SlideShare a Scribd company logo
1 of 3
Download to read offline
C&T RF Antennas Inc
www.ctrfantennas.com rfproducts1@ctrfantennas.com
Please Contact us for more information, thank you.
 Jasmine Lu (86)17322110281
Four key points for smart city public WiFi security
Wi-Fi is the largest attack surface and the most vulnerable attack surface of smart cities. Wi-Fi
access and metro Wi-Fi networks are key assets for smart cities.
Wi-Fi access and metro Wi-Fi networks are key assets for smart cities.
However, the availability of public Wi-Fi networks comes at a price, because public Wi-Fi
networks are vulnerable to cyber-attacks. Cybersecurity company Norton sees free public Wi-Fi
as "a playground for hackers to steal personal information." Free Wi-Fi, whether provided by
Starbucks or City Hall, is the target of hackers.
Only the combination of strong encryption and security hardening practices can significantly
improve the security of citizens and tourists using public Wi-Fi networks.
Ted Wagner, vice president, and chief information security officer of SAP NS2, an SAP
cybersecurity subsidiary, states that as long as encryption is applied, even with weak encryption,
hackers will need to spend some resources to crack. Often times, it's bad implementation and
configuration that puts the city in trouble.
The government-enterprise partnership also helps cities use the power and expertise of
technology companies to help cities solve difficult technical problems and reduce operating and
maintenance costs.
Strong encryption is the starting point for a secure public Wi-Fi
With the spread of public Wi-Fi, more secure encryption methods have gradually attracted
people's attention. The Wireless Encryption Protocol (WEP), one of the earliest encryption
schemes to protect wireless networks, has proven to be insufficient to stop attackers. Wi-Fi
Protected Access (WPA) was designed to replace WEP, but hackers still found the loophole.
The current standard is WPA2, which utilizes the Advanced Encryption Standard (AES) in
combination with 802.11i.
This standard manages the encryption architecture together with the RADIUS server because the
RADIUS server uses a central database to verify the identity of remote users and is a stronger
C&T RF Antennas Inc
www.ctrfantennas.com rfproducts1@ctrfantennas.com
Please Contact us for more information, thank you.
 Jasmine Lu (86)17322110281
certificate distribution method than wireless access point distribution.
CIOs of smart cities also need to pay due diligence and double checks on their own systems to
ensure city Wi-Fi security.
I don't even trust myself in terms of security controls. I will introduce a third party to check.
Therefore, due diligence is important.
Wilfred Pinfold is the chair of the American Computer Society (ACM) Smart Cities Emerging
Interest Group and the CEO of Urban Systems. He said that urban Wi-Fi is easy to be hacked,
probably because the default password of the device has not been changed, or low-level errors
such as security updates and patches have not been installed.
There are many security blunders caused by things being left behind. There must be certain
procedures for setting up the infrastructure, and care must be taken. Any device on the network
should be treated this way.
Smashing the "rogue hotspots" in smart cities
Adding a forced authentication portal can help users distinguish whether they are visiting a city's
public Wi-Fi network or a normal website login page when they access a Wi-Fi network. For
example, Kansas City's public Wi-Fi system login page has both the city's logo and the city's
network partner Sprint's logo. According to Bob Bennett, former chief innovation officer at
Kansas City and director of the Cities Today Institute, users will know they are connected to the
correct network, not a malicious network.
However, Wagner believes that these pages are easy to clone and that hackers can insert code
into the website itself. A more effective measure is to include a more pure authentication process
on both ends.
802.1x adds an additional layer of user authentication security and establishes a tunnel between
the user and the access point. The above authentication can be achieved through 802.1x. PKI
certificates provide fully automated secure connections and can also be used by smart cities.
According to Pinfold, this is the most common public encryption mechanism. In this system,
X.509 PKI certificates uniquely identify end-users and devices.
Pinfold states that these encryption technologies "allow us to implement authentication simply
and seamlessly, and we should use them more."
Government-enterprise partnership fights public Wi-Fi security risks
From a talent perspective alone, cities that want to set up and operate their own public Wi-Fi
networks are often at a disadvantage. Many cities are often struggling to compete for top talent,
and it is difficult to secure the right resources and budget to upgrade.
So many cities are working with large tech companies. A study presented at this year's
International Conference on Theoretical and Practical Issues in E-Government Affairs shows that
public-private partnerships are the main business form of implementing and operating public
digital communication networks.
This is not just a matter of saving money; doing so puts the experts in a position responsible for
this cybersecurity, and professional issues are resolved by professionals.
When Kansas City provided public Wi-Fi across 54 blocks in the city center, the city established a
partnership with Sprint, which owns and operates the network. Sprint's security level is obviously
higher than in the public management field. This partnership is also attractive for tech companies
C&T RF Antennas Inc
www.ctrfantennas.com rfproducts1@ctrfantennas.com
Please Contact us for more information, thank you.
 Jasmine Lu (86)17322110281
because participating in Metro Wi-Fi can demonstrate their ability as a socially responsible
business.
5G Potential on Safe City Wi-Fi Networks
The Hotspot 2.0 protocol is an industry-recognized method for seamless Wi-Fi roaming. Although
Wagner considers such methods effective, he also said that the market is moving to 5G. The
latter has become a common topic for everyone at this year's Consumer Electronics Show.
Many people are looking forward to the 5G. 5G may usher in an opportunity to compete with
Wi-Fi.
Existing 5G infrastructures built using Verizon and AT & T are also considered by major cities.
Compared to traditional wireless services, the prospects for 5G are significantly broader.
Bennett said that the state governments in the United States have moved beyond 5G and are
looking to 6G and 7G, especially when cities are building networks and setting up the
infrastructure that can last 30 years.
Why public Wi-Fi is the focus of smart cities
Security risks are not a reason to completely abandon public Wi-Fi. Public Wi-Fi brings many
possibilities to smart cities and helps local economic development. According to the National
Cities Alliance, cities based on digital technology will have lower unemployment and poverty
levels. The average income level and per capita GDP of a city are related to the size of its Internet
industry.
Public Wi-Fi not only drives IoT devices that provide the data needed for better decision making
but is also seen by governments as a way to help cities and regions address infrastructure gaps
and help them respond to natural disasters. Public Wi-Fi networks can provide Internet access for
low-income people, and to some extent alleviate social problems that may be caused by income
inequality.
We don't want to leave a large number of people unable to access the Internet and unable to
take advantage of the technologies and functions brought by the Internet.
Creating public Wi-Fi is not just to allow rich children to upload social media photos in urban
areas, although this is still a trendy thing, but to enable most people without Internet access to
enjoy the Internet conveniently. With public Wi-Fi, kids in every household can stay home and do
their homework. This is a good thing.

More Related Content

What's hot

How three wireless technologies will soon ignite the edge computing revolution
How three wireless technologies will soon ignite the edge computing revolutionHow three wireless technologies will soon ignite the edge computing revolution
How three wireless technologies will soon ignite the edge computing revolutionAbaram Network Solutions
 
20141110_SDBJ interview of Mike
20141110_SDBJ interview of Mike20141110_SDBJ interview of Mike
20141110_SDBJ interview of MikeMichael Mossbarger
 
Middle East IoT Workshop
Middle East IoT WorkshopMiddle East IoT Workshop
Middle East IoT WorkshopHaider Iqbal
 
D link industrial ethernet infographic - outdoor wireless
D link industrial ethernet infographic - outdoor wirelessD link industrial ethernet infographic - outdoor wireless
D link industrial ethernet infographic - outdoor wirelessGerald Schouten
 
How telecom industry realte with IoT as a new area of business- TDC a case study
How telecom industry realte with IoT as a new area of business- TDC a case studyHow telecom industry realte with IoT as a new area of business- TDC a case study
How telecom industry realte with IoT as a new area of business- TDC a case studyMd. Kamrul Islam
 
Building trust in IoT, by Gemalto
Building trust in IoT, by GemaltoBuilding trust in IoT, by Gemalto
Building trust in IoT, by GemaltoHaider Iqbal
 
10 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 201810 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 2018Axis Communications
 
Presentatie kpn jasper snijder - lo ra alliance english pdf
Presentatie kpn   jasper snijder - lo ra alliance english pdfPresentatie kpn   jasper snijder - lo ra alliance english pdf
Presentatie kpn jasper snijder - lo ra alliance english pdfKPN IoT
 
Blockchain convergence wih 5 g and iot
Blockchain convergence wih 5 g and iotBlockchain convergence wih 5 g and iot
Blockchain convergence wih 5 g and iotClint Smith
 
Introduction to IoT by Sachin Pukale
Introduction to IoT by Sachin PukaleIntroduction to IoT by Sachin Pukale
Introduction to IoT by Sachin PukaleTechXpla
 
Nucleus vision onepager
Nucleus vision onepagerNucleus vision onepager
Nucleus vision onepagerDeepika Jha
 
Fog and the City: an urbanist's perspective
Fog and the City: an urbanist's perspectiveFog and the City: an urbanist's perspective
Fog and the City: an urbanist's perspectiveRoberto Reale
 
City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCisco Security
 
The Digital Telecom. Security Services
The Digital Telecom. Security ServicesThe Digital Telecom. Security Services
The Digital Telecom. Security ServicesParviz Iskhakov, PhD
 
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012
Supelec  M2M IoT course 1 - introduction - Part 1/2 - 2012Supelec  M2M IoT course 1 - introduction - Part 1/2 - 2012
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012Thierry Lestable
 

What's hot (20)

How three wireless technologies will soon ignite the edge computing revolution
How three wireless technologies will soon ignite the edge computing revolutionHow three wireless technologies will soon ignite the edge computing revolution
How three wireless technologies will soon ignite the edge computing revolution
 
IoT Trends
IoT Trends IoT Trends
IoT Trends
 
20141110_SDBJ interview of Mike
20141110_SDBJ interview of Mike20141110_SDBJ interview of Mike
20141110_SDBJ interview of Mike
 
Middle East IoT Workshop
Middle East IoT WorkshopMiddle East IoT Workshop
Middle East IoT Workshop
 
D link industrial ethernet infographic - outdoor wireless
D link industrial ethernet infographic - outdoor wirelessD link industrial ethernet infographic - outdoor wireless
D link industrial ethernet infographic - outdoor wireless
 
How telecom industry realte with IoT as a new area of business- TDC a case study
How telecom industry realte with IoT as a new area of business- TDC a case studyHow telecom industry realte with IoT as a new area of business- TDC a case study
How telecom industry realte with IoT as a new area of business- TDC a case study
 
Building trust in IoT, by Gemalto
Building trust in IoT, by GemaltoBuilding trust in IoT, by Gemalto
Building trust in IoT, by Gemalto
 
Big data telecom
Big data telecomBig data telecom
Big data telecom
 
10 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 201810 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 2018
 
Presentatie kpn jasper snijder - lo ra alliance english pdf
Presentatie kpn   jasper snijder - lo ra alliance english pdfPresentatie kpn   jasper snijder - lo ra alliance english pdf
Presentatie kpn jasper snijder - lo ra alliance english pdf
 
Blockchain convergence wih 5 g and iot
Blockchain convergence wih 5 g and iotBlockchain convergence wih 5 g and iot
Blockchain convergence wih 5 g and iot
 
Introduction to IoT by Sachin Pukale
Introduction to IoT by Sachin PukaleIntroduction to IoT by Sachin Pukale
Introduction to IoT by Sachin Pukale
 
Nucleus vision onepager
Nucleus vision onepagerNucleus vision onepager
Nucleus vision onepager
 
ICC icXchange Community Wireless Mobility
ICC icXchange Community Wireless MobilityICC icXchange Community Wireless Mobility
ICC icXchange Community Wireless Mobility
 
Fog and the City: an urbanist's perspective
Fog and the City: an urbanist's perspectiveFog and the City: an urbanist's perspective
Fog and the City: an urbanist's perspective
 
Internet of Things
Internet of Things Internet of Things
Internet of Things
 
Telecom industry trends for 2021
Telecom industry trends for 2021Telecom industry trends for 2021
Telecom industry trends for 2021
 
City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
 
The Digital Telecom. Security Services
The Digital Telecom. Security ServicesThe Digital Telecom. Security Services
The Digital Telecom. Security Services
 
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012
Supelec  M2M IoT course 1 - introduction - Part 1/2 - 2012Supelec  M2M IoT course 1 - introduction - Part 1/2 - 2012
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012
 

Similar to Four key points for smart city public wifi security -- C&T RF Antennas Inc

SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdfSecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdfSecurity Gen
 
A tale of 3 smart cities
A tale of 3 smart citiesA tale of 3 smart cities
A tale of 3 smart citiesChris Wick
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTMd.Imtiaz Ahmed
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.Pooja G N
 
Towerstream 4 gwe presentation final (1)
Towerstream 4 gwe presentation final (1)Towerstream 4 gwe presentation final (1)
Towerstream 4 gwe presentation final (1)Carl Ford
 
DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020Neil McDonnell
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017Ahmed Banafa
 
The Fascinating Story Of The Rise of IoT in smart cities 2023 | CIO Women Mag...
The Fascinating Story Of The Rise of IoT in smart cities 2023 | CIO Women Mag...The Fascinating Story Of The Rise of IoT in smart cities 2023 | CIO Women Mag...
The Fascinating Story Of The Rise of IoT in smart cities 2023 | CIO Women Mag...CIOWomenMagazine
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 

Similar to Four key points for smart city public wifi security -- C&T RF Antennas Inc (19)

What are the 5G network security issues?
What are the 5G network security issues?What are the 5G network security issues?
What are the 5G network security issues?
 
What are the 5G network security issues?
What are the 5G network security issues?What are the 5G network security issues?
What are the 5G network security issues?
 
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdfSecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
 
A tale of 3 smart cities
A tale of 3 smart citiesA tale of 3 smart cities
A tale of 3 smart cities
 
When all else fails
When all else failsWhen all else fails
When all else fails
 
5G_Upload.docx
5G_Upload.docx5G_Upload.docx
5G_Upload.docx
 
Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
IJET-V2I6P24
IJET-V2I6P24IJET-V2I6P24
IJET-V2I6P24
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.
 
Towerstream 4 gwe presentation final (1)
Towerstream 4 gwe presentation final (1)Towerstream 4 gwe presentation final (1)
Towerstream 4 gwe presentation final (1)
 
DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017
 
PVT Cisco Case Study
PVT Cisco Case StudyPVT Cisco Case Study
PVT Cisco Case Study
 
The Fascinating Story Of The Rise of IoT in smart cities 2023 | CIO Women Mag...
The Fascinating Story Of The Rise of IoT in smart cities 2023 | CIO Women Mag...The Fascinating Story Of The Rise of IoT in smart cities 2023 | CIO Women Mag...
The Fascinating Story Of The Rise of IoT in smart cities 2023 | CIO Women Mag...
 
Top 14 IoT Trends to Emerge in 2023.pdf
Top 14 IoT Trends to Emerge in 2023.pdfTop 14 IoT Trends to Emerge in 2023.pdf
Top 14 IoT Trends to Emerge in 2023.pdf
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 

More from Antenna Manufacturer Coco

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
What are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdfWhat are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdfAntenna Manufacturer Coco
 
Comparison of GSM and NB-IoT Coverage Capability.pdf
Comparison of GSM and NB-IoT Coverage Capability.pdfComparison of GSM and NB-IoT Coverage Capability.pdf
Comparison of GSM and NB-IoT Coverage Capability.pdfAntenna Manufacturer Coco
 
What Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdfWhat Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdfAntenna Manufacturer Coco
 
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdfLoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdfAntenna Manufacturer Coco
 
Yagi Antenna Design and 433MHz Antenna Design Example.pdf
Yagi Antenna Design and 433MHz Antenna Design Example.pdfYagi Antenna Design and 433MHz Antenna Design Example.pdf
Yagi Antenna Design and 433MHz Antenna Design Example.pdfAntenna Manufacturer Coco
 
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
55 Different Types of Antennas With Examples Used in Wireless Communication.pdfAntenna Manufacturer Coco
 
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdfWiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdfAntenna Manufacturer Coco
 
Mobile networks’ evolution from 1G to 5G.pdf
Mobile networks’ evolution from 1G to 5G.pdfMobile networks’ evolution from 1G to 5G.pdf
Mobile networks’ evolution from 1G to 5G.pdfAntenna Manufacturer Coco
 
What is the Difference Between LTE and Wifi.pdf
What is the Difference Between LTE and Wifi.pdfWhat is the Difference Between LTE and Wifi.pdf
What is the Difference Between LTE and Wifi.pdfAntenna Manufacturer Coco
 
Comparison of 7 Common Positioning Technologies.pdf
Comparison of 7 Common Positioning Technologies.pdfComparison of 7 Common Positioning Technologies.pdf
Comparison of 7 Common Positioning Technologies.pdfAntenna Manufacturer Coco
 
Which 4 Positioning Technologies Are Commonly Used.pdf
Which 4 Positioning Technologies Are Commonly Used.pdfWhich 4 Positioning Technologies Are Commonly Used.pdf
Which 4 Positioning Technologies Are Commonly Used.pdfAntenna Manufacturer Coco
 

More from Antenna Manufacturer Coco (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
What are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdfWhat are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdf
 
Comparison of GSM and NB-IoT Coverage Capability.pdf
Comparison of GSM and NB-IoT Coverage Capability.pdfComparison of GSM and NB-IoT Coverage Capability.pdf
Comparison of GSM and NB-IoT Coverage Capability.pdf
 
What Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdfWhat Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdf
 
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdfLoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
 
What is A Private 5G Network.pdf
What is A Private 5G Network.pdfWhat is A Private 5G Network.pdf
What is A Private 5G Network.pdf
 
What is LPWAN.pdf
What is LPWAN.pdfWhat is LPWAN.pdf
What is LPWAN.pdf
 
What is 5G LAN How Does It Work.pdf
What is 5G LAN How Does It Work.pdfWhat is 5G LAN How Does It Work.pdf
What is 5G LAN How Does It Work.pdf
 
Internal Antenna VS. External Antenna.pdf
Internal Antenna VS. External Antenna.pdfInternal Antenna VS. External Antenna.pdf
Internal Antenna VS. External Antenna.pdf
 
Yagi Antenna Design and 433MHz Antenna Design Example.pdf
Yagi Antenna Design and 433MHz Antenna Design Example.pdfYagi Antenna Design and 433MHz Antenna Design Example.pdf
Yagi Antenna Design and 433MHz Antenna Design Example.pdf
 
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
 
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdfWiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
 
Mobile networks’ evolution from 1G to 5G.pdf
Mobile networks’ evolution from 1G to 5G.pdfMobile networks’ evolution from 1G to 5G.pdf
Mobile networks’ evolution from 1G to 5G.pdf
 
What is DTU.pdf
What is DTU.pdfWhat is DTU.pdf
What is DTU.pdf
 
What is a DTU and What Does it Do.pdf
What is a DTU and What Does it Do.pdfWhat is a DTU and What Does it Do.pdf
What is a DTU and What Does it Do.pdf
 
New Technology in Farming Applications.pdf
New Technology in Farming Applications.pdfNew Technology in Farming Applications.pdf
New Technology in Farming Applications.pdf
 
What is the Difference Between LTE and Wifi.pdf
What is the Difference Between LTE and Wifi.pdfWhat is the Difference Between LTE and Wifi.pdf
What is the Difference Between LTE and Wifi.pdf
 
Wifi vs LTE Technology.pdf
Wifi vs LTE Technology.pdfWifi vs LTE Technology.pdf
Wifi vs LTE Technology.pdf
 
Comparison of 7 Common Positioning Technologies.pdf
Comparison of 7 Common Positioning Technologies.pdfComparison of 7 Common Positioning Technologies.pdf
Comparison of 7 Common Positioning Technologies.pdf
 
Which 4 Positioning Technologies Are Commonly Used.pdf
Which 4 Positioning Technologies Are Commonly Used.pdfWhich 4 Positioning Technologies Are Commonly Used.pdf
Which 4 Positioning Technologies Are Commonly Used.pdf
 

Recently uploaded

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 

Four key points for smart city public wifi security -- C&T RF Antennas Inc

  • 1. C&T RF Antennas Inc www.ctrfantennas.com rfproducts1@ctrfantennas.com Please Contact us for more information, thank you.  Jasmine Lu (86)17322110281 Four key points for smart city public WiFi security Wi-Fi is the largest attack surface and the most vulnerable attack surface of smart cities. Wi-Fi access and metro Wi-Fi networks are key assets for smart cities. Wi-Fi access and metro Wi-Fi networks are key assets for smart cities. However, the availability of public Wi-Fi networks comes at a price, because public Wi-Fi networks are vulnerable to cyber-attacks. Cybersecurity company Norton sees free public Wi-Fi as "a playground for hackers to steal personal information." Free Wi-Fi, whether provided by Starbucks or City Hall, is the target of hackers. Only the combination of strong encryption and security hardening practices can significantly improve the security of citizens and tourists using public Wi-Fi networks. Ted Wagner, vice president, and chief information security officer of SAP NS2, an SAP cybersecurity subsidiary, states that as long as encryption is applied, even with weak encryption, hackers will need to spend some resources to crack. Often times, it's bad implementation and configuration that puts the city in trouble. The government-enterprise partnership also helps cities use the power and expertise of technology companies to help cities solve difficult technical problems and reduce operating and maintenance costs. Strong encryption is the starting point for a secure public Wi-Fi With the spread of public Wi-Fi, more secure encryption methods have gradually attracted people's attention. The Wireless Encryption Protocol (WEP), one of the earliest encryption schemes to protect wireless networks, has proven to be insufficient to stop attackers. Wi-Fi Protected Access (WPA) was designed to replace WEP, but hackers still found the loophole. The current standard is WPA2, which utilizes the Advanced Encryption Standard (AES) in combination with 802.11i. This standard manages the encryption architecture together with the RADIUS server because the RADIUS server uses a central database to verify the identity of remote users and is a stronger
  • 2. C&T RF Antennas Inc www.ctrfantennas.com rfproducts1@ctrfantennas.com Please Contact us for more information, thank you.  Jasmine Lu (86)17322110281 certificate distribution method than wireless access point distribution. CIOs of smart cities also need to pay due diligence and double checks on their own systems to ensure city Wi-Fi security. I don't even trust myself in terms of security controls. I will introduce a third party to check. Therefore, due diligence is important. Wilfred Pinfold is the chair of the American Computer Society (ACM) Smart Cities Emerging Interest Group and the CEO of Urban Systems. He said that urban Wi-Fi is easy to be hacked, probably because the default password of the device has not been changed, or low-level errors such as security updates and patches have not been installed. There are many security blunders caused by things being left behind. There must be certain procedures for setting up the infrastructure, and care must be taken. Any device on the network should be treated this way. Smashing the "rogue hotspots" in smart cities Adding a forced authentication portal can help users distinguish whether they are visiting a city's public Wi-Fi network or a normal website login page when they access a Wi-Fi network. For example, Kansas City's public Wi-Fi system login page has both the city's logo and the city's network partner Sprint's logo. According to Bob Bennett, former chief innovation officer at Kansas City and director of the Cities Today Institute, users will know they are connected to the correct network, not a malicious network. However, Wagner believes that these pages are easy to clone and that hackers can insert code into the website itself. A more effective measure is to include a more pure authentication process on both ends. 802.1x adds an additional layer of user authentication security and establishes a tunnel between the user and the access point. The above authentication can be achieved through 802.1x. PKI certificates provide fully automated secure connections and can also be used by smart cities. According to Pinfold, this is the most common public encryption mechanism. In this system, X.509 PKI certificates uniquely identify end-users and devices. Pinfold states that these encryption technologies "allow us to implement authentication simply and seamlessly, and we should use them more." Government-enterprise partnership fights public Wi-Fi security risks From a talent perspective alone, cities that want to set up and operate their own public Wi-Fi networks are often at a disadvantage. Many cities are often struggling to compete for top talent, and it is difficult to secure the right resources and budget to upgrade. So many cities are working with large tech companies. A study presented at this year's International Conference on Theoretical and Practical Issues in E-Government Affairs shows that public-private partnerships are the main business form of implementing and operating public digital communication networks. This is not just a matter of saving money; doing so puts the experts in a position responsible for this cybersecurity, and professional issues are resolved by professionals. When Kansas City provided public Wi-Fi across 54 blocks in the city center, the city established a partnership with Sprint, which owns and operates the network. Sprint's security level is obviously higher than in the public management field. This partnership is also attractive for tech companies
  • 3. C&T RF Antennas Inc www.ctrfantennas.com rfproducts1@ctrfantennas.com Please Contact us for more information, thank you.  Jasmine Lu (86)17322110281 because participating in Metro Wi-Fi can demonstrate their ability as a socially responsible business. 5G Potential on Safe City Wi-Fi Networks The Hotspot 2.0 protocol is an industry-recognized method for seamless Wi-Fi roaming. Although Wagner considers such methods effective, he also said that the market is moving to 5G. The latter has become a common topic for everyone at this year's Consumer Electronics Show. Many people are looking forward to the 5G. 5G may usher in an opportunity to compete with Wi-Fi. Existing 5G infrastructures built using Verizon and AT & T are also considered by major cities. Compared to traditional wireless services, the prospects for 5G are significantly broader. Bennett said that the state governments in the United States have moved beyond 5G and are looking to 6G and 7G, especially when cities are building networks and setting up the infrastructure that can last 30 years. Why public Wi-Fi is the focus of smart cities Security risks are not a reason to completely abandon public Wi-Fi. Public Wi-Fi brings many possibilities to smart cities and helps local economic development. According to the National Cities Alliance, cities based on digital technology will have lower unemployment and poverty levels. The average income level and per capita GDP of a city are related to the size of its Internet industry. Public Wi-Fi not only drives IoT devices that provide the data needed for better decision making but is also seen by governments as a way to help cities and regions address infrastructure gaps and help them respond to natural disasters. Public Wi-Fi networks can provide Internet access for low-income people, and to some extent alleviate social problems that may be caused by income inequality. We don't want to leave a large number of people unable to access the Internet and unable to take advantage of the technologies and functions brought by the Internet. Creating public Wi-Fi is not just to allow rich children to upload social media photos in urban areas, although this is still a trendy thing, but to enable most people without Internet access to enjoy the Internet conveniently. With public Wi-Fi, kids in every household can stay home and do their homework. This is a good thing.