{"id":32175,"date":"2020-01-24T03:21:25","date_gmt":"2020-01-24T08:21:25","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=32175"},"modified":"2023-07-07T04:09:41","modified_gmt":"2023-07-07T08:09:41","slug":"5g-securing-smart-cities","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/5g-securing-smart-cities\/32175\/","title":{"rendered":"How can we protect our smart cities in the age of 5G?"},"content":{"rendered":"<p>1G, 2G, 3G, 4G \u2013 now 5G is here. And <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/5g-technology-opportunities\/28876\/\" target=\"_blank\" rel=\"noopener nofollow\">it\u2019s got a lot going for it<\/a>. But as the fifth generation of mobile networks is poised for a pivotal role in the future of business, society and technology, a recent report by <a href=\"https:\/\/securingsmartcities.org\/wp-content\/uploads\/2019\/11\/SSC5G.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Securing Smart Cities<\/a> has warned what we might need to think carefully about how to protect our citadels. But first, what exactly is a smart city? And what does 5G have to do with it?<\/p>\n<h2>Smart cities are connected<\/h2>\n<p>Smart cities usually occupy six dimensions: people, technology, infrastructure, management, economy and government. Put simply; a smart city uses <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/category\/internet-of-things\/\" target=\"_blank\" rel=\"noopener nofollow\">internet of things<\/a> (IoT) sensors and technology to connect components across a city to make everyday life easier for its citizens.<\/p>\n<p>Sounds complicated, but it\u2019s reasonably simple: sensors and connected devices allow cities to manage and monitor infrastructure, transport and financial systems, postal services and more. Traffic could run more efficiently, payment transactions made more secure and remote emergency surgery (think advanced drones replacing paramedics) could become commonplace.<\/p>\n<p>According to a <a href=\"https:\/\/iot.electronicsforu.com\/content\/whats-new\/news-whats-new\/spending-on-smart-city-technology-likely-to-grow-to-135-billion-by-2021-idc\/\" target=\"_blank\" rel=\"noopener nofollow\">report from the International Data Corporation (IDC)<\/a>, global smart city tech investment is set to reach $135bn by 2021. So what\u2019s behind this rapid rise?<\/p>\n<p>In short: 5G. This new network is estimated to be up to 100 times faster than the present 4G systems, with up to 25 times lower latency (lag time) and as many as one million devices supported per square km; that\u2019s a staggering <em>one thousand times<\/em> what\u2019s currently possible! This increased bandwidth brings many new possibilities, like <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cybersecurity-autonomous-vehicles\/28291\/\" target=\"_blank\" rel=\"noopener nofollow\">autonomous driving<\/a>, and better connectivity. But, with these possibilities come significant threats.<\/p>\n<h2>The far-reaching risks of 5G<\/h2>\n<p>As with every new technology, it\u2019s essential to be aware of how it can affect IT security infrastructures. 5G will serve as the foundation for many future technologies; however, the security concerns are inescapable. It\u2019s evolved from 4G, from which it will inevitably inherit vulnerabilities and misconfigurations. If 5G is to play a crucial role in smart cities, governments and industry leaders should promote secure 5G projects that enhance services but also ensure stability and quality of life for its citizens.<br>\n<img decoding=\"async\" class=\"aligncenter size-large wp-image-32177\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/01\/24025430\/5G_security_smart_cities_inline-1024x495.png\" alt=\"5G security smart cities\" width=\"1024\" height=\"495\">Art by\u00a0<a href=\"https:\/\/unsplash.com\/@widenka?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\" target=\"_blank\" rel=\"noopener nofollow\">Martin Widenka<\/a><\/p>\n<p>So what are the specific risks and challenges to look out for? The <a href=\"https:\/\/securingsmartcities.org\/wp-content\/uploads\/2019\/11\/SSC5G.pdf\" target=\"_blank\" rel=\"noopener nofollow\">5G Security and Privacy for Smart Cities<\/a> report, which I co-authored with David Jordan and Alan Seow, has an extensive explanation. Here are the key things you need to know.<\/p>\n<h2>From protocol weaknesses to DDoS attacks<\/h2>\n<p>As 5G and smart devices connect our cities, it will cover more areas than today\u2019s telecommunications equipment, giving previously non-network devices connectivity and centralized management. This means better visibility, efficiency and performance, but also exposes the population to more risks as the entire system is connected. If one node is attacked, many more may be affected.<\/p>\n<p>For example, 5G will increase the risk and potential damage of large-scale distributed denial-of-service (DDoS) attacks. This is when a hacker overloads a machine or network with traffic to render it useless. DDoS attacks are used to disable the online services of banks and e-commerce platforms, but the city\u2019s critical infrastructure is a significant weak spot. In 2014, a DDoS attack on Boston Children\u2019s Hospital meant staff couldn\u2019t use medical devices, putting patients\u2019 lives in danger and causing damages <a href=\"https:\/\/securingsmartcities.org\/wp-content\/uploads\/2019\/11\/SSC5G.pdf\" target=\"_blank\" rel=\"noopener nofollow\">totaling an estimated US $600,000<\/a>.<\/p>\n<p>5G also presents some protocol weaknesses, for example in the authentication and key agreement (AKA) \u2013 the method of encrypting communication between devices and cellular networks, which has been previously utilized in 3G and 4G networks and is known to be vulnerable to international mobile subscriber identity (IMSI) catchers, interception of traffic and sensitive information.<\/p>\n<p>With both of these threats on the horizon, regular security practices such as supply chain security, access control, <a href=\"https:\/\/www.manageengine.com\/patch-management\/what-is-patch-management.html\" target=\"_blank\" rel=\"noopener nofollow\">patch management<\/a>, <a href=\"https:\/\/securityintelligence.com\/a-beginners-guide-to-threat-hunting\/\" target=\"_blank\" rel=\"noopener nofollow\">threat hunting<\/a> and configuration management should be carried out to secure against 5G threats.<\/p>\n<p>But there\u2019s more to do to keep our cities and societies safe.<\/p>\n<h2>How do we ensure 5G safety?<\/h2>\n<p>There are many solutions to protecting smart cities in the age of 5G, from full audits to anomaly detection. One I\u2019d like to highlight is hybrid authentication.<\/p>\n<p>In 2G to 4G, network authentication \u2013 a security process when a computer on a network tries to connect to a server \u2013 has previously been a straightforward process between service and network providers, and the user\u2019s device. Network authentication liberates the user from having to authenticate for every service they need access to; a single network authentication is sufficient.<\/p>\n<p>When it comes to an entire network of connected devices, authentication must be as safe and secure as possible. One security recommendation for this relies on network-based authentication.<\/p>\n<p>5G network security will require flexibility for organizations to manage multiple unknown devices with various levels of security, moving away from previous authentication models. A new, unified hybrid framework is needed to coordinate different security methods for each security layer. If devices can\u2019t be authenticated, are misbehaving or not adequately set, we need processes in place to isolate them.<\/p>\n<p>Ultimately, 5G is a technology advancement that will help us combat many of the world\u2019s problems. But we have to make sure we\u2019re wholly certain about the threats that it could bring and help governing bodies and our civic leaders prepare so safer smart cities can benefit our lives.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>5G is the foundation for many futuristic technologies that will connect our cities in ways we\u2019ve never seen before. Here\u2019s what that means for security.<\/p>\n","protected":false},"author":2558,"featured_media":48581,"template":"","coauthors":[3656],"class_list":{"0":"post-32175","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-emerging-tech","7":"emagazine-category-internet-of-things","8":"emagazine-category-opinions","9":"emagazine-tag-5g","10":"emagazine-tag-smart-cities"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/5g-securing-smart-cities\/32175\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/5g-securing-smart-cities\/21785\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/secure-futures-magazine\/5g-securing-smart-cities\/21209\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/secure-futures-magazine\/5g-securing-smart-cities\/17033\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/32175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2558"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/48581"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=32175"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=32175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}