How 5G helps secure the ever-expanding Internet of Things.
As beneficial and powerful as the Internet of Things (IoT) can be for business and society, all those sensors, cameras, meters, and other IoT devices can create a near-infinite number of potential openings into an organization’s network. That expands what security professionals call the attack surface.
As the IoT grows from billions to trillions of devices over time, how do businesses secure this ever-expanding footprint? Fortunately, 5G is designed to enable more reliable, scalable, and secure IoT connectivity than previous generations of wireless networks.
Crucially, 5G hardens IoT security with encryption and network slicing technologies. 5G integrates more IT industry standard protocols, like HTTPS, rather than cellular-specific ones used in 4G and earlier generations. Transport Layer Security (TLS) and other specifications for encrypting data in transit are being incorporated into the 5G standards—in contrast, previous wireless standards did not specify transit encryption in the core network. And, 5G brings greater protections for privacy and trust by using Public Key Cryptography, Digital Certificates, and more advanced forms of authentication to ensure that both the devices and network are authenticated and protected.
35.8 billion
of IoT devices were installed worldwide by the end of 2021.
With cybersecurity top of mind among business leaders due to unrelenting threats, we at
As a result of these efforts, businesses like yours can confidently capitalize on the possibilities created by IoT—so long as you’ve prepared by putting the proper processes and infrastructure in place.
Protecting zettabytes of data.
IoT devices may be part of your day-to-day operations. Popular use cases include asset tracking, vehicle telemetry, factory automation, and utility networks. But emerging 5G-capable IoT devices and next-generati
A staggering number of IoT devices—35.8 billion—were installed worldwide by the end of 2021, according to TechJury, a technology review website. Their report on IoT devices includes cameras, sensors, supply chain tags, environmental control devices, and the asset trackers companies use to monitor equipment. The installed number of IoT devices is expected to surpass 75 billion by 2025—and generate roughly 79 zettabytes of data.
To put that in perspective, a large enterprise may have 1 petabyte of data distributed across several databases. A zettabyte is a million times as much data as a petabyte. That means nearly 80 million petabytes of proprietary and private information will need protection from malicious actors intent on intercepting it.
On the
Even with these 5G security safeguards in place, organizations must stay current with emerging threats and the latest protective measures. As technologies change, so does the guidance. The good news is regular upgrades, new innovations in 5G networking, and ongoing development of improved 5G security specifications will continue to protect IoT devices and the data they emit.
5G—in particular, 5G Standalone—supports network slicing, which adds another layer of data protection. 5G Standalone refers to a 5G network where the 5G New Radio access technology operates on a 5G network core, rather than overlaying an existing 4G LTE network core. By creating private, designated paths for data transmission, 5G-enabled network slicing will provide additional protection for customer data.
“We have a set of strong restrictions on what software and services can run on the [mobile365 ] network, as well as on the devices that connect to the network. And we require that they are developed using secure practices.”
Shawn Corey, Cybersecurity Engineer & Member of Technical Staff,
A multi-pronged approach to security.
Data protection is only one element of our multi-pronged approach to help customers make IoT environments more secure. Security must be baked in at all levels and the network protected at every access point. At
To further protect our customers’ data, we developed a rigorous set of foundational security standards and strict platform requirements—from the chipset level and booting process all the way through to the operating system, communications interfaces, and storage. We also work with device manufacturers to ensure consistency and compliance with our standards. Equipment is not deployed on the
“We use the same methods that malicious actors do to find potential security issues,” says Shawn Corey, a
This kind of under-the-hood security assessment includes determining whether the necessary anti-tampering measures are in place. For more critical devices, we require manufacturers to install a tampering alarm that goes off if the equipment is physically opened. The software on a device is also examined.
“We have a set of strong restrictions on what software and services can run on the network, as well as on the devices that connect to the network,’’ Corey adds. “And we require that they are developed using secure practices.”
Externally, we have representatives in numerous leadership roles across industry standards development organizations and forums that create and define new 5G security specifications. Two of the mobile industry’s influential bodies relating to mobile security specifications are 3GPP and GSMA. In 2019, GSMA launched a two-phased approach to addressing global 5G security concerns. GSMA and 3GPP came together to develop the program, named Network Equipment Security Assurance Scheme (NESAS).
According to Todd Gibson, a
“
Businesses and consumers alike can rest easier knowing that any
We also work with business customers on their own system designs to ensure they know best practices in enterprise-wide security. That includes using
Securing the network and all of that data is, and will continue to be, a challenge that requires an organization’s undivided attention. But because 5G is designed to provide robust security, protecting an extensive IoT network has become that much more manageable. #5GHQ
Best practices and undivided attention.
IoT devices are sure to have a growing impact on business operations. Connected devices of all shapes and sizes are getting smarter, offering richer experiences, and generating more data.
Securing the network and all of that data is, and will continue to be, a challenge that requires an organization’s undivided attention. The potential points of vulnerability include physical devices, software/firmware, and security settings.
But because 5G is designed to provide robust security, protecting an extensive IoT network has become that much more manageable. With proper awareness, best practices, and partnerships in place, business managers can confidently forge ahead into the fast-emerging world of IoT to pursue the new opportunities this technology makes possible.