Secure AI for 6G Networks: Addressing Side-Channel Attacks
Mohammed Saeb Nahi
Vol. 11, Issue 1, Jan-Dec 2025
Page Number: 1 - 11
Abstract:
6t generation networks, such as ultra-low latency, massive device connection, and high data throughput, along with formidable applications including autonomous systems, smart cities, and advanced healthcare, has arrived. Unfortunately, these advancements also bring about significant security issues, namely side channel attacks that use non-functional data, i.e., power consumption and timing information to leak out sensitive information. In this paper, deep learning optimization strategies for making 6G mobile devices more secure against such vulnerabilities are presented. The proposed framework integrates robust encryption techniques with AI powered secure key management mechanisms to mitigate threats of potential threats while bolstering robust and adaptive defenses in dynamic 6G environments. We observe via extensive experimental results that optimized deep learning models can accurately detect and counter side-channel exploits with a detection accuracy approaching 95%. In addition, AI driven encryption is able to achieve significantly better performance and resilience by achieving lower computational over head while having equally high security. It highlights the importance of artificial intelligence in solving growing cybersecurity challenges and paving the way for the secure deployment of next generation networks. The findings underline the need for AI driven methodologies in protecting the integrity and privacy of the data being deployed in 6G systems.
References
- Wong, A. W. L., Goh, S. L., Hasan, M. K., & Fattah, S. (2024). Multi-hop and mesh for LoRa networks: Recent advancements, issues, and recommended applications. ACM Computing Surveys, 56(6), 1-43.
- Hasan MK, Jahan N, Nazri MZ, Islam S, Khan MA, Alzahrani AI, Alalwan N, Nam Y. Federated learning for computational offloading and resource management of vehicular edge computing in 6G-V2X network. IEEE Transactions on Consumer Electronics. 2024 Jan 26.
- Ahmed, A. A., Hasan, M. K., Memon, I., Aman, A. H. M., Islam, S., Gadekallu, T. R., & Memon, S. A. (2024). Secure AI for 6G Mobile Devices: Deep Learning Optimization Against Side-Channel Attacks. IEEE Transactions on Consumer Electronics.
- Mousa'B, M. S., Hasan, M. K., Sulaiman, R., Islam, S., & Khan, A. U. R. (2023). An explainable ensemble deep learning approach for intrusion detection in industrial Internet of Things. IEEE Access, 11, 115047-115061.
- Hasan, M.K., Sundararajan, E., Islam, S., Ahmed, F.R.A., Babiker, N.B.M., Alzahrani, A.I., Alalwan, N. and Khan, M.A., 2024. A novel segmented random search-based batch scheduling algorithm in fog computing. Computers in Human Behavior, 158, p.108269.
- A. A. Ahmed, M. K. Hasan, N. S. Nafi, A. H. Aman, S. Islam, and S. A. Fadhil, 'Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks,' 2023 33rd International Telecommunication Networks and Applications Conference, Melbourne, Australia, 2023, pp. 325-328,
- Hasan, Mohammad Kamrul, Zhou Weichen, Nurhizam Safie, Fatima Rayan Awad Ahmed, and Taher M. Ghazal. 'A Survey on Key Agreement and Authentication Protocol for Internet of Things Application.' IEEE Access (2024).
- Wenhua, Z., Hasan, M.K., Jailani, N.B., Islam, S., Safie, N., Albarakati, H.M., Aljohani, A. and Khan, M.A., 2024. A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications. Computers in Human Behavior, 153, p.108134.
- Xiang, Y., Chen, Z., Chen, Z., Fang, Z., Hao, H., Chen, J., Liu, Y., Wu, Z., Xuan, Q., & Yang, X. (2019). Open DNN Box by Power Side-Channel Attack. IEEE Transactions on Circuits and Systems II: Express Briefs, 67, 2717-2721.
- Abbas Ahmed, A., Kamrul Hasan, M., Azman Mohd Noah, S., & Hafizah Aman, A. (2024). Design of Time-Delay Convolutional Neural Networks (TDCNN) Model for Feature Extraction for Side-Channel Attacks. International Journal of Computing and Digital Systems, 16(1), 341-351.
- AL-Jumaili, A.H.A., Muniyandi, R.C., Hasan, M.K., Singh, M.J., Paw, J.K.S. and Amir, M., 2023. Advancements in intelligent cloud computing for power optimization and battery management in hybrid renewable energy systems: A comprehensive review. Energy Reports, 10, pp.2206-2227.
- Hasan, Mohammad Kamrul, Musse Mohamud Ahmed, Shayla Islam, S. Rayhan Kabir, Fatima Rayan Awad Ahmed, Mufti Mahmud, Mohd Zakree Ahmad Nazri, and Nissrein Babiker Mohammed Babiker. 'Malaysia energy outlook from 1990 to 2050 for sustainability: Business-as-usual and Alternative policy Scenarios based economic projections with AI based experiments.' Energy Strategy Reviews 53 (2024): 101360.
- Hasan, M. K., Abdulkadir, R. A., Islam, S., Gadekallu, T. R., & Safie, N. (2024). A review on machine learning techniques for secured cyber-physical systems in smart grid networks. Energy Reports, 11, 1268-1290.
- Al-Qirim, N., Bani-Hani, A., Majdalawieh, M., Al Hamadi, H., & Hasan, M. K. (2024). DiGraph enabled Digital Twin and Label- Encoding Machine Learning for SCADA Network's Cyber Attack Analysis in Industry 5.0. IEEE Open Journal of the Communications Society.
- Ometov, A., Levina, A., Borisenko, P., Mostovoy, R., Orsino, A., & Andreev, S. (2017). Mobile Social Networking Under Side- Channel Attacks: Practical Security Challenges. IEEE Access, 5, 2591-2601.
- Ashrif, F. F., Sundararajan, E. A., Hasan, M. K., Ahmad, R., Abdullah, S., & Wazirali, R. (2024). Secured lightweight authentication for 6LoWPANs in machine-to-machine communications. Computers & Security, 145, 104002.
- Ashrif, Fatma Foad, Elankovan A. Sundararajan, Mohammad Kamrul Hasan, Rami Ahmad, Aisha-Hassan Abdalla Hashim, and Azhar Abu Talib. 'Provably secured and lightweight authenticated encryption protocol in machine-tomachine communication in industry 4.0.' Computer Communications218 (2024): 263-275.
- Ahmed, A.A., Hasan, M.K., Alqahtani, A., Islam, S., Pandey, B., Rzayeva, L., Abbas, H.S., Aman, A.H.M. and Alqahtani, N., 2024. Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks. Tsinghua Science and Technology, 30(3), pp.1012-1026.
Back Download