A Study on AI-driven Security Concerns in the Wireless Ecosystem

Authors

  • Heena T. Shaikh
  • Kazi Kutubuddin Sayyad Liyakat

Keywords:

AI, AI-driven security, Wireless ecosystem, Cyberattack, Accuracy, Precision, Recall, F1 score

Abstract

The rapid convergence of artificial intelligence (AI) with the next-generation wireless fabric—5G, Wi-Fi 6/7, and emerging terahertz links—has turned the radio spectrum into a dynamic, data-rich battlefield. AI-driven security mechanisms (e.g., intelligent intrusion detection, autonomous spectrum allocation, and self‑healing protocols) promise unprecedented resilience, yet they also introduce a new class of systemic risks that are rarely captured by traditional threat models. This study surveys the landscape of AI-enabled attacks (adversarial signal crafting, model poisoning, and covert inference) and the cascade effects they trigger across heterogeneous wireless nodes, edge-cloud continuums, and IoT swarms. By coupling stochastic game theory with a multi-layered threat-tree analysis, quantify the probability—impact surface of AI-mediated breaches under realistic deployment constraints (limited power, latency budgets, and heterogeneous hardware). The simulations reveal a counter-intuitive “dual-use” paradox: the very AI algorithms designed to harden the network can, when subverted, amplify the attack surface by up to 73% in dense urban micro-cells. The findings underscore three pivotal insights: (1) security-by-design must embed provenance-aware model pipelines; (2) continuous, federated verification of AI decisions is indispensable for maintaining trust at the edge; and (3) regulatory sandboxes are required to benchmark AI-driven defenses against evolving adversarial playbooks. The abstract concludes that without a holistic, AI-conscious security framework, the wireless ecosystem risks becoming a self-optimizing conduit for sophisticated cyber-physical threats.

References

B. Kim, Y. Sagduyu, K. Davaslioglu, T. Erpek, and S. Ulukus, “Adversarial machine learning for NextG covert communications using multiple antennas,” Entropy, vol. 24, no. 8, p. 1047, Jul. 2022.

D. Adesina, C.-C. Hsieh, Y. E. Sagduyu, and L. Qian, “Adversarial machine learning in wireless communications using RF data: A review,” IEEE Communications Surveys & Tutorials, vol. 25, no. 1, pp. 77–100, First Quarter 2023.

L. Alhoraibi, D. Alghazzawi, R. Alhebshi, and O. B. J. Rabie, “Physical layer authentication in wireless networks-based machine learning approaches,” Sensors, vol. 23, no. 4, p. 1814, Jan. 2023.

M. Wasilewska and H. Bogucka, “Protection against poisoning attacks on federated learning-based spectrum sensing,” IEEE Journal on Selected Areas in Communications, vol. 43, no. 6, pp. 2042–2055, Jun. 2025.

J.-H. Huh, T. Inagaki, J. Nakazato, M. Arai, K. Yano, and M. Hasegawa, “Graph neural network-based multi-metric performance modeling in urban multi-RAT wireless networks,” ICT Express, vol. 11, no. 5, pp. 957–962, Jul. 2025.

S. Cheng, X. Ling, and L. Zhu, “Deep reinforcement learning-based anti-jamming approach for fast frequency hopping systems,” IEEE Open Journal of the Communications Society, vol. 6, pp. 961–971, 2025.

B. Zhu, N. Mu, J. Jiao, and D. Wagner, “Generative AI security: Challenges and countermeasures,” arXiv preprint, Oct. 2024.

H. Slatman, “Awesome-threat-intelligence,” GitHub repository, Jan. 2022.

K. K. S. Liyakat and U. M. Halli, “Nanotechnology in IoT security,” Journal of Nanoscience, Nanoengineering & Applications, vol. 12, no. 3, pp. 11–16, 2022.

K. Akanksha, Z. Utkarsha, K. Sneha, C. Sanika, and K. K. S., “Email security,” Journal of Image Processing and Intelligent Remote Sensing, vol. 2, no. 6, pp. 23–31, Oct. 2022.

R. S. Pol, A. B. Deshmukh, M. M. Jadhav, K. K. S. Liyakat, and A. O. Mulani, “iButton-based physical access authorisation and security system,” Journal of Algebraic Statistics, vol. 13, no. 3, pp. 3822–3829, 2022.

K. K. S. Liyakat, “Implementation of e-mail security with three layers of authentication,” Journal of Operating Systems Development and Trends, vol. 9, no. 2, pp. 29–35, 2022.

K. K. S. Liyakat, “VHDL programming for secure true random number generators in IoT security,” Research & Review: Electronics and Communication Engineering, vol. 2, no. 1, pp. 38–47, Mar. 2025.

K. K. S. Liyakat, “KVS approach for IoT network security: A novel approach to IoT network security with B-cell inspired models,” Journal of Network Security, vol. 13, no. 2, pp. 16–25, 2025.

H. T. Shaikh and K. K. S. Liyakat, “Robust access control mechanisms in IoT security using VHDL programming,” Journal of VLSI Design and Signal Processing, vol. 11, no. 2, pp. 31–40, Aug. 2025.

K. K. S. Liyakat, “Detection of malicious nodes in IoT networks based on throughput and ML,” Journal of Electrical and Power System Engineering, vol. 9, no. 1, pp. 22–29, 2023.

K. K. S. Liyakat, “Detection of malicious nodes in IoT networks based on packet loss using ML,” Journal of Mobile Computing, Communication & Mobile Networks, vol. 9, no. 3, pp. 9–16, 2022.

K. K. S. Liyakat, “Detecting malicious nodes in IoT networks using machine learning and artificial neural networks,” in Proc. Int. Conf. Emerging Smart Computing and Informatics (ESCI), Pune, India, 2023, pp. 1–5.

K. Kazi, “Machine learning approach using artificial neural networks to detect malicious nodes in IoT networks,” in Algorithms for Intelligent Systems, pp. 27–37, 2023.

K. K. S. Liyakat, “Machine learning approach using artificial neural networks to detect malicious nodes in IoT networks,” in S. K. Udgata, S. Sethi, and X. Z. Gao, Eds., Intelligent Systems, Lecture Notes in Networks and Systems, vol. 728, Singapore: Springer, 2024, pp. 1–10.

Published

2026-04-14

How to Cite

Heena T. Shaikh, & Kazi Kutubuddin Sayyad Liyakat. (2026). A Study on AI-driven Security Concerns in the Wireless Ecosystem. Research & Review: Electronics and Communication Engineering, 27–38. Retrieved from https://matjournals.net/engineering/index.php/RRECE/article/view/3446