Influence of 5G Technology on IOT Devices and The Vulnerabilities Associated
Evaluation Criteria:
– The abstract of the project (not more than 400 words)
– Introduction
– The importance of the study (i.e., how your IT research project will enhance our current
knowledge)
– The structure of the project. In other words, after mentioning the importance of your
study, you should briefly inform readers about you will complete the current study.
– Research question(s) of the study
– Methodology of the study
– Discussion
– Conclusion
Problem Statement:
The onset of 5G technology provides data speeds up to ten times faster than legacy LTE, with this in mind, it is reported that IOT devices are expected to increase from 700 million devices currently to 3.2 billion by 2023. While there are numerous factors for the exponential increase of IOT devices, one of the main reasons is 5G technology. As a result, a couple of issues arise, each relating to cyber security; one issue specific to the 5G network and the other to IOT devices.
Legacy LTE was a hardware based network, 5G technology is a distributed software design. The hardware based network allowed for choke points where security could be implemented, 5G technology does not allow this. With so many IOT devices coming online and many of them having multiple access points (5G/WIFI/BlueTooth), an exploitation via 5G could give a bad actor access to the other networks linked to the IOT device.
This study will contribute to the current literature by explaining how not only 5G technology influences IOT devices but also what security vulnerabilities come about as a result.
The importance is to provide ideas on how to minimize or mitigate risk to IOT devices that use 5G technology.
Research Questions:
1) What are the causes of IOT device data breaches within 5G networks
2) What is the impact of IOT device data breaches using 5G networks to the organization and stakeholders who rely on the device?
3) How can data breaches of IOT devices on 5G networks be mitigated or prevented?