SlideShare a Scribd company logo
5G and IoT Security
Nicholas Ho, NUS-ISS
Ng Kok Leong, NUS-ISS
11 August 2020
#ISSLearningFest
Agenda
• Introduction to IoT & 5G – Dr Nicholas Ho
• 5G and IoT Security – Ng Kok Leong
#ISSLearningFest
Introduction to IoT & 5G
Nicholas Ho, NUS ISS
11 August 2020
#ISSLearningFest
About Nicholas Ho
• nicholas.ho@nus.edu.sg
• Lecturer at NUS ISS; Courses covered include:
Envisioning Smart Urban IoT Solutions
Humanizing Smart Systems
Autonomous Robots and Vehicles
• BEng and PhD degree from School of Mechanical
Engineering, NUS
• Specialized in architecture, design & development
Internet-of-Things (IoT) & Cyber-Physical System (CPS)
Augmented/Virtual Reality
Artificial Intelligence
#ISSLearningFest
Contents
• What is IoT?
• Possible IoT Involvement in Autonomous Systems?
• Introduction to 5G
• 5G Involvement in the IoT Realm
#ISSLearningFest
What is IoT?
This section will enable you to briefly understand what IoT is and its applications
#ISSLearningFest
Introducing Internet-of-Things (IoT)
What is IoT?
Internet connects all people, so it is
called “the Internet of People”
IoT connects all things, so it is
called “the Internet of Things”
Remember the key elements of IoT:
1. Connect devices
2. Process (i.e. data collection,
analysis and management)
3. Act
#ISSLearningFest
IoT Example 1: Tado° Smart Thermostat
#ISSLearningFest
Source:
https://www.youtube.com/
watch?v=lYUmnxndHg4
IoT Example 1: Tado° Smart Thermostat
#ISSLearningFest
• Full features
• Full controls
• More potential usability issues
• Little features
• Limited controls
• Less potential usability issues
IoT Example 2: Berg Cloud Wash
#ISSLearningFest
Source: https://vimeo.com/87522764
Mechanical
Washing
Machine Panel
Cloud-
connected
Washing
Machine Panel
School of thought:
What major problem could
IoT possibly solve?
Opportunities in the IoT Realm
#ISSLearningFest
Possible IoT Involvement in
Autonomous Systems?
This section will explain how IoT can be involved within autonomous robots and within
autonomous vehicles in the far future
#ISSLearningFest
IoT Application Example in Autonomous Robots
#ISSLearningFest
Source:
https://www.youtube.com/
watch?v=Mog3UgQvHIo
Is IoT crucial in
the autonomous
movement here?
In which areas IoT
is crucial within
this autonomous
security robot?
Current Autonomous Vehicle (AV) System
#ISSLearningFest
Source:
https://www.youtube.com/
watch?v=x4jg4E7LrZE
Is IoT crucial in
the autonomous
driving here?
IoT can Help Shape the AV Industry
#ISSLearningFest
Interaction model for IoT-based ecosystem for an autonomous vehicle
IoT can Help Shape the AV Industry (Cont)
#ISSLearningFest
Is the current technology
good enough that we can
implement this concept?
Why or Why Not?
What's the solution to
this problem?
Introduction to 5G
This section will enable you to briefly understand what 5G is and its applications
#ISSLearningFest
What is 5G?
#ISSLearningFest
5G uses radio waves or radio frequency (RF) energy to transmit
and receive voice and data connecting our communities
5G = 5th generation of mobile networks,
an advanced version of the 4G LTE
networks
Designed to meet the very large growth in
data and connectivity of today’s modern
society, IoT with billions of connected
devices, and tomorrow’s innovations
5G will initially operate in conjunction with
existing 4G networks before evolving to
fully standalone networks in subsequent
releases and coverage expansions
Summarized Advantages of 5G
1. High bandwidth (how big is the
“data door”? Affects the data speed)
• At least 1GB/s
2. Low latency (how fast can the data
move from one source to another?)
• Can be as low as 1 ms response time
3. Dense connections (how many
devices can be connected at the
same time?)
• Can connect up to 100 times more than
4G allows
• Highly supports mass IoT adoption
#ISSLearningFest
5G vs 4G vs 3G
#ISSLearningFest
Some of the Technologies that Made 5G Possible
#ISSLearningFest
Millimeter Waves
(spectrum above 6 GHz)
Small Cell Networks
(Limited range per small cell
[aka mini base station]:
10 meters to a few hundred meters)
Applications of 5G
#ISSLearningFest
5G will provide the speed, low latency and
connectivity to enable a new generation of
applications, services and business
opportunities that have not been seen before
5G Involvement in the IoT Realm
This section will explain how 5G can be involved within the IoT World in future
#ISSLearningFest
5G Supporting a Smart City
#ISSLearningFest
Source:
https://www.sageautomation.com
/blog/what-will-5g-mean-for-
smart-city-transport-infrastructure
5G Supporting Urban Farming IoT
#ISSLearningFest
https://www.channelnewsasia.com/news/singapore/covid10-singapore-food-
security-farming-innovation-12649468
5G could also play an
important role to sustain
and ensure feasibility of
Urban Farming
operations in SG
5G Supporting VR/AR Systems
#ISSLearningFest
https://www.hollywoodreporter.com/behind-screen/fifa-
world-cup-bbc-testing-live-vr-hdr-streaming-1115756
https://cnalifestyle.channelnewsasia.com/travel/
virtual-reality-travel-12601122
SUMMARY - Key Element of 5G & IoT
• While the internet connects all people, IoT connects all things
• Key elements of IoT: Connect, Process, Act
• AVs are unable to fully rely on the current LTE networks for driving
purposes because of its insufficient levels of real-time capability and
robustness of connectivity. Hence, the need for 5G
• 5G is an advanced version of the 4G LTE networks; known as the 5th
generation of mobile networks
• Main advantages of 5G include: (a) High bandwidth (b) Low latency,
and (c) Dense connections
• 5G plays a very crucial role, especially for IoT applications within
the communities and businesses/industries in the future
#ISSLearningFest
5G and IoT Security
Ng Kok Leong, NUS-ISS
11 August 2020
#ISSLearningFest
About Ng Kok Leong
• kokleong@nus.edu.sg
• Lecturer at NUS ISS; Courses covered include:
Information Systems Security (ISC2 CISSP)
Cloud Security (ISC2 CCSP)
Systems Security (ISC2 SSCP)
Security Architecture
IoT Security
• Master degree in Computer Science &
Information Systems, NUS
• Master degree in Business Administration,
University of Melbourne
#ISSLearningFest
Community effort to establish a secure
5G/IoT ecosystem
#ISSLearningFest
2017: 80% of IoT apps left unsecured
#ISSLearningFestSource: www.iottechnews.com
2020: 83% of IoT transaction are not secure
#ISSLearningFestSurce: www.zscaler.com
Security by design – what happen?
#ISSLearningFestImage: www.uscybersecurity.net
Now, add autonomous systems & 5G
#ISSLearningFest
Image: www.cpomagazine.com
Increase insecurity !
Solution?
IoT ecosystem
#ISSLearningFest
Cloud Service
Providers
(AWS, Azure)
IoT IoT / Gateway
Short range
(BLE, ZigBee, 5G)
Long range
(NB-IoT, Sigfox, 4G/5G)
Devices Network Applications
5G Security Standards - Examples
• Inherited protection since 3G
• Mutual authentication
between device and network
• Integrity protection of
signaling
• Incorporate IPsec, EAP, TLS
• Network slicing
#ISSLearningFest
5G Security Issue – Deployment Model
#ISSLearningFest
Non-Standalone (NSA) deployment Standalone (SA) deployment
Image: gsma.com
5G Security Issue - Standards
#ISSLearningFestImage: ericsson.com
5G Security Issue – More Software
#ISSLearningFest
Image: infocus.delltechnologies.com
• 5G network utilizes
NFV and SDN. Going
software will increase
attack surface at
telecom backend.
• Telecom operator will
have to ensure setup
and operation are
secured.
CVE registered vulnerability trend, Oct 2019
#ISSLearningFest
Image: https://portswigger.net
Software Challenges
• Many high profile
compromises, local and
abroad, can trace the root
causes to inadequate
practices of security
controls.
• To address a software
backend, 5G telecom
operator has allocate
adequate resources to gain
assurance in cyber security.
IoT Network – short range & long range
#ISSLearningFestImage: www.embien.com
Protocol standard
creators design security
into zigbee protocol,
sigfox protocol etc.
Network equipment
#ISSLearningFest
Equipment product
builders develop security
into ZigBee equipment,
Sigfox equipment, 5G
equipment etc
Image:
www.elprocus.com
http://v14.thingsboard.io
Expect vulnerability
• Vulnerability from design flaw and implementation flaw.
• Known and unknown vulnerability.
#ISSLearningFest
• On defense side,
• Discover and mitigate vulnerability
• Build in multiple layers of defense, e.g.
Vulnerability != compromise
Preventive => Detective => Corrective
IoT ecosystem
#ISSLearningFest
Cloud Service
Providers
(AWS, Azure)
IoT IoT / Gateway
Short range
(BLE, ZigBee, 5G)
Long range
(NB-IoT, Sigfox, 4G/5G)
Devices Network Applications
AWS Cloud: MQTT over TLS
#ISSLearningFestYoutube.com “Connecting Digi XBee3 Cellular to AWS IoT with MQTT”
Azure Cloud: CoAP over DTLS
#ISSLearningFestImage: https://blog.cloudflare.com
OSCORE: application layer protection
#ISSLearningFestImage: https://www.u-blox.com
OSCORE protects the
application layer
request/response
message between the
endpoints.
IoT ecosystem
#ISSLearningFest
Cloud Service
Providers
(AWS, Azure)
IoT IoT / Gateway
Short range
(BLE, ZigBee, 5G)
Long range
(NB-IoT, Sigfox, 4G/5G)
Devices Network Applications
IoT device
#ISSLearningFest
Image: https://mitechnews.com
IoT product builders develop
security into IoT device
Mirai attack
#ISSLearningFestImage: www.fortinet.com
Has IoT devices became
more secured?
IoT device
#ISSLearningFest
Researcher
&
Security Specialist
Image: accdocket.com
Who discover new vulnerability
and attack vector?
Autonomous System security issues
#ISSLearningFest
Eykholt et al. (2018). Physical Adversarial
Examples for Object Detectors.
Examples,
• Use physical adversarial patch to
cause failure to see stop sign
(refer image on left).
• Fake sensor information to
confuse neighboring vehicle.
IMDA IoT Cyber Security Guidelines
#ISSLearningFest
Examples of clauses,
1) Secure remote management of devices including
support software / firmware updates using
cryptographically secure methods.
2) Employ proper key management (generation,
exchange, storage, use, destruction, replacement,
etc) techniques
3) Establish hardware root of trust.
4) Employ anti-tamper mechanisms for resistance,
evidence, detection, and / or response.
Constrained Devices
#ISSLearningFestImage: www.cisoplatform.com
Security features commonly found in gateways and smart devices cannot
to be assumed to be available in constrained devices.
Secure firmware update
#ISSLearningFest
Image: www.slideshare.net/ARMHoldings/
Trustzone Technology
#ISSLearningFestSource: K5_Addressing_IoT_and_Embedded_Security_at_the_Chip_Level_Roni.pdf
Arm Trustzone technology
provides a cost-effective
methodology to isolate
security critical
components in a system,
by hardware separating
a rich OS, from a much
smaller secure OS
Trustzone Technology
#ISSLearningFestImage: https://www.trustonic.com
Provide hardware-
based root of trust
Trustzone Technology Example: Netflix
#ISSLearningFestImage: http://itersnews.com/?p=44991
Trustzone Technology Example: Samsung Pay
#ISSLearningFest
“secure” chip for autonomous system
#ISSLearningFestSource: ARM “how to make autonomous vehicle a reality with Arm”
ARM Processor Architecture
#ISSLearningFestImage: www.anandtech.com
ARM Processor Architecture: M series
Processor Usage Trustzone Tamper
Resistance
Cortex-M0 Smallest Arm processor available
Cortex-M0+ Smallest footprint & lowest power requirements of Cortex-M processors
Cortex-M1 Optimised for FPGA design
Cortex-M3 Exceptional 32-bit performance with low power consumption
Cortex-M4 Control and performance for mixed signal devices
Cortex-M7 Highest performance Cortex-M processor
Cortex-M23 Smallest and lowest power microcontroller with TrustZone security √
Cortex-M33 Ideal blend of real-time determinism, efficiency and security √
Cortex-M35P The first Armv8-M processor with tamper resistance built in √ √
Cortex-M55 Arm’s most AI-capable Cortex-M processor √
#ISSLearningFest
Chip with Trustzone for constrained IoT
#ISSLearningFestSource: https://www.nuvoton.com/products/microcontrollers/arm-cortex-m23-mcus/
Micro chip for IoT with TRUSTZONE feature
has became available; which provides Root
of Trust. Hence, facilitating secure firmware
update.
IMDA IoT Cyber Security Guidelines
#ISSLearningFest
Examples of clauses,
1) Secure remote management of devices including support
software / firmware updates using cryptographically
secure methods.
2) Employ proper key management (generation, exchange,
storage, use, destruction, replacement, etc) techniques
3) Establish hardware root of trust.
4) Employ anti-tamper mechanisms for resistance, evidence,
detection, and / or response.
√ √
Hardware Root of Trust
#ISSLearningFest
Image: www.semanticscholar.org
Hardware Root of Trust
#ISSLearningFest
Image: www.synopsys.com
ARM Processor Architecture: M35P
#ISSLearningFest
Source: https://www.zdnet.com/article/arm-launches-
cortex-m35p-processor-to-bring-security-to-silicon/
Chip with Trustzone for constrained IoT, since 2018
#ISSLearningFest
Source: https://community.arm.com/developer/ip-products/processors/trustzone-for-armv8-
m/b/blog/posts/microchip-release-first-arm-cortex-m23-based-chip-
SAML11 has trustzone and crypto accelerators (AES, SHA), secure boot
and secure key storage with added chip-level tamper detection
capabilities, to establish a hardware root of trust and secure bootloader
for secure firmware upgrades.
IMDA IoT Cyber Security Guidelines
#ISSLearningFest
Examples of clauses,
1) Secure remote management of devices including support
software / firmware updates using cryptographically
secure methods.
2) Employ proper key management (generation, exchange,
storage, use, destruction, replacement, etc) techniques
3) Establish hardware root of trust.
4) Employ anti-tamper mechanisms for resistance, evidence,
detection, and / or response.
√ √
√
?
FIPS 140-2 certification levels (IoT)
• Security level 1
• Physical security cryptographic module has at least one approved security
function or approved algorithm.
• Security level 2
• Capability to illustrate evidence of tampering.
• Security level 3
• Capability to detect access attempts and responding
• Security level 4
• Capability to trigger immediate zeroization of all plaintext critical security
parameters.
#ISSLearningFest
FIPS 140-2 certification levels (Cloud)
#ISSLearningFest
https://aws.amazon.com/cloudhsm/
https://azure.microsoft.com/en-us/services/azure-dedicated-hsm/
To put in
perspective, the
Hardware Secure
Module used in
cloud is at level 3.
IMDA IoT Cyber Security Guidelines
#ISSLearningFest
Examples of clauses,
1) Secure remote management of devices including support
software / firmware updates using cryptographically
secure methods.
2) Employ proper key management (generation, exchange,
storage, use, destruction, replacement, etc) techniques
3) Establish hardware root of trust.
4) Employ anti-tamper mechanisms for resistance, evidence,
detection, and / or response.
√ √
√
?
IoT product builder
• Do they have the tools to build,
Secure firmware update?
Secure key management?
Hardware root of trust?
Detect tamper at chip level (FIPS 140-2 level 2)?
What % of IoT devices in the market are “secured by design”?
#ISSLearningFest
5G & IoT security, where are the weak links?
#ISSLearningFest
System owner: Define End-to-End security
#ISSLearningFestImage: www.gadgeon.com
System owner: Where are the trust boundaries?
#ISSLearningFestImage: www.engineering.com
Security goes beyond technology
#ISSLearningFest
Image: www.complianceforge.com
Security professional
Operation
Audit
Who ensure cyber security is being addressed
holistically when deployed to enterprise?
Community effort to establish a secure 5G/IoT
ecosystem
#ISSLearningFestEnd-to-end security
Security professional, Operation, Audit
Protocol standard creator,
Equipment product developer
IoT product
developer
Application / Cloud
Service Provider
(shared responsibility model)
Thank You!
Nicholas.ho@nus.edu.sg
kokleong@nus.edu.sg
#ISSLearningFest
Give Us Your Feedback
#ISSLearningFest
Day 1 Programme Festival Experience

More Related Content

What's hot

5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing
3G4G
 
5G BASIC
5G BASIC5G BASIC
Intermediate: 5G Applications Architecture - A look at Application Functions ...
Intermediate: 5G Applications Architecture - A look at Application Functions ...Intermediate: 5G Applications Architecture - A look at Application Functions ...
Intermediate: 5G Applications Architecture - A look at Application Functions ...
3G4G
 
6 g tecnology
6 g tecnology6 g tecnology
6 g tecnology
selvalakshmi24
 
How to build high performance 5G networks with vRAN and O-RAN
How to build high performance 5G networks with vRAN and O-RANHow to build high performance 5G networks with vRAN and O-RAN
How to build high performance 5G networks with vRAN and O-RAN
Qualcomm Research
 
Why and what you need to know about 6G in 2022
Why and what you need to know about 6G in 2022Why and what you need to know about 6G in 2022
Why and what you need to know about 6G in 2022
Qualcomm Research
 
5G seminar
5G seminar5G seminar
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
inside-BigData.com
 
5G Network - It's Architecture and Technology
5G Network - It's Architecture and Technology5G Network - It's Architecture and Technology
5G Network - It's Architecture and Technology
RajKumarRaj32
 
6G mobile technology
6G mobile technology6G mobile technology
6G mobile technology
AJOVE
 
5g nertwork
5g nertwork5g nertwork
5g nertwork
alireza irani
 
Paving the path to Narrowband 5G with LTE IoT
Paving the path to Narrowband 5G with LTE IoTPaving the path to Narrowband 5G with LTE IoT
Paving the path to Narrowband 5G with LTE IoT
Qualcomm Research
 
Expanding the 5G NR (New Radio) ecosystem
Expanding the 5G NR (New Radio) ecosystemExpanding the 5G NR (New Radio) ecosystem
Expanding the 5G NR (New Radio) ecosystem
Qualcomm Research
 
Presentation on private 5G.pptx
Presentation on private 5G.pptxPresentation on private 5G.pptx
Presentation on private 5G.pptx
PavanKuamr4
 
5G PPT
5G PPT5G PPT
5G PPT
Sharon Moses
 
5G
5G5G
Signaling security essentials. Ready, steady, 5G!
 Signaling security essentials. Ready, steady, 5G! Signaling security essentials. Ready, steady, 5G!
Signaling security essentials. Ready, steady, 5G!
PositiveTechnologies
 
Technology trends towards 6G
Technology trends towards 6GTechnology trends towards 6G
Technology trends towards 6G
Alain Mourad
 
5G Fixed Wireless Access: Trends we’re seeing and Capgemini’s approach
5G Fixed Wireless Access: Trends we’re seeing and Capgemini’s approach5G Fixed Wireless Access: Trends we’re seeing and Capgemini’s approach
5G Fixed Wireless Access: Trends we’re seeing and Capgemini’s approach
Capgemini
 
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosLPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
Peter R. Egli
 

What's hot (20)

5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing
 
5G BASIC
5G BASIC5G BASIC
5G BASIC
 
Intermediate: 5G Applications Architecture - A look at Application Functions ...
Intermediate: 5G Applications Architecture - A look at Application Functions ...Intermediate: 5G Applications Architecture - A look at Application Functions ...
Intermediate: 5G Applications Architecture - A look at Application Functions ...
 
6 g tecnology
6 g tecnology6 g tecnology
6 g tecnology
 
How to build high performance 5G networks with vRAN and O-RAN
How to build high performance 5G networks with vRAN and O-RANHow to build high performance 5G networks with vRAN and O-RAN
How to build high performance 5G networks with vRAN and O-RAN
 
Why and what you need to know about 6G in 2022
Why and what you need to know about 6G in 2022Why and what you need to know about 6G in 2022
Why and what you need to know about 6G in 2022
 
5G seminar
5G seminar5G seminar
5G seminar
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
 
5G Network - It's Architecture and Technology
5G Network - It's Architecture and Technology5G Network - It's Architecture and Technology
5G Network - It's Architecture and Technology
 
6G mobile technology
6G mobile technology6G mobile technology
6G mobile technology
 
5g nertwork
5g nertwork5g nertwork
5g nertwork
 
Paving the path to Narrowband 5G with LTE IoT
Paving the path to Narrowband 5G with LTE IoTPaving the path to Narrowband 5G with LTE IoT
Paving the path to Narrowband 5G with LTE IoT
 
Expanding the 5G NR (New Radio) ecosystem
Expanding the 5G NR (New Radio) ecosystemExpanding the 5G NR (New Radio) ecosystem
Expanding the 5G NR (New Radio) ecosystem
 
Presentation on private 5G.pptx
Presentation on private 5G.pptxPresentation on private 5G.pptx
Presentation on private 5G.pptx
 
5G PPT
5G PPT5G PPT
5G PPT
 
5G
5G5G
5G
 
Signaling security essentials. Ready, steady, 5G!
 Signaling security essentials. Ready, steady, 5G! Signaling security essentials. Ready, steady, 5G!
Signaling security essentials. Ready, steady, 5G!
 
Technology trends towards 6G
Technology trends towards 6GTechnology trends towards 6G
Technology trends towards 6G
 
5G Fixed Wireless Access: Trends we’re seeing and Capgemini’s approach
5G Fixed Wireless Access: Trends we’re seeing and Capgemini’s approach5G Fixed Wireless Access: Trends we’re seeing and Capgemini’s approach
5G Fixed Wireless Access: Trends we’re seeing and Capgemini’s approach
 
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosLPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
 

Similar to 5G and IoT Security

5G_Upload.docx
5G_Upload.docx5G_Upload.docx
5G_Upload.docx
Sun Technologies
 
5G report 2
5G report 25G report 2
5G report 2
IGDTUW
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoT
Md.Imtiaz Ahmed
 
Introduction to IoT by Vectolabs
Introduction to IoT by VectolabsIntroduction to IoT by Vectolabs
Introduction to IoT by Vectolabs
Vectolabs Technologies Sdn Bhd
 
5 g as a service (5gaas)
5 g as a service (5gaas)5 g as a service (5gaas)
5 g as a service (5gaas)
Luke Wang
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
ajaygreat321
 
5G Network
5G Network5G Network
5G Network
DigitalNational
 
What Makes 5G Network Different - Digital Nasional Berhad
What Makes 5G Network Different - Digital Nasional BerhadWhat Makes 5G Network Different - Digital Nasional Berhad
What Makes 5G Network Different - Digital Nasional Berhad
DigitalNational
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
IRJET Journal
 
India_has_made_massive_growth_in_the_global[1][1].pptx
India_has_made_massive_growth_in_the_global[1][1].pptxIndia_has_made_massive_growth_in_the_global[1][1].pptx
India_has_made_massive_growth_in_the_global[1][1].pptx
ajaygreat321
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
Abaram Network Solutions
 
Migration from 4G to 5G: A Complete synopsis guide on 4G to 5G migration.
Migration from 4G to 5G: A Complete synopsis guide on 4G to 5G migration.Migration from 4G to 5G: A Complete synopsis guide on 4G to 5G migration.
Migration from 4G to 5G: A Complete synopsis guide on 4G to 5G migration.
Utkarsh Jaiswal
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
Belal Ashraf
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson
 
Nanotechnology in 5G Wireless Communication Network: An Approach
Nanotechnology in 5G Wireless Communication Network: An ApproachNanotechnology in 5G Wireless Communication Network: An Approach
Nanotechnology in 5G Wireless Communication Network: An Approach
IRJET Journal
 
What is the future of IoT connectivity.pdf
What is the future of IoT connectivity.pdfWhat is the future of IoT connectivity.pdf
What is the future of IoT connectivity.pdf
Ciente
 
The Future of 6G Wireless Networks Opportunities, Requirements, and Challenge...
The Future of 6G Wireless Networks Opportunities, Requirements, and Challenge...The Future of 6G Wireless Networks Opportunities, Requirements, and Challenge...
The Future of 6G Wireless Networks Opportunities, Requirements, and Challenge...
ijtsrd
 
Defining Future 5G Networks - All Slides
Defining Future 5G Networks - All SlidesDefining Future 5G Networks - All Slides
Defining Future 5G Networks - All Slides
Digital Catapult
 
Wi-Fi Controlled Car
Wi-Fi Controlled CarWi-Fi Controlled Car
Wi-Fi Controlled Car
IRJET Journal
 
Gemalto Review: 5G Feature
Gemalto Review: 5G FeatureGemalto Review: 5G Feature
Gemalto Review: 5G Feature
Nexus Publishing
 

Similar to 5G and IoT Security (20)

5G_Upload.docx
5G_Upload.docx5G_Upload.docx
5G_Upload.docx
 
5G report 2
5G report 25G report 2
5G report 2
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoT
 
Introduction to IoT by Vectolabs
Introduction to IoT by VectolabsIntroduction to IoT by Vectolabs
Introduction to IoT by Vectolabs
 
5 g as a service (5gaas)
5 g as a service (5gaas)5 g as a service (5gaas)
5 g as a service (5gaas)
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
5G Network
5G Network5G Network
5G Network
 
What Makes 5G Network Different - Digital Nasional Berhad
What Makes 5G Network Different - Digital Nasional BerhadWhat Makes 5G Network Different - Digital Nasional Berhad
What Makes 5G Network Different - Digital Nasional Berhad
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
India_has_made_massive_growth_in_the_global[1][1].pptx
India_has_made_massive_growth_in_the_global[1][1].pptxIndia_has_made_massive_growth_in_the_global[1][1].pptx
India_has_made_massive_growth_in_the_global[1][1].pptx
 
How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks How to deal with the impact of digital transformation on networks
How to deal with the impact of digital transformation on networks
 
Migration from 4G to 5G: A Complete synopsis guide on 4G to 5G migration.
Migration from 4G to 5G: A Complete synopsis guide on 4G to 5G migration.Migration from 4G to 5G: A Complete synopsis guide on 4G to 5G migration.
Migration from 4G to 5G: A Complete synopsis guide on 4G to 5G migration.
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of Things
 
Nanotechnology in 5G Wireless Communication Network: An Approach
Nanotechnology in 5G Wireless Communication Network: An ApproachNanotechnology in 5G Wireless Communication Network: An Approach
Nanotechnology in 5G Wireless Communication Network: An Approach
 
What is the future of IoT connectivity.pdf
What is the future of IoT connectivity.pdfWhat is the future of IoT connectivity.pdf
What is the future of IoT connectivity.pdf
 
The Future of 6G Wireless Networks Opportunities, Requirements, and Challenge...
The Future of 6G Wireless Networks Opportunities, Requirements, and Challenge...The Future of 6G Wireless Networks Opportunities, Requirements, and Challenge...
The Future of 6G Wireless Networks Opportunities, Requirements, and Challenge...
 
Defining Future 5G Networks - All Slides
Defining Future 5G Networks - All SlidesDefining Future 5G Networks - All Slides
Defining Future 5G Networks - All Slides
 
Wi-Fi Controlled Car
Wi-Fi Controlled CarWi-Fi Controlled Car
Wi-Fi Controlled Car
 
Gemalto Review: 5G Feature
Gemalto Review: 5G FeatureGemalto Review: 5G Feature
Gemalto Review: 5G Feature
 

More from NUS-ISS

Designing Impactful Services and User Experience - Lim Wee Khee
Designing Impactful Services and User Experience - Lim Wee KheeDesigning Impactful Services and User Experience - Lim Wee Khee
Designing Impactful Services and User Experience - Lim Wee Khee
NUS-ISS
 
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
NUS-ISS
 
How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...
NUS-ISS
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
NUS-ISS
 
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
NUS-ISS
 
Understanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix Goh
NUS-ISS
 
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeDigital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
NUS-ISS
 
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
NUS-ISS
 
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
NUS-ISS
 
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnSupply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
NUS-ISS
 
Future of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdf
NUS-ISS
 
Future of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan MengFuture of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan Meng
NUS-ISS
 
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Site Reliability Engineer (SRE), We Keep The Lights On 24/7Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
NUS-ISS
 
Product Management in The Trenches for a Cloud Service
Product Management in The Trenches for a Cloud ServiceProduct Management in The Trenches for a Cloud Service
Product Management in The Trenches for a Cloud Service
NUS-ISS
 
Overview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and FoundationsOverview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and Foundations
NUS-ISS
 
Predictive Analytics
Predictive AnalyticsPredictive Analytics
Predictive Analytics
NUS-ISS
 
Feature Engineering for IoT
Feature Engineering for IoTFeature Engineering for IoT
Feature Engineering for IoT
NUS-ISS
 
Master of Technology in Software Engineering
Master of Technology in Software EngineeringMaster of Technology in Software Engineering
Master of Technology in Software Engineering
NUS-ISS
 
Master of Technology in Enterprise Business Analytics
Master of Technology in Enterprise Business AnalyticsMaster of Technology in Enterprise Business Analytics
Master of Technology in Enterprise Business Analytics
NUS-ISS
 
Diagnosing Complex Problems Using System Archetypes
Diagnosing Complex Problems Using System ArchetypesDiagnosing Complex Problems Using System Archetypes
Diagnosing Complex Problems Using System Archetypes
NUS-ISS
 

More from NUS-ISS (20)

Designing Impactful Services and User Experience - Lim Wee Khee
Designing Impactful Services and User Experience - Lim Wee KheeDesigning Impactful Services and User Experience - Lim Wee Khee
Designing Impactful Services and User Experience - Lim Wee Khee
 
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
 
How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...How the World's Leading Independent Automotive Distributor is Reinventing Its...
How the World's Leading Independent Automotive Distributor is Reinventing Its...
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
 
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
 
Understanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix Goh
 
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeDigital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
 
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
 
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
 
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnSupply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
 
Future of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdfFuture of Learning - Yap Aye Wee.pdf
Future of Learning - Yap Aye Wee.pdf
 
Future of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan MengFuture of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan Meng
 
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Site Reliability Engineer (SRE), We Keep The Lights On 24/7Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
 
Product Management in The Trenches for a Cloud Service
Product Management in The Trenches for a Cloud ServiceProduct Management in The Trenches for a Cloud Service
Product Management in The Trenches for a Cloud Service
 
Overview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and FoundationsOverview of Data and Analytics Essentials and Foundations
Overview of Data and Analytics Essentials and Foundations
 
Predictive Analytics
Predictive AnalyticsPredictive Analytics
Predictive Analytics
 
Feature Engineering for IoT
Feature Engineering for IoTFeature Engineering for IoT
Feature Engineering for IoT
 
Master of Technology in Software Engineering
Master of Technology in Software EngineeringMaster of Technology in Software Engineering
Master of Technology in Software Engineering
 
Master of Technology in Enterprise Business Analytics
Master of Technology in Enterprise Business AnalyticsMaster of Technology in Enterprise Business Analytics
Master of Technology in Enterprise Business Analytics
 
Diagnosing Complex Problems Using System Archetypes
Diagnosing Complex Problems Using System ArchetypesDiagnosing Complex Problems Using System Archetypes
Diagnosing Complex Problems Using System Archetypes
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

5G and IoT Security

  • 1. 5G and IoT Security Nicholas Ho, NUS-ISS Ng Kok Leong, NUS-ISS 11 August 2020 #ISSLearningFest
  • 2. Agenda • Introduction to IoT & 5G – Dr Nicholas Ho • 5G and IoT Security – Ng Kok Leong #ISSLearningFest
  • 3. Introduction to IoT & 5G Nicholas Ho, NUS ISS 11 August 2020 #ISSLearningFest
  • 4. About Nicholas Ho • nicholas.ho@nus.edu.sg • Lecturer at NUS ISS; Courses covered include: Envisioning Smart Urban IoT Solutions Humanizing Smart Systems Autonomous Robots and Vehicles • BEng and PhD degree from School of Mechanical Engineering, NUS • Specialized in architecture, design & development Internet-of-Things (IoT) & Cyber-Physical System (CPS) Augmented/Virtual Reality Artificial Intelligence #ISSLearningFest
  • 5. Contents • What is IoT? • Possible IoT Involvement in Autonomous Systems? • Introduction to 5G • 5G Involvement in the IoT Realm #ISSLearningFest
  • 6. What is IoT? This section will enable you to briefly understand what IoT is and its applications #ISSLearningFest
  • 7. Introducing Internet-of-Things (IoT) What is IoT? Internet connects all people, so it is called “the Internet of People” IoT connects all things, so it is called “the Internet of Things” Remember the key elements of IoT: 1. Connect devices 2. Process (i.e. data collection, analysis and management) 3. Act #ISSLearningFest
  • 8. IoT Example 1: Tado° Smart Thermostat #ISSLearningFest Source: https://www.youtube.com/ watch?v=lYUmnxndHg4
  • 9. IoT Example 1: Tado° Smart Thermostat #ISSLearningFest • Full features • Full controls • More potential usability issues • Little features • Limited controls • Less potential usability issues
  • 10. IoT Example 2: Berg Cloud Wash #ISSLearningFest Source: https://vimeo.com/87522764 Mechanical Washing Machine Panel Cloud- connected Washing Machine Panel School of thought: What major problem could IoT possibly solve?
  • 11. Opportunities in the IoT Realm #ISSLearningFest
  • 12. Possible IoT Involvement in Autonomous Systems? This section will explain how IoT can be involved within autonomous robots and within autonomous vehicles in the far future #ISSLearningFest
  • 13. IoT Application Example in Autonomous Robots #ISSLearningFest Source: https://www.youtube.com/ watch?v=Mog3UgQvHIo Is IoT crucial in the autonomous movement here? In which areas IoT is crucial within this autonomous security robot?
  • 14. Current Autonomous Vehicle (AV) System #ISSLearningFest Source: https://www.youtube.com/ watch?v=x4jg4E7LrZE Is IoT crucial in the autonomous driving here?
  • 15. IoT can Help Shape the AV Industry #ISSLearningFest Interaction model for IoT-based ecosystem for an autonomous vehicle
  • 16. IoT can Help Shape the AV Industry (Cont) #ISSLearningFest Is the current technology good enough that we can implement this concept? Why or Why Not? What's the solution to this problem?
  • 17. Introduction to 5G This section will enable you to briefly understand what 5G is and its applications #ISSLearningFest
  • 18. What is 5G? #ISSLearningFest 5G uses radio waves or radio frequency (RF) energy to transmit and receive voice and data connecting our communities 5G = 5th generation of mobile networks, an advanced version of the 4G LTE networks Designed to meet the very large growth in data and connectivity of today’s modern society, IoT with billions of connected devices, and tomorrow’s innovations 5G will initially operate in conjunction with existing 4G networks before evolving to fully standalone networks in subsequent releases and coverage expansions
  • 19. Summarized Advantages of 5G 1. High bandwidth (how big is the “data door”? Affects the data speed) • At least 1GB/s 2. Low latency (how fast can the data move from one source to another?) • Can be as low as 1 ms response time 3. Dense connections (how many devices can be connected at the same time?) • Can connect up to 100 times more than 4G allows • Highly supports mass IoT adoption #ISSLearningFest
  • 20. 5G vs 4G vs 3G #ISSLearningFest
  • 21. Some of the Technologies that Made 5G Possible #ISSLearningFest Millimeter Waves (spectrum above 6 GHz) Small Cell Networks (Limited range per small cell [aka mini base station]: 10 meters to a few hundred meters)
  • 22. Applications of 5G #ISSLearningFest 5G will provide the speed, low latency and connectivity to enable a new generation of applications, services and business opportunities that have not been seen before
  • 23. 5G Involvement in the IoT Realm This section will explain how 5G can be involved within the IoT World in future #ISSLearningFest
  • 24. 5G Supporting a Smart City #ISSLearningFest Source: https://www.sageautomation.com /blog/what-will-5g-mean-for- smart-city-transport-infrastructure
  • 25. 5G Supporting Urban Farming IoT #ISSLearningFest https://www.channelnewsasia.com/news/singapore/covid10-singapore-food- security-farming-innovation-12649468 5G could also play an important role to sustain and ensure feasibility of Urban Farming operations in SG
  • 26. 5G Supporting VR/AR Systems #ISSLearningFest https://www.hollywoodreporter.com/behind-screen/fifa- world-cup-bbc-testing-live-vr-hdr-streaming-1115756 https://cnalifestyle.channelnewsasia.com/travel/ virtual-reality-travel-12601122
  • 27. SUMMARY - Key Element of 5G & IoT • While the internet connects all people, IoT connects all things • Key elements of IoT: Connect, Process, Act • AVs are unable to fully rely on the current LTE networks for driving purposes because of its insufficient levels of real-time capability and robustness of connectivity. Hence, the need for 5G • 5G is an advanced version of the 4G LTE networks; known as the 5th generation of mobile networks • Main advantages of 5G include: (a) High bandwidth (b) Low latency, and (c) Dense connections • 5G plays a very crucial role, especially for IoT applications within the communities and businesses/industries in the future #ISSLearningFest
  • 28. 5G and IoT Security Ng Kok Leong, NUS-ISS 11 August 2020 #ISSLearningFest
  • 29. About Ng Kok Leong • kokleong@nus.edu.sg • Lecturer at NUS ISS; Courses covered include: Information Systems Security (ISC2 CISSP) Cloud Security (ISC2 CCSP) Systems Security (ISC2 SSCP) Security Architecture IoT Security • Master degree in Computer Science & Information Systems, NUS • Master degree in Business Administration, University of Melbourne #ISSLearningFest
  • 30. Community effort to establish a secure 5G/IoT ecosystem #ISSLearningFest
  • 31. 2017: 80% of IoT apps left unsecured #ISSLearningFestSource: www.iottechnews.com
  • 32. 2020: 83% of IoT transaction are not secure #ISSLearningFestSurce: www.zscaler.com
  • 33. Security by design – what happen? #ISSLearningFestImage: www.uscybersecurity.net
  • 34. Now, add autonomous systems & 5G #ISSLearningFest Image: www.cpomagazine.com Increase insecurity ! Solution?
  • 35. IoT ecosystem #ISSLearningFest Cloud Service Providers (AWS, Azure) IoT IoT / Gateway Short range (BLE, ZigBee, 5G) Long range (NB-IoT, Sigfox, 4G/5G) Devices Network Applications
  • 36. 5G Security Standards - Examples • Inherited protection since 3G • Mutual authentication between device and network • Integrity protection of signaling • Incorporate IPsec, EAP, TLS • Network slicing #ISSLearningFest
  • 37. 5G Security Issue – Deployment Model #ISSLearningFest Non-Standalone (NSA) deployment Standalone (SA) deployment Image: gsma.com
  • 38. 5G Security Issue - Standards #ISSLearningFestImage: ericsson.com
  • 39. 5G Security Issue – More Software #ISSLearningFest Image: infocus.delltechnologies.com • 5G network utilizes NFV and SDN. Going software will increase attack surface at telecom backend. • Telecom operator will have to ensure setup and operation are secured.
  • 40. CVE registered vulnerability trend, Oct 2019 #ISSLearningFest Image: https://portswigger.net Software Challenges • Many high profile compromises, local and abroad, can trace the root causes to inadequate practices of security controls. • To address a software backend, 5G telecom operator has allocate adequate resources to gain assurance in cyber security.
  • 41. IoT Network – short range & long range #ISSLearningFestImage: www.embien.com Protocol standard creators design security into zigbee protocol, sigfox protocol etc.
  • 42. Network equipment #ISSLearningFest Equipment product builders develop security into ZigBee equipment, Sigfox equipment, 5G equipment etc Image: www.elprocus.com http://v14.thingsboard.io
  • 43. Expect vulnerability • Vulnerability from design flaw and implementation flaw. • Known and unknown vulnerability. #ISSLearningFest • On defense side, • Discover and mitigate vulnerability • Build in multiple layers of defense, e.g. Vulnerability != compromise Preventive => Detective => Corrective
  • 44. IoT ecosystem #ISSLearningFest Cloud Service Providers (AWS, Azure) IoT IoT / Gateway Short range (BLE, ZigBee, 5G) Long range (NB-IoT, Sigfox, 4G/5G) Devices Network Applications
  • 45. AWS Cloud: MQTT over TLS #ISSLearningFestYoutube.com “Connecting Digi XBee3 Cellular to AWS IoT with MQTT”
  • 46. Azure Cloud: CoAP over DTLS #ISSLearningFestImage: https://blog.cloudflare.com
  • 47. OSCORE: application layer protection #ISSLearningFestImage: https://www.u-blox.com OSCORE protects the application layer request/response message between the endpoints.
  • 48. IoT ecosystem #ISSLearningFest Cloud Service Providers (AWS, Azure) IoT IoT / Gateway Short range (BLE, ZigBee, 5G) Long range (NB-IoT, Sigfox, 4G/5G) Devices Network Applications
  • 49. IoT device #ISSLearningFest Image: https://mitechnews.com IoT product builders develop security into IoT device
  • 51. IoT device #ISSLearningFest Researcher & Security Specialist Image: accdocket.com Who discover new vulnerability and attack vector?
  • 52. Autonomous System security issues #ISSLearningFest Eykholt et al. (2018). Physical Adversarial Examples for Object Detectors. Examples, • Use physical adversarial patch to cause failure to see stop sign (refer image on left). • Fake sensor information to confuse neighboring vehicle.
  • 53. IMDA IoT Cyber Security Guidelines #ISSLearningFest Examples of clauses, 1) Secure remote management of devices including support software / firmware updates using cryptographically secure methods. 2) Employ proper key management (generation, exchange, storage, use, destruction, replacement, etc) techniques 3) Establish hardware root of trust. 4) Employ anti-tamper mechanisms for resistance, evidence, detection, and / or response.
  • 54. Constrained Devices #ISSLearningFestImage: www.cisoplatform.com Security features commonly found in gateways and smart devices cannot to be assumed to be available in constrained devices.
  • 55. Secure firmware update #ISSLearningFest Image: www.slideshare.net/ARMHoldings/
  • 56. Trustzone Technology #ISSLearningFestSource: K5_Addressing_IoT_and_Embedded_Security_at_the_Chip_Level_Roni.pdf Arm Trustzone technology provides a cost-effective methodology to isolate security critical components in a system, by hardware separating a rich OS, from a much smaller secure OS
  • 58. Trustzone Technology Example: Netflix #ISSLearningFestImage: http://itersnews.com/?p=44991
  • 59. Trustzone Technology Example: Samsung Pay #ISSLearningFest
  • 60. “secure” chip for autonomous system #ISSLearningFestSource: ARM “how to make autonomous vehicle a reality with Arm”
  • 62. ARM Processor Architecture: M series Processor Usage Trustzone Tamper Resistance Cortex-M0 Smallest Arm processor available Cortex-M0+ Smallest footprint & lowest power requirements of Cortex-M processors Cortex-M1 Optimised for FPGA design Cortex-M3 Exceptional 32-bit performance with low power consumption Cortex-M4 Control and performance for mixed signal devices Cortex-M7 Highest performance Cortex-M processor Cortex-M23 Smallest and lowest power microcontroller with TrustZone security √ Cortex-M33 Ideal blend of real-time determinism, efficiency and security √ Cortex-M35P The first Armv8-M processor with tamper resistance built in √ √ Cortex-M55 Arm’s most AI-capable Cortex-M processor √ #ISSLearningFest
  • 63. Chip with Trustzone for constrained IoT #ISSLearningFestSource: https://www.nuvoton.com/products/microcontrollers/arm-cortex-m23-mcus/ Micro chip for IoT with TRUSTZONE feature has became available; which provides Root of Trust. Hence, facilitating secure firmware update.
  • 64. IMDA IoT Cyber Security Guidelines #ISSLearningFest Examples of clauses, 1) Secure remote management of devices including support software / firmware updates using cryptographically secure methods. 2) Employ proper key management (generation, exchange, storage, use, destruction, replacement, etc) techniques 3) Establish hardware root of trust. 4) Employ anti-tamper mechanisms for resistance, evidence, detection, and / or response. √ √
  • 65. Hardware Root of Trust #ISSLearningFest Image: www.semanticscholar.org
  • 66. Hardware Root of Trust #ISSLearningFest Image: www.synopsys.com
  • 67. ARM Processor Architecture: M35P #ISSLearningFest Source: https://www.zdnet.com/article/arm-launches- cortex-m35p-processor-to-bring-security-to-silicon/
  • 68. Chip with Trustzone for constrained IoT, since 2018 #ISSLearningFest Source: https://community.arm.com/developer/ip-products/processors/trustzone-for-armv8- m/b/blog/posts/microchip-release-first-arm-cortex-m23-based-chip- SAML11 has trustzone and crypto accelerators (AES, SHA), secure boot and secure key storage with added chip-level tamper detection capabilities, to establish a hardware root of trust and secure bootloader for secure firmware upgrades.
  • 69. IMDA IoT Cyber Security Guidelines #ISSLearningFest Examples of clauses, 1) Secure remote management of devices including support software / firmware updates using cryptographically secure methods. 2) Employ proper key management (generation, exchange, storage, use, destruction, replacement, etc) techniques 3) Establish hardware root of trust. 4) Employ anti-tamper mechanisms for resistance, evidence, detection, and / or response. √ √ √ ?
  • 70. FIPS 140-2 certification levels (IoT) • Security level 1 • Physical security cryptographic module has at least one approved security function or approved algorithm. • Security level 2 • Capability to illustrate evidence of tampering. • Security level 3 • Capability to detect access attempts and responding • Security level 4 • Capability to trigger immediate zeroization of all plaintext critical security parameters. #ISSLearningFest
  • 71. FIPS 140-2 certification levels (Cloud) #ISSLearningFest https://aws.amazon.com/cloudhsm/ https://azure.microsoft.com/en-us/services/azure-dedicated-hsm/ To put in perspective, the Hardware Secure Module used in cloud is at level 3.
  • 72. IMDA IoT Cyber Security Guidelines #ISSLearningFest Examples of clauses, 1) Secure remote management of devices including support software / firmware updates using cryptographically secure methods. 2) Employ proper key management (generation, exchange, storage, use, destruction, replacement, etc) techniques 3) Establish hardware root of trust. 4) Employ anti-tamper mechanisms for resistance, evidence, detection, and / or response. √ √ √ ?
  • 73. IoT product builder • Do they have the tools to build, Secure firmware update? Secure key management? Hardware root of trust? Detect tamper at chip level (FIPS 140-2 level 2)? What % of IoT devices in the market are “secured by design”? #ISSLearningFest
  • 74. 5G & IoT security, where are the weak links? #ISSLearningFest
  • 75. System owner: Define End-to-End security #ISSLearningFestImage: www.gadgeon.com
  • 76. System owner: Where are the trust boundaries? #ISSLearningFestImage: www.engineering.com
  • 77. Security goes beyond technology #ISSLearningFest Image: www.complianceforge.com Security professional Operation Audit Who ensure cyber security is being addressed holistically when deployed to enterprise?
  • 78. Community effort to establish a secure 5G/IoT ecosystem #ISSLearningFestEnd-to-end security Security professional, Operation, Audit Protocol standard creator, Equipment product developer IoT product developer Application / Cloud Service Provider (shared responsibility model)
  • 80. Give Us Your Feedback #ISSLearningFest Day 1 Programme Festival Experience