How to secure the network in a 5G/IoT world

March 9, 2020
The 2020 version of the Verizon Mobile Security Index included a section on 5G and the Internet of Things (IoT) that delves into how the attack surface is expanding because of the increasing ...

The 2020 version of the Verizon Mobile Security Index included a section on 5G and the Internet of Things (IoT) that delves into how the attack surface is expanding because of the increasing number and types of connected devices. For example, the report, which is based on a survey of 850+ professionals who buy, manage, and secure mobile and IoT devices, indicated that 31% of respondents admitted to having suffered a compromise involving an IoT device.

While 5G wireless service has more security considerations than any other mobile generation, it is built on virtual networks, which are not native to telcos, said Jimmy Jones, telecom cybersecurity expert, Positive Technologies. "The question becomes, 'How do you expand your vulnerability exposures to cloud ones as well as network ones?'"

With the move from 4G to 5G, there obviously are upgrades involved, and people must access the network in different ways. The possibility is there that they could do so maliciously and create threats, Jones said. Another factor is that 5G is designed for IoT, which is hugely diverse and has multiple use cases.

"(You) slice the network and tailor each particular slice of the network to support a (particular) application. What that means is that telephone operators, instead of looking after one fundamental network, are (looking after) tens or hundreds," Jones said.

Telcos have a lot of experience with person-to-person communication, but this could be flipped on its head with 5G, where the talking is to machines. There also has been an explosion in mobile licenses, and the number of companies providing service has gone up.

"It's no longer an old boys network," Jones said. "(You) have to be connected to all different companies. Everyone expects the mobile network to work."

There are more interfaces for IoT, and by opening up the network for more specific applications - like power meters, for example - the telcos are moving away from their core business.

"You are building in a likelihood for problems. The first market mover advances. Instead of the long, slow process of bringing a telco application to market, there is a much faster line to market," Jones said. "What we need to make sure (of) is that the trust level isn't eroded by bringing on applications that are not what we think of as telecom standards."

Jones said that it will be key for telcos to work with security experts that understand multiple verticals. "(They) need to understand physical threats, but also real-world threats. Really what telcos need to do is to speak to companies who understand both sides."

About the Author

BTR Staff

EDITORIAL
STEPHEN HARDY
Editorial Director and Associate Publisher
[email protected]
MATT VINCENT
Senior Editor
[email protected]
SALES
KRISTINE COLLINS
Business Solutions Manager
(312) 350-0452
[email protected]
JEAN LAUTER
Business Solutions Manager
(516) 695-3899
[email protected]

Sponsored Recommendations

On Topic: Optical Players Race to Stay Pace With the AI Revolution

Sept. 18, 2024
The optical industry is moving fast with new approaches to satisfying the ever-growing demand from hyperscalers, which are balancing growing bandwidth demands with power efficiency...

Optimize Live Video Streaming with Accelerated Transcoding in the Cloud

Nov. 29, 2022
With the rise of interactive media, accelerated transcoding has emerged as a popular method to low-latency streaming. Now with this technology available in the cloud, content ...

Smartphone Certification – Ensuring FCC Regulatory Compliance with Simulation

Sept. 11, 2024
Learn how electromagnetic simulation can provide early-stage compliant design of smartphones. With this tool, smartphone OEMs can build with confidence, from design to hardware...

ON TOPIC: Cable’s Fiber to the X Play

Aug. 28, 2024
Cable operators are strategically deploying fiber-to-the-home (FTTH) networks in Greenfield markets and Brownfield markets where existing cable plant has reached its end of life...