, AFs, and OAM. Optionally, Data Collection Coordination Function (DCCF) and Messaging Framework Adaptor Function (MFAF) may be involved to distribute and collect repeated data towards or from various data sources. Note that AF contains a Network Exposure Function (NEF) if it is an untrusted AF. NEF may assist the AI/ML application server in scheduling available UE(s) to participate in the AI/ML operation, e.g., Federated Learning. 
Also, Mobile Core Network may assist the selection of UEs to serve as FL clients, by providing a list of target member UE(s), then subscribing to the NEF to be notified about the subset list of UE(s) (i.e., list of candidate UE(s)) that fulfill certain filtering criteria <xref target="TR23.700-82"/>.</t>
      <section anchor="aiml-for-vertical-markets">
        <name>AI/ML for Vertical Markets</name>
        <t>Vertical markets cover automotive such as  cars, drones and IoT based smart factories
are the major consumers of 3GPP-provided data analytics services. 
They play important role on the Exposure of data analytics services from different network domains 
to the verticals
in a unified manner. Essentially they define, at an overarching layer, value-add application 
data analytics services which cover stats/predictions for the end-to-end application service.</t>
        <t>Example use case is the Vertical user leveraging the Application layer Analytics capabilities
for predicting end to end performance and selecting the optimal vertical application layer 
(VAL) server <xref target="TS23.436"/>.</t>
        <t><xref target="TR23.700-82"/> expands upon the data analytics as a useful tool to optimize the service offering by predicting events related to the network or UE conditions. These services however can also assist the 3rd party AI/ML application service provider for the AI/ML model distribution, transfer, training for various applications (e.g., video/speech recognition, robot control, automotive). This takes us to the concept of the application enablement layer can play role on the exposure of AI/ML services from different 3GPP domains to the Application Service Providers (ASP) in a unified manner.</t>
      </section>
    </section>
    <section anchor="security-and-privacy">
      <name>Security and Privacy</name>
      <t>AI/ML networking raises many security and privacy issues. <xref target="TR23.700-80"/> and <xref target="TR23.700-82"/> identify a number of key issues  and <xref target="TR33.898"/> presents a study on one of the key issues which will be detailed here.</t>
      <t><xref target="TR23.700-80"/> studies the exposure of different types of assistance information such as traffic rate, packet delay, packet loss rate, network condition changes, candidate FL members, geographical distribution information, etc., to AF for AI / ML operations. Some of assistance information could be user privacy sensitive, such as candidate FL members, geographical distribution information.
There is a need to study how to protect such privacy-related assistance information. In addition, Mobile Core Network needs to determine which assistance information is required by AF to complete AI/ML operation and to avoid exposing information that is unnecessary for AI/ML operations.</t>
      <t>Because of the use of Restful API which depend on the use of HTTP protocol, OAuth <xref target="RFC6749"/> protocol seems to be the natural choice here for authorization.</t>
      <t>One solution can be developed reusing existing mechanism for authorization of Mobile Core Network assistance information exposure to AF. The solution is based on reusing the OAuth-based authorization mechanism 
OAuth <xref target="RFC6749"/> protocol which extends traditional client-server authentication 
by providing a third-party client with a token.  Since such
   token resembles a different set of credentials compared to those of
   the resource owner, the device needs not be allowed to use the
   resource owner's credentials to access protected resources.</t>
      <t>UE privacy profile/local policies stored in a database can also be employed to authorize UE-related Mobile Core Network assistance information exposure. UE privacy profile/local policies may also contain protection policies that indicate how Mobile Core Network assistance information should be protected (e.g., encryption, integrity protection, etc.). NWDAF via Network Exposure Function (NEF) sends the UE-related Mobile Core Network assistance information to AF when the local policies/UE privacy profile authorize the AF to access the information. According to the local policies/UE privacy profiles, NWDAF may need to protect the Mobile Core Network assistance information with security mechanisms.</t>
      <t>Network Functions securely expose capabilities and events to 3rd party Application Functions (AF) via Network Exposure Function (NEF). The interface between the NEF and the Application Function needs integrity protection, replay protection, confidentiality protection for communication between the NEF and Application Function, and mutual authentication between the NEF and Application Function and protect internal 5G Core network information. The NEF also enable secure provision of information in the 3GPP network by authenticated and authorized AFs.</t>
      <t>Security should be provided to support the protection of user privacy sensitive assistance information being exposed to AF. TLS 1.3 <xref target="RFC8446"/> is used to provide integrity protection, replay protection and confidentiality protection for the interface between the NEF and the AF <xref target="TS33.501"/>.</t>
    </section>
    <section anchor="work-points">
      <name>Work Points</name>
      <t>Security and privacy of AI/ML Networking based services and applications need further work. <xref target="TR33.898"/> provides solutions to only one of many possible key issues. Each key issue has been in depth investigated in <xref target="TR23.700-80"/> and <xref target="TR23.700-82"/> from which new solutions can be developed.</t>
      <t>We list below only some of the key issues identified:</t>
      <ul spacing="normal">
        <li>
          <t>enhance the mobile core network to expose information to the UE to facilitate its Application AI/ML operation (e.g., Model Training, Splitting and inference feedback etc.)</t>
        </li>
        <li>
          <t>expose UE-related information to an AF  ensuring that privacy and security requirements are met.</t>
        </li>
        <li>
          <t>additional parameters to be provisioned to the mobile core network by an external party for the assistance to Application AI/ML operation.</t>
        </li>
        <li>
          <t>Whether and how the existing the mobile core network data transfer/traffic routing mechanisms are re-used or enhanced to support the transmission of the Application AI/ML traffic(s) between AI/ML endpoints (i.e., UE and AF)?</t>
        </li>
        <li>
          <t>information to be provided by the mobile core network to the AF can help the AF to select and manage the group of UEs which will be part of FL operation.</t>
        </li>
        <li>
          <t>enhancing the architecture and related functions to support application layer AI/ML services</t>
        </li>
        <li>
          <t>supporting federated learning at application enablement layers</t>
        </li>
        <li>
          <t>enhancing the architecture and related functions to support management and/or configuration for split AI/ML operation, and in-time transfer of AI/ML models. The management and configuration aspects including discovery of required nodes for split AI/ML operation and support of different models of AI/ML operation splitting in which the AI/ML operation/model is split into multiple parts according to the current task and environment.</t>
        </li>
      </ul>
      <section anchor="future-work">
        <name>Future Work</name>
        <t>A use case document is needed. So far 3GPP identified many use cases and some of which are described above in this document. New set of use cases on Rule Based Automation, Autonomous Networks, Automated Testing, Energy Efficiency and so on could be added to the existing use cases. All or some of these usage areas of AI/ML can further be elaborated in a use case document These use cases should make it clear why the security and privacy protocols are needed.</t>
        <t>A problem statement on AI/ML networking document is needed. Such a document should identify the problems that possibly need a new protocol to be developed or need to identify extensions to an existing protocol. One possibility in that direction could be refining the work points identified above and formulating them in terms of existing or to be defined in the future security and privacy protocols.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations of AI/ML Networking is TBD.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There are no IANA considerations for this document.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>We acknowledge useful comments from Hesham ElBakoury.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="TR22.874">
          <front>
            <title>Study on traffic characteristics and performance requirements for AI/ML model transfer in 5GS</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2021" month="December"/>
          </front>
        </reference>
        <reference anchor="TR23.700-80">
          <front>
            <title>Study on 5G System Support for AI/ML-based Services</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2022" month="December"/>
          </front>
        </reference>
        <reference anchor="TR23.700-82">
          <front>
            <title>Study on application layer support for AI/ML services</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="March"/>
          </front>
        </reference>
        <reference anchor="IsNo20" target="https://www.ericsson.com/en/reports-and-papers/research-papers/secure-federated-learning-5g">
          <front>
            <title>Secure Federated Learning in 5G Mobile Networks</title>
            <author initials="M." surname="Isaksson" fullname="Martin Isaksson">
              <organization/>
            </author>
            <author initials="C." surname="Norrman" fullname="Carl Norrman">
              <organization/>
            </author>
            <date year="2020" month="December"/>
          </front>
        </reference>
        <reference anchor="Srini21" target="https://www.kdnuggets.com/2021/11/difference-distributed-learning-federated-learning-algorithms.html">
          <front>
            <title>Difference between distributed learning versus federated learning algorithms</title>
            <author initials="A." surname="Srinivasan" fullname="Aishwarya Srinivasan">
              <organization/>
            </author>
            <date year="2021" month="November"/>
          </front>
        </reference>
        <reference anchor="TR33.898">
          <front>
            <title>Study on security and privacy of Artificial Intelligence/Machine Learning (AI/ML)-based services and applications in 5G</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2023" month="July"/>
          </front>
        </reference>
        <reference anchor="TS33.501" target="https://www.3gpp.org/ftp/Specs/archive/33_series/33.501/33501-i30.zip">
          <front>
            <title>Security Architecture and Procedures for 5G System</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2023" month="December"/>
          </front>
        </reference>
        <reference anchor="TS23.436" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.436/23436-i20.zip">
          <front>
            <title>Functional architecture and information flows for Application Data Analytics Enablement Service</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="January"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
