5G mobile systems – do we have enough energy? Abstract The 5G mobile systems will bring a revolution in the way people communicate. This study will examine whether the global community has the capabilities to develop and deploy the 5G mobile systems. Arguably, the success of 5G mobile systems will highly depend on its ability to promote bandwidth efficiency, which is an issue with the past generations of telecommunication networks. To achieve this, there is a need to develop efficient networks. In addition, standardization is needed to provide an avenue for different types of devices to interact without any conflict. Furthermore, the study identifies interoperability as a challenge that undermines the effort of researchers, scholars and technology analysts to deploy 5G mobile systems. In this case, there is a need to provide an avenue for different networks as well as devices to communicate and share data. Finally, the study highlights information security as an issue that will constantly arise. However, based on the past research and study finding, the global community can deal with threats of cybercrime irrespective of its evolving nature. Importantly, the study concludes that the global community can build and deploy 5G mobile systems successfully. Table of contents ABSTRACT 2 1.0. INTRODUCTION 4 2.0. LITERATURE REVIEW 5 2.1. DEVELOPMENT OF 5G MOBILE SYSTEMS 5 2.2. IMPLEMENTATION OF 5G MOBILE SYSTEMS 6 2.3. CYBERCRIME AND THE 5G MOBILE SYSTEMS 8 3.0.
According to Schneier, as our world becomes interconnected through the internet the security of the internet becomes the security of everything (Bruce Schneier, 2017). This concept is very real when one considers how so many devices that are now connected to the internet. Everyday Items from coffee makers to automobiles have sophisticated computer systems being put into them which are intended to make everyday life easier. However, this technology comes new threats that move from affecting us only in the online world to the physical world.
This rise in connected devices creates a greater need for cyber security in order to defend these devices and the personal data they contain. Mobile phones are now common place at most households in the United States with as many as 68% of US adults owning one as of 2015, according to Pew Research (Anderson). These devices contain a plethora of personal information ranging from credit card numbers, pictures, bank account information, and much more. Mobile phones are connected through various forms of communication such as cell networks, Wi-Fi, Bluetooth, etcetera. Mobile phones have vast amount of data and many access routes for criminals to access this data. Cyber Security experts, now more than ever, need to work towards protecting these devices and stopping criminals from accessing them. Another form of technology that has been on the rise are so called IoT devices, or Internet of Things. These are everyday devices that in the past, would not have been connected to the internet such as fridges, coffee makers, and thermostats, that are now becoming connected devices. These devices often are not protected by strong forms of security or any security at all. These devices provide easy access into their users lives and can in some cases be very dangerous if not protected properly. According to an article written for Forbes magazine the number of interconnected IoT devices could reach upwards of 30 billion devices by the year 2030 (Press). If these devices are not brought up to the security standards of modern laptops and desktops, then home and office networks alike will be at risk of attacks from hackers and criminals. More devices are being connected to the internet every day and as this number grows cyber security will become ever more important to ensure that these devices stay secure and safe for their
Figure 2.1 displays the growth of just smartphones worldwide showing how a computer which was only once available to those who could afford it is now dominating the way we view and send data in our everyday life. The internet is a globally connected network where a user can obtain information from another computer (providing that they have correct permissions to access the information). The internet has allowed our society to an efficiency that is
Similar to the complexities of the Boeing 747 “super jet”, “No single person can comprehend the entire workings” of a cell phone. The cell phone found in the pocket of the majority of citizens of the world today include GPS, Wi-Fi, 3G or 4G networks, LTE, high-resolution cameras and millions of downloadable user-made applications to choose from. In fewer than 30 years, the cell phone went from a rare device only attainable by the wealthiest of the population, to a device that a large percentage of the population now owns. Whether on the streets of downtown Toronto, or a small village in poverty-stricken East Africa, it is becoming increasingly rare to find a person who does not own a mobile device.
Phones have changed the way we communicate with each other forever and how we store information ourselves. During the last couple of decades there has been a steady incline of methods allowing information to become more accessible to all people within range such as Wi-Fi or data connection. Although there have been some downsides to this technology such as increased cyber bullying and other confidence issues, the internet and smartphones in general have become vital parts of our lives. At times we even feeling lost without them, phones have become more convenient and it has increased communication and its beneficial having everything in one device.
Over the years, there has been an increased growth in the usage of smartphones across the world. Gee (2014) asserts that,
Throughout the history of the world, people have thought of new and innovative ways to communicate. In the past, people used smoke signals, telegrams, home telephones, and car telephones. Now the primary form of communication typically occurs on a cell phone. Cell phones have improved and developed a significant amount over the years. In 1973, the first cell phone, the Motorola Dyna-Tac, hit the market. It weighed an astonishing two pounds, and only had one feature—voice calls. Fast forward to the present day, most consumers not only own cell phones, but they own smartphones. These smartphones are now capable of incredible things. Features such as text messaging, video calling, and artificial intelligence come standard on most models.
Since the first cellular phone call made on June 17th 1946, it’s rather hard to imagine todays world without the use of technology. We have seemed to envelope it into our lives to the point that it practically irreplaceable. Today, cellular phones are more than we ever could’ve dreamed they would become. Its invention was to make phone calls, but now it acts as someone’s companion, guide, friend, way of communication, a computer and security, all simultaneously. Cellular phones have made a tremendous impact on the way we communicate with others, because someone is just seconds away with the use of your hands or even your voice now. The research provided is merely exploratory and focuses on how the world has
Advancements in technology have resulted in the invention of devices and machines that increase the efficiency and quality of life. Notably, the design of the cellphone and the internet highlights the latest technology that captivates both young and old. Mobile phones have become an integral part of our society. Primarily, the development of cellphones which combine different sophisticated features has made the device one of the necessities of life. So far, statistics indicate that the number of cell phones in the world supersedes the total population of people. Most people consider cell phones beneficial because of the level of interconnectedness it creates between people around the world. Arguably,
Before 2007 electronic devices served customers to interact with the world, was primarily laptops, desktops for emails, web browsing, chat and e-commerce. Starting around early 2008, there was gradual shift towards tablets and smartphones. Critical question to probe and understand is what elements of the environment drove this structural shift. From a technology perspective tablets and smartphones use low powered CPU’s and RAM compare to their laptops and desktops brethren. They use both Wi-Fi and Cellular antenna to connect to World Wide Web. Cellular service provider’s data speed, which is the primary source for smart phone speed seen considerable improvement from 2G to 3G and further to 4G3.
Hello reader. I have chosen the IEEE Symposium on Security and Privacy. The IEEE Symposium on Security and Privacy has held a conference every year since 1980 to touch on major points going around the cyber security career fields and fields alike. Upon review of the call for papers section of their website; some topics stood out and interested me greatly. The first topic I would like to go over would be mobile and web security and privacy. Mobile computing has risen exponentially in the past decade. We find that more and more users are turning to smartphones and tablets instead of desktops to take care of personal and business related tasks. While completing important tasks while on a bus or metro transit seems nice, the reality is that people are putting sensitive information at risk if they do not properly protect themselves. According to the French telecommunications equipment company Alcatel-Lucent, an estimated 16 million mobile devices worldwide were infected by malicious software in 2014. This figure only accounts for infected mobile devices whilst another 5.2 million smartphones were lost or stolen in the United States alone in 2014. Back to the IEEE Symposium on Security and Privacy; they had a workshop specifically for mobile security threats and technology that will better assist us in preventing statistics like the ones mentioned above. Their workshop is called ‘Mobile Security Technologies’ or MoST. Mobile Security Technologies (MoST) aims at bringing together
The “consumerization of IT”: The Bring Your Own Device (BYOD) trend requires networks that are both flexible and secure.
Networking of computers has developed quite well since they were first introduced. Wireless networks are basically just the new trend of computer networks in the IT world. Of course with every new technology that is created, there are some pros and cons. This paper engages some of the key advantages and deficiencies of wireless networks security. It addresses various types of security levels being implemented by standard wireless networks, such as WEP, WPA and 802.11.This paper also discusses benefits of utilizing wireless networks, like cost effectiveness. Businesses have recently been found considering wireless installations simply because the lower total cost of ownership and maintenance. Other benefits will be brought to light, such as how wireless networks increase data accuracy and increases a user’s productivity. Wireless networks are starting to make their way into just about every venue possible, like schools, airports and hospitals. One of the main points that seem to always be addressed when discussing wireless networks is security and how people are concerned with the protection of their valuable information. In the conclusions, questions and opportunities for future WLAN research will be discussed.
There is being observed a mass proliferation of heterogeneous deployment of Android, Windows, iOS and Blackberry and other platforms as well connected mobile devices that have started to become a norm. This is also being embraced by organizations that is bring your own device (BYOD) trend on the other side the tablets and smartphone are increasingly becoming a center or say hub for personal and business data. And with the upcoming and already established technologies such as Bluetooth, NFC and others where machine to machine interaction is at its peak and mobile devices have started to become wallets and security badges and more.