5. 5G or LTE Security

5G or LTE Security
--------------------------
They're talking about 5G security technology due to billions of devices connected to the networks.

* They're using slicing technology to differentiate devices and applications, I think. This would eliminate cross talks, too, I guess. However they could tap in each slice in order to eave drop devices on each slice.

1. How about encryption similar to authentication with SSD as a key, i.e. variable keys. Using encryption with the only destination device and authorized control center could decrypt the conversation, i.e. no master key. Police could attend the control center as needed.
- Currently anyone with a master key could tap to wireline communications at anywhere they like.

2. Hoping frequency, i.e. changing communication channels occasionally. This ways it's harder for eave droppers. Of course, you must come up with an algorithm/protocol that only the device and RBS knew how to hop or figure out the next channel.
- a mobile phone number or a serial number is unique.

3. I don't know when a mobile router would be implemented, but at that time capacity of wireless network must be improved. A lot of devices would be connected through a smart phone channel.



* October 31, 2017: In addition to variable keys in encryption, the mobile phone and RBS could have a pool of encryption algorithms. They could change algorithms as conversation was going on. Of course both sides must coordinate for this type of algorithm ever-changing.

No comments:

Post a Comment