All 5G Security & mIoT Security Posts
-
5G Security
Bluetooth Security 101 (Non-5G IoT Connectivity Options)
Bluetooth is short-range wireless communications technology based on the IEEE 802.15.1 protocol. It works in a crowded license free 2.4 GHz frequency band and shares this resource with many other technologies. Bluetooth is the optimal solution for establishing small wireless networks called Piconets, by connecting two Bluetooth devices. One of these nodes is Master that can be connected via Bluetooth link to 7 other Bluetooth…
Read More » -
5G Security
Zigbee Security 101 (Non-5G IoT Connectivity Options)
Zigbee technology introduction Zigbee is wireless PAN (Personal Area Network) technology developed to support automation, machine-to-machine communication, remote control and monitoring of IoT devices. It evolved from IEEE 802.15.4 wireless standard and supported by the ZigBee Alliance. IEEE 802.15.4 standard determines specifications for the physical and data link layer and Zigbee Alliance provides standards from network layer to application layer. While Zigbee determines the contents…
Read More » -
5G Security
LoRaWAN Security 101 (Non-5G IoT Connectivity Options)
I get accused of focusing too much on 5G as the only future IoT connectivity option. I do write a lot about how 5G will revolutionize our society, become the most critical of critical infrastructures and about security threats with 5G. I see 5G, with its low latency, high bandwidth, network slicing and ubiquitous coverage becoming the foundational capability for mission critical industrial, agricultural, financial,…
Read More » -
AI Security
Digital Double Helix: Why the Fates of 5G and AI are Intertwined
In 2013, George F. Young and colleagues completed a fascinating study into the science behind starling murmurations. These breathtaking displays of thousands – sometimes hundreds of thousands – of birds in a single flock swooping and diving around each other, look from a distance like a single organism organically shape-shifting before the viewer’s eyes. In their research article, Young et al reference the starling’s remarkable…
Read More » -
5G Security
5G Critical Infrastructure – the Most Critical of All
Not even 30 years separate us from the end of the Cold War. Yet, we appear to be witnessing the emergence of a new one, a technology Cold War between the United States and China. This time, instead of a ‘red under the bed’, the US government has declared there is one at the back door. It accuses Chinese technology companies of deliberately building vulnerabilities…
Read More » -
5G Security
Telcos Should Take Risks to Jumpstart the 5G Ecosystem
5G connectivity burst onto the world stage at last year’s Winter Olympics in Seoul, South Korea and gained pop culture visibility again at the April 2019 NCAA Final Four men’s college basketball games in Minneapolis. Why the rush to 5G though, when most of the world is still rolling out 4G mobile service or still waiting for it? Consumers don’t yet have 5G enabled phones…
Read More » -
5G Security
Geopolitics of 5G and 5G-Connected Massive & Critical IoT
Emerging Technology and Geopolitics of 5G There are several reasons emerging technology is a highly competitive industry, notwithstanding the race for intellectual property that can be licensed by burgeoning markets for revenue. A first-mover advantage is often a way to lock in relationships that can lead to long-term infrastructure commitments, integration support services, and service delivery platform development. As the adage goes, “Whoever owns the…
Read More » -
5G Security
5G Policy and Regulatory Checklist
Ultra high speed, high quality 5G networks are expected to provide the connectivity required for massive IoT adoption, remote robotic surgery as well as instant movie downloads and 3D mobile gaming. The technology boasts incredible reliability and low latency and promises to enable the next industrial revolution and society 5.0. Assuming that 5G policy and regulatory issues are sorted out. However, recent hype generated by…
Read More »