Skip to main content

2020 | OriginalPaper | Buchkapitel

5G Cybersecurity Vulnerabilities with IoT and Smart Societies

verfasst von : Yelda Shah, Nishan Chelvachandran, Stefan Kendzierskyj, Hamid Jahankhani, Radovan Janoso

Erschienen in: Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

5G, the fifth generation of wireless connectivity, is designed to allow long-distance coverage and stable connections as well as rapid data download and upload. As a result of 5G’s the wireless-based technology, the data migration enables a speed of 20 Gbps (Gigabyte per second) through wireless mobile data connections, which simplifies the management of excessive data transmission via 5G. The protocols capability for high quantity data transfer speeds with low latency, compared with the previous generations mobile data telephony makes the protocol ideal for both current IoT and automated systems, as well as enabling the development and further proliferation of more. Data transfer speeds and latency rates have been a bottleneck in the roll out of smart technologies. Despite the relatively high data speeds of 4G connectivity, the availability and development of infrastructure, together with the explosion in the ownership and use of devices utilising the technology, has been a limiting factor in the roll out and use of AI and automated technologies such as driverless vehicles and smart city implementations. Whilst 5G looks to solve these limitations brought by previous generations, there are also drawbacks with 5G. The frequency and narrow wavelength, known as millimeter wave, whilst enabling such high data transfer speeds and reduced latency, also has a very limited distance of effectivity. There is only a very short distance before the signal starts to deteriorate, after which, the deterioration is exponential. 5G signals also cannot penetrate or reflect off of buildings and other obstacles very easily. This means that for a 5G networks implementation to be maximised, direct line of sight between the connected device and the relays or radioheads must be maintained, or at least, with as minimal obstruction as possible. A work around to this limitation is through densification and utilising large numbers of small cell radio heads throughout a coverage area. This will require that there is far greater investment and redevelopment in the mobile telephony infrastructure for this strategy to be implemented.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Al-Dulaimi A, Chih-Lin I, Wang X (2018) 5G networks: fundamental requirements, enabling technologies, and operations management, 1st edn. Wiley, New Jersey Al-Dulaimi A, Chih-Lin I, Wang X (2018) 5G networks: fundamental requirements, enabling technologies, and operations management, 1st edn. Wiley, New Jersey
3.
Zurück zum Zitat Atlam HF, Wills GB (2019) IoT security, privacy, safety and ethics. In: Farsi M et al (eds) Digital twin technologies and smart cities, internet of things. Springer Nature Switzerland AG 2020 Atlam HF, Wills GB (2019) IoT security, privacy, safety and ethics. In: Farsi M et al (eds) Digital twin technologies and smart cities, internet of things. Springer Nature Switzerland AG 2020
5.
Zurück zum Zitat Calder A, Watkins S (2015) IT governance: an international guide to data security and ISO27001/ISO27002, 6th edn. Kogan Page, London Calder A, Watkins S (2015) IT governance: an international guide to data security and ISO27001/ISO27002, 6th edn. Kogan Page, London
6.
Zurück zum Zitat Chandran S, Lobo A (2016) Ethics and compliance in corporations: value based approach. 2016 IEEE International Symposium on Ethics in Engineering, Science and Technology (ETHICS) 1(1):1–4 Chandran S, Lobo A (2016) Ethics and compliance in corporations: value based approach. 2016 IEEE International Symposium on Ethics in Engineering, Science and Technology (ETHICS) 1(1):1–4
7.
Zurück zum Zitat Condoluci M, Mahmoodi T (2018) Softwarization and virtualization in 5G mobile networks: benefits, trends and challenges. Comput Netw 146(1):65–84CrossRef Condoluci M, Mahmoodi T (2018) Softwarization and virtualization in 5G mobile networks: benefits, trends and challenges. Comput Netw 146(1):65–84CrossRef
8.
Zurück zum Zitat Edfors O, Larsson EG, Marzetta TL, Tufvesson F (2014) Massive MIMO for next generation wireless systems. IEEE Communications Magazine. pp 186–195 Edfors O, Larsson EG, Marzetta TL, Tufvesson F (2014) Massive MIMO for next generation wireless systems. IEEE Communications Magazine. pp 186–195
10.
Zurück zum Zitat Ellingsen SE, Løvholt F, Madshus C, Norèn-Cosgriff K (2017) Simulating low frequency sound transmission through walls and windows by a two-way coupled fluid structure interaction model. J Sound Vib 396(1):203–216 Ellingsen SE, Løvholt F, Madshus C, Norèn-Cosgriff K (2017) Simulating low frequency sound transmission through walls and windows by a two-way coupled fluid structure interaction model. J Sound Vib 396(1):203–216
12.
Zurück zum Zitat Fogg BJ, Tseng S (1999) Credibility and computing technology. Commun ACM 42(5):39–44CrossRef Fogg BJ, Tseng S (1999) Credibility and computing technology. Commun ACM 42(5):39–44CrossRef
13.
Zurück zum Zitat Ge X, Mao G, Han T, Tu S, Wang CX (2016) 5G ultra-dense cellular networks. IEEE Wirel Commun 23(1):72–79CrossRef Ge X, Mao G, Han T, Tu S, Wang CX (2016) 5G ultra-dense cellular networks. IEEE Wirel Commun 23(1):72–79CrossRef
16.
Zurück zum Zitat Khalaf K, Long J-R, Vidojkovic V, Wambacq P (2015) Data transmission at millimeter waves: exploiting the 60 GHz on silicon, 1st edn. Springer, Berlin/Heidelberg Khalaf K, Long J-R, Vidojkovic V, Wambacq P (2015) Data transmission at millimeter waves: exploiting the 60 GHz on silicon, 1st edn. Springer, Berlin/Heidelberg
17.
Zurück zum Zitat Luoma E, Mazhelis O, Warma H (2012) Defining an Internet-of-Things Eco-System. In: Andreev S, Balandin S, Koucheryavy Y (eds) Internet of things, smart spaces, and next generation networking: 12th international conference, NEW2AN 2012 and 5th conference, ruSmart 2012, St. Petersburg, Russia, August 2012, Proceedings, 1st edn. Springer, Berlin Heidelberg Luoma E, Mazhelis O, Warma H (2012) Defining an Internet-of-Things Eco-System. In: Andreev S, Balandin S, Koucheryavy Y (eds) Internet of things, smart spaces, and next generation networking: 12th international conference, NEW2AN 2012 and 5th conference, ruSmart 2012, St. Petersburg, Russia, August 2012, Proceedings, 1st edn. Springer, Berlin Heidelberg
18.
Zurück zum Zitat Miller L (2016) IoT security for dummies, INSIDE secure edition. 1st. Chichester/West Sussex: Wiley Miller L (2016) IoT security for dummies, INSIDE secure edition. 1st. Chichester/West Sussex: Wiley
21.
Zurück zum Zitat Nesterova M, Nesterova Y, Nicol S (2018) Evaluating power density for 5G applications. 2018 IEEE 5G World Forum (5GWF), pp 347–350 Nesterova M, Nesterova Y, Nicol S (2018) Evaluating power density for 5G applications. 2018 IEEE 5G World Forum (5GWF), pp 347–350
22.
Zurück zum Zitat Rodriguez J (2015) Fundamentals of 5G mobile networks, 1st edn. Wiley, Chichester/West Sussex Rodriguez J (2015) Fundamentals of 5G mobile networks, 1st edn. Wiley, Chichester/West Sussex
28.
Zurück zum Zitat Weber RH (2010) Internet of things – new security and privacy challenges. Comput Law Secur Rev 26(1):23–30MathSciNetCrossRef Weber RH (2010) Internet of things – new security and privacy challenges. Comput Law Secur Rev 26(1):23–30MathSciNetCrossRef
31.
Zurück zum Zitat Zhang Y (2018) Network function virtualization concepts and applicability in 5G networks, 1st edn. Wiley, New JerseyCrossRef Zhang Y (2018) Network function virtualization concepts and applicability in 5G networks, 1st edn. Wiley, New JerseyCrossRef
32.
Zurück zum Zitat Zinner S (2014) Codes of ethics move into the “third generations”. 2014 IEEE International Symposium on Ethics in Science, Technology and Engineering 1(1):1–3 Zinner S (2014) Codes of ethics move into the “third generations”. 2014 IEEE International Symposium on Ethics in Science, Technology and Engineering 1(1):1–3
Metadaten
Titel
5G Cybersecurity Vulnerabilities with IoT and Smart Societies
verfasst von
Yelda Shah
Nishan Chelvachandran
Stefan Kendzierskyj
Hamid Jahankhani
Radovan Janoso
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-35746-7_9