Home 5G CYBERSECURITY, PRIVACY, TECHNOLOGY

5G CYBERSECURITY, PRIVACY, TECHNOLOGY

NFC Cybersecurity
NFC is a short range two-way wireless communication technology that enables simple and secure communication between electronic devices embedded with NFC microchip. NFC technology operates in 13.56 megahertz and supports 106, 212, or 424 Kbps throughput. There are three available modes of NFC communication: Read/write (e.g. for reading tags in NFC posters) Card emulation (e.g. for making payments) Peer-to-peer (e.g. for file transfers) There is no need for pairing code between devices, because once in range they instantly start communication and prompt the user. NFC technology is power efficient - much more than other wireless technologies. The communication range of NFC is approximately...
RFID Cybersecurity
Radio-Frequency Identification (RFID) is a technology commonly used for identification, status administration and management of different objects. It is important for people identification, as it is commonly deployed in the latest biometric passports.  It operates in several frequency bands like Low frequency band from 125 kHz to 134 kHz, High frequency band with 13.56MHz working frequency, Ultra-high frequency band with 433 MHz working frequency and 860 - 960 MHz sub-band. In Ultra-high frequency bands there are two types of RFID systems—Active and Passive. Active RFID system operates on 433 MHz radio frequency and on 2.4GHz from Extremely High- Frequency Range. It supports...
Wi-Fi Cybersecurity
The Wi-Fi represents wireless technology that includes the IEEE 802.11 family of standards (IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, IEEE 802.11ac, etc.). Within 50m range, it operates in 2.4 GHz and 5GHz frequency bands,. This technology was developed for wireless networking of computer devices and is commonly called WLAN (Wireless Local Area Network), where the communication is realized between wireless routers typically connected to the Internet and other wireless nodes within its range. In correlation with performances of specific IEEE 802.11 standards, different data rates are enabled and their theoretical throughput is 11 Mbps (IEEE 802.11b), 54 Mbps (IEEE...
Bluetooth Cybersecurity
Bluetooth is short-range wireless communications technology based on the IEEE 802.15.1 protocol. It works in a crowded license free 2.4 GHz frequency band and shares this resource with many other technologies. Bluetooth is the optimal solution for establishing small wireless networks called Piconets, by connecting two Bluetooth devices. One of these nodes is Master that can be connected via Bluetooth link to 7 other Bluetooth devices—Slave nodes in Personal Area Network (PAN). Typical data rates are 1-3 Mbps. The newest versions of Bluetooth is known as Bluetooth Low Energy (BLE) or Bluetooth smart. It is important to note that Bluetooth and BLE...
Zigbee Security
Zigbee technology introduction Zigbee is wireless PAN (Personal Area Network) technology developed to support automation, machine-to-machine communication, remote control and monitoring of IoT devices. It evolved from IEEE 802.15.4 wireless standard and supported by the ZigBee Alliance. IEEE 802.15.4 standard determines specifications for the physical and data link layer and Zigbee Alliance provides standards from network layer to application layer. While Zigbee determines the contents of the transmitted message, the 802.15.4 standard provides details about the robust radio communication and medium access control. The Zigbee Alliance, as a non-profit association, develops open global Zigbee standard for use in the Internet of Things...
LoRaWAN IoT Security
I get accused of focusing too much on 5G as the only future IoT connectivity option. I do write a lot about how 5G will revolutionize our society, become the most critical of critical infrastructures and about security threats with 5G. I see 5G, with its low latency, high bandwidth, network slicing and ubiquitous coverage becoming the foundational capability for mission critical industrial, agricultural, financial, medical, education, energy and transportation, even military and emergency services IoT communication needs. That’s not to say that 5G is the only IoT connectivity option. There are plenty of others. IoT applications have some common requirements...
Smart Home Wireless Connectivity
In a recent session on smart building cybersecurity, a student cheekily asked me "How did we ever connect anything before 5G?" At that moment I realized I might have been overdoing my 5G cheerleading recently. To atone, here are the key performance and cybersecurity attributes of the most commonly used connectivity technologies in smart home / smart building use cases... And 5G. If you thought that the "traditional" home life is under heavy attack from digitization of media and constant communication, wait until you learn about the Internet of Things (IoT) and Smart Homes. Our most personal spaces - our homes...
Huawei ERNW 5G Source Code Analysis
No, no it doesn’t. Huawei's code might as well be extremely secure. Their code is certainly the most scrutinized. But the recent UDG source code review is not an evidence of security. ERNW, an independent IT security service provider in Germany, recently performed a technical review / audit of Huawei’s Unified Distributed Gateway (UDG) source code. Huawei made the summary report available here . The review focused on the quality of the source code and the source code management practices. The report is overall positive and showed that Huawei has significantly improved its software engineering processes. At least for the UDG...
IoT Protocols Speed Range
IoT Wireless Protocols data rate and range comparison in a spreadsheet format. Includes downloadable Excel spreadsheet.
IoT Protocols Speed Range
IoT Wireless Protocols in a spreadsheet format. Includes downloadable Excel spreadsheet.
S.3469 NETWORK Act
A bipartisan group of U.S. lawmakers today introduced in Senate a bill aimed "To impose sanctions with respect to foreign telecommunications companies engaged in economic or industrial espionage against United States persons, and for other purposes." Officially called Neutralizing Emerging Threats from Wireless OEMs Receiving direction from Kleptocracies and Surveillance states Act or the NETWORKS Act, the bill would require the President to block and prohibit significant transactions and interests in property of a foreign individual or entity that (1) produces fifth- or future-generation telecommunications technology; and (2) engages in economic or industrial espionage, or other related illicit activities, involving...
Bell Canada 5G
On Bell's BCE Inc (BCE) Q1 2020 Results Conference Call on Thursday new Bell's President and CEO Mirko Bibic said: "We are ready with our initial 5G network, but frankly we don’t think that it’s the right time right now to officially launch it for marketing purposes. I just don’t think that customers are paying attention to this right now and that’s not what is top of mind for our customer base. They have other priorities, understandably. Bell Canada started the deployment of its 5G network infrastructure this year, using Nokia's gear. Babic did say that the infrastructure projects continue: "At...
TeraGo 5G
TeraGo Inc. (“TeraGo” or the “Company”) (TSX: TGO, www.terago.ca) is a Canadian managed cloud and connectivity solutions company. It owns a national spectrum portfolio of exclusive 24GHz and 38GHz wide-area spectrum licences including 2,120 MHz of spectrum across Canada’s 6 largest cities. It operates a national fixed wireless network with thousands of access points across Canada and operates five data centres in the Greater Toronto Area, the Greater Vancouver Area, and Kelowna. TeraGo announced that it will be starting 5G technical trials in the Greater Toronto Area utilizing 5G fixed wireless network equipment from Nokia. These initial trials are expected...
5G COVID-19
There are many adjectives that could be used to describe the global outbreak of COVID-19, but perhaps the simplest might be: fast. The disease has spread quicker than most people can mentally digest. By nature, humans process linearly. This pandemic has been a lesson in exponential thinking for the common man. Those who don’t spend their time contemplating Moore's Law or compound interest have felt overwhelmed by infection or mortality rates that double daily. In response, governments, businesses, monetary institutions, education systems and the many other players in corporate and civil life have acted at high speed. It is easy to...
The Next Gen Future 5G Australia
Australian government's committee - The House of Representatives Standing Committee on Communications and the Arts - has issued a new report on adoption of 5G in Australia. The report titled "The Next Gen Future - Inquiry into the deployment, adoption and application of 5G in Australia" lists 14 recommendations including these few related to technology independence and cybersecurity: The Committee recommends that the Australian Government investigate ways to encourage the manufacture of 5G infrastructure within Australia. To help enable this, the Australian Government should establish a 5G R&D Innovation Fund to fast track the development and scale-up of alternative manufacturing...