Home Massive IoT and 5G

Massive IoT and 5G

Canada 5G AI
Canada has been investing in machine learning and artificial intelligence (AI) for longer than most of the industrialized world. Dr. Geoff Hinton of Google helped ignite the field of graphics processing unit (GPU) deep learning at the University of Toronto. Then he became chief scientific advisor to the Vector Institute, which in collaboration with the University, aims to produce the largest number of deep learning AI graduates and innovators globally. Meanwhile, Montreal, Quebec prides itself as the birthplace of AI. It’s the home of computer scientist Yoshua Bengio, who is another pioneer of AI technology. Hundreds of AI researchers...
Edge Computing Fog
For many end-users of today's communications technology, the cloud is a somewhat mystical concept, a digital equivalent of aether. Most think of it as a formless abstraction "up there" when, in fact, the cloud is rooted in the ground. Or the seabed. Despite rapid advances in satellite connection, almost all intercontinental data transfer that takes place every second of the day occurs via hundreds of thousands of miles of underwater cables. Reading a map of these submarine cables is like viewing a tapestry of international telecommunication. It is perhaps strange to think that the email you just sent to your colleague...
RFID Cybersecurity
Radio-Frequency Identification (RFID) is a technology commonly used for identification, status administration and management of different objects. It is important for people identification, as it is commonly deployed in the latest biometric passports.  It operates in several frequency bands like Low frequency band from 125 kHz to 134 kHz, High frequency band with 13.56MHz working frequency, Ultra-high frequency band with 433 MHz working frequency and 860 - 960 MHz sub-band. In Ultra-high frequency bands there are two types of RFID systems—Active and Passive. Active RFID system operates on 433 MHz radio frequency and on 2.4GHz from Extremely High- Frequency Range. It supports...
5G Health Concerns
The rollout of 5G is one of the most anticipated events in humanity’s technological history. But what about the 5G health concerns? It’s the night before Halloween in 1938 and, as the tale goes, radio audiences tuning into Orson Welles’ reading of War of the Worlds are driven to panic. Apparently listening to an ordinary radio broadcast, the public hear of an unfolding Martian invasion and a chaos of heat rays, poisonous gas and alien war machines. The news account is met with hysteria. Someone hearing this story for the first time may find it laughable that people could be so easily...
NFC Cybersecurity
NFC is a short range two-way wireless communication technology that enables simple and secure communication between electronic devices embedded with NFC microchip. NFC technology operates in 13.56 megahertz and supports 106, 212, or 424 Kbps throughput. There are three available modes of NFC communication: Read/write (e.g. for reading tags in NFC posters) Card emulation (e.g. for making payments) Peer-to-peer (e.g. for file transfers) There is no need for pairing code between devices, because once in range they instantly start communication and prompt the user. NFC technology is power efficient - much more than other wireless technologies. The communication range of NFC is approximately...
Canada Innovation Zones AI 5G
In my previous post I argued that if Canada wants to succeed with its AI-focused innovation agenda, it should also be at the forefront of 5G innovation and development. Canada could get ahead in the global 5G race not by being the first to 5G, but by being the first to roll out 5G in the right way - addressing cybersecurity, linking development of AI and 5G, addressing regulatory and policy prerequisites, etc. Canada could leap ahead in development of both, 5G and AI, by tackling them collaboratively rather than in parallel but separately as is the case now. One...
5G TSN Manufacturing
In the recent report by IHS Markit - "The 5G Economy - How 5G will contribute to the global economy" - researchers claimed that manufacturing will garner almost $4.7 trillion in sales enablement by 2035. Or 36% of the $13.2 trillion total opportunity of 5G by 2035. Manufacturing will be by far the largest industry beyond mobile to be impacted by 5G. In the manufacturing sector the adoption will benefit in the short-to-medium term from enhanced indoor wireless broadband coverage. Other early use cases include asset tracking such as visibility over incoming and outgoing components and goods in the supply...
5G Connectivity Security
The timeline of human history is marked by inflection points of major technological advancement. The plow, the printing press, the telegraph, the steam engine, electricity, the telephone, the internet: each of these breakthroughs precipitated tectonic shifts in how people lived and worked. Now, in the early part of the 21st century, we stand witness to the birth of a new industrial revolution built on 5th generation cellular technology - 5G network. As the name implies, 5G network follows a developmental chain. First came 1G, the first generation of cellular communication that freed us to make voice calls without being tethered...
Open RAN Security
It's been a year of contradictions for the telecommunications industry. Like most sectors, it has been heavily impacted by the consequences of the Covid-19 pandemic, with a slowdown in global 5G roll-outs being a notable result. Geopolitical conflicts have continued to muddy the market, with governments playing a more active role than ever in setting telecoms-centred policy. At the same time, however, the air is thick with promise and opportunity. Over the last nine months, entire organizations have transitioned to remote working and high-bandwidth video communication. Corporations have accelerated digital transformation initiatives. Online shopping has soared. The appetite for autonomous manufacturing...
IIoT 5G Trust Security
When microwave ovens first arrived on the market in 1967 they were met with public skepticism. Perhaps it was because, not long before, the same technology now promising to safely cook consumers’ evening meals was the backbone of a military radar. Perhaps it was the $495 price tag (more than $3,700 in today’s money). Whatever the reason, in the early 1970s the percentage of Americans owning a microwave was tiny. By 2011, it was 97%. What changed? Trust and convenience. When microwave technology was first released, it was difficult to trust. Cooking without using heat? It was simply too alien. In 1973,...
Huawei ERNW 5G Source Code Analysis
No, no it doesn’t. Huawei's code might as well be extremely secure. Their code is certainly the most scrutinized. But the recent UDG source code review is not an evidence of security. ERNW, an independent IT security service provider in Germany, recently performed a technical review / audit of Huawei’s Unified Distributed Gateway (UDG) source code. Huawei made the summary report available here . The review focused on the quality of the source code and the source code management practices. The report is overall positive and showed that Huawei has significantly improved its software engineering processes. At least for the UDG...
oran lexicon
The telecoms and digital technologies sectors are notoriously jargonised. Eavesdrop on any conversation at an industry conference (remember those?) and you’d be treated to a parade of acronyms, initialisms and technical terms that would sound like ancient Greek to an outsider. However, with new technologies being developed and deployed at an accelerated rate, staying on top of terminology can be challenging for even seasoned professionals. This is nowhere as apparent as in the evolving debate around Open RAN and its applications. Open RAN and its variations became the next "big thing" in wireless and I thought I'd try and help...
LoRaWAN IoT Security
I get accused of focusing too much on 5G as the only future IoT connectivity option. I do write a lot about how 5G will revolutionize our society, become the most critical of critical infrastructures and about security threats with 5G. I see 5G, with its low latency, high bandwidth, network slicing and ubiquitous coverage becoming the foundational capability for mission critical industrial, agricultural, financial, medical, education, energy and transportation, even military and emergency services IoT communication needs. That’s not to say that 5G is the only IoT connectivity option. There are plenty of others. IoT applications have some common requirements...
5G SBA IMS MEC Architecture
The interest in 5G and mIoT is exploding. It's exciting to see so many IT and cybersecurity professionals in my network trying to learn more about 5G and related technologies. In addition to my usual articles about the societal impacts of these innovations, I'll start a series of articles introducing key 5G and mIoT technology concepts. Before we move on to technical aspects of 5G security. Let's get started with reviewing the 5G core service-based architecture and learning the first few dozen acronyms, out of approximately a gazillion. The cellular industry loves acronyms. Even more than the cybersecurity industry. 5G architecture is...
5G Critical Infrastructure
Not even 30 years separate us from the end of the Cold War. Yet, we appear to be witnessing the emergence of a new one, a technology Cold War between the United States and China. This time, instead of a ‘red under the bed’, the US government has declared there is one at the back door. It accuses Chinese technology companies of deliberately building vulnerabilities into their tech, allowing the Chinese to access and control the 5G critical infrastructure, and through it the connected devices and machinery at will. Headlines are dominated by the case against Huawei, and debate continues...