Logo Header Menu

How 5G introduces new security vulnerabilities

With 5G set to drive a new era of IoT adoption, enterprises need to think about the possibility of new security vulnerabilities How 5G introduces new security vulnerabilities image

The migration to 5G is underway with more hype than any IT innovation in history (at least it feels that way). Predictions about 5G’s potential have reached fever pitch, according to Gartner, 66% of organisations already plan to deploy it by 2020.

But while this is an exciting time, how many of us really know what 5G is or what infrastructure is needed to make it a reality? Even more important, how many people and businesses are thinking about the security concerns of implementing 5G?

With low latency and higher bandwidth, 5G brings together cloud-based services, network function virtualization, IoT and Industrial IoT, and edge platforms; this raises a problem, more users and more devices mean there are more things that can go wrong.

5G deployment will require pervasive security – while mobile carriers will need to accept their role as critical infrastructure in the dynamic, volatile world of 5G IoT.

The infrastructure requirements of 5G

While concerns around more data bringing more vulnerabilities are valid, it’s far from the only hurdle; there are issues with 5G at a technology layer.

According to Bill Malik, VP of Infrastructure Strategies at Trend Micro, the advanced functions associated with 5G, particularly ultra-reliability and low latency, are going to put additional demands on an enterprise’s infrastructure.

Why 5G is the heart of Industry 4.0

We are in the middle of the fourth industrial revolution. While many business leaders are paying attention to energy consumption and automation, is 5G the true driver of Industry 4.0?

“Ultra reliability means enterprises are going to have to duplicate their infrastructure,” he said. “The only way to get a highly available system is to have a backup you can cut over to rapidly.”

With 5G, data will arrive too rapidly for most legacy applications. Many enterprise data strategies do not take the technical challenges presented 5G into account. Organisations will require an enterprise data layer – a highly distributed, always available data store that supports master and operational data to provide real-time data availability and functionality to all consumers and endpoints.

The danger of failing to update the infrastructure accordingly is heightened by the fact that we will depend on 5G more than 4G for mission-critical applications. 5G will connect applications that are critical to life and safety.

5G authentication

While 2G, 3G and 4G were designed for people, 5G is specifically designed for ‘things’. A recent Gartner report found that two-thirds of organisations are planning to deploy 5G that connects to IoT devices. As 5G becomes more widely used across smart cities, banking or as part of a nation’s critical infrastructure – information sent and received must be trustworthy.

5G might involve reviewing rules applied in filtering out malicious network traffic, as the current rules used might not recognise the subtleties of the highly customised traffic possible with 5G.

The addition of more IoT devices could also present attribution difficulties for security statistics that have been used to monitoring only human subscribers — as opposed to machine subscribers, a second subscriber type made up of IoT devices.

5G and IoT – how to deal with data expansion as you scale

Patrick Callaghan, strategic business advisor, DataStax, explains how 5G and IoT increases demand for distributed data

Threats may appear from 5G networks connecting to devices with poor or no inbuilt security. Threats may also emerge from distributed data centres, edge computing and network slicing.

Malik added also that because 5G cellular equipment is less expensive than 4G, attackers could create their own cellular towers more cheaply. Phoney cell base stations already exist, according to research from Defcon.

Furthermore, the current 5G AKA authentication standard may not be adequate, as researchers report in ‘A Formal Analysis of 5G Authentication’.

In a report, the Journals of ICT Standardization suggested enterprises take a multi-level approach to 5G security, including trust models, authentication and key agreement (AKA), and an extensible authentication protocol (EAP)-based secondary authentication, among others.

Why digital trust matters in the IoT

As IoT adoption continues to rise, business success in the world of connected devices depends on building digital trust with consumers

Latest news

divider
Automation
Three pillars for scaling intelligent automation: process, technology, people

Three pillars for scaling intelligent automation: process, technology, people

16 July 2019 / Scaling intelligent automation is proving more difficult than anticipated, says Chris Huff, three pillars, involving [...]

divider
Healthcare
Healthcare’s biggest barrier to AI adoption

Healthcare’s biggest barrier to AI adoption

16 July 2019 / This article will explore the biggest barrier to AI adoption in healthcare. Less than 4% [...]

divider
Automation
How startups can stay competitive in the digital age with intelligent automation

How startups can stay competitive in the digital age with intelligent automation

16 July 2019 / Automation is now at the forefront of digital transformation for enterprises across the world. Every [...]

divider
PE & VC
IQ Capital raises over $300 million to invest in UK deep tech

IQ Capital raises over $300 million to invest in UK deep tech

16 July 2019 / Deep tech venture capital firm, IQ Capital, has launched a new $125 million Growth Opportunities [...]

divider
Recruitment
Tech skills shortages are a national challenge – but they are also a sign of growth

Tech skills shortages are a national challenge – but they are also a sign of growth

15 July 2019 / We have become accustomed to talking about tech skills shortages in recent years. With so [...]

divider
Cybersecurity
For network vulnerability Huawei ban is a red herring 

For network vulnerability Huawei ban is a red herring 

15 July 2019 / Even supposedly ‘trusted’ members of the supply chain introduce cyber risk. The real challenge for [...]

divider
EMEA
What’s driving growth in Bristol’s burgeoning tech scene?

What’s driving growth in Bristol’s burgeoning tech scene?

15 July 2019 / The South West is home to many innovative and diverse businesses and, despite uncertain times, [...]

divider
Software and Applications
Innovating in the API economy: instant and on-demand expertise

Innovating in the API economy: instant and on-demand expertise

15 July 2019 / In recent years, we’ve witnessed the inception of the so-called ‘API economy’. While the use [...]

divider
AI & Machine Learning
AI projects to double within the next year ⁠— Gartner

AI projects to double within the next year ⁠— Gartner

15 July 2019 / AI projects are on the rise and will double within the next year according to [...]

Do NOT follow this link or you will be banned from the site!

Pin It on Pinterest