<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<?rfc tocompact="yes"?>
<?rfc tocindent="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sarischo-6gip-aiml-security-privacy-05" category="std" consensus="true" submissionType="IETF" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="AI/ML  security privacy implications">Security and Privacy Implications of 3GPP AI/ML  Services for 6G</title>
    <seriesInfo name="Internet-Draft" value="draft-sarischo-6gip-aiml-security-privacy-05"/>
    <author initials="B." surname="Sarikaya" fullname="Behcet Sarikaya">
      <organization>Unaffiliated</organization>
      <address>
        <email>sarikaya@ieee.org</email>
      </address>
    </author>
    <author initials="R." surname="Schott" fullname="Roland Schott">
      <organization abbrev="Deutsche Telekom">Deutsche Telekom</organization>
      <address>
        <postal>
          <street>Deutsche-Telekom-Allee 9</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>Roland.Schott@telekom.de</email>
      </address>
    </author>
    <date year="2025" month="May" day="12"/>
    <abstract>
      <?line 171?>

<t>This document provides an overview of 3GPP work on Artificial Intelligence/ Machine Learning (AI/ML) services. Application areas and corresponding proposed modifications to the architecture are identified. Security and privacy issues of these new applications need to be identified out of which IETF work could emerge.</t>
    </abstract>
  </front>
  <middle>
    <?line 176?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Artificial Intelligence (AI) has historically been defined as the science and engineering to build intelligent machines capable of carrying out tasks as humans do. Inspired from the way human brain works, machine learning (ML) is defined as the field of study that gives computers the ability to learn without being explicitly programmed. Since it is believed that the main computational elements in a human brain are 86 billion neurons, the more popular ML approaches are using “neural network” as the model. Neural networks (NN) take their inspiration from the notion that a neuron’s computation involves a weighted sum of the input values. A computational neural network contains the neurons in the input layer which receive some values and propagate them to the neurons in the middle layer of the network, which is also called a “hidden layer”. The weighted sums from one or more hidden layers are ultimately propagated to the output layer, which presents the final outputs of the network.</t>
      <t>Neural networks having more than three layers, i.e., more than one hidden layer are called 
deep neural networks (DNN). In contrast to the conventional shallow-structured NN architectures, DNNs, also referred to as deep learning, made amazing breakthroughs since 2010s in many essential application areas because they can achieve human-level accuracy or even exceed human accuracy. Deep learning techniques use supervised and/or unsupervised strategies to automatically learn hierarchical representations in deep architectures for classification. With a large number of hidden layers, the superior performance of DNNs comes from its ability to extract high-level features from raw sensory data after using statistical learning over a large amount of data to obtain an effective representation of an input space. In recent years, thanks to the big data obtained from the real world, the rapidly increased computation capacity and continuously-evolved algorithms, DNNs have become the most popular ML models for many AI applications.</t>
      <t>The performance of DNNs is gained at the cost of high computational complexity. Hence 
more efficient compute engines are often used, e.g. graphics processing units (GPU) and 
network processing units (NPU). Compared to the inference which only involves the feedforward
 process, the training often requires more computation and storage resources because it involves 
 also the back propagation process.</t>
      <t>Many DNN models have been developed over the past two decades. Each of these models 
has a different “network architecture” in terms of number of layers, layer types, layer shapes
 (i.e., filter size, number of channels and filters), and connections between layers. Three 
 popular structures of DNNs: multilayer perceptron (MLPs), convolution neural networks (CNNs), 
 and recurrent neural networks (RNNs). Multilayer perceptron (MLP) model is the most basic 
 DNN, which is composed of a series of fully connected layers. In a fully connected layer, 
 all outputs are connected to all inputs. Hence MLP requires a significant amount of storage 
 and computation.</t>
      <t>A convolution neural network (CNN) is composed of multiple convolutional layers. Applying 
various convolutional filters, CNN models can capture the high-level representation of the 
input data, making it popular for image classification and speech recognition tasks.</t>
      <t>Recurrent neural network (RNN) models are another type of DNNs, which use sequential data feeding. 
The input of RNN consists of the current input and the previous samples. RNN models have 
been widely used in the natural language processing task on mobile devices, e.g., language 
modeling, machine translation, question answering, word embedding, and document classification.
RNN models and their derivative Large Language Model (LLM) are out of scope.</t>
      <t>While AI/ML has very many applications, in this document, we are interested in
it AI/ML based services in mobile networks <xref target="MaTeMaFiWeKo21"/>. 
One is the network optimization comprises of the time-series forecasting, predictive maintenance, Quality 
of Experience (QoE) modeling and the other is speech recognition, image recognition, video 
processing all of them characterized as network analytics. When network analytics is used
in the mobile network, 
the end device is the base station. For the speech/ image recognition and video processing
(mainly used in the vertical markets such as autonomous cars, smart factories) 
the end device is the UE <xref target="TR22.874"/>.</t>
      <t>AI/ML has other applications as well in improving radio access network (RAN). DNN models
can be used for the New Radio (NR) air interface. Use cases are channel 
state information (CSI)
feedback enhancement, beam management, and positioning accuracy enhancements <xref target="Lin23"/>
and <xref target="Lin24"/>.</t>
      <t>This document aims to present issues of Artificial Intelligence Machine Learning (AIML) based 
services in mobile networks
that may require further protocol work, mostly on the security and privacy aspects.
It is expected that the next generation 6G air interface will emerge from AI/ML
applications to the NR air interface, and network operation will benefit from the network 
analytics enhancements offered by AI/ML.</t>
    </section>
    <section anchor="training-and-federated-learning">
      <name>Training and Federated Learning</name>
      <t>Training is a process in which an AI/ML model learns to perform its given tasks, more specifically, by optimizing the value of the weights in the DNN. A DNN is trained by inputting a training set, which are often correctly-labelled training samples. Taking image classification for instance, the training set includes correctly-classified images. The training process is repeated iteratively to continuously reduce the overall loss. Until the loss is below a predefined threshold, the DNN with high precision is obtained. 
After a DNN is trained, it can perform its task by computing the output of the network using the weights determined during the training process, which is referred to as inference. 
In the model inference process, the inputs from the real world are passed through the DNN. Then the prediction for the task is output. For instance, the inputs can be pixels of an image, sampled amplitudes of an audio wave or the numerical representation of the state of some system or game. Correspondingly, the outputs of the network 
can be a probability that an image contains a particular object.</t>
      <t>With continuously improving capability of cameras and sensors on mobile devices, valuable training data, which are essential for AI/ML model training, are increasingly generated on the devices. For many AI/ML tasks, the fragmented data collected by mobile devices are essential for training a global model. In the traditional approaches, the training data gathered by mobile devices are centralized to the cloud datacenter for a centralized training.</t>
      <t>In Distributed Learning mode, each computing node trains its own DNN model locally with local data, which preserves private information locally. To obtain the global DNN model by sharing local training improvement, nodes in the network will communicate with each other to exchange the local model updates. In this mode, the global DNN model can be trained without the intervention of the cloud datacenter.</t>
      <t>In 3GPP Federated Learning (FL) mode, the cloud server trains a global model by aggregating local models partially-trained by each end devices. The most agreeable Federated Learning algorithm so far is based on the iterative model averaging whereby within each training iteration, a UE performs the training based on the model downloaded from the AI 
server using the local training data. Then the UE reports the interim training results 
(e.g., gradients for the DNN) to the cloud server via the uplink (UL) channels. 
The server aggregates the gradients from the UEs, and updates the global model. 
Next, the updated global model is distributed to the UEs via the Data Link (DL) channels. 
Then the UEs can perform the training for the next iteration.</t>
      <t>Summarizing, we can say that distributed learning  is about having centralized data but distributing the model training to different nodes, while Federated Learning (FL) is about having decentralized data and training and in effect having a central model <xref target="Srini21"/></t>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <t>A new framework for protocols called Service based architecture (SBA) comprises Network 
Functions (NFs) that expose services through RESTful Application Programming Interface (APIs) 
has been defined. There are providers 
and consumers (publishers and subscribers) which are new functions in the system <xref target="IsNo20"/>.
SBA provides built in security using Public Key Infrastructure (PKI) managed certificates
in the mobile core network.</t>
      <t>For AI/ML, 3GPP core,  aka mobile core network, has a new 
server function: The Network Data Analytics Function (NWDAF) provides analytics to Mobile 
Core Network Functions (NFs) and Operations and Management (OAM). An NWDAF may contain the 
Analytics logical function (AnLF): A logical function in NWDAF, which performs inference, 
derives analytics information and Model Training logical function (MTLF) which trains Machine 
Learning (ML) models and exposes new training services. The Application AI/ML operation logic 
is controlled by an Application Function (AF). Any AF request to the mobile network (which 
consists of the Mobile Core Network, access network and UE) in the context of 
the Mobile Core Network assistance to Application AI/ML operation should be authorized by 
the Mobile Core Network <xref target="TR23.700-80"/>.</t>
      <figure anchor="nwdaf-arch">
        <name>NWDAF and related components</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="440" viewBox="0 0 440 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
              <path d="M 8,96 L 8,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 8,256" fill="none" stroke="black"/>
              <path d="M 80,32 L 80,64" fill="none" stroke="black"/>
              <path d="M 80,96 L 80,128" fill="none" stroke="black"/>
              <path d="M 80,160 L 80,256" fill="none" stroke="black"/>
              <path d="M 152,48 L 152,80" fill="none" stroke="black"/>
              <path d="M 152,128 L 152,176" fill="none" stroke="black"/>
              <path d="M 152,208 L 152,256" fill="none" stroke="black"/>
              <path d="M 192,88 L 192,120" fill="none" stroke="black"/>
              <path d="M 256,48 L 256,80" fill="none" stroke="black"/>
              <path d="M 256,128 L 256,176" fill="none" stroke="black"/>
              <path d="M 256,208 L 256,256" fill="none" stroke="black"/>
              <path d="M 304,168 L 304,224" fill="none" stroke="black"/>
              <path d="M 320,128 L 320,208" fill="none" stroke="black"/>
              <path d="M 432,128 L 432,208" fill="none" stroke="black"/>
              <path d="M 8,32 L 80,32" fill="none" stroke="black"/>
              <path d="M 152,48 L 256,48" fill="none" stroke="black"/>
              <path d="M 8,64 L 80,64" fill="none" stroke="black"/>
              <path d="M 152,80 L 256,80" fill="none" stroke="black"/>
              <path d="M 8,96 L 80,96" fill="none" stroke="black"/>
              <path d="M 8,128 L 80,128" fill="none" stroke="black"/>
              <path d="M 152,128 L 256,128" fill="none" stroke="black"/>
              <path d="M 320,128 L 432,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 80,160" fill="none" stroke="black"/>
              <path d="M 96,160 L 144,160" fill="none" stroke="black"/>
              <path d="M 272,160 L 312,160" fill="none" stroke="black"/>
              <path d="M 152,176 L 256,176" fill="none" stroke="black"/>
              <path d="M 152,208 L 256,208" fill="none" stroke="black"/>
              <path d="M 320,208 L 432,208" fill="none" stroke="black"/>
              <path d="M 96,224 L 144,224" fill="none" stroke="black"/>
              <path d="M 264,224 L 304,224" fill="none" stroke="black"/>
              <path d="M 8,256 L 80,256" fill="none" stroke="black"/>
              <path d="M 152,256 L 256,256" fill="none" stroke="black"/>
              <g class="text">
                <text x="44" y="52">AF</text>
                <text x="200" y="68">NRF/UDM</text>
                <text x="48" y="84">|</text>
                <text x="40" y="116">NEF</text>
                <text x="48" y="148">|</text>
                <text x="212" y="148">DCCF</text>
                <text x="348" y="164">Data</text>
                <text x="396" y="164">Source</text>
                <text x="372" y="180">NF</text>
                <text x="200" y="196">|</text>
                <text x="40" y="212">NWDAF</text>
                <text x="204" y="228">MFAF</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
+--------+
|   AF   |        +------------+
+--------+        |  NRF/UDM   |
     |            +------------+
+--------+             |
|  NEF   |             |
+--------+        +------------+       +-------------+
     |            |     DCCF   |       |             |
+--------+ -------|            | ------| Data Source |
|        |        +------------+     | |     NF      |
|        |              |            | |             |
| NWDAF  |        +------------+     | +-------------+
|        | -------|    MFAF    |-----+
|        |        |            |
+--------+        +------------+
]]></artwork>
        </artset>
      </figure>
      <t>NWDAF relies on various sources of data input including data from the mobile core NFs, AFs, 
e.g., Network Repository Function (NRF), Unified Data Management (UDM), etc., 
and OAM data, including performance measurements (PMs), Key Performance Indicators (KPIs), 
configuration management data and alarms. An NWDAF may provide in turn analytics output 
results to the mobile core NF, AFs, and OAM. Optionally, Data Collection Coordination Function 
(DCCF) and Messaging Framework Adaptor Function (MFAF) may be involved to distribute and 
collect repeated data towards or from various data sources. Note that AF contains a Network 
Exposure Function (NEF) if it is an untrusted AF, i.e. external to the operator's network. 
NEF may assist the AI/ML application 
server in scheduling available UE(s) to participate in the AI/ML operation, e.g., Federated 
Learning <xref target="nwdaf-arch"/> <xref target="TS23.288"/>. 
Also, Mobile Core Network may assist the selection of UEs to serve as FL clients, by 
providing a list of target member UE(s), then subscribing to NWDAF via the NEF to be notified 
about the subset list of UE(s) (i.e., list of candidate UE(s)) that fulfill certain filtering 
criteria (not shown in the figure) <xref target="TR23.700-82"/>.</t>
      <t>In Next Generation Radio Access Network (NG-RAN), AI/ML support requires inputs from 
neighboring NG-RAN nodes and UEs. No special new node is added to the architecture for training
and inference. AI/ML model training can be located in the OAM and model inference in the
NG-RAN node or UE. It is also possible that both model training and inference are located in 
the NG-RAN node <xref target="TS38.300"/>.</t>
      <section anchor="aiml-for-vertical-markets">
        <name>AI/ML for Vertical Markets</name>
        <t>Vertical markets cover automotive such as  cars, drones and IoT based smart factories
are the major consumers of 3GPP-provided data analytics services <xref target="TS22.261"/>. 
They play important role on the Exposure of data analytics services from different network domains 
to the verticals
in a unified manner. They define, at an overarching layer, value-add application 
data analytics services which cover stats/predictions for the end-to-end application service.</t>
        <t>In order to allow the vertical market industries running applications over the mobile network
a service enabler architecture which specifies the procedures, information flows and APIs<br/>
called Application Data Analytics 
Enablement Service Enabler Architecture Layer (SEAL) for Verticals is defined <xref target="TS23.436"/>.
SEAL applications can be hosted on the Edge of the mobile network for UE use at the Edge.</t>
        <t>Example use case is the Vertical user leveraging the Application layer Analytics capabilities
for predicting end to end performance and selecting the optimal Vertical Application Layer 
(VAL) server <xref target="TS23.436"/>. VAL uses the SEAL layer to realize its services.</t>
        <t><xref target="TR23.700-82"/> expands upon the data analytics as a useful tool to optimize the service 
offering by predicting events related to the network or UE conditions. These services however 
can also assist the 3rd party AI/ML application service provider for the AI/ML model distribution, 
transfer, training for various applications (e.g., video/speech recognition, robot control, automotive). This takes us to the concept of the application enablement layer can play role on the exposure of AI/ML services from different 3GPP domains to the Application Service Providers (ASP) in a unified manner.</t>
      </section>
    </section>
    <section anchor="aiml-in-radio-access-network">
      <name>AI/ML in Radio Access Network</name>
      <t>AI/ML for New Radio (NR) Air Interface has these use cases: Channel State Information (CSI) feedback
enhancement which involves overhead reduction, improved accuracy, prediction; beam management,
and positioning accuracy enhancements <xref target="TR38.843"/>.</t>
      <t>For CSI, time domain CSI prediction employing one sided (usually at the UE) model training
done by the vendor and inference done at the UE. This technique avoids CSI compression using
two-sided AI/ML models  where Deep Neural Network models are used by UE to encode,  to 
compress  CSI feedback information and a corresponding CSI decoder is used at the gNB 
to reconstruct the CSI from the received feedback data.</t>
      <t>AI/ML is also used in beam management to support downlink beam forming with one sided (UE or gNB) 
models and positioning accuracy enhancements with direct UE side AI/ML positioning or UE-assisted 
or gNB-assisted LMF-based positioning.</t>
      <t>Protocol mechanism is called data collection. It is for the purpose of AI/ML model training,
data analytics and inference by the network nodes, management entity or UE. Xn Application
Protocol over Xn interface defines a set of Data Collection messages used by an NG-RAN node 1 to request from 
another NG-RAN node 2 the reporting of information to support AI/ML in NG-RAN <xref target="TR38.423"/>. 
UE data collection is done by gNB requested by OAM and reported to the Access and Mobility management Function 
(AMF).</t>
      <t>Radio Access Network AI/ML operations are based on Data Collection protocol procedures which
are used in model training and model inference operations. Data Collection set of link layer 
messages are part of Xn Application Protocol defined in <xref target="TR38.423"/>. Stream Control Transmission 
Protocol (SCTP) is used to securely transport data collection messages
in the Radio Access Network <xref target="RFC9260"/>.</t>
      <section anchor="aiml-in-open-radio-access-network">
        <name>AI/ML in Open Radio Access Network</name>
        <t>Open Radio Access Network (Open RAN) is a new approach to building RANs <xref target="WakaSB24"/>. Open RAN is about 
disaggregated RAN functionality built using open interface specifications between elements 
designed to support equipment interoperability from multiple vendors.
In Open RAN, a base station is split into several functional components, including central unit (CU), 
distributed unit (DU), and a remote unit (RU). Open RAN introduces advanced automation into the 
RAN system by means of an abstracted entity to manage the radio networks, i.e. RAN 
Intelligent Controller (RIC).</t>
        <t>RIC will contain specialized AI hardware needed to implement the execution of the models for 
CSI feedback enhancement, beam management and positioning accuracy enhancements discussed above.</t>
      </section>
    </section>
    <section anchor="security-and-privacy">
      <name>Security and Privacy</name>
      <t>AI/ML based aservices in mobile networks raise many security and privacy issues. <xref target="TR23.700-80"/> and <xref target="TR23.700-82"/> 
identify a number of key issues  and <xref target="TR33.898"/> presents a study on one of the key issues 
which will be detailed here.</t>
      <t><xref target="TR23.700-80"/> studies the exposure of different types of assistance information such as 
traffic rate, packet delay, packet loss rate, network condition changes, candidate federated learning
(FL) members, 
geographical distribution information, etc., to AF for AI / ML operations. Some of assistance 
information could be user privacy sensitive, such as candidate FL members, geographical distribution, 
i.e. location information.
There is a need to study how to protect such privacy-related assistance information. In addition, 
Mobile Core Network needs to determine which assistance information is required by AF to 
complete AI/ML operation and to avoid exposing information that is unnecessary for AI/ML operations.</t>
      <t>Because of the use of Restful API which depend on the use of HTTP protocol, OAuth 2.0 <xref target="RFC6749"/> 
protocol seems to be the natural choice here for authorization.</t>
      <t>One solution can be developed reusing existing mechanism for authorization of Mobile Core 
Network assistance information exposure to AF. The solution is based on reusing the OAuth 2.0-based 
authorization mechanism. 
OAuth 2.0 <xref target="RFC6749"/> protocol extends traditional client-server authentication 
by providing a third-party client with a token.  Since such
   token resembles a different set of credentials compared to those of
   the resource owner, the device needs not be allowed to use the
   resource owner's credentials to access protected resources.</t>
      <t>UE privacy profile/local policies stored in a database can also be employed to authorize UE-related 
Mobile Core Network assistance information exposure. UE privacy profile/local policies may 
also contain protection policies that indicate how Mobile Core Network assistance information 
should be protected (e.g., using security techniques like encryption, integrity protection, 
etc.). NWDAF via Network Exposure 
Function (NEF) sends the UE-related Mobile Core Network assistance information to AF when 
the local policies/UE privacy profile allows authorizing the AF to access the information 
(see <xref target="nwdaf-arch"/>). 
According 
to the local policies/UE privacy profiles, NWDAF may need to protect the Mobile Core 
Network assistance information with security mechanisms.</t>
      <t>A common Application Programming Interface (API) Framework for the Mobile Core Network and<br/>
northbound APIs (called CAPIF) is defined to  securely expose capabilities and events to 
3rd party Application Functions,
i.e. external 
(AF) via Network Exposure Function (NEF). The interface between the NEF and the Application 
Function needs integrity protection, replay protection, confidentiality protection for communication 
between the NEF and Application Function, and mutual authentication between the NEF and Application 
Function and protect internal Mobile Core network information. The NEF also enable secure provision 
of information in the 3GPP network by authenticated and authorized AFs.</t>
      <t>Security should be provided to support the protection of user privacy sensitive assistance 
information being exposed to AF. TLS 1.3 <xref target="RFC8446"/> is used to provide integrity protection, 
replay protection and confidentiality protection for the interface between the NEF and the 
AF <xref target="TS33.501"/>.</t>
      <t>As for Radio Access Network AI/ML services use cases like CSI, beam management, position 
accuracy enhancement, UE uses NR-Uu interface to  communicate with NG-RAN node using RRC protocol
to send L3 cell/beam measurements, location, sensor and timing information. Radio Resource Control
(RRC) messages communicated over the air interface causes security issues because they are not 
protected. Transport 
layer protocol SCTP  is used only when two NG-RAN nodes are connected over Xn. In this case SCTP
should be run below DTLS 1.3 <xref target="RFC9147"/> to provide communications privacy, prevent eavesdropping 
and detect 
tampering or message forgery <xref target="dtlssctp"/>.</t>
      <t>Any location/positioning information sent directly from UE to NG-RAN node causes privacy
concern without user consent. Location information may be sent in RRC IDLE/INACTIVE state
and also in CONNECTED state after the connection is established <xref target="TR38.843"/>. Location information 
received by NG-RAN node is sent to Location Management Function (LMF) in the mobile core 
network.</t>
    </section>
    <section anchor="work-points">
      <name>Work Points</name>
      <t>Security and privacy of AI/ML based services and applications in mobile networks need further work. 
<xref target="TR33.898"/> provides solutions to only one of many possible key issues. Each key issue has 
been in depth investigated in <xref target="TR23.700-80"/> and <xref target="TR23.700-82"/> from which new solutions 
can be developed.</t>
      <t>We list below only some of the key issues identified:</t>
      <ul spacing="normal">
        <li>
          <t>Enhance the mobile core network to expose information to the UE to facilitate the operation of<br/>
AI/ML applications (e.g., Model Training, Splitting and inference feedback etc.)</t>
        </li>
        <li>
          <t>Expose UE-related information to an AF  ensuring that privacy and security requirements are met.</t>
        </li>
        <li>
          <t>Additional parameters to be provisioned to the mobile core network by an external party for the assistance to the operation of AI/ML applications.</t>
        </li>
        <li>
          <t>Whether and how the existing  mobile core network data transfer/traffic routing mechanisms 
are re-used or enhanced to support the transmission of the Application AI/ML traffic(s) between 
AI/ML endpoints (i.e., UE and AF)</t>
        </li>
        <li>
          <t>Information to be provided by the mobile core network to the AF can help the AF to select 
and manage the group of UEs which will be part of FL operation.</t>
        </li>
        <li>
          <t>Enhance the architecture and related functions to support application layer AI/ML services</t>
        </li>
        <li>
          <t>Support Federated Learning at application enablement layers</t>
        </li>
        <li>
          <t>Enhance the architecture and related functions to support management and/or configuration
for split AI/ML operation, and in-time transfer of AI/ML models. The management and configuration 
aspects including discovery of required nodes for split AI/ML operation and support of different 
models of AI/ML operation splitting in which the AI/ML operation/model is split, e.g. for performing 
inference, 
into multiple 
parts according to the current task and environment.</t>
        </li>
        <li>
          <t>Support transfer learning at application enablement layers</t>
        </li>
      </ul>
      <t>The last key issue will be elaborated in the next section below.</t>
    </section>
    <section anchor="transfer-learning-use-case">
      <name>Transfer Learning Use Case</name>
      <t>Transfer Learning (TL) is the training of a machine learning (ML) technique where a model 
pre-trained
on one task is fine-tuned for a new but related task. Transfer learning assumes a baseline 
model
is already available in a repository in the mobile network provided by the source domain
can be fine-tuned to quickly perform the same or similar tasks in the target domain with 
lesser
amount of training data.</t>
      <t>TL support involves many entities in the mobile network. ML models need to be stored in 
 the 
 repository
 entities. When storing, some information elements need to be added to the model, such as 
 identity of the model consumer that is initiating the request, i.e. model consumer id.
 For transfer learning, Base Model ID could be added.</t>
      <t>Transfer Learning solution should aim to provide support for Transfer Learning (TL) by 
discovering and selecting the base models to be used for similar tasks as pre-trained 
models.
It involves first discovering repositories of pre-trained models in a given service area 
and then sending request messages to the repositories and collecting responses.</t>
      <t>Security and privacy issues in all the messaging need to be investigated.</t>
    </section>
    <section anchor="future-work">
      <name>Future Work</name>
      <t>A use case document is needed. We have listed the identified use cases and elaborated 
 one of them  above in this document. New set of use cases on Rule Based Automation, Autonomous 
Networks, Automated Testing, Energy Efficiency and so on could be added to the existing use 
cases. All or some of these usage areas of AI/ML can further be elaborated in a use case 
document. 
These use cases should make it clear why the security and privacy protocols are needed.</t>
      <t>A problem statement on AI/ML based services in mobile networks document is needed. Such a document should identify 
the problems that possibly need a new protocol to be developed or need to identify extensions 
to an existing protocol. One possibility in that direction could be refining the work points 
identified above and formulating them in terms of existing or to be defined in the future 
security and privacy protocols.</t>
      <t>A document describing security threat model on which AI/ML security and privacy enhancements 
can be developed <xref target="RFC6819"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations of AI/ML services is TBD.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There are no IANA considerations for this document.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>We acknowledge useful comments from Hesham ElBakoury, Marie-Jose Monpetit, Natalie Romo-Moreno
 that have led to many improvements in the document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC6819">
          <front>
            <title>OAuth 2.0 Threat Model and Security Considerations</title>
            <author fullname="T. Lodderstedt" initials="T." role="editor" surname="Lodderstedt"/>
            <author fullname="M. McGloin" initials="M." surname="McGloin"/>
            <author fullname="P. Hunt" initials="P." surname="Hunt"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document gives additional security considerations for OAuth, beyond those in the OAuth 2.0 specification, based on a comprehensive threat model for the OAuth 2.0 protocol. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6819"/>
          <seriesInfo name="DOI" value="10.17487/RFC6819"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9260">
          <front>
            <title>Stream Control Transmission Protocol</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <author fullname="K. Nielsen" initials="K." surname="Nielsen"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document describes the Stream Control Transmission Protocol (SCTP) and obsoletes RFC 4960. It incorporates the specification of the chunk flags registry from RFC 6096 and the specification of the I bit of DATA chunks from RFC 7053. Therefore, RFCs 6096 and 7053 are also obsoleted by this document. In addition, RFCs 4460 and 8540, which describe errata for SCTP, are obsoleted by this document.</t>
              <t>SCTP was originally designed to transport Public Switched Telephone Network (PSTN) signaling messages over IP networks. It is also suited to be used for other applications, for example, WebRTC.</t>
              <t>SCTP is a reliable transport protocol operating on top of a connectionless packet network, such as IP. It offers the following services to its users:</t>
              <t>The design of SCTP includes appropriate congestion avoidance behavior and resistance to flooding and masquerade attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9260"/>
          <seriesInfo name="DOI" value="10.17487/RFC9260"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="dtlssctp">
          <front>
            <title>Datagram Transport Layer Security (DTLS) 1.3 for Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="Michael Tüxen" initials="M." surname="Tüxen">
              <organization>Münster University of Applied Sciences</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document describes the usage of the Datagram Transport Layer
   Security (DTLS) 1.3 protocol over the Stream Control Transmission
   Protocol (SCTP) and obsoletes RFC 6083.

   DTLS 1.3 over SCTP provides communications privacy for applications
   that use SCTP as their transport protocol and allows client/server
   applications to communicate in a way that is designed to prevent
   eavesdropping and detect tampering or message forgery.

   Applications using DTLS 1.3 over SCTP can use almost all transport
   features provided by SCTP and its extensions.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tuexen-tsvwg-rfc6083-bis-06"/>
        </reference>
        <reference anchor="TS22.261">
          <front>
            <title>Service Requirements for the 5G System</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="TR22.874">
          <front>
            <title>Study on traffic characteristics and performance requirements for AI/ML model transfer in 5GS</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2021" month="December"/>
          </front>
        </reference>
        <reference anchor="TR23.700-80" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.700-80/">
          <front>
            <title>Study on 5G System Support for AI/ML-based Services</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2022" month="December"/>
          </front>
        </reference>
        <reference anchor="TR23.700-82" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.700-82/23700-82-j10.zip">
          <front>
            <title>Study on application layer support for AI/ML services</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="September"/>
          </front>
        </reference>
        <reference anchor="IsNo20" target="https://www.ericsson.com/48df60/assets/local/reports-papers/research-papers/secure-federated-learning-in-5g-mobile-networks.pdf">
          <front>
            <title>Secure Federated Learning in 5G Mobile Networks</title>
            <author initials="M." surname="Isaksson" fullname="Martin Isaksson">
              <organization/>
            </author>
            <author initials="C." surname="Norrman" fullname="Carl Norrman">
              <organization/>
            </author>
            <date year="2020" month="December"/>
          </front>
        </reference>
        <reference anchor="MaTeMaFiWeKo21" target="https://www.ericsson.com/en/reports-and-papers/white-papers/accelerating-the-adoption-of-ai-in-programmable-5g-networks">
          <front>
            <title>Accelerating the adoption of AI in programmable 5G networks</title>
            <author initials="J." surname="Manocha" fullname="Jatendra Manocha, et al.">
              <organization/>
            </author>
            <date year="2021" month="July"/>
          </front>
        </reference>
        <reference anchor="WakaSB24" target="https://www.softbank.jp/corp/set/data/technology/research/story-event/Whitepaper_Download_Location/pdf/SoftBank_AI_RAN_Whitepaper_December2024.pdf">
          <front>
            <title>AI-RAN Telecom Infrastructure for the Age of AI</title>
            <author initials="R." surname="Wakikawa" fullname="Ryuji Wakikawa, et al.">
              <organization/>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="Lin24" target="https://www.comsoc.org/publications/ctn/overview-ai-3gpps-ran-release-18-enhancing-next-generation-connectivity">
          <front>
            <title>Enhancing Next-Generation Connectivity</title>
            <author initials="X." surname="Lin" fullname="Xingqin Lin">
              <organization>NVIDIA, USA</organization>
            </author>
            <date year="2024" month="March"/>
          </front>
        </reference>
        <reference anchor="Lin23" target="https://arxiv.org/pdf/2312.15174">
          <front>
            <title>5G-Advanced evolution in 3GPP Release 19</title>
            <author initials="X." surname="Lin" fullname="Xingqin Lin">
              <organization>NVIDIA, USA</organization>
            </author>
            <date year="2023" month="December"/>
          </front>
        </reference>
        <reference anchor="Srini21" target="https://www.kdnuggets.com/2021/11/difference-distributed-learning-federated-learning-algorithms.html">
          <front>
            <title>Difference between distributed learning versus Federated Learning algorithms</title>
            <author initials="A." surname="Srinivasan" fullname="Aishwarya Srinivasan">
              <organization/>
            </author>
            <date year="2021" month="November"/>
          </front>
        </reference>
        <reference anchor="TR33.898" target="https://www.3gpp.org/ftp/Specs/archive/33_series/33.898/33898-i01.zip">
          <front>
            <title>Study on security and privacy of Artificial Intelligence/Machine Learning (AI/ML)-based services and applications in 5G</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2023" month="July"/>
          </front>
        </reference>
        <reference anchor="TS33.501" target="https://www.3gpp.org/ftp/Specs/archive/33_series/33.501/33501-j10.zip">
          <front>
            <title>Security Architecture and Procedures for 5G System</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2025" month="January"/>
          </front>
        </reference>
        <reference anchor="TS23.436" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.436/23436-j20.zip">
          <front>
            <title>Functional architecture and information flows for Application Data Analytics Enablement Service</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="September"/>
          </front>
        </reference>
        <reference anchor="TS38.300" target="https://www.3gpp.org/ftp/Specs/archive/38_series/38.300/38300-i40.zip">
          <front>
            <title>Radio Access Network; NR; NR and NG-RAN Overall Description</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="TR38.843" target="https://www.3gpp.org/ftp/Specs/archive/38_series/38.843/38843-i00.zip">
          <front>
            <title>Study on Artificial Intelligence (AI)/Machine Learning (ML) for NR air interface</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="January"/>
          </front>
        </reference>
        <reference anchor="TR38.423" target="https://www.3gpp.org/ftp/Specs/archive/38_series/38.423/38423-i40.zip">
          <front>
            <title>NG-RAN; Xn application protocol (XnAP)</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="TS23.288" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.288/23288-j10.zip">
          <front>
            <title>Architecture enhancements for 5G System (5GS) to support network data analytics services</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
