So what is 5G?

Issue 1 2020 Infrastructure

Wikipedia describes 5G as “the fifth generation wireless technology for digital cellular networks that began wide deployment in 2019. As with previous standards, the covered areas are divided into regions called ‘cells’, serviced by individual antennas. … The frequency spectrum of 5G is divided into millimetre waves, mid-band and low-band. Low-band uses a similar frequency range as the predecessor, 4G.”

Hi-Tech Security Solutions asked Nokia’s Deon Geyser for more on this new technology that has created enormous expectations.

What is 5G and why is it getting so much attention?

5G transformation is much more than a radio network upgrade challenge. While 5G New Radio is clearly important to the network buildout, 5G requires a much more comprehensive approach. 5G involves E2E technology (radio, core, cloud, high bandwidth and programmable transport, management, automation, BSS, security, and more), business and people capabilities. Nokia as the industry leader can help on all these fronts, so that operators deliver the extraordinary potential of 5G to their customers and their stakeholders.

5G will change the game for everyone. It will transform business models and create new revenue streams for enterprises. It will revolutionise the way consumers interact with the world around them and create opportunities for mobile operators to deliver extraordinary experiences.

There are several use cases for 5G, ranging from video surveillance and analytics, machine remote control, assisted and autonomous vehicles, and cloud robotics and process automation to name a few.

There is talk of health risks associated with 5G, are these valid?

For Nokia, product safety is a key consideration. All Nokia products, including 5G, comply with established international exposure standards and regulations. Those exposure limits are based on extensive reviews of research publications covering the radio spectrum used for 5G.

What benefits will we see from a 5G rollout? What challenges will there be?

5G technology has enormous potential to transform the way people live and work as well as transform multiple sectors. 5G will provide ultra-high bandwidth and low-latency services, as well as new applications in areas such as virtual reality, augmented reality and artificial intelligence. Energy, healthcare, education, transport, and entertainment sectors will benefit from various IoT use cases enabled by 5G. These use cases will enhance operational efficiencies and user experiences.

Africa is as capable of embracing the huge potential of this technology as the rest of the world, even within the limitations of existing infrastructure and complex connectivity challenges. Industries have adopted 2G, 3G and 4G in incremental steps as these technologies have evolved within the constraints of legacy technologies and capabilities. Now, 5G is introducing an opportunity for the industry to embrace growth and innovation. But only if it is done with a clear focus on what 5G can realistically deliver and a clear eye on the future.

As far as challenges are concerned, to capitalise on 5G, the industry has to re-architecture the networks because new services will not only be about high bandwidth but also about low latency. The future is about ensuring that systems and solutions are ‘always on’ and intelligent, providing industry verticals with the ability to fully recognise the capabilities of automation.

It has become clear that great 5G runs on top of great 4G. In non-standalone architectures, the 5G control information goes through the LTE eNodeBs and the throughput can tap the resources of 5G and 4G through dual connectivity. This means that if you have the best performing 4G network, you are already ahead of the game in 5G.

What about the security of 5G?

The challenging nature of 5G networks to support unique and diverse business requirements of various sectors has rendered current network security less than adequate. In 5G networks, reliability does not only refer to the network infrastructure but also to ensuring high connectivity, infinite capacity and coverage (and other promised 5G features) anytime and anywhere. This implies a security makeover of how confidentiality, integrity, and availability will be maintained and managed in 5G networks. Furthermore, the complexity of securing a network has increased due to the introduction of SDN and NFV in 5G networks.

Nokia’s end-to-end security solutions help mitigate these security risks in a three-step process. We collaborate with 3GPP and other specification bodies to influence the security requirements, which are then implemented into all our products by our DFSEC (Design For Security Process).

Lastly, we have a wide range of network security solutions and services that help operators to automate and orchestrate the security requirements by consolidating network security requirements into a single operations view via our SOAR (security, orchestration, analytics, and response) approach. It leverages our best-in-class global threat intelligence repository and automated workflow management to help CISOs and CIOs develop end-to-end visibility and control of their security operations which will become far more critical as the adoption of 5G accelerates.

Will the security market (intrusion monitoring, surveillance, etc.) benefit from 5G communications?

Yes, it will. For example, wireless video surveillance is a cost-effective way to enhance safety and security in industrial sites, campuses and public spaces. It’s also increasingly popular.

Wireless broadband makes it possible to mount cameras on drones and land-based vehicles, or in places that are difficult to reach with fixed cables. These cameras can provide footage that enhances situational awareness and decision making for a variety of industries. For example, drone-mounted cameras can help first responders address fires or natural disasters more effectively. They can enable terminal operators to inspect container ships before they reach the port. Or allow wind farm operators to detect problems before they cause costly turbine outages.

The addition of video analytics creates more valuable applications. In factory environments, video analytics can enhance quality, security and efficiency by enabling automatic fault detection, intrusion detection and control of robots.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Understanding shared responsibility
Infrastructure
Data management is increasingly coming under the governance spotlight, yet a significant vulnerability often goes unnoticed. Many businesses operating on Microsoft 365 assume their data is comprehensively backed up.

Read more...
Direct-to-cloud surveillance platform
Surveillance Infrastructure
Oncam has announced a forthcoming end-to-end, direct-to-cloud video platform that combines AI-enabled cameras, intelligent IoT devices, and cloud-integrated video management software to deliver smarter performance with reduced complexity.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.