<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.23 (Ruby 3.2.3) -->
<?rfc tocompact="yes"?>
<?rfc tocindent="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sarischo-6gip-aiml-security-privacy-04" category="std" consensus="true" submissionType="IETF" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.27.0 -->
  <front>
    <title abbrev="AI/ML  security privacy implications">Security and Privacy Implications of 3GPP AI/ML  Services for 6G</title>
    <seriesInfo name="Internet-Draft" value="draft-sarischo-6gip-aiml-security-privacy-04"/>
    <author initials="B." surname="Sarikaya" fullname="Behcet Sarikaya">
      <organization>Unaffiliated</organization>
      <address>
        <email>sarikaya@ieee.org</email>
      </address>
    </author>
    <author initials="R." surname="Schott" fullname="Roland Schott">
      <organization abbrev="Deutsche Telekom">Deutsche Telekom</organization>
      <address>
        <postal>
          <street>Deutsche-Telekom-Allee 9</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>Roland.Schott@telekom.de</email>
      </address>
    </author>
    <author initials="" surname="Natalie Romo-Moreno" fullname="Natalie Romo-Moreno">
      <organization abbrev="Deutsche Telekom">Deutsche Telekom</organization>
      <address>
        <postal>
          <street>Landgrabenweg 149</street>
          <city>Bonn</city>
          <code>53227</code>
          <country>Germany</country>
        </postal>
        <email>nathalie.romo-moreno@telekom.de</email>
      </address>
    </author>
    <date year="2025" month="February" day="24"/>
    <abstract>
      <?line 179?>

<t>This document provides an overview of 3GPP work on Artificial Intelligence/ Machine Learning (AI/ML) services. Application areas and corresponding proposed modifications to the architecture are identified. Security and privacy issues of these new applications need to be identified out of which IETF work could emerge.</t>
    </abstract>
  </front>
  <middle>
    <?line 184?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Artificial Intelligence (AI) has historically been defined as the science and engineering to build intelligent machines capable of carrying out tasks as humans do. Inspired from the way human brain works, machine learning (ML) is defined as the field of study that gives computers the ability to learn without being explicitly programmed. Since it is believed that the main computational elements in a human brain are 86 billion neurons, the more popular ML approaches are using “neural network” as the model. Neural networks (NN) take their inspiration from the notion that a neuron’s computation involves a weighted sum of the input values. A computational neural network contains the neurons in the input layer which receive some values and propagate them to the neurons in the middle layer of the network, which is also called a “hidden layer”. The weighted sums from one or more hidden layers are ultimately propagated to the output layer, which presents the final outputs of the network.</t>
      <t>Neural networks having more than three layers, i.e., more than one hidden layer are called 
deep neural networks (DNN). In contrast to the conventional shallow-structured NN architectures, DNNs, also referred to as deep learning, made amazing breakthroughs since 2010s in many essential application areas because they can achieve human-level accuracy or even exceed human accuracy. Deep learning techniques use supervised and/or unsupervised strategies to automatically learn hierarchical representations in deep architectures for classification. With a large number of hidden layers, the superior performance of DNNs comes from its ability to extract high-level features from raw sensory data after using statistical learning over a large amount of data to obtain an effective representation of an input space. In recent years, thanks to the big data obtained from the real world, the rapidly increased computation capacity and continuously-evolved algorithms, DNNs have become the most popular ML models for many AI applications.</t>
      <t>The performance of DNNs is gained at the cost of high computational complexity. Hence 
more efficient compute engines are often used, e.g. graphics processing units (GPU) and 
network processing units (NPU). Compared to the inference which only involves the feedforward
 process, the training often requires more computation and storage resources because it involves 
 also the back propagation process.</t>
      <t>Many DNN models have been developed over the past two decades. Each of these models 
has a different “network architecture” in terms of number of layers, layer types, layer shapes
 (i.e., filter size, number of channels and filters), and connections between layers. Three 
 popular structures of DNNs: multilayer perceptron (MLPs), convolution neural networks (CNNs), 
 and recurrent neural networks (RNNs). Multilayer perceptron (MLP) model is the most basic 
 DNN, which is composed of a series of fully connected layers. In a fully connected layer, 
 all outputs are connected to all inputs. Hence MLP requires a significant amount of storage 
 and computation.</t>
      <t>A convolution neural network (CNN) is composed of multiple convolutional layers. Applying 
various convolutional filters, CNN models can capture the high-level representation of the 
input data, making it popular for image classification and speech recognition tasks.</t>
      <t>Recurrent neural network (RNN) models are another type of DNNs, which use sequential data feeding. 
The input of RNN consists of the current input and the previous samples. RNN models have 
been widely used in the natural language processing task on mobile devices, e.g., language 
modeling, machine translation, question answering, word embedding, and document classification.
RNN models and their derivative Large Language Model (LLM) are out of scope.</t>
      <t>While AI/ML has very many applications, in this document, we are interested in
it AI/ML based services in mobile networks <xref target="MaTeMaFiWeKo21"/>. 
One is the network optimization comprises of the time-series forecasting, predictive maintenance, Quality 
of Experience (QoE) modeling and the other is speech recognition, image recognition, video 
processing all of them characterized as network analytics. When network analytics is used
in the mobile network, 
the end device is the base station. For the speech/ image recognition and video processing
(mainly used in the vertical markets such as autonomous cars, smart factories) 
the end device is the UE <xref target="TR22.874"/>.</t>
      <t>AI/ML has other applications as well in improving radio access network (RAN). DNN models
can be used for the New Radio (NR) air interface. Use cases are channel 
state information (CSI)
feedback enhancement, beam management, and positioning accuracy enhancements <xref target="Lin23"/>
and <xref target="Lin24"/>.</t>
      <t>This document aims to present issues of Artificial Intelligence Machine Learning (AIML) based 
services in mobile networks
that may require further protocol work, mostly on the security and privacy aspects.
It is expected that the next generation 6G air interface will emerge from AI/ML
applications to the NR air interface, and network operation will benefit from the network 
analytics enhancements offered by AI/ML.</t>
    </section>
    <section anchor="training-and-federated-learning">
      <name>Training and Federated Learning</name>
      <t>Training is a process in which an AI/ML model learns to perform its given tasks, more specifically, by optimizing the value of the weights in the DNN. A DNN is trained by inputting a training set, which are often correctly-labelled training samples. Taking image classification for instance, the training set includes correctly-classified images. The training process is repeated iteratively to continuously reduce the overall loss. Until the loss is below a predefined threshold, the DNN with high precision is obtained. 
After a DNN is trained, it can perform its task by computing the output of the network using the weights determined during the training process, which is referred to as inference. 
In the model inference process, the inputs from the real world are passed through the DNN. Then the prediction for the task is output. For instance, the inputs can be pixels of an image, sampled amplitudes of an audio wave or the numerical representation of the state of some system or game. Correspondingly, the outputs of the network 
can be a probability that an image contains a particular object.</t>
      <t>With continuously improving capability of cameras and sensors on mobile devices, valuable training data, which are essential for AI/ML model training, are increasingly generated on the devices. For many AI/ML tasks, the fragmented data collected by mobile devices are essential for training a global model. In the traditional approaches, the training data gathered by mobile devices are centralized to the cloud datacenter for a centralized training.</t>
      <t>In Distributed Learning mode, each computing node trains its own DNN model locally with local data, which preserves private information locally. To obtain the global DNN model by sharing local training improvement, nodes in the network will communicate with each other to exchange the local model updates. In this mode, the global DNN model can be trained without the intervention of the cloud datacenter.</t>
      <t>In 3GPP Federated Learning (FL) mode, the cloud server trains a global model by aggregating local models partially-trained by each end devices. The most agreeable Federated Learning algorithm so far is based on the iterative model averaging whereby within each training iteration, a UE performs the training based on the model downloaded from the AI 
server using the local training data. Then the UE reports the interim training results 
(e.g., gradients for the DNN) to the cloud server via the uplink (UL) channels. 
The server aggregates the gradients from the UEs, and updates the global model. 
Next, the updated global model is distributed to the UEs via the Data Link (DL) channels. 
Then the UEs can perform the training for the next iteration.</t>
      <t>Summarizing, we can say that distributed learning  is about having centralized data but distributing the model training to different nodes, while Federated Learning (FL) is about having decentralized data and training and in effect having a central model <xref target="Srini21"/></t>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <t>A new framework for protocols called Service based architecture (SBA) comprises Network 
Functions (NFs) that expose services through RESTful Application Programming Interface (APIs) 
has been defined. There are providers 
and consumers (publishers and subscribers) which are new functions in the system <xref target="IsNo20"/>.
SBA provides built in security using Public Key Infrastructure (PKI) managed certificates
in the mobile core network.</t>
      <t>For AI/ML, 3GPP core,  aka mobile core network, has a new 
server function: The Network Data Analytics Function (NWDAF) provides analytics to Mobile 
Core Network Functions (NFs) and Operations and Management (OAM). An NWDAF may contain the 
Analytics logical function (AnLF): A logical function in NWDAF, which performs inference, 
derives analytics information and Model Training logical function (MTLF) which trains Machine 
Learning (ML) models and exposes new training services. The Application AI/ML operation logic 
is controlled by an Application Function (AF). Any AF request to the mobile network (which 
consists of the Mobile Core Network, access network and UE) in the context of 
the Mobile Core Network assistance to Application AI/ML operation should be authorized by 
the Mobile Core Network <xref target="TR23.700-80"/>.</t>
      <figure anchor="nwdaf-arch">
        <name>NWDAF and related components</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="440" viewBox="0 0 440 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 8,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 8,256" fill="none" stroke="black"/>
              <path d="M 80,32 L 80,64" fill="none" stroke="black"/>
              <path d="M 80,96 L 80,128" fill="none" stroke="black"/>
              <path d="M 80,160 L 80,256" fill="none" stroke="black"/>
              <path d="M 152,48 L 152,80" fill="none" stroke="black"/>
              <path d="M 152,128 L 152,176" fill="none" stroke="black"/>
              <path d="M 152,208 L 152,256" fill="none" stroke="black"/>
              <path d="M 192,88 L 192,120" fill="none" stroke="black"/>
              <path d="M 256,48 L 256,80" fill="none" stroke="black"/>
              <path d="M 256,128 L 256,176" fill="none" stroke="black"/>
              <path d="M 256,208 L 256,256" fill="none" stroke="black"/>
              <path d="M 304,168 L 304,224" fill="none" stroke="black"/>
              <path d="M 320,128 L 320,208" fill="none" stroke="black"/>
              <path d="M 432,128 L 432,208" fill="none" stroke="black"/>
              <path d="M 8,32 L 80,32" fill="none" stroke="black"/>
              <path d="M 152,48 L 256,48" fill="none" stroke="black"/>
              <path d="M 8,64 L 80,64" fill="none" stroke="black"/>
              <path d="M 152,80 L 256,80" fill="none" stroke="black"/>
              <path d="M 8,96 L 80,96" fill="none" stroke="black"/>
              <path d="M 8,128 L 80,128" fill="none" stroke="black"/>
              <path d="M 152,128 L 256,128" fill="none" stroke="black"/>
              <path d="M 320,128 L 432,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 80,160" fill="none" stroke="black"/>
              <path d="M 96,160 L 144,160" fill="none" stroke="black"/>
              <path d="M 272,160 L 312,160" fill="none" stroke="black"/>
              <path d="M 152,176 L 256,176" fill="none" stroke="black"/>
              <path d="M 152,208 L 256,208" fill="none" stroke="black"/>
              <path d="M 320,208 L 432,208" fill="none" stroke="black"/>
              <path d="M 96,224 L 144,224" fill="none" stroke="black"/>
              <path d="M 264,224 L 304,224" fill="none" stroke="black"/>
              <path d="M 8,256 L 80,256" fill="none" stroke="black"/>
              <path d="M 152,256 L 256,256" fill="none" stroke="black"/>
              <g class="text">
                <text x="44" y="52">AF</text>
                <text x="200" y="68">NRF/UDM</text>
                <text x="48" y="84">|</text>
                <text x="40" y="116">NEF</text>
                <text x="48" y="148">|</text>
                <text x="212" y="148">DCCF</text>
                <text x="348" y="164">Data</text>
                <text x="396" y="164">Source</text>
                <text x="372" y="180">NF</text>
                <text x="200" y="196">|</text>
                <text x="40" y="212">NWDAF</text>
                <text x="204" y="228">MFAF</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+--------+
|   AF   |        +------------+
+--------+        |  NRF/UDM   |
     |            +------------+
+--------+             |
|  NEF   |             |
+--------+        +------------+       +-------------+
     |            |     DCCF   |       |             |
+--------+ -------|            | ------| Data Source |
|        |        +------------+     | |     NF      |
|        |              |            | |             |
| NWDAF  |        +------------+     | +-------------+
|        | -------|    MFAF    |-----+
|        |        |            |
+--------+        +------------+
]]></artwork>
        </artset>
      </figure>
      <t>NWDAF relies on various sources of data input including data from the mobile core NFs, AFs, 
e.g., Network Repository Function (NRF), Unified Data Management (UDM), etc., 
and OAM data, including performance measurements (PMs), Key Performance Indicators (KPIs), 
configuration management data and alarms. An NWDAF may provide in turn analytics output 
results to the mobile core NF, AFs, and OAM. Optionally, Data Collection Coordination Function 
(DCCF) and Messaging Framework Adaptor Function (MFAF) may be involved to distribute and 
collect repeated data towards or from various data sources. Note that AF contains a Network 
Exposure Function (NEF) if it is an untrusted AF, i.e. external to the operator's network. 
NEF may assist the AI/ML application 
server in scheduling available UE(s) to participate in the AI/ML operation, e.g., Federated 
Learning <xref target="nwdaf-arch"/> <xref target="TS23.288"/>. 
Also, Mobile Core Network may assist the selection of UEs to serve as FL clients, by 
providing a list of target member UE(s), then subscribing to NWDAF via the NEF to be notified 
about the subset list of UE(s) (i.e., list of candidate UE(s)) that fulfill certain filtering 
criteria (not shown in the figure) <xref target="TR23.700-82"/>.</t>
      <t>In Next Generation Radio Access Network (NG-RAN), AI/ML support requires inputs from 
neighboring NG-RAN nodes and UEs. No special new node is added to the architecture for training
and inference. AI/ML model training can be located in the OAM and model inference in the
NG-RAN node or UE. It is also possible that both model training and inference are located in 
the NG-RAN node <xref target="TS38.300"/>.</t>
      <section anchor="aiml-for-vertical-markets">
        <name>AI/ML for Vertical Markets</name>
        <t>Vertical markets cover automotive such as  cars, drones and IoT based smart factories
are the major consumers of 3GPP-provided data analytics services <xref target="TS22.261"/>. 
They play important role on the Exposure of data analytics services from different network domains 
to the verticals
in a unified manner. They define, at an overarching layer, value-add application 
data analytics services which cover stats/predictions for the end-to-end application service.</t>
        <t>In order to allow the vertical market industries running applications over the mobile network
a service enabler architecture which specifies the procedures, information flows and APIs<br/>
called Application Data Analytics 
Enablement Service Enabler Architecture Layer (SEAL) for Verticals is defined <xref target="TS23.436"/>.
SEAL applications can be hosted on the Edge of the mobile network for UE use at the Edge.</t>
        <t>Example use case is the Vertical user leveraging the Application layer Analytics capabilities
for predicting end to end performance and selecting the optimal Vertical Application Layer 
(VAL) server <xref target="TS23.436"/>. VAL uses the SEAL layer to realize its services.</t>
        <t><xref target="TR23.700-82"/> expands upon the data analytics as a useful tool to optimize the service 
offering by predicting events related to the network or UE conditions. These services however 
can also assist the 3rd party AI/ML application service provider for the AI/ML model distribution, 
transfer, training for various applications (e.g., video/speech recognition, robot control, automotive). This takes us to the concept of the application enablement layer can play role on the exposure of AI/ML services from different 3GPP domains to the Application Service Providers (ASP) in a unified manner.</t>
      </section>
    </section>
    <section anchor="aiml-in-radio-access-network">
      <name>AI/ML in Radio Access Network</name>
      <t>AI/ML for New Radio (NR) Air Interface has these use cases: Channel State Information (CSI) feedback
enhancement which involves overhead reduction, improved accuracy, prediction; beam management,
and positioning accuracy enhancements <xref target="TR38.843"/>.</t>
      <t>For CSI, time domain CSI prediction employing one sided (usually at the UE) model training
done by the vendor and inference done at the UE. This technique avoids CSI compression using
two-sided AI/ML models  where Deep Neural Network models are used by UE to encode,  to 
compress  CSI feedback information and a corresponding CSI decoder is used at the gNB 
to reconstruct the CSI from the received feedback data.</t>
      <t>AI/ML is also used in beam management to support downlink beam forming with one sided (UE or gNB) 
models and positioning accuracy enhancements with direct UE side AI/ML positioning or UE-assisted 
or gNB-assisted LMF-based positioning.</t>
      <t>Protocol mechanism is called data collection. It is for the purpose of AI/ML model training,
data analytics and inference by the network nodes, management entity or UE. Xn Application
Protocol over Xn interface defines a set of Data Collection messages used by an NG-RAN node 1 to request from 
another NG-RAN node 2 the reporting of information to support AI/ML in NG-RAN <xref target="TR38.423"/>. 
UE data collection is done by gNB requested by OAM and reported to the Access and Mobility management Function 
(AMF).</t>
      <t>Radio Access Network AI/ML operations are based on Data Collection protocol procedures which
are used in model training and model inference operations. Data Collection set of link layer 
messages are part of Xn Application Protocol defined in <xref target="TR38.423"/>. Stream Control Transmission 
Protocol (SCTP) is used to securely transport data collection messages
in the Radio Access Network <xref target="RFC9260"/>.</t>
      <section anchor="aiml-in-open-radio-access-network">
        <name>AI/ML in Open Radio Access Network</name>
        <t>Open Radio Access Network (Open RAN) is a new approach to building RANs <xref target="WakaSB24"/>. Open RAN is about 
disaggregated RAN functionality built using open interface specifications between elements 
designed to support equipment interoperability from multiple vendors.
In Open RAN, a base station is split into several functional components, including central unit (CU), 
distributed unit (DU), and a remote unit (RU). Open RAN introduces advanced automation into the 
RAN system by means of an abstracted entity to manage the radio networks, i.e. RAN 
Intelligent Controller (RIC).</t>
        <t>RIC will contain specialized AI hardware needed to implement the execution of the models for 
CSI feedback enhancement, beam management and positioning accuracy enhancements discussed above.</t>
      </section>
    </section>
    <section anchor="security-and-privacy">
      <name>Security and Privacy</name>
      <t>AI/ML based aservices in mobile networks raise many security and privacy issues. <xref target="TR23.700-80"/> and <xref target="TR23.700-82"/> 
identify a number of key issues  and <xref target="TR33.898"/> presents a study on one of the key issues 
which will be detailed here.</t>
      <t><xref target="TR23.700-80"/> studies the exposure of different types of assistance information such as 
traffic rate, packet delay, packet loss rate, network condition changes, candidate federated learning
(FL) members, 
geographical distribution information, etc., to AF for AI / ML operations. Some of assistance 
information could be user privacy sensitive, such as candidate FL members, geographical distribution, 
i.e. location information.
There is a need to study how to protect such privacy-related assistance information. In addition, 
Mobile Core Network needs to determine which assistance information is required by AF to 
complete AI/ML operation and to avoid exposing information that is unnecessary for AI/ML operations.</t>
      <t>Because of the use of Restful API which depend on the use of HTTP protocol, OAuth 2.0 <xref target="RFC6749"/> 
protocol seems to be the natural choice here for authorization.</t>
      <t>One solution can be developed reusing existing mechanism for authorization of Mobile Core 
Network assistance information exposure to AF. The solution is based on reusing the OAuth 2.0-based 
authorization mechanism. 
OAuth 2.0 <xref target="RFC6749"/> protocol extends traditional client-server authentication 
by providing a third-party client with a token.  Since such
   token resembles a different set of credentials compared to those of
   the resource owner, the device needs not be allowed to use the
   resource owner's credentials to access protected resources.</t>
      <t>UE privacy profile/local policies stored in a database can also be employed to authorize UE-related 
Mobile Core Network assistance information exposure. UE privacy profile/local policies may 
also contain protection policies that indicate how Mobile Core Network assistance information 
should be protected (e.g., using security techniques like encryption, integrity protection, 
etc.). NWDAF via Network Exposure 
Function (NEF) sends the UE-related Mobile Core Network assistance information to AF when 
the local policies/UE privacy profile allows authorizing the AF to access the information 
(see <xref target="nwdaf-arch"/>). 
According 
to the local policies/UE privacy profiles, NWDAF may need to protect the Mobile Core 
Network assistance information with security mechanisms.</t>
      <t>A common Application Programming Interface (API) Framework for the Mobile Core Network and<br/>
northbound APIs (called CAPIF) is defined to  securely expose capabilities and events to 
3rd party Application Functions,
i.e. external 
(AF) via Network Exposure Function (NEF). The interface between the NEF and the Application 
Function needs integrity protection, replay protection, confidentiality protection for communication 
between the NEF and Application Function, and mutual authentication between the NEF and Application 
Function and protect internal Mobile Core network information. The NEF also enable secure provision 
of information in the 3GPP network by authenticated and authorized AFs.</t>
      <t>Security should be provided to support the protection of user privacy sensitive assistance 
information being exposed to AF. TLS 1.3 <xref target="RFC8446"/> is used to provide integrity protection, 
replay protection and confidentiality protection for the interface between the NEF and the 
AF <xref target="TS33.501"/>.</t>
      <t>As for Radio Access Network AI/ML services use cases like CSI, beam management, position 
accuracy enhancement, UE uses NR-Uu interface to  communicate with NG-RAN node using RRC protocol
to send L3 cell/beam measurements, location, sensor and timing information. Radio Resource Control
(RRC) messages communicated over the air interface causes security issues because they are not 
protected. Transport 
layer protocol SCTP  is used only when two NG-RAN nodes are connected over Xn. In this case SCTP
should be run below DTLS 1.3 <xref target="RFC9147"/> to provide communications privacy, prevent eavesdropping 
and detect 
tampering or message forgery <xref target="dtlssctp"/>.</t>
      <t>Any location/positioning information sent directly from UE to NG-RAN node causes privacy
concern without user consent. Location information may be sent in RRC IDLE/INACTIVE state
and also in CONNECTED state after the connection is established <xref target="TR38.843"/>. Location information 
received by NG-RAN node is sent to Location Management Function (LMF) in the mobile core 
network.</t>
    </section>
    <section anchor="work-points">
      <name>Work Points</name>
      <t>Security and privacy of AI/ML based services and applications in mobile networks need further work. 
<xref target="TR33.898"/> provides solutions to only one of many possible key issues. Each key issue has 
been in depth investigated in <xref target="TR23.700-80"/> and <xref target="TR23.700-82"/> from which new solutions 
can be developed.</t>
      <t>We list below only some of the key issues identified:</t>
      <ul spacing="normal">
        <li>
          <t>Enhance the mobile core network to expose information to the UE to facilitate the operation of<br/>
AI/ML applications (e.g., Model Training, Splitting and inference feedback etc.)</t>
        </li>
        <li>
          <t>Expose UE-related information to an AF  ensuring that privacy and security requirements are met.</t>
        </li>
        <li>
          <t>Additional parameters to be provisioned to the mobile core network by an external party for the assistance to the operation of AI/ML applications.</t>
        </li>
        <li>
          <t>Whether and how the existing  mobile core network data transfer/traffic routing mechanisms 
are re-used or enhanced to support the transmission of the Application AI/ML traffic(s) between 
AI/ML endpoints (i.e., UE and AF)</t>
        </li>
        <li>
          <t>Information to be provided by the mobile core network to the AF can help the AF to select 
and manage the group of UEs which will be part of FL operation.</t>
        </li>
        <li>
          <t>Enhance the architecture and related functions to support application layer AI/ML services</t>
        </li>
        <li>
          <t>Support Federated Learning at application enablement layers</t>
        </li>
        <li>
          <t>Enhance the architecture and related functions to support management and/or configuration
for split AI/ML operation, and in-time transfer of AI/ML models. The management and configuration 
aspects including discovery of required nodes for split AI/ML operation and support of different 
models of AI/ML operation splitting in which the AI/ML operation/model is split, e.g. for performing 
inference, 
into multiple 
parts according to the current task and environment.</t>
        </li>
        <li>
          <t>Support transfer learning at application enablement layers</t>
        </li>
      </ul>
      <t>The last key issue will be elaborated in the next section below.</t>
    </section>
    <section anchor="transfer-learning-use-case">
      <name>Transfer Learning Use Case</name>
      <t>Transfer Learning (TL) is the training of a machine learning (ML) technique where a model 
pre-trained
on one task is fine-tuned for a new but related task. Transfer learning assumes a baseline 
model
is already available in a repository in the mobile network provided by the source domain
can be fine-tuned to quickly perform the same or similar tasks in the target domain with 
lesser
amount of training data.</t>
      <t>TL support involves many entities in the mobile network. ML models need to be stored in 
 the 
 repository
 entities. When storing, some information elements need to be added to the model, such as 
 identity of the model consumer that is initiating the request, i.e. model consumer id.
 For transfer learning, Base Model ID could be added.</t>
      <t>Transfer Learning solution should aim to provide support for Transfer Learning (TL) by 
discovering and selecting the base models to be used for similar tasks as pre-trained 
models.
It involves first discovering repositories of pre-trained models in a given service area 
and then sending request messages to the repositories and collecting responses.</t>
      <t>Security and privacy issues in all the messaging need to be investigated.</t>
    </section>
    <section anchor="future-work">
      <name>Future Work</name>
      <t>A use case document is needed. We have listed the identified use cases and elaborated 
 one of them  above in this document. New set of use cases on Rule Based Automation, Autonomous 
Networks, Automated Testing, Energy Efficiency and so on could be added to the existing use 
cases. All or some of these usage areas of AI/ML can further be elaborated in a use case 
document. 
These use cases should make it clear why the security and privacy protocols are needed.</t>
      <t>A problem statement on AI/ML based services in mobile networks document is needed. Such a document should identify 
the problems that possibly need a new protocol to be developed or need to identify extensions 
to an existing protocol. One possibility in that direction could be refining the work points 
identified above and formulating them in terms of existing or to be defined in the future 
security and privacy protocols.</t>
      <t>A document describing security threat model on which AI/ML security and privacy enhancements 
can be developed <xref target="RFC6819"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations of AI/ML services is TBD.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There are no IANA considerations for this document.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>We acknowledge useful comments from Hesham ElBakoury, Marie-Jose Monpetit
 that have led to many improvements in the document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC6819">
          <front>
            <title>OAuth 2.0 Threat Model and Security Considerations</title>
            <author fullname="T. Lodderstedt" initials="T." role="editor" surname="Lodderstedt"/>
            <author fullname="M. McGloin" initials="M." surname="McGloin"/>
            <author fullname="P. Hunt" initials="P." surname="Hunt"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document gives additional security considerations for OAuth, beyond those in the OAuth 2.0 specification, based on a comprehensive threat model for the OAuth 2.0 protocol. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6819"/>
          <seriesInfo name="DOI" value="10.17487/RFC6819"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9260">
          <front>
            <title>Stream Control Transmission Protocol</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <author fullname="K. Nielsen" initials="K." surname="Nielsen"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document describes the Stream Control Transmission Protocol (SCTP) and obsoletes RFC 4960. It incorporates the specification of the chunk flags registry from RFC 6096 and the specification of the I bit of DATA chunks from RFC 7053. Therefore, RFCs 6096 and 7053 are also obsoleted by this document. In addition, RFCs 4460 and 8540, which describe errata for SCTP, are obsoleted by this document.</t>
              <t>SCTP was originally designed to transport Public Switched Telephone Network (PSTN) signaling messages over IP networks. It is also suited to be used for other applications, for example, WebRTC.</t>
              <t>SCTP is a reliable transport protocol operating on top of a connectionless packet network, such as IP. It offers the following services to its users:</t>
              <t>The design of SCTP includes appropriate congestion avoidance behavior and resistance to flooding and masquerade attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9260"/>
          <seriesInfo name="DOI" value="10.17487/RFC9260"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="dtlssctp">
          <front>
            <title>Datagram Transport Layer Security (DTLS) 1.3 for Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="Michael Tüxen" initials="M." surname="Tüxen">
              <organization>Münster University of Applied Sciences</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document describes the usage of the Datagram Transport Layer
   Security (DTLS) 1.3 protocol over the Stream Control Transmission
   Protocol (SCTP) and obsoletes RFC 6083.

   DTLS 1.3 over SCTP provides communications privacy for applications
   that use SCTP as their transport protocol and allows client/server
   applications to communicate in a way that is designed to prevent
   eavesdropping and detect tampering or message forgery.

   Applications using DTLS 1.3 over SCTP can use almost all transport
   features provided by SCTP and its extensions.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tuexen-tsvwg-rfc6083-bis-06"/>
        </reference>
        <reference anchor="TS22.261">
          <front>
            <title>Service Requirements for the 5G System</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="TR22.874">
          <front>
            <title>Study on traffic characteristics and performance requirements for AI/ML model transfer in 5GS</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2021" month="December"/>
          </front>
        </reference>
        <reference anchor="TR23.700-80" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.700-80/">
          <front>
            <title>Study on 5G System Support for AI/ML-based Services</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2022" month="December"/>
          </front>
        </reference>
        <reference anchor="TR23.700-82" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.700-82/23700-82-j10.zip">
          <front>
            <title>Study on application layer support for AI/ML services</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="September"/>
          </front>
        </reference>
        <reference anchor="IsNo20" target="https://www.ericsson.com/48df60/assets/local/reports-papers/research-papers/secure-federated-learning-in-5g-mobile-networks.pdf">
          <front>
            <title>Secure Federated Learning in 5G Mobile Networks</title>
            <author initials="M." surname="Isaksson" fullname="Martin Isaksson">
              <organization/>
            </author>
            <author initials="C." surname="Norrman" fullname="Carl Norrman">
              <organization/>
            </author>
            <date year="2020" month="December"/>
          </front>
        </reference>
        <reference anchor="MaTeMaFiWeKo21" target="https://www.ericsson.com/en/reports-and-papers/white-papers/accelerating-the-adoption-of-ai-in-programmable-5g-networks">
          <front>
            <title>Accelerating the adoption of AI in programmable 5G networks</title>
            <author initials="J." surname="Manocha" fullname="Jatendra Manocha, et al.">
              <organization/>
            </author>
            <date year="2021" month="July"/>
          </front>
        </reference>
        <reference anchor="WakaSB24" target="https://www.softbank.jp/corp/set/data/technology/research/story-event/Whitepaper_Download_Location/pdf/SoftBank_AI_RAN_Whitepaper_December2024.pdf">
          <front>
            <title>AI-RAN Telecom Infrastructure for the Age of AI</title>
            <author initials="R." surname="Wakikawa" fullname="Ryuji Wakikawa, et al.">
              <organization/>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="Lin24" target="https://www.comsoc.org/publications/ctn/overview-ai-3gpps-ran-release-18-enhancing-next-generation-connectivity">
          <front>
            <title>Enhancing Next-Generation Connectivity</title>
            <author initials="X." surname="Lin" fullname="Xingqin Lin">
              <organization>NVIDIA, USA</organization>
            </author>
            <date year="2024" month="March"/>
          </front>
        </reference>
        <reference anchor="Lin23" target="https://arxiv.org/pdf/2312.15174">
          <front>
            <title>5G-Advanced evolution in 3GPP Release 19</title>
            <author initials="X." surname="Lin" fullname="Xingqin Lin">
              <organization>NVIDIA, USA</organization>
            </author>
            <date year="2023" month="December"/>
          </front>
        </reference>
        <reference anchor="Srini21" target="https://www.kdnuggets.com/2021/11/difference-distributed-learning-federated-learning-algorithms.html">
          <front>
            <title>Difference between distributed learning versus Federated Learning algorithms</title>
            <author initials="A." surname="Srinivasan" fullname="Aishwarya Srinivasan">
              <organization/>
            </author>
            <date year="2021" month="November"/>
          </front>
        </reference>
        <reference anchor="TR33.898" target="https://www.3gpp.org/ftp/Specs/archive/33_series/33.898/33898-i01.zip">
          <front>
            <title>Study on security and privacy of Artificial Intelligence/Machine Learning (AI/ML)-based services and applications in 5G</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2023" month="July"/>
          </front>
        </reference>
        <reference anchor="TS33.501" target="https://www.3gpp.org/ftp/Specs/archive/33_series/33.501/33501-j10.zip">
          <front>
            <title>Security Architecture and Procedures for 5G System</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2025" month="January"/>
          </front>
        </reference>
        <reference anchor="TS23.436" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.436/23436-j20.zip">
          <front>
            <title>Functional architecture and information flows for Application Data Analytics Enablement Service</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="September"/>
          </front>
        </reference>
        <reference anchor="TS38.300" target="https://www.3gpp.org/ftp/Specs/archive/38_series/38.300/38300-i40.zip">
          <front>
            <title>Radio Access Network; NR; NR and NG-RAN Overall Description</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="TR38.843" target="https://www.3gpp.org/ftp/Specs/archive/38_series/38.843/38843-i00.zip">
          <front>
            <title>Study on Artificial Intelligence (AI)/Machine Learning (ML) for NR air interface</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="January"/>
          </front>
        </reference>
        <reference anchor="TR38.423" target="https://www.3gpp.org/ftp/Specs/archive/38_series/38.423/38423-i40.zip">
          <front>
            <title>NG-RAN; Xn application protocol (XnAP)</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="TS23.288" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.288/23288-j10.zip">
          <front>
            <title>Architecture enhancements for 5G System (5GS) to support network data analytics services</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
