<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<?rfc tocompact="yes"?>
<?rfc tocindent="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sarischo-6gip-aiml-security-privacy-03" category="std" consensus="true" tocDepth="3" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="AI/ML  security privacy implications">Security and Privacy Implications of 3GPP AI/ML Networking Studies for 6G</title>
    <seriesInfo name="Internet-Draft" value="draft-sarischo-6gip-aiml-security-privacy-03"/>
    <author initials="B." surname="Sarikaya" fullname="Behcet Sarikaya">
      <organization>Unaffiliated</organization>
      <address>
        <email>sarikaya@ieee.org</email>
      </address>
    </author>
    <author initials="R." surname="Schott" fullname="Roland Schott">
      <organization abbrev="Deutsche Telekom">Deutsche Telekom</organization>
      <address>
        <postal>
          <street>Deutsche-Telekom-Allee 9</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>Roland.Schott@telekom.de</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <abstract>
      <?line 145?>

<t>This document provides an overview of 3GPP work on Artificial Intelligence/ Machine Learning (AI/ML) networking. Application areas and corresponding proposed modifications to the architecture are identified. Security and privacy issues of these new applications need to be identified out of which IETF work could emerge.</t>
    </abstract>
  </front>
  <middle>
    <?line 150?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Artificial Intelligence (AI) has historically been defined as the science and engineering to build intelligent machines capable of carrying out tasks as humans do. Inspired from the way human brain works, machine learning (ML) is defined as the field of study that gives computers the ability to learn without being explicitly programmed. Since it is believed that the main computational elements in a human brain are 86 billion neurons, the more popular ML approaches are using “neural network” as the model. Neural networks (NN) take their inspiration from the notion that a neuron’s computation involves a weighted sum of the input values. A computational neural network contains the neurons in the input layer which receive some values and propagate them to the neurons in the middle layer of the network, which is also called a “hidden layer”. The weighted sums from one or more hidden layers are ultimately propagated to the output layer, which presents the final outputs of the network.</t>
      <t>Neural networks having more than three layers, i.e., more than one hidden layer are called 
deep neural networks (DNN). In contrast to the conventional shallow-structured NN architectures, DNNs, also referred to as deep learning, made amazing breakthroughs since 2010s in many essential application areas because they can achieve human-level accuracy or even exceed human accuracy. Deep learning techniques use supervised and/or unsupervised strategies to automatically learn hierarchical representations in deep architectures for classification. With a large number of hidden layers, the superior performance of DNNs comes from its ability to extract high-level features from raw sensory data after using statistical learning over a large amount of data to obtain an effective representation of an input space. In recent years, thanks to the big data obtained from the real world, the rapidly increased computation capacity and continuously-evolved algorithms, DNNs have become the most popular ML models for many AI applications.</t>
      <t>The performance of DNNs is gained at the cost of high computational complexity. Hence 
more efficient compute engines are often used, e.g. graphics processing units (GPU) and 
network processing units (NPU). Compared to the inference which only involves the feedforward
 process, the training often requires more computation and storage resources because it involves 
 also the back propagation process.</t>
      <t>Many DNN models have been developed over the past two decades. Each of these models 
has a different “network architecture” in terms of number of layers, layer types, layer shapes
 (i.e., filter size, number of channels and filters), and connections between layers. Three 
 popular structures of DNNs: multilayer perceptron (MLPs), convolution neural networks (CNNs), 
 and recurrent neural networks (RNNs). Multilayer perceptron (MLP) model is the most basic 
 DNN, which is composed of a series of fully connected layers. In a fully connected layer, 
 all outputs are connected to all inputs. Hence MLP requires a significant amount of storage 
 and computation.</t>
      <t>A convolution neural network (CNN) is composed of multiple convolutional layers. Applying 
various convolutional filters, CNN models can capture the high-level representation of the 
input data, making it popular for image classification and speech recognition tasks.</t>
      <t>Recurrent neural network (RNN) models are another type of DNNs, which use sequential data feeding. 
The input of RNN consists of the current input and the previous samples. RNN models have 
been widely used in the natural language processing task on mobile devices, e.g., language 
modeling, machine translation, question answering, word embedding, and document classification.
RNN models and their derivative Large Language Model (LLM) are out of scope.</t>
      <t>While AI/ML has very many applications, in this document, we are interested in
the applications that involve networking. 
One is the network optimization comprises of the time-series forecasting, predictive maintenance, Quality 
of Experience (QoE) modeling and the other is speech recognition, image recognition, video 
processing all of them characterized as network analytics. When network analytics is used
in the mobile network, 
the end device is the base station. For the speech/ image recognition and video processing
(mainly used in the vertical markets such as autonomous cars, smart factories) 
the end device is the UE <xref target="TR22.874"/>.</t>
      <t>AI/ML has other applications as well in improving radio access network (RAN). DNN models
can be used for the New Radio (NR) air interface. Use cases are channel state information (CSI)
feedback enhancement, beam management, positioning accuracy enhancements <xref target="Lin24"/>.</t>
      <t>This document aims to present Artificial Intelligence Machine Learning (AIML) networking 
issues that may require further protocol work, mostly on the security and privacy aspects 
of networking. It is expected that the next generation 6G air interface will emerge from AI/ML
applications to the NR air interface and network operation will benefit from the network 
analytics enhancements offered by AI/ML.</t>
    </section>
    <section anchor="training-and-federated-learning">
      <name>Training and Federated Learning</name>
      <t>Training is a process in which an AI/ML model learns to perform its given tasks, more specifically, by optimizing the value of the weights in the DNN. A DNN is trained by inputting a training set, which are often correctly-labelled training samples. Taking image classification for instance, the training set includes correctly-classified images. The training process is repeated iteratively to continuously reduce the overall loss. Until the loss is below a predefined threshold, the DNN with high precision is obtained. After a DNN is trained, it can perform its task by computing the output of the network using the weights determined during the training process, which is referred to as inference. In the model inference process, the inputs from the real world are passed through the DNN. Then the prediction for the task is output. For instance, the inputs can be pixels of an image, sampled amplitudes of an audio wave or the numerical representation of the state of some system or game. Correspondingly, the outputs of the network 
can be a probability that an image contains a particular object.</t>
      <t>With continuously improving capability of cameras and sensors on mobile devices, valuable training data, which are essential for AI/ML model training, are increasingly generated on the devices. For many AI/ML tasks, the fragmented data collected by mobile devices are essential for training a global model. In the traditional approaches, the training data gathered by mobile devices are centralized to the cloud datacenter for a centralized training.</t>
      <t>In Distributed Learning mode, each computing node trains its own DNN model locally with local data, which preserves private information locally. To obtain the global DNN model by sharing local training improvement, nodes in the network will communicate with each other to exchange the local model updates. In this mode, the global DNN model can be trained without the intervention of the cloud datacenter.</t>
      <t>In 3GPP Federated Learning (FL) mode, the cloud server trains a global model by aggregating local models partially-trained by each end devices. The most agreeable Federated Learning algorithm so far is based on the iterative model averaging whereby within each training iteration, a UE performs the training based on the model downloaded from the AI 
server using the local training data. Then the UE reports the interim training results 
(e.g., gradients for the DNN) to the cloud server via the uplink (UL) channels. 
The server aggregates the gradients from the UEs, and updates the global model. 
Next, the updated global model is distributed to the UEs via the Data Link (DL) channels. 
Then the UEs can perform the training for the next iteration.</t>
      <t>Summarizing, we can say that distributed learning  is about having centralized data but distributing the model training to different nodes, while Federated Learning (FL) is about having decentralized data and training and in effect having a central model <xref target="Srini21"/></t>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <t>A new framework for protocols called Service based architecture (SBA) comprises Network 
Functions (NFs) that expose services through RESTful Application Programming Interface (APIs) 
has been defined. There are providers 
and consumers (publishers and subscribers) which are new functions in the system <xref target="IsNo20"/>.
SBA provides built in security using Public Key Infrastructure (PKI) managed certificates
in the mobile core network.</t>
      <t>For AI/ML, 3GPP core,  aka mobile core network, has a new 
server function: The Network Data Analytics Function (NWDAF) provides analytics to Mobile 
Core Network Functions (NFs) and Operations and Management (OAM). An NWDAF may contain the 
Analytics logical function (AnLF): A logical function in NWDAF, which performs inference, 
derives analytics information and Model Training logical function (MTLF) which trains Machine 
Learning (ML) models and exposes new training services. The Application AI/ML operation logic 
is controlled by an Application Function (AF). Any AF request to the mobile network in the context 
(which consists of the mobile core network, access network 
and UE) assistance to Application AI/ML operation should be authorized by the Mobile Core 
Network <xref target="TR23.700-80"/>.</t>
      <figure anchor="nwdaf-arch">
        <name>NWDAF and related components</name>
        <artset>
          <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="256" width="440" viewBox="0 0 440 256" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,144 L 8,240" fill="none" stroke="black"/>
              <path d="M 80,144 L 80,240" fill="none" stroke="black"/>
              <path d="M 152,32 L 152,64" fill="none" stroke="black"/>
              <path d="M 152,112 L 152,160" fill="none" stroke="black"/>
              <path d="M 152,192 L 152,240" fill="none" stroke="black"/>
              <path d="M 256,32 L 256,64" fill="none" stroke="black"/>
              <path d="M 256,112 L 256,160" fill="none" stroke="black"/>
              <path d="M 256,192 L 256,240" fill="none" stroke="black"/>
              <path d="M 304,152 L 304,208" fill="none" stroke="black"/>
              <path d="M 320,112 L 320,192" fill="none" stroke="black"/>
              <path d="M 432,112 L 432,192" fill="none" stroke="black"/>
              <path d="M 152,32 L 256,32" fill="none" stroke="black"/>
              <path d="M 152,64 L 256,64" fill="none" stroke="black"/>
              <path d="M 152,112 L 256,112" fill="none" stroke="black"/>
              <path d="M 320,112 L 432,112" fill="none" stroke="black"/>
              <path d="M 8,144 L 80,144" fill="none" stroke="black"/>
              <path d="M 96,144 L 144,144" fill="none" stroke="black"/>
              <path d="M 272,144 L 312,144" fill="none" stroke="black"/>
              <path d="M 152,160 L 256,160" fill="none" stroke="black"/>
              <path d="M 152,192 L 256,192" fill="none" stroke="black"/>
              <path d="M 320,192 L 432,192" fill="none" stroke="black"/>
              <path d="M 96,208 L 144,208" fill="none" stroke="black"/>
              <path d="M 264,208 L 304,208" fill="none" stroke="black"/>
              <path d="M 8,240 L 80,240" fill="none" stroke="black"/>
              <path d="M 152,240 L 256,240" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="320,144 308,138.4 308,149.6" fill="black" transform="rotate(0,312,144)"/>
              <polygon class="arrowhead" points="152,208 140,202.4 140,213.6" fill="black" transform="rotate(0,144,208)"/>
              <polygon class="arrowhead" points="152,144 140,138.4 140,149.6" fill="black" transform="rotate(0,144,144)"/>
              <g class="text">
                <text x="200" y="52">NRF/UDM</text>
                <text x="200" y="84">0</text>
                <text x="200" y="100">|</text>
                <text x="212" y="132">DCCF</text>
                <text x="348" y="148">Data</text>
                <text x="396" y="148">Source</text>
                <text x="372" y="164">NF</text>
                <text x="200" y="180">|</text>
                <text x="40" y="196">NWDAF</text>
                <text x="204" y="212">MFAF</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[
                  +------------+
                  |  NRF/UDM   |
                  +------------+
                        0
                        |
                  +------------+       +-------------+
                  |     DCCF   |       |             |
+--------+ ------>|            | ----->| Data Source |
|        |        +------------+     | |     NF      |
|        |              |            | |             |
| NWDAF  |        +------------+     | +-------------+
|        | ------>|    MFAF    |-----+
|        |        |            |
+--------+        +------------+
]]></artwork>
        </artset>
      </figure>
      <t>NWDAF relies on various sources of data input including data from the mobile core NFs, AFs, 
e.g., Network Repository Function (NRF), Unified Data Management (UDM), etc., 
and OAM data, including performance measurements (PMs), Key Performance Indicators (KPIs), 
configuration management data and alarms. An NWDAF may provide in turn analytics output 
results to the mobile core NF, AFs, and OAM. Optionally, Data Collection Coordination Function 
(DCCF) and Messaging Framework Adaptor Function (MFAF) may be involved to distribute and 
collect repeated data towards or from various data sources. Note that AF contains a Network 
Exposure Function (NEF) if it is an untrusted AF. NEF may assist the AI/ML application 
server in scheduling available UE(s) to participate in the AI/ML operation, e.g., Federated 
Learning <xref target="nwdaf-arch"/>. 
Also, Mobile Core Network may assist the selection of UEs to serve as FL clients, by 
providing a list of target member UE(s), then subscribing to the NEF to be notified about 
the subset list of UE(s) (i.e., list of candidate UE(s)) that fulfill certain filtering 
criteria <xref target="TR23.700-82"/>.</t>
      <t>In Next Generation Radio Access Network (NG-RAN), AI/ML support requires inputs from 
neighboring NG-RAN nodes and UEs. No special new node is added to the architecture for training
and inference. AI/ML model training can be located in the OAM and model inference in the
NG-RAN node or UE. It is also possible that both model training and inference are located in 
the NG-RAN node.</t>
      <section anchor="aiml-for-vertical-markets">
        <name>AI/ML for Vertical Markets</name>
        <t>Vertical markets cover automotive such as  cars, drones and IoT based smart factories
are the major consumers of 3GPP-provided data analytics services. 
They play important role on the Exposure of data analytics services from different network domains 
to the verticals
in a unified manner. They define, at an overarching layer, value-add application 
data analytics services which cover stats/predictions for the end-to-end application service.</t>
        <t>In order to allow the vertical market industries running applications over the mobile network
a service enabler architecture which specifies the procedures, information flows and APIs<br/>
called Application Data Analytics 
Enablement Service Enabler Architecture Layer (SEAL) for Verticals is defined <xref target="TS23.436"/>.
SEAL applications can be hosted on the Edge of the mobile network for UE use at the Edge.</t>
        <t>Example use case is the Vertical user leveraging the Application layer Analytics capabilities
for predicting end to end performance and selecting the optimal Vertical Application Layer 
(VAL) server <xref target="TS23.436"/>. VAL uses the SEAL layer to realize its services.</t>
        <t><xref target="TR23.700-82"/> expands upon the data analytics as a useful tool to optimize the service 
offering by predicting events related to the network or UE conditions. These services however 
can also assist the 3rd party AI/ML application service provider for the AI/ML model distribution, 
transfer, training for various applications (e.g., video/speech recognition, robot control, automotive). This takes us to the concept of the application enablement layer can play role on the exposure of AI/ML services from different 3GPP domains to the Application Service Providers (ASP) in a unified manner.</t>
      </section>
    </section>
    <section anchor="aiml-in-radio-access-network">
      <name>AI/ML in Radio Access Network</name>
      <t>AI/ML for New Radio (NR) Air Interface has these use cases: Channel State Information (CSI) feedback
enhancement which involves overhead reduction, improved accuracy, prediction; beam management,
and positioning accuracy enhancements <xref target="TR38.843"/>.</t>
      <t>For CSI, time domain CSI prediction employing one sided (usually at the UE) model training
done by the vendor and inference done at the UE. This technique avoids CSI compression using
two-sided AI/ML models  where Deep Neural Network models are used by UE to encode,  to 
compress  CSI feedback information and a corresponding CSI decoder is used at the gNB 
to reconstruct the CSI from the received feedback data.</t>
      <t>AI/ML is also used in beam management to support downlink beam forming with one sided (UE or gNB) 
models and positioning accuracy enhancements with direct UE side AI/ML positioning or UE-assisted 
or gNB-assisted LMF-based positioning.</t>
      <t>Protocol mechanism is called data collection. It is for the purpose of AI/ML model training,
data analytics and inference by the network nodes, management entity or UE. Xn Application
Protocol over Xn interface defines a set of Data Collection messages used by an NG-RAN node 1 to request from 
another NG-RAN node 2 the reporting of information to support AI/ML in NG-RAN <xref target="TR38.423"/>. 
UE data collection is done by gNB requested by OAM and reported to the Access and Mobility management Function 
(AMF).</t>
      <t>Radio Access Network AI/ML operations are based on Data Collection protocol procedures which
are used in model training and model inference operations. Data Collection set of link layer 
messages are part of Xn Application Protocol defined in <xref target="TR38.423"/>. Stream Control Transmission 
Protocol (SCTP) is used to securely transport data collection messages
in the Radio Access Network <xref target="RFC9260"/>.</t>
    </section>
    <section anchor="security-and-privacy">
      <name>Security and Privacy</name>
      <t>AI/ML networking raises many security and privacy issues. <xref target="TR23.700-80"/> and <xref target="TR23.700-82"/> 
identify a number of key issues  and <xref target="TR33.898"/> presents a study on one of the key issues 
which will be detailed here.</t>
      <t><xref target="TR23.700-80"/> studies the exposure of different types of assistance information such as traffic rate, packet delay, packet loss rate, network condition changes, candidate FL members, geographical distribution information, etc., to AF for AI / ML operations. Some of assistance information could be user privacy sensitive, such as candidate FL members, geographical distribution information.
There is a need to study how to protect such privacy-related assistance information. In addition, Mobile Core Network needs to determine which assistance information is required by AF to complete AI/ML operation and to avoid exposing information that is unnecessary for AI/ML operations.</t>
      <t>Because of the use of Restful API which depend on the use of HTTP protocol, OAuth <xref target="RFC6749"/> 
protocol seems to be the natural choice here for authorization.</t>
      <t>One solution can be developed reusing existing mechanism for authorization of Mobile Core 
Network assistance information exposure to AF. The solution is based on reusing the OAuth-based 
authorization mechanism 
OAuth <xref target="RFC6749"/> protocol which extends traditional client-server authentication 
by providing a third-party client with a token.  Since such
   token resembles a different set of credentials compared to those of
   the resource owner, the device needs not be allowed to use the
   resource owner's credentials to access protected resources.</t>
      <t>UE privacy profile/local policies stored in a database can also be employed to authorize UE-related 
Mobile Core Network assistance information exposure. UE privacy profile/local policies may 
also contain protection policies that indicate how Mobile Core Network assistance information 
should be protected (e.g., using security techniques like encryption, integrity protection, 
etc.). NWDAF via Network Exposure 
Function (NEF) sends the UE-related Mobile Core Network assistance information to AF when 
the local policies/UE privacy profile authorize the AF to access the information. According 
to the local policies/UE privacy profiles, NWDAF may need to protect the Mobile Core 
Network assistance information with security mechanisms.</t>
      <t>Network Functions securely expose capabilities and events to 3rd party Application Functions 
(AF) via Network Exposure Function (NEF). The interface between the NEF and the Application 
Function needs integrity protection, replay protection, confidentiality protection for communication 
between the NEF and Application Function, and mutual authentication between the NEF and Application 
Function and protect internal Mobile Core network information. The NEF also enable secure provision 
of information in the 3GPP network by authenticated and authorized AFs.</t>
      <t>Security should be provided to support the protection of user privacy sensitive assistance 
information being exposed to AF. TLS 1.3 <xref target="RFC8446"/> is used to provide integrity protection, 
replay protection and confidentiality protection for the interface between the NEF and the 
AF <xref target="TS33.501"/>.</t>
      <t>As for Radio Access Network AI/ML networking use cases like CSI, beam management, position 
accuracy enhancement, UE uses NR-Uu interface to  communicate with NG-RAN node using RRC protocol
to send L3 cell/beam measurements, location, sensor and timing information. Radio Resource Control
(RRC) messages communicated over the air interface causes security issues because they are not 
protected. Transport 
layer protocol SCTP  is used only when two NG-RAN nodes are connected over Xn. In this case SCTP
should be run below DTLS 1.3 to provide communications privacy, prevent eavesdropping and detect 
tampering or message forgery <xref target="dtlssctp"/>.</t>
      <t>Any location/positioning information sent directly from UE to NG-RAN node causes privacy
concern without user consent. Location information may be sent in RRC IDLE/INACTIVE state
and also in CONNECTED state after the connection is established <xref target="TR38.843"/>. Location information 
received by NG-RAN node is sent to Location Management Function (LMF) in the mobile core 
network.</t>
    </section>
    <section anchor="work-points">
      <name>Work Points</name>
      <t>Security and privacy of AI/ML Networking based services and applications need further work. 
<xref target="TR33.898"/> provides solutions to only one of many possible key issues. Each key issue has 
been in depth investigated in <xref target="TR23.700-80"/> and <xref target="TR23.700-82"/> from which new solutions 
can be developed.</t>
      <t>We list below only some of the key issues identified:</t>
      <ul spacing="normal">
        <li>
          <t>Enhance the mobile core network to expose information to the UE to facilitate its Application AI/ML operation (e.g., Model Training, Splitting and inference feedback etc.)</t>
        </li>
        <li>
          <t>Expose UE-related information to an AF  ensuring that privacy and security requirements are met.</t>
        </li>
        <li>
          <t>Additional parameters to be provisioned to the mobile core network by an external party for the assistance to Application AI/ML operation.</t>
        </li>
        <li>
          <t>Whether and how the existing the mobile core network data transfer/traffic routing mechanisms 
are re-used or enhanced to support the transmission of the Application AI/ML traffic(s) between 
AI/ML endpoints (i.e., UE and AF)?</t>
        </li>
        <li>
          <t>Information to be provided by the mobile core network to the AF can help the AF to select 
and manage the group of UEs which will be part of FL operation.</t>
        </li>
        <li>
          <t>Enhance the architecture and related functions to support application layer AI/ML services</t>
        </li>
        <li>
          <t>Support Federated Learning at application enablement layers</t>
        </li>
        <li>
          <t>Enhance the architecture and related functions to support management and/or configuration
for split AI/ML operation, and in-time transfer of AI/ML models. The management and configuration 
aspects including discovery of required nodes for split AI/ML operation and support of different 
models of AI/ML operation splitting in which the AI/ML operation/model is split into multiple 
parts according to the current task and environment.</t>
        </li>
        <li>
          <t>Support transfer learning at application enablement layers</t>
        </li>
      </ul>
      <t>The last key issue will be elaborated in the next section below.</t>
    </section>
    <section anchor="transfer-learning-use-case">
      <name>Transfer Learning Use Case</name>
      <t>Transfer Learning (TL) is the training of a machine learning (ML) technique where a model 
pre-trained
on one task is fine-tuned for a new but related task. Transfer learning assumes a baseline 
model
is already available in a repository in the mobile network provided by the source domain
can be fine-tuned to quickly perform the same or similar tasks in the target domain with 
lesser
amount of training data.</t>
      <t>TL support involves many entities in the mobile network. ML models need to be stored in 
 the 
 repository
 entities. When storing, some information elements need to be added to the model, such as 
 identity of the model consumer that is initiating the request, i.e. model consumer id.
 For transfer learning, Base Model ID could be added.</t>
      <t>Transfer Learning solution should aim to provide support for Transfer Learning (TL) by 
discovering and selecting the base models to be used for similar tasks as pre-trained 
models.
It involves first discovering repositories of pre-trained models in a given service area 
and then sending request messages to the repositories and collecting responses.</t>
      <t>Security and privacy issues in all the messaging need to be investigated.</t>
    </section>
    <section anchor="future-work">
      <name>Future Work</name>
      <t>A use case document is needed. We have listed the identified use cases and elaborated 
 one of them  above in this document. New set of use cases on Rule Based Automation, Autonomous 
Networks, Automated Testing, Energy Efficiency and so on could be added to the existing use 
cases. All or some of these usage areas of AI/ML can further be elaborated in a use case 
document. 
These use cases should make it clear why the security and privacy protocols are needed.</t>
      <t>A problem statement on AI/ML networking document is needed. Such a document should identify 
the problems that possibly need a new protocol to be developed or need to identify extensions 
to an existing protocol. One possibility in that direction could be refining the work points 
identified above and formulating them in terms of existing or to be defined in the future 
security and privacy protocols.</t>
      <t>A document describing security threat model on which AI/ML security and privacy enhancements 
can be developed <xref target="RFC6819"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations of AI/ML Networking is TBD.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There are no IANA considerations for this document.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>We acknowledge useful comments from Hesham ElBakoury that have led to many improvements in the document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC6819">
          <front>
            <title>OAuth 2.0 Threat Model and Security Considerations</title>
            <author fullname="T. Lodderstedt" initials="T." role="editor" surname="Lodderstedt"/>
            <author fullname="M. McGloin" initials="M." surname="McGloin"/>
            <author fullname="P. Hunt" initials="P." surname="Hunt"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document gives additional security considerations for OAuth, beyond those in the OAuth 2.0 specification, based on a comprehensive threat model for the OAuth 2.0 protocol. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6819"/>
          <seriesInfo name="DOI" value="10.17487/RFC6819"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9260">
          <front>
            <title>Stream Control Transmission Protocol</title>
            <author fullname="R. Stewart" initials="R." surname="Stewart"/>
            <author fullname="M. Tüxen" initials="M." surname="Tüxen"/>
            <author fullname="K. Nielsen" initials="K." surname="Nielsen"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>This document describes the Stream Control Transmission Protocol (SCTP) and obsoletes RFC 4960. It incorporates the specification of the chunk flags registry from RFC 6096 and the specification of the I bit of DATA chunks from RFC 7053. Therefore, RFCs 6096 and 7053 are also obsoleted by this document. In addition, RFCs 4460 and 8540, which describe errata for SCTP, are obsoleted by this document.</t>
              <t>SCTP was originally designed to transport Public Switched Telephone Network (PSTN) signaling messages over IP networks. It is also suited to be used for other applications, for example, WebRTC.</t>
              <t>SCTP is a reliable transport protocol operating on top of a connectionless packet network, such as IP. It offers the following services to its users:</t>
              <t>The design of SCTP includes appropriate congestion avoidance behavior and resistance to flooding and masquerade attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9260"/>
          <seriesInfo name="DOI" value="10.17487/RFC9260"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="dtlssctp">
          <front>
            <title>Datagram Transport Layer Security (DTLS) 1.3 for Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="Michael Tüxen" initials="M." surname="Tüxen">
              <organization>Münster University of Applied Sciences</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document describes the usage of the Datagram Transport Layer
   Security (DTLS) 1.3 protocol over the Stream Control Transmission
   Protocol (SCTP).

   DTLS 1.3 over SCTP provides communications privacy for applications
   that use SCTP as their transport protocol and allows client/server
   applications to communicate in a way that is designed to prevent
   eavesdropping and detect tampering or message forgery.

   Applications using DTLS 1.3 over SCTP can use almost all transport
   features provided by SCTP and its extensions.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tuexen-tsvwg-rfc6083-bis-04"/>
        </reference>
        <reference anchor="TR22.874">
          <front>
            <title>Study on traffic characteristics and performance requirements for AI/ML model transfer in 5GS</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2021" month="December"/>
          </front>
        </reference>
        <reference anchor="TR23.700-80" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.700-80/">
          <front>
            <title>Study on 5G System Support for AI/ML-based Services</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2022" month="December"/>
          </front>
        </reference>
        <reference anchor="TR23.700-82" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.700-82/23700-82-j00.zip">
          <front>
            <title>Study on application layer support for AI/ML services</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="June"/>
          </front>
        </reference>
        <reference anchor="IsNo20" target="https://www.ericsson.com/48df60/assets/local/reports-papers/research-papers/secure-federated-learning-in-5g-mobile-networks.pdf">
          <front>
            <title>Secure Federated Learning in 5G Mobile Networks</title>
            <author initials="M." surname="Isaksson" fullname="Martin Isaksson">
              <organization/>
            </author>
            <author initials="C." surname="Norrman" fullname="Carl Norrman">
              <organization/>
            </author>
            <date year="2020" month="December"/>
          </front>
        </reference>
        <reference anchor="MaTeMaFiWeKo21" target="https://www.ericsson.com/en/reports-and-papers/white-papers/accelerating-the-adoption-of-ai-in-programmable-5g-networks">
          <front>
            <title>Accelerating the adoption of AI in programmable 5G networks</title>
            <author initials="J." surname="Manocha" fullname="Jatendra Manocha, et al.">
              <organization/>
            </author>
            <date year="2021" month="July"/>
          </front>
        </reference>
        <reference anchor="Lin24" target="https://www.comsoc.org/publications/ctn/overview-ai-3gpps-ran-release-18-enhancing-next-generation-connectivity">
          <front>
            <title>Enhancing Next-Generation Connectivity</title>
            <author initials="X." surname="Lin" fullname="Xingqin Lin">
              <organization>NVIDIA, USA</organization>
            </author>
            <date year="2024" month="March"/>
          </front>
        </reference>
        <reference anchor="Lin23" target="https://arxiv.org/pdf/2312.15174">
          <front>
            <title>5G-Advanced evolution in 3GPP Release 19</title>
            <author initials="X." surname="Lin" fullname="Xingqin Lin">
              <organization>NVIDIA, USA</organization>
            </author>
            <date year="2023" month="December"/>
          </front>
        </reference>
        <reference anchor="Srini21" target="https://www.kdnuggets.com/2021/11/difference-distributed-learning-federated-learning-algorithms.html">
          <front>
            <title>Difference between distributed learning versus Federated Learning algorithms</title>
            <author initials="A." surname="Srinivasan" fullname="Aishwarya Srinivasan">
              <organization/>
            </author>
            <date year="2021" month="November"/>
          </front>
        </reference>
        <reference anchor="TR33.898">
          <front>
            <title>Study on security and privacy of Artificial Intelligence/Machine Learning (AI/ML)-based services and applications in 5G</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2023" month="July"/>
          </front>
        </reference>
        <reference anchor="TS33.501" target="https://www.3gpp.org/ftp/Specs/archive/33_series/33.501/33501-i30.zip">
          <front>
            <title>Security Architecture and Procedures for 5G System</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2023" month="December"/>
          </front>
        </reference>
        <reference anchor="TS23.436" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.436/23436-j10.zip">
          <front>
            <title>Functional architecture and information flows for Application Data Analytics Enablement Service</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="June"/>
          </front>
        </reference>
        <reference anchor="TS38.300" target="https://www.3gpp.org/ftp/Specs/archive/38_series/38.300/38300-i20.zip">
          <front>
            <title>Radio Access Network; NR; NR and NG-RAN Overall Description</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="July"/>
          </front>
        </reference>
        <reference anchor="TR38.843" target="https://www.3gpp.org/ftp/Specs/archive/38_series/38.843/38843-i0.zip">
          <front>
            <title>Study on Artificial Intelligence (AI)/Machine Learning (ML) for NR air interface</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2023" month="December"/>
          </front>
        </reference>
        <reference anchor="TR38.423" target="https://www.3gpp.org/ftp/Specs/archive/38_series/38.423/38423-i20.zip">
          <front>
            <title>NG-RAN; Xn application protocol (XnAP)</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2024" month="July"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
