Skip to main content

Evolving Cyberspace: The Marriage of 5G and the Internet of Things (IoT) Technologies

  • Chapter
  • First Online:
Ethical and Secure Computing

Part of the book series: Undergraduate Topics in Computer Science ((UTICS))

  • 1731 Accesses

Abstract

Recent technological developments have seen the emergence of two new technologies with the potential to drastically change the way we have viewed and used cyberspace. With the phenomenal development and growth of the fifth generation (5G), a technology that is greatly increasing the speed and responsiveness of wireless networks, and the Internet of Things (IoT), a technology that allowed a high degree of network connectivity where any connected device can talk to each other by sending and receiving data, a new dawn in a remarkable cyberspace was born. Noting that wireless networks are a core component of cyberspace, 5G technology inevitably becomes a fundamental outlier of cyberspace. Also noting that wireless devices form the bulk of the outliers of cyberspace; hence, the many devices that form the Internet of things (IoT), a new marriage between 5G and IoT was inevitable. The resulting environment is the new frontier of cyberspace wherein miniature devices including bread toasters are talking smartphones as the house fridge talks to the garage door opener. It is a wild west and a social, ethical, and security quagmire. All this mayhem is a result of our total dependence on technology, now creeping ever closer into our living and bedrooms. The home front, as the last frontier of defenses, is now the security war front, brought home by the 5G and IoT technologies. In this chapter, we are going to explore these technologies, highlight the problematic issues, comment on the ethical implications, and outline the latest security tools and best practices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    vana Kottasova CNNtech, November 20, 2014: 10:04 a.m. ET.

References

  1. Lancaster University. G5: moving to the next generation in wireless technology. ScienceDaily. ScienceDaily, 30 Apr 2015. www.sciencedaily.com/releases/2015/04/150430082723.htm

  2. Ma Z, Quan Z, Guo ZZ, Ping D, Fan Z, Li HC (2015) Key techniques for 5G wireless communications: network architecture, physical layer, and MAC layer perspectives. Sci China Inf Sci. 58(4):1–20

    Article  Google Scholar 

  3. Ding Z et al. A survey on non-orthogonal multiple access for 5G networks: research challenges and future trends. https://ieeexplore.ieee.org/document/7973146/authors

  4. Mundy J. What is massive MIMO technology? https://5g.co.uk/guides/what-is-massive-mimo-technology/

  5. Imthiyaz A. 5G the nanocore. http://www.telecoms.com/wp-content/blogs.dir/1/files/2011/05/5G_The_NanoCore.pdf

  6. G PPP architecture working group. View on 5G Architecture. https://5g-ppp.eu/wp-content/uploads/2014/02/5G-PPP-5G-Architecture-WP-For-public-consultation.pdf

  7. Maney K. Meet Kevin Ashton, father of the Internet of Things. http://www.newsweek.com/2015/03/06/meet-kevin-ashton-father-internet-things-308763.html

  8. INFOGRAPHIC: The growth of the Internet of Things. https://www.ncta.com/platform/industry-news/infographic-the-growth-of-the-internet-of-things/

  9. Gubbia J, Buyyab R, Marusica S, Palaniswamia M. Internet of Things (IoT): a vision, architectural elements, and future directions. Elsevier, http://www.sciencedirect.com/science/article/pii/S0167739X13000241

  10. Guillemin P, Friess P (Sept 2009) Internet of things strategic research roadmap. The cluster of European research projects, Tech Rep, http://www.internet-of-things-research.eu/pdf/IoT_Cluster_Strategic_Research_Agenda_2009.pdf

  11. Morgan J. A simple explanation of “The Internet Of Things”. http://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things-that-anyone-can-understand/#5939c9768284

  12. Atzori L, Iera A, Morabito G. The Internet of Things: a survey. Computer Networks, Elsevier. http://ac.els-cdn.com/S1389128610001568/1-s2.0-S1389128610001568-main.pdf?_tid=1094eeaa-85ae-11e6-a405-00000aab0f01&acdnat=1475089513_ff39eabceaa7caece0fbe703937e25c1

  13. Greenough J, Camhi J. Business intelligence. Here are IoT trends that will change the way businesses, governments, and consumers interact with the world, 29 Aug 2016, http://www.businessinsider.com/top-internet-of-things-trends-2016-1?IR=T

  14. Shang W, Yu Y, Droms R (2016) Challenges in IoT networking via TCP/IP architecture. NDN Technical Report NDN-0038. http://named-data.net/techreports.html

  15. Sutaria R, Govindachari R. Understanding the Internet Of Things. http://electronicdesign.com/iot/understanding-internet-things#IoT

  16. Schneider S. Understanding the protocols behind the Internet Of Things. http://electronicdesign.com/iot/understanding-protocols-behind-internet-things

  17. IoT standards and protocols. http://www.postscapes.com/internet-of-things-protocols/

  18. Zaslavsky A, Jayaraman PP (2015) The Internet Of Things: discovery in the Internet Of Things. Ubiquity 2015:1–10

    Article  Google Scholar 

  19. IERC (Jan 2015) Internet of Things IoT governance, privacy and security issues. European research cluster on the Internet Of Things. http://www.internet-of-things-research.eu/pdf/IERC_Position_Paper_IoT_Governance_Privacy_Security_Final.pdf

  20. Ashiraf QM, Habaebi MH. Introducing autonomy in Internet of Things. http://www.wseas.us/e-library/conferences/2015/Malaysia/COMP/COMP-27.pdf

  21. Kounelis I, Baldini G, Neisse R, Steri G, Tallacchini M, Pereira ÂG (2014) Building trust in the human–Internet of Things relationship. IEEEXplore. IEEE Technology and Society Magazine, Winter. http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6969184

  22. Walia A. The damaging effects of 5G wireless on your health. Collective revolution. https://www.collective-evolution.com/2018/06/18/the-damaging-effects-of-5g-wifi-on-your-health/

Further Reading

  1. Samani R. 3 key security challenges for the Internet of Things. https://securingtomorrow.mcafee.com/business/3-key-security-challenges-internet-things/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joseph Migga Kizza .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kizza, J.M. (2019). Evolving Cyberspace: The Marriage of 5G and the Internet of Things (IoT) Technologies. In: Ethical and Secure Computing. Undergraduate Topics in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-030-03937-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-03937-0_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-03936-3

  • Online ISBN: 978-3-030-03937-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics