Home Massive IoT and 5G

Massive IoT and 5G

5G Mobile IoT
Everybody has been confused about the furore over 5G recently. The confusion, of course, being why would anybody be so concerned with 5G now compared to 4G or 3G or indeed any of the past cellular mobile communications specifications. Why wasn’t the USA attempting sanctions when Huawei was providing 4G and 3G equipment? How come it is an issue now even in the non-Trumpified European governments who don’t have a mini-trade war going on with China? Well, the answer to your question is that unlike in the past 5G is actually not about mobile phones and how fast you...
IoT Protocols Speed Range
IoT Wireless Protocols data rate and range comparison in a chart.
5G Virtualization
Depending on who you speak to, 5G is either humankind’s greatest imminent blessing or its greatest imminent curse. Still in its infancy, and not yet commercially standardized, this technology has already been the most polarizing advancement we have ever seen in communication. Consumers worldwide are captivated by promises of super-fast download speeds, split-second responsiveness and next-level mobile phone communication, but are divided on the possible sacrifices of privacy and security. Detractors continue to issue condemnations of 5G cellular’s possible health risks. Supporters continue to shake their heads in disbelief. Governments jostle for geopolitical supremacy; 5G is seen as both a proxy...
Security Standards Regulations Guidelines
Below is my attempt to list of all published 5G, IoT and "Smart Everything"-related security guidelines, frameworks and standards. If you are aware of additional entries that should be here, please let me know at [email protected]
Cybersecurity IoT 5G Cyber-Kinetic Risks
Getting smart about security in smart systems Smart used to be something we called people or pets. It wasn't a term one would use to describe one's hairbrush. That is changing, of course, in an era of accelerating digital transformation. Now we have smart homes, smart cities, smart grids, smart refrigerators and, yes, even smart hairbrushes. What's not so smart, though, is the way the cybersecurity and cyber-kinetic security risks of these systems are often overlooked, and with new horizon technologies like 5G, these problems are set to grow exponentially. Cyber-physical systems and the smartification of our world Cyber-connected objects have become...
Bluetooth Cybersecurity
Bluetooth is short-range wireless communications technology based on the IEEE 802.15.1 protocol. It works in a crowded license free 2.4 GHz frequency band and shares this resource with many other technologies. Bluetooth is the optimal solution for establishing small wireless networks called Piconets, by connecting two Bluetooth devices. One of these nodes is Master that can be connected via Bluetooth link to 7 other Bluetooth devices—Slave nodes in Personal Area Network (PAN). Typical data rates are 1-3 Mbps. The newest versions of Bluetooth is known as Bluetooth Low Energy (BLE) or Bluetooth smart. It is important to note that Bluetooth and BLE...
IoT Protocols Speed Range
IoT Wireless Protocols in a spreadsheet format. Includes downloadable Excel spreadsheet.
IoT Protocols Speed Range
IoT Wireless Protocols data rate and range comparison in a spreadsheet format. Includes downloadable Excel spreadsheet.
Quantum Computer 5G Security

The Quantum Computing Threat

The secret sauce of quantum computing, which even Einstein called "spooky," is the ability to generate and manipulate quantum bits of data or qubits. Certain computational tasks can be executed exponentially faster on a quantum processor using qubits, than on a classical computer with 1s and 0s. A qubit can attain a third state of superimposition of 1s and 0s simultaneously, encode data into quantum mechanical properties by "entangling" pairs of qubits, manipulate that data and perform huge complex calculations very quickly.
Canada 5G CA5G
In 1967, Lynn Margulis, a young biologist, published a paper that challenged more than a hundred years of evolutionary theory. It proposed that millions of years ago, the eukaryotes emerged not from competition, as neo-Darwinism asserts, but from collaboration. Margulis’ research showed how single-celled lifeforms working together created an entirely new organism that became the foundation of all advanced life on earth. This was an inflection point in the development of evolutionary biology, shifting the scientific and cultural narrative away from “survival of the fittest” towards “survival of the most cooperative.” Though competition contributes to better individual or organizational performance, it...
IEMI
As IoT adoption continues to proliferate, manufactures and adopters are increasingly aware of cybersecurity risks to IoT. Yet, even among the IoT security professionals, one significant potential remote attack vector is often overlooked: intentional electromagnetic interference (IEMI). Electromagnetic interference (EMI) surrounds us – natural causes, such as solar flares and lightning; and man-made sources such as radio and TV broadcasting, radars, microwaves and many others all emit electromagnetic waves that could disrupt operation of electrical and electronic devices. That is, if devices wouldn’t comply with numerous electromagnetic compatibility (EMC) standards which ensure correct operation in common electromagnetic environment and resilience...
5G COVID-19
There are many adjectives that could be used to describe the global outbreak of COVID-19, but perhaps the simplest might be: fast. The disease has spread quicker than most people can mentally digest. By nature, humans process linearly. This pandemic has been a lesson in exponential thinking for the common man. Those who don’t spend their time contemplating Moore's Law or compound interest have felt overwhelmed by infection or mortality rates that double daily. In response, governments, businesses, monetary institutions, education systems and the many other players in corporate and civil life have acted at high speed. It is easy to...
5G Cloud Architecture
The 5G Core network is a Service Based Architecture. It evolves the traditional appliance based 4G Core Network to support services. It offers more agility and flexibility. The major building blocks of this architecture include Service-Based Interface: The Service Based Interfaces rely on HTTP/2 The 5G Network Functions: As explained by Ericsson “is built using IT network principles and cloud native technology. In this new architecture each Network Function (NF) offers one or more services to other NFs via Application Programming Interfaces (API). Each Network Function (NF) is formed by a combination of small pieces of software code called as...
5G Security Politics
Homo sapiens is an incredibly adaptable species, arguably the most adaptable ever. But it is also a forgetful one, quick to take things for granted. Many of us can remember when cell phones first emerged, when the internet first became publicly available, when the first iPhone was released. These momentous shifts occurred within a generation, altering the nature of society and civilization. Just a few decades ago, none of these existed, but by the time Covid-19 hit, billions of people were able to lift their smartphone and video call a loved one on the other side of the world. At...
IoT Cybersecurity Framework Government
The human brain is programmed to keep us safe and secure. Yes, we are separated from the rest of the animal kingdom by our advanced capacities of sense-making and decision-making, but at the core of our grey matter remains some primitive but powerful tech tasked with keeping us alive. If your amygdala senses danger, it makes a split second decision and triggers the fight-or-flight response, flooding your body with hormones like adrenaline that prepare you for battle. This overrides the cortex – the sophisticated part of the brain we rely on for problem-solving and strategic thinking – making it...