Читать книгу Intelligent Connectivity - Abdulrahman Yarali - Страница 35
2.2 Cybersecurity Concerns in the 5G World
ОглавлениеBy the time 5G networks and systems arrive in full force, there will be a great deal of consideration with regards to numerous security aspects. The criticality of addressing cybersecurity concerns has been growing over the years, as the impact of such instances eventually became quite widespread. Moreover, there is little awareness of all the risks evident at present, and the likeliness of cyberattacks affecting individuals greatly increases (French and Shim 2016). The 5G technology holds immense potential for realizing many IoT devices and making sure that their processes are as effective as possible (Akyildiz, Wang, and Lin 2015). This will inevitably lead to an explosion in the number of IoT devices connected to the internet, directly or indirectly. Moreover, there would be a significant increase in interconnectivity across the board. This specifically means that a single attack can cause maximum harm in terms of coverage, which is possible since these devices will be connected to multiple sub‐networks to provide agility and flexibility in operations.
Additionally, security concerning dissemination will also become a definite challenge. When considering IoT technologies, it is necessary to highlight a bit of revelation about the exact nature of the change. IoT is everyday “things” that people usually use in their daily lives. However, they are then optimized to function with the inserted capabilities of doing the functions they were meant to do, and more (Al‐Falahy and Alani 2017). Turning ordinary objects into specific IoT devices is challenging across every instance. It is also no wonder that these concerns that are being raised will extend to the provisioning of actual security allocations for these particular and different devices (Li, Da Xu, and Zhao 2018). Security solutions also follow monitoring protocols in real‐time and are often limited by the network's bandwidth capability (Arel, Rose, and Karnowski 2010). However, there is a constant look‐out for user performance upon the specified bandwidth through these specifications. The advent of 5G may make all these legacy strains of security solutions completely obsolete.
Moreover, another cybersecurity concern that realistically exists relates to the specific issues that reflect on the situation from another perspective altogether. In terms of realizing IoT, it is quite apparent that people would depend upon technology even more than the situation now. Therefore, the higher area of attack could find very subtle and non‐noticeable ways in which to significantly disrupt users' daily lives in a critical and very damaging fashion (Siau and Wang 2018). As a consequence, it becomes clear that the entire scenario reflects a situation that needs to address security across multiple dimensions at large.
IoT devices are the ultimate manifestations of what automation is supposed to be. However, this is not specifically focused upon 5G networks squarely, as it will also require the same treatment. The rise in security allocations that are automated across widespread systems has been quite prescient for some time. However, because of the existing challenges in the proper form of integration that many architectures and interfaces have encountered (Arel, Rose, and Karnowski 2010), the requirements state that security must synchronize with the data at every possible level, irrespective of the physical property or software. This fact is more problematic, especially when the software divide has become extremely complex. This is all in addition to the prescient need in case AI becomes an indelible part of 5G technology at large (Yazıcı, Kozat, and Sunay 2014). It will inimitably mean that there should be a significant increase in the stakes since the convergence of both will raise the requirement of data required for the AI systems to work correctly (Hassabis et al. 2017). All of this places a great deal of risk for the entire prospect of 5G technology and the networks.