Abstract
Recent technological developments have seen the emergence of two new technologies with the potential to drastically change the way we have viewed and used cyberspace. With the phenomenal development and growth of the fifth generation (5G), a technology that is greatly increasing the speed and responsiveness of wireless networks, and the Internet of Things (IoT), a technology that allowed a high degree of network connectivity where any connected device can talk to each other by sending and receiving data, a new dawn in a remarkable cyberspace was born. Noting that wireless networks are a core component of cyberspace, 5G technology inevitably becomes a fundamental outlier of cyberspace. Also noting that wireless devices form the bulk of the outliers of cyberspace; hence, the many devices that form the Internet of things (IoT), a new marriage between 5G and IoT was inevitable. The resulting environment is the new frontier of cyberspace wherein miniature devices including bread toasters are talking smartphones as the house fridge talks to the garage door opener. It is a wild west and a social, ethical, and security quagmire. All this mayhem is a result of our total dependence on technology, now creeping ever closer into our living and bedrooms. The home front, as the last frontier of defenses, is now the security war front, brought home by the 5G and IoT technologies. In this chapter, we are going to explore these technologies, highlight the problematic issues, comment on the ethical implications, and outline the latest security tools and best practices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
vana Kottasova CNNtech, November 20, 2014: 10:04 a.m. ET.
References
Lancaster University. G5: moving to the next generation in wireless technology. ScienceDaily. ScienceDaily, 30 Apr 2015. www.sciencedaily.com/releases/2015/04/150430082723.htm
Ma Z, Quan Z, Guo ZZ, Ping D, Fan Z, Li HC (2015) Key techniques for 5G wireless communications: network architecture, physical layer, and MAC layer perspectives. Sci China Inf Sci. 58(4):1–20
Ding Z et al. A survey on non-orthogonal multiple access for 5G networks: research challenges and future trends. https://ieeexplore.ieee.org/document/7973146/authors
Mundy J. What is massive MIMO technology? https://5g.co.uk/guides/what-is-massive-mimo-technology/
Imthiyaz A. 5G the nanocore. http://www.telecoms.com/wp-content/blogs.dir/1/files/2011/05/5G_The_NanoCore.pdf
G PPP architecture working group. View on 5G Architecture. https://5g-ppp.eu/wp-content/uploads/2014/02/5G-PPP-5G-Architecture-WP-For-public-consultation.pdf
Maney K. Meet Kevin Ashton, father of the Internet of Things. http://www.newsweek.com/2015/03/06/meet-kevin-ashton-father-internet-things-308763.html
INFOGRAPHIC: The growth of the Internet of Things. https://www.ncta.com/platform/industry-news/infographic-the-growth-of-the-internet-of-things/
Gubbia J, Buyyab R, Marusica S, Palaniswamia M. Internet of Things (IoT): a vision, architectural elements, and future directions. Elsevier, http://www.sciencedirect.com/science/article/pii/S0167739X13000241
Guillemin P, Friess P (Sept 2009) Internet of things strategic research roadmap. The cluster of European research projects, Tech Rep, http://www.internet-of-things-research.eu/pdf/IoT_Cluster_Strategic_Research_Agenda_2009.pdf
Morgan J. A simple explanation of “The Internet Of Things”. http://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things-that-anyone-can-understand/#5939c9768284
Atzori L, Iera A, Morabito G. The Internet of Things: a survey. Computer Networks, Elsevier. http://ac.els-cdn.com/S1389128610001568/1-s2.0-S1389128610001568-main.pdf?_tid=1094eeaa-85ae-11e6-a405-00000aab0f01&acdnat=1475089513_ff39eabceaa7caece0fbe703937e25c1
Greenough J, Camhi J. Business intelligence. Here are IoT trends that will change the way businesses, governments, and consumers interact with the world, 29 Aug 2016, http://www.businessinsider.com/top-internet-of-things-trends-2016-1?IR=T
Shang W, Yu Y, Droms R (2016) Challenges in IoT networking via TCP/IP architecture. NDN Technical Report NDN-0038. http://named-data.net/techreports.html
Sutaria R, Govindachari R. Understanding the Internet Of Things. http://electronicdesign.com/iot/understanding-internet-things#IoT
Schneider S. Understanding the protocols behind the Internet Of Things. http://electronicdesign.com/iot/understanding-protocols-behind-internet-things
IoT standards and protocols. http://www.postscapes.com/internet-of-things-protocols/
Zaslavsky A, Jayaraman PP (2015) The Internet Of Things: discovery in the Internet Of Things. Ubiquity 2015:1–10
IERC (Jan 2015) Internet of Things IoT governance, privacy and security issues. European research cluster on the Internet Of Things. http://www.internet-of-things-research.eu/pdf/IERC_Position_Paper_IoT_Governance_Privacy_Security_Final.pdf
Ashiraf QM, Habaebi MH. Introducing autonomy in Internet of Things. http://www.wseas.us/e-library/conferences/2015/Malaysia/COMP/COMP-27.pdf
Kounelis I, Baldini G, Neisse R, Steri G, Tallacchini M, Pereira ÂG (2014) Building trust in the human–Internet of Things relationship. IEEEXplore. IEEE Technology and Society Magazine, Winter. http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6969184
Walia A. The damaging effects of 5G wireless on your health. Collective revolution. https://www.collective-evolution.com/2018/06/18/the-damaging-effects-of-5g-wifi-on-your-health/
Further Reading
Samani R. 3 key security challenges for the Internet of Things. https://securingtomorrow.mcafee.com/business/3-key-security-challenges-internet-things/
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kizza, J.M. (2019). Evolving Cyberspace: The Marriage of 5G and the Internet of Things (IoT) Technologies. In: Ethical and Secure Computing. Undergraduate Topics in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-030-03937-0_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-03937-0_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03936-3
Online ISBN: 978-3-030-03937-0
eBook Packages: Computer ScienceComputer Science (R0)