By Prof. Dror Fixler, CEO of FirstPoint Mobile Guard
In May 2018, the 3GPP Committee defined the 5G Phase 1 architecture and gave us a taste of the new generation of the secure mobile communication system. The main use case for 5G Phase 1 was mobile broadband. 5G Phase 2, that will be defined at 2019, will bring solutions for the Internet of Things (IoT), covering several scenarios in the form of massive Machine Type Communication (mMTC) and Ultra-Reliable and Low Latency Communications (URLLC). mMTC relates to the very large number of devices transmitting a relatively low volume of non-delay-sensitive data and URLLC which relates to services with stringent requirements for capabilities such as throughput, latency, and availability (such as smart city driving assistance devices).
For mMTC, very low data-rates going down to few bits per day, we will have to consider the extent of security (be it authentication, confidentiality, integrity or otherwise) that can be provided. Several IoT or Machine-to-Machine (M2M) services and devices fall under this category, examples are temperature sensors giving hourly updates, logistic sensors tracking package location and health and smart city devices. Such devices will also be resource constrained in terms of battery, computation, and memory. For security, the requirement will be to reduce the overhead of security-related bits, e.g. for integrity, for every communication. The only manner in which cellular communication can be protected in this highly constraint environment is via a cellular network based solution, which does not impact battery, CPU, require any space for SW or HW components and fits any of the endless types of devices that will be used.
At the other end of the scale, URLLC devices will call for high data-rates with potentially higher battery and computational resources; examples include cars, Industrial IoT (IIoT) devices like factory machinery and virtual or augmented reality (VR or AR) devices – used for gaming or real-time services. Providing higher data rates also means that the throughput of security functions need to be considered to avoid processing delay.
Therefore, the real challenge for 2019 will be finding security solutions that enable large scale deployment of various use cases, without compromising on protection.
FirstPoint is ready for these challenges! FirstPoint’s one-of-a-kind network-based service is the ultimate solution.
Enterprises, defense organizations, MNOs and EPC providers – ultimate cellular cyber security is here.
Contact us today to find out more about protecting your people, your IP and your devices at firstname.lastname@example.org.