Sponsored By

5G Insights: IoT Opportunities, Vulnerabilities5G Insights: IoT Opportunities, Vulnerabilities

5G will provide an opportunity to connect IoT devices across the enterprise, but security vulnerabilities may follow.

Gary Audin

August 12, 2019

2 Min Read
Someone working on a cellphone

Most of the hype around 5G networks comes from its ability to improve speeds, as well as its potential to support the growing number of Internet of Things (IoT) devices in need of constant and consistent connectivity. However, security vulnerabilities are likely to surface in supply chains and on the network, according to a newly published Cybersecurity and Infrastructure Security Agency (CISA) key findings report.

 

What Should You Do?

If you’re looking at future in which 5G provides your IoT connectivity, you need to investigate the security efforts of your network provider. Ask questions about its suppliers. What liabilities will the provider accept if any? Look into what your 5G endpoints can implement to compensate for the potential 5G providers security problems.

 

Here are a few factors to consider:

 

Supply Chain Vulnerabilities

According to the CISA report, untrusted partners can manipulate 5G products manufactured by trusted suppliers, creating vulnerabilities like counterfeit components or malicious software/hardware. In addition, when a trusted company buys 5G components from overseas production facilities, supply chain risks may crop up.

 

Compromised devices may provide malicious actors with 5G network access to intercept data that routes through the devices, the CISA researchers went on to say. Even though a U.S. network might appear secure, data traveling across countries may pass through untrusted telecommunication networks. These vulnerabilities will be difficult for enterprises to detect.

 

Network Security

Security updates don't guarantee that there will be no more security fixes. An update itself can open a new vulnerability window.

 

The CISA report highlights that “5G technologies will be … overlaid on the existing 4G Long-Term Evolution (LTE) network that [already have] legacy vulnerabilities.” Security settings, permissions, and specifications from an untrusted core network may block 5G device security.

 

Technology Deployment

5G small cell towers will reside on trees, light poles, homes, building corners, and retail shops. This provides more physical access points for malicious behavior, and the ability to intercept data and introduce denial-of-service attacks. According to the report, compromised small cells may produce the capability to clone devices, thereby replicating calls, use data, and add charges.

 

Fewer Options

The report also mentions that untrusted 5G equipment makers are less likely to be involved with interoperability testing. This can make it difficult to ensure that their untrusted products are comparable to those from trusted providers, limiting competition.

 

Proprietary 5G equipment can be difficult to update and repair. Poor written code can lead to unsupportable software. Limited interoperability between networks can delay or increase the cost deployment.

 

Again, be sure to talk to your network provider about its 5G network strategy and any concerns you might have.

About the Author

Gary Audin

Gary Audin is the President of Delphi, Inc. He has more than 40 years of computer, communications and security experience. He has planned, designed, specified, implemented and operated data, LAN and telephone networks. These have included local area, national and international networks as well as VoIP and IP convergent networks in the U.S., Canada, Europe, Australia, Asia and Caribbean. He has advised domestic and international venture capital and investment bankers in communications, VoIP, and microprocessor technologies.

For 30+ years, Gary has been an independent communications and security consultant. Beginning his career in the USAF as an R&D officer in military intelligence and data communications, Gary was decorated for his accomplishments in these areas.

Mr. Audin has been published extensively in the Business Communications Review, ACUTA Journal, Computer Weekly, Telecom Reseller, Data Communications Magazine, Infosystems, Computerworld, Computer Business News, Auerbach Publications and other magazines. He has been Keynote speaker at many user conferences and delivered many webcasts on VoIP and IP communications technologies from 2004 through 2009. He is a founder of the ANSI X.9 committee, a senior member of the IEEE, and is on the steering committee for the VoiceCon conference. Most of his articles can be found on www.webtorials.com and www.acuta.org. In addition to www.nojitter.com, he publishes technical tips at www.Searchvoip.com.