From GenAIs to RGenAIs: A Contextual Modelling of Potential Network Attacks within IoT Networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

There is huge potential for artificial intelligence (AI)-driven attacks on Internet of Things (IoT) networks, particularly with the growing use of generative AI (GenAI) and regenerative AI (RGenAI). GenAIs are known for generating new datasets with similar attributes to their underlying trained datasets, while RGenAIs can reshape and adapt the inputs feeding GenAIs based on feedback responses. These AI technologies, when combined, can inflict massive costs on IoT networks that may be difficult to detect and resolve. In this paper, a contextual model is proposed to examine the possible scenarios of IoT network attacks arising from the combination of GenAI/RGenAI entities. This model constructs potential AIdriven attacks on IoT ecosystems as a looped process occurring in three phases: learn, deploy, and adapt. The paper further considers the likely use cases of this proposed model and provides insights into possible countermeasures to prevent such AI attacks.

Original languageEnglish
Title of host publication2025 IEEE 3rd Wireless Africa Conference, WAC 2025 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798331517588
DOIs
Publication statusPublished - 2025
Event3rd IEEE Wireless Africa Conference, WAC 2025 - Pretoria, South Africa
Duration: 24 Feb 202525 Feb 2025

Publication series

Name2025 IEEE 3rd Wireless Africa Conference, WAC 2025 - Proceedings

Conference

Conference3rd IEEE Wireless Africa Conference, WAC 2025
Country/TerritorySouth Africa
CityPretoria
Period24/02/2525/02/25

Keywords

  • Cybersecurity
  • Generative AIs
  • IoT Network Attacks
  • IoT Networks
  • Regenerative AIs

ASJC Scopus subject areas

  • Signal Processing
  • Software
  • Instrumentation
  • Development
  • Computer Networks and Communications
  • Hardware and Architecture
  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'From GenAIs to RGenAIs: A Contextual Modelling of Potential Network Attacks within IoT Networks'. Together they form a unique fingerprint.

Cite this