All 5G Security & mIoT Security Posts
-
5G Security
Is 5G security being sacrificed at the altar of profit, politics and process?
Homo sapiens is an incredibly adaptable species, arguably the most adaptable ever. But it is also a forgetful one, quick to take things for granted. Many of us can remember when cell phones first emerged, when the internet first became publicly available, when the first iPhone was released. These momentous shifts occurred within a generation, altering the nature of society and civilization. Just a few…
Read More » -
Post-Quantum
Quantum Readiness for Mission-Critical Communications (MCC)
Mission-critical communications (MCC) networks are the specialized communication systems used by “blue light” emergency and disaster response services (police, fire, EMS), military units, utilities, and other critical operators to relay vital information when lives or infrastructure are at stake. These networks prioritize reliability, availability, and resilience – they must remain operational even during disasters or infrastructure outages. For example, in a hurricane that knocks out…
Read More » -
5G Security
Can we afford to keep ignoring Open RAN security?
I’m skeptical of ‘futurists’. Work closely enough with the development of technology solutions and you’ll know that the only certain thing about the future is that it’s constantly changing. For example, few ‘futurists’ predicted the Covid-19 outbreak that brought the world to a standstill in 2020. Many, however, had spent hours waxing on about how 5G technology was to change the trajectory of human evolution,…
Read More » -
Post-Quantum
Cryptography in a Modern 5G Call: A Step-by-Step Breakdown
Modern telecommunications networks rely on multiple layers of cryptography at every step of a call or data session. Understanding the complexity of the process and the amount of cryptography involved is critical for post-quantum migration planning - an initiative some of my advanced telecommunications clients are kicking off these days. And many are widely underestimating how much cryptography is used. From the moment a user’s…
Read More » -
Society 5.0
Securing Society 5.0
A term first coined by the Japanese government, “Society 5.0” describes “A human-centered society that balances economic advancement with the resolution of social problems by a system that highly integrates cyberspace and physical space.” The fifth evolution of the society, enabled by the fifth generation of cellular networking and cyber-physical systems, imagines technology, things and humans converging to address some of the biggest societal challenges.…
Read More » -
Post-Quantum
Quantum Computing – Looming Threat to Telecom Security
Since the early 2000s, the field of quantum computing has seen significant advancements, both in technological development and in commercialization efforts. The experimental demonstration of Shor's algorithm in 2001 proved to be one of the key catalyzing events, spurring increased interest and investment from both the public and private sectors.
Read More » -
5G Security
A Comparison of 5G Core Network Architectures
The 5G Core network is a Service Based Architecture. It evolves the traditional appliance based 4G Core Network to support services. It offers more agility and flexibility. The major building blocks of this architecture include Service-Based Interface: The Service Based Interfaces rely on HTTP/2 The 5G Network Functions: As explained by Ericsson “is built using IT network principles and cloud native technology. In this new…
Read More » -
5G Security
The Open RAN Lexicon You Need
The telecoms and digital technologies sectors are notoriously jargonised. Eavesdrop on any conversation at an industry conference (remember those?) and you’d be treated to a parade of acronyms, initialisms and technical terms that would sound like ancient Greek to an outsider. However, with new technologies being developed and deployed at an accelerated rate, staying on top of terminology can be challenging for even seasoned professionals.…
Read More »