5G, Edge, mIoT Cybersecurity Articles

Introducing Society 5.0

Securing Society 5.0
Self-help authors and politicians seem to agree on at least one thing: mindset matters. The shelves of bookstores worldwide are awash with motivational books by evangelical writers hoping to convert readers to their gospel of optimism. The central thesis is simple: success depends on approaching life, especially its challenges, with a positive outlook. Politicians and leaders have always appreciated the power of mindset, though less of the positive kind, as attested to by a history of propaganda that dates back to at least 500 BC. More recently, as Covid-19 spread across the globe, language in public discourse showed itself to be carefully selected to shape national mindsets. War metaphors, specifically, became the favoured way of talking about the virus that...

Securing Society 5.0 – Overcoming the hidden threats in society’s greatest evolutionary leap

Securing Society 5.0 Introduction
A term first coined by the Japanese government, “Society 5.0” describes "A human-centered society that balances economic advancement with the resolution of social problems by a system that highly integrates cyberspace and physical space." The fifth evolution of the society, enabled by the fifth generation of cellular networking and cyber-physical systems, imagines technology, things and humans converging to address some of the biggest societal challenges. The concept encompasses Industry 4.0, Fourth Industrial Revolution, Smart-Everything World and other buzzwords of the moment. In the society of the future the more the cyber and physical worlds are combined, the greater the benefits we will experience. However, the same is true of cyber threats. The more technology is incorporated into every corner of...

Opportunity and Cybersecurity in the Age of 5G

5G Opportunity and Cybersecurity
The human will to innovate is seemingly relentless. The history of our species is one of continual development, with the last 350 years, in particular, representing staggering technological progress. The first industrial revolution mechanized production using natural elements like water. The second revolution used electricity to enable mass production; the third used electronics and information technology to automate production. The fourth industrial revolution unfolding all around us is characterized by an exponential growth in data production and the merging of the physical and digital. Cyber-physical systems (CSPs) like the internet of things (IoT) and industrial control systems (ICS) are capable of reading and influencing physical and biological domains. They are the first wave of super-integrated realities that will see objects, systems,...

IIoT and Trust and Convenience: A Potentially Deadly Combination

IIoT 5G Trust Security
When microwave ovens first arrived on the market in 1967 they were met with public skepticism. Perhaps it was because, not long before, the same technology now promising to safely cook consumers’ evening meals was the backbone of a military radar. Perhaps it was the $495 price tag (more than $3,700 in today’s money). Whatever the reason, in the early 1970s the percentage of Americans owning a microwave was tiny. By 2011, it was 97%. What changed? Trust and convenience. When microwave technology was first released, it was difficult to trust. Cooking without using heat? It was simply too alien. In 1973, Consumers Union stated that microwave ovens couldn’t be considered safe because there was no solid data on safe levels of...

5G Security & Privacy Challenges

5G Security Privacy
Don’t let the “5G” in the title confuse you. This post is not only about the telcos’ core networks, but about the 5G security and privacy issues in our (very) near, and very different future that 5G will enable. In the 5G-enabled massive Internet of Things (mIoT) world we’re about to find ourselves in, we are expected to have 1000 devices connected for every person… These devices will be the components of the ‘5G operating system’ for our smart cities, our industry 4.0, our smart homes, smart transportation, smart healthcare, and much more. To enable this future, we will need to have a complex symphony of computing going on across devices themselves, “fog” computing, enterprise and telco data centers,...

Cyber-Kinetic Security and Privacy Threats in Smart Cities

Smart City 5G Privacy
More than half of the world’s population lives in cities. The UN estimates that by 2050 that proportion will be 68% - more than 6 billion people living in high-density conditions. This raises significant challenges. What is the best way to ensure that human needs are met in a fair and equitable way? How will we face challenges like resource strain, waste and pollution management, traffic congestion and connectivity? In response to these wicked problems, cities are increasingly relying on smart technologies to foster greater efficiency and sustainable growth. These interventions do not, however, come without their own complications. Just like any digital tool, smart systems are vulnerable to cyber-kinetic attacks, but what makes them unique is their high degree...

Importance of Privacy for Smart Cities and IoT

smart cities privacy
From The Jetsons to Blade Runner, to Back to the Future, to A.I. to The 5th Element, popular culture has long been fascinated by what the future would look like for ordinary people. In these films and countless others, humans of the future are shown engaging with technology that speaks to them, cooks for them, asks them how their day was and connects them with the outside world in a seamless and intuitive way. These are all examples of what we now regard as smart homes and smart cities – living spaces optimized by devices connected through the Internet of Things (IoT), intelligently responding to our needs. These homes are a natural extension of the smart capabilities that most of...

Most popular articles this week