Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

3 questions to ask before adopting 5G for IoT

The power of 5G networks will one day usher in new generations of IoT applications, but large-scale adoption may still be a long way off. For one thing, none of the network providers is anywhere near full rollout. In the US, for example, the three biggest mobile network providers are ahead of the curve, but they still have a lot to do. According to software company WhistleOut, which compares internet and mobile phone providers, T-Mobile offers 5G coverage in 53.79% of the country, AT&T in 29.52%, and Verizon in 12.77%, as of June 2024.

CIOs do have the option of using a private 5G network, where 5G protocols are used with equipment like what’s deployed in public networks, but the network is run by either the end customer or a third-party provider, instead of a public operator. Whether the network is a public or private network, another big concern is that 5G may be overkill for most use cases. Moreover, enterprise use of 5G for IoT is so new that anybody who uses it now will have to face all the challenges that come with being an early adopter.

So CIOs looking to use 5G for IoT in the near term should first ask these three important questions.

Do other network protocols better suit my needs?

The three main use cases of 5G wireless technology were originally specified by the 3G partner program (3GPP). The first is enhanced mobile broadband for cell phone users. The second is for ultra-reliable, low latency data communication for applications like remote medical diagnosis and automated cars, where latency and reliability are tantamount. And the third is massive machine-to-machine communication, where a million devices can connect per square kilometer.

“Out of these three use cases, IoT fits in the last two,” says Raj Radjassamy, director for the 5G and wireless segment at OmniOn Power. “With an ultra-reliable low-latency network, where you really need less than one millisecond latency, you’re not worried about the battery life. You need to have a good throughput so the data gets around really fast in a power plant, for example, where you could have million-dollar high pressure turbines and generators operating.”

srcset=”https://b2b-contenthub.com/wp-content/uploads/2024/07/Raj-Radjassamy-director-for-5G-and-wireless-OmniOn-Power.jpg?quality=50&strip=all 1800w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Raj-Radjassamy-director-for-5G-and-wireless-OmniOn-Power.jpg?resize=300%2C200&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Raj-Radjassamy-director-for-5G-and-wireless-OmniOn-Power.jpg?resize=768%2C512&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Raj-Radjassamy-director-for-5G-and-wireless-OmniOn-Power.jpg?resize=1024%2C683&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Raj-Radjassamy-director-for-5G-and-wireless-OmniOn-Power.jpg?resize=1536%2C1024&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Raj-Radjassamy-director-for-5G-and-wireless-OmniOn-Power.jpg?resize=1240%2C826&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Raj-Radjassamy-director-for-5G-and-wireless-OmniOn-Power.jpg?resize=150%2C100&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Raj-Radjassamy-director-for-5G-and-wireless-OmniOn-Power.jpg?resize=1046%2C697&quality=50&strip=all 1046w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Raj-Radjassamy-director-for-5G-and-wireless-OmniOn-Power.jpg?resize=252%2C168&quality=50&strip=all 252w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Raj-Radjassamy-director-for-5G-and-wireless-OmniOn-Power.jpg?resize=126%2C84&quality=50&strip=all 126w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Raj-Radjassamy-director-for-5G-and-wireless-OmniOn-Power.jpg?resize=720%2C480&quality=50&strip=all 720w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Raj-Radjassamy-director-for-5G-and-wireless-OmniOn-Power.jpg?resize=540%2C360&quality=50&strip=all 540w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Raj-Radjassamy-director-for-5G-and-wireless-OmniOn-Power.jpg?resize=375%2C250&quality=50&strip=all 375w” width=”1240″ height=”827″ sizes=”(max-width: 1240px) 100vw, 1240px”>

Raj Radjassamy, director for 5G and wireless, OmniOn Power

OmniOn Power

That speed and efficiency of data are critical, especially in high-pressure environments — and special infrastructure is required to ensure reliability, which is where OmniOn Power gets involved with 5G. They design, develop, and manufacturer products and solutions to power the new cell towers, a critical environment where speed and uptime define the service.

“If there’s an alarm and you want to take an action on it, you need to be able to take it within a few milliseconds to avoid potentially damaging an expensive asset,” he adds. “That’s an example of the mission-critical, ultra-reliable IoT that 5G can support. Then there’s massive IoT density, like a smart city or smart factory, for example, with up to millions of devices. Here, latency and bandwidth aren’t as important as connectivity to a large number of devices in a relatively small area.”

These are the two broad categories of use cases where 5G was originally specified to serve IoT. But over time, it became clear from looking more closely at the most prevalent IoT use cases that these two extreme categories wouldn’t be enough. Something else needed to be offered for lower-end applications.

To address this issue, the 3GPP standards committee last year introduced Reduced Capability, also called RedCap or NR-Light, in Release 17 of the standards. Reduced capability specifies throughputs of 150 and 50 Mbps in the downlink and uplink, respectively, which is much more than what’s needed by the current generation of IoT applications.

Other networking protocols that have been serving IoT applications for around two decades may still be the best solution. These technologies are specifically designed to serve simple battery-powered devices with limited processing power not made to be connected directly to the internet because they’re kept as basic and frugal as possible. A processor too busy communicating can’t do much else unless you beef it up, and handling sophisticated protocols would wear the battery down too quickly. Moreover, the devices sometimes operate in remote locations that are out of reach for public wireless networks. Specialized wireless protocols, like LoRa and Sigfox, were developed to support IoT with reduced communication over longer distances, using inexpensive base stations that are easy to deploy and operate.

“LoRa, Sigfox, and other existing IoT networks are still the best option for a lot of enterprise needs — and at significantly lower cost,” says Jeremy Prince, IoT consultant and former president of France-based Sigfox. “One of the features of these specialized protocols is the devices don’t pair with the network, which reduces the amount of processing on the device and the number of exchanges over the network. In existing protocols, very little data is sent from the server to the device.”

srcset=”https://b2b-contenthub.com/wp-content/uploads/2024/07/Jeremy-Prince-IoT-consultant-and-former-president-of-Sigfox.jpg?quality=50&strip=all 1800w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Jeremy-Prince-IoT-consultant-and-former-president-of-Sigfox.jpg?resize=300%2C200&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Jeremy-Prince-IoT-consultant-and-former-president-of-Sigfox.jpg?resize=768%2C512&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Jeremy-Prince-IoT-consultant-and-former-president-of-Sigfox.jpg?resize=1024%2C683&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Jeremy-Prince-IoT-consultant-and-former-president-of-Sigfox.jpg?resize=1536%2C1024&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Jeremy-Prince-IoT-consultant-and-former-president-of-Sigfox.jpg?resize=1240%2C826&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Jeremy-Prince-IoT-consultant-and-former-president-of-Sigfox.jpg?resize=150%2C100&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Jeremy-Prince-IoT-consultant-and-former-president-of-Sigfox.jpg?resize=1046%2C697&quality=50&strip=all 1046w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Jeremy-Prince-IoT-consultant-and-former-president-of-Sigfox.jpg?resize=252%2C168&quality=50&strip=all 252w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Jeremy-Prince-IoT-consultant-and-former-president-of-Sigfox.jpg?resize=126%2C84&quality=50&strip=all 126w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Jeremy-Prince-IoT-consultant-and-former-president-of-Sigfox.jpg?resize=720%2C480&quality=50&strip=all 720w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Jeremy-Prince-IoT-consultant-and-former-president-of-Sigfox.jpg?resize=540%2C360&quality=50&strip=all 540w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Jeremy-Prince-IoT-consultant-and-former-president-of-Sigfox.jpg?resize=375%2C250&quality=50&strip=all 375w” width=”1240″ height=”827″ sizes=”(max-width: 1240px) 100vw, 1240px”>

Jeremy Prince, IoT consultant and former president of Sigfox 

Jeremy Prince

Sigfox is well established, with more than 70 national independent providers globally, and devices built for one network can be run on any of the others. Currently, over 13 million sensors are connected for 1,500 customers.

In 2022, Sigfox was acquired by UnaBiz, a global IoT service provider and integrator headquartered in Singapore. Even after buying Sigfox, the company remains network agnostic, working with a range of other protocols including LoRaWAN, LTE-M, NB-IoT and Satellite. “Sometimes, we use pure Sigfox or pure LoRaWAN, and sometimes we build a hybrid solution, like Nicigas, Japan’s leading LPG gas company that deployed 1.4 million sensors in Japan based on a combination of Sigfox and LTE-M,” says Alexis Susset, group CTO of UnaBiz.

One of the interesting things about the specialized networks, according to Susset, is that because they use unlicensed frequency bands, they don’t have high upfront costs. By contrast, public networks spend up to billions of dollars on 3G, 4G, and 5G licenses and have to recover that investment by squeezing as much usage out of the frequencies as possible. Moreover, because 5G chipsets and modems are still very costly today, devices that connect to 5G networks are very expensive.

“You need scale to make it cheaper,” says Susset. “But you can’t really scale because 5G is not available everywhere.”

What are the cybersecurity risks for the network I’ve chosen?

“With 5G comes more data exchanges in both directions, widening the attack surface,” says Dan Lohrmann, field CISO at IT consultancy Presidio. “Bad actors can more easily find a device and scan it for known vulnerability and missing patches. The large amount of data generated by IoT devices also presents privacy concerns as it’s transmitted and stored across networks. Plus, adversary-in-the-middle attacks can intercept — and sometimes alter — communication between IoT devices when authentication mechanisms are weak.”

srcset=”https://b2b-contenthub.com/wp-content/uploads/2024/07/Dan-Lohrmann-field-CISO-Presidio.png?quality=50&strip=all 1800w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Dan-Lohrmann-field-CISO-Presidio.png?resize=300%2C200&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Dan-Lohrmann-field-CISO-Presidio.png?resize=768%2C512&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Dan-Lohrmann-field-CISO-Presidio.png?resize=1024%2C683&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Dan-Lohrmann-field-CISO-Presidio.png?resize=1536%2C1024&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Dan-Lohrmann-field-CISO-Presidio.png?resize=1240%2C826&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Dan-Lohrmann-field-CISO-Presidio.png?resize=150%2C100&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Dan-Lohrmann-field-CISO-Presidio.png?resize=1046%2C697&quality=50&strip=all 1046w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Dan-Lohrmann-field-CISO-Presidio.png?resize=252%2C168&quality=50&strip=all 252w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Dan-Lohrmann-field-CISO-Presidio.png?resize=126%2C84&quality=50&strip=all 126w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Dan-Lohrmann-field-CISO-Presidio.png?resize=720%2C480&quality=50&strip=all 720w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Dan-Lohrmann-field-CISO-Presidio.png?resize=540%2C360&quality=50&strip=all 540w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Dan-Lohrmann-field-CISO-Presidio.png?resize=375%2C250&quality=50&strip=all 375w” width=”1240″ height=”827″ sizes=”(max-width: 1240px) 100vw, 1240px”>

Dan Lohrmann, field CISO, Presidio

Presidio

But the more traditional IoT networks come with their own security threats, such as default passwords not being changed and passwords that are easily discovered and compromised with brute force and other attacks. Multi-factor security can’t be implemented with the traditional protocols where data flow is largely unidirectional from the device to the server. Moreover, security patches can’t easily be applied, and firmware updates or other hardware changes are difficult to deploy. 

“Several significant security vulnerabilities have been documented against these lower-cost IoT solutions using these protocols,” says Lohrmann. “These threats include DDoS, bit-flipping where the attacker changes the encrypted message that results in predictable changes to the plain text, acknowledgment spoofing, and root key management attacks, which could undermine the benefits of encryption. While there are ways to protect against these cyberthreats, the current versions are not as secure as they could be.”

According to Lohrmann, new versions of traditional IoT network protocols are being developed and tested, but much of what’s operating today has demonstrated problems with security. “For CIOs interested in significant deployments using LoRa, Sigfox, and other traditional protocols, it’s important to determine if current versions meet their network security requirements,” says Lohrmann. “You might need to wait for new, more secure, upgrades.”

Can I build a solution, or should I outsource?

Regardless of the network, IoT is not yet mature enough to offer a lot of off-the-shelf solutions. Enterprises typically need to either build their own solution or outsource the work to an integrator. “Unless you have very simple use cases that other companies have already addressed, it’s probably best to use an integrator,” says Sigfox’s Prince.

srcset=”https://b2b-contenthub.com/wp-content/uploads/2024/07/Alexis-Susset-group-CTO-UnaBiz.jpg?quality=50&strip=all 1800w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Alexis-Susset-group-CTO-UnaBiz.jpg?resize=300%2C200&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Alexis-Susset-group-CTO-UnaBiz.jpg?resize=768%2C512&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Alexis-Susset-group-CTO-UnaBiz.jpg?resize=1024%2C683&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Alexis-Susset-group-CTO-UnaBiz.jpg?resize=1536%2C1025&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Alexis-Susset-group-CTO-UnaBiz.jpg?resize=1240%2C826&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Alexis-Susset-group-CTO-UnaBiz.jpg?resize=150%2C100&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Alexis-Susset-group-CTO-UnaBiz.jpg?resize=1045%2C697&quality=50&strip=all 1045w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Alexis-Susset-group-CTO-UnaBiz.jpg?resize=252%2C168&quality=50&strip=all 252w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Alexis-Susset-group-CTO-UnaBiz.jpg?resize=126%2C84&quality=50&strip=all 126w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Alexis-Susset-group-CTO-UnaBiz.jpg?resize=719%2C480&quality=50&strip=all 719w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Alexis-Susset-group-CTO-UnaBiz.jpg?resize=540%2C360&quality=50&strip=all 540w, https://b2b-contenthub.com/wp-content/uploads/2024/07/Alexis-Susset-group-CTO-UnaBiz.jpg?resize=375%2C250&quality=50&strip=all 375w” width=”1240″ height=”827″ sizes=”(max-width: 1240px) 100vw, 1240px”>

Alexis Susset, group CTO, UnaBiz

UnaBiz

When you start working with an integrator, try to understand what allegiances they have and which biases they bring to the conversation, adds Susset. Most solution providers have preferences for network protocols and operators, and they have expertise in certain types of cybersecurity. Unabiz tries to overcome bias by deploying teams with expertise in different protocols, in hopes that they’ll remain agnostic as a group.

Susset advises CIOs to ask integrators to explain why they think the technology they’re close to is the right fit for the use case at hand. “Very often they open up and tell you the pros and cons and help you make the right choice for your project,” he says.


Read More from This Article: 3 questions to ask before adopting 5G for IoT
Source: News

Category: NewsJuly 31, 2024
Tags: art

Post navigation

PreviousPrevious post:Los siete mejores casos de uso empresarial de la IA generativaNextNext post:Einstein Studio 1: What it is and what to expect

Related posts

휴먼컨설팅그룹, HR 솔루션 ‘휴넬’ 업그레이드 발표
May 9, 2025
Epicor expands AI offerings, launches new green initiative
May 9, 2025
MS도 합류··· 구글의 A2A 프로토콜, AI 에이전트 분야의 공용어 될까?
May 9, 2025
오픈AI, 아시아 4국에 데이터 레지던시 도입··· 한국 기업 데이터는 한국 서버에 저장
May 9, 2025
SAS supercharges Viya platform with AI agents, copilots, and synthetic data tools
May 8, 2025
IBM aims to set industry standard for enterprise AI with ITBench SaaS launch
May 8, 2025
Recent Posts
  • 휴먼컨설팅그룹, HR 솔루션 ‘휴넬’ 업그레이드 발표
  • Epicor expands AI offerings, launches new green initiative
  • MS도 합류··· 구글의 A2A 프로토콜, AI 에이전트 분야의 공용어 될까?
  • 오픈AI, 아시아 4국에 데이터 레지던시 도입··· 한국 기업 데이터는 한국 서버에 저장
  • SAS supercharges Viya platform with AI agents, copilots, and synthetic data tools
Recent Comments
    Archives
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.