You are on page 1of 3

1.

Future aspects
Future aspects for ML/DL applications in wireless communications:

ML architectures might have a huge potential to shape the PHY design of future radios and challenging
open problems exist to unlock the true potential of AI-based approaches for future wireless systems,
however some problems and limitation should be taken into account for the future.

An intelligent receiver is that most detectors available in the literature require perfect CSI to function
properly. Because estimating channels in practice is difficult, and especially more difficult in massive
MIMO systems because of the high number of transmit antennas, building a system model with a perfect
CSI assumption remains a pipe dream. To promote practicability, receiver frameworks based on ML/DL
approaches comprising channel estimators and symbol detectors should become more widespread in the
future.

Moreover, the suggested models in a computer simulation environment using general channel model
assumptions may be misleading because there are many more impairments in real-world settings that we
do not know how they affect the performance of ML/DL models. As a result, it is proposed to develop
benchmark channel datasets that contain real-world impairments and different settings for multiple
wireless communication technologies. These benchmark datasets will enable fair comparisons of deep
learning models.

The construction of benchmark system models against which researchers may measure their ML/DL
models is the third critical area for quick advancement in this discipline. With the development of the
literature, the number of innovative DL frameworks has increased. As a result, to avoid the agglomeration
of identical models, new DL-based frameworks should be compared to current unique data-driven
methodologies.

Future aspects of ML/DL for wireless security:

As machine learning and deep learning form the foundation of existing and new communication systems
such as 5G and 6G, they become vulnerable to hostile impacts. To deliver on the promise of intelligent
operations and effective resource management with the use of ML in dynamic wireless settings, it is
critical to create ML models that are safe, resilient, and resistant to attacks by taking into consideration the
specific aspects of wireless communications. An AML attack model precisely described by wireless
features is envisaged to serve as the cornerstone for ML-driven wireless security research and
development for present and new communication systems. Several key concepts that can aid in the
realization of the promise of resilient models that are successful even in the face of enemies:

Wireless communication dataset: A difficulty that has to be overcome is the lack of standardized real-
world datasets that effectively depict real-life occurrences in the wireless communication domain. It is
critical for the research community to create additional publicly available datasets that depict various
situations, including not just channel, interference type, and waveform changes, but also AML attacks.

Robust features: The requirement for robust features in constructing ML/DL models in wireless
communication is also a critical concern for future systems. An important research focus for AML in
wireless communications is identifying robust features in datasets, distinguishing non-robust features from
robust features, and training models that generalize well and are resistant to adversarial attacks.

Certifiable defense: Another essential component of the work required to realize the full potential of
ML/DL in the wireless communications arena is the design and implementation of certifiable defensive
mechanisms for AML. Various defense measures, such as adversarial training and the use of statistical
methods, have been offered, however most of these defenses become useless when confronted with more
strong attackers. As a result, certifiable defensive mechanisms are required, in which prediction on test
data may be proven to be a constant within a narrow region surrounding the input data.

Although essential areas of research to ensure high performance from robust ML/DL models have been
covered in this section, there is also a need to transition from black-box models to interpretable models for
the safe deployment of ML/DL-based models into future communication systems. Today's paradigms
include physics-guided ML, in which basic physics rules are integrated into the learning process to
promote generalizability and explainability, as well as provide resilience against attacks, as required in
wireless communication systems [1].

The roles of AI in 6G:

Fig. 1. AI roles in 6G for transportation systems [2].

2. Standardization:
Several standardization groups, including 3GPP and the International Telecommunication Union (ITU), as
well as the 5GAA (5G Automotive Association), have begun to evaluate ML in 5G and future networks.
The ML models and algorithms will not be standardized in terms of standards. Other organizations,
including as the ORAN alliance, have begun to define open interfaces to share crucial information across
different components of the protocol stack. They have designated entities as a real-time intelligent
controller and a non-real-time intelligent controller. Non-real time RIC is one in which the ML models are
trained utilizing data gathered by lower layers. This learning occurs at a glacial pace, thus the term non-
real time. This learnt model is supplied into the real-time RIC, which applies it to real-time data and
makes real-time choices online. Depending on the sort of data that may be collected, such systems can be
implemented in core networks or RAN. The issue of incorporating ML capabilities into the 3GPP RAN is
still in its early stages of standardization. Given the complexity of future networks, the autonomous
network is an essential subject for RAN. The RAN is planned to have six stages of automation. L0
networks are manually operated, whereas L5 networks are entirely autonomous, with no human
participation at any step.

It is also necessary to define: signaling support for ML training and execution, data required by the ML
algorithms that is either reported by the user equipment (UE) or collected from an NG-RAN node, and
outputs generated by the algorithms that are to be delivered to the network, including network functions
and core network.

Furthermore, if the UE is capable of supporting at least a portion of ML inference on board, it is important


to investigate how the ML-enabled UE acquires an updated ML model and intermediate output depending
on dynamic environment changes and application. Due to limited storage space in the UEs, it is
impossible to pre-load all conceivable models on-board. As a result, ML model downloading or transfer
learning is required. ITU-T Rec. Y.3172 defines a technology-agnostic logical architectural model for
high-level machine learning needs such as interfaces, heterogeneous data support, and machine learning
algorithms in future networks. The real underlying network technology (e.g., 4G, 5G, 6G, IEEE 802.11) is
almost replicated by a digital twin known as a closed-loop subsystem, which is used to securely
investigate the results of various machine learning-enabled action possibilities [3].

You might also like