5G Is Poised to Revolutionize Industries Beyond Telecommunications

Guest writer | December 6, 2018

article image
The pace of technological innovation has increased exponentially over the past century. It took the telephone 75 years to reach 50 million users. It took the Internet only four years to reach the same number. However, those metrics pale in comparison to the success of the smartphone game Pokemon Go, which was released in the summer of 2016. It reached 50 million users in only 19 days. With 5G networks on the horizon, user bases will continue to grow at breakneck pace. This next-generation network will accelerate innovation in a broad set of industry verticals—including media, entertainment, healthcare, and agriculture—and each will have its own requirements and uses. Every sector will fall into one of three categories: Enhanced Mobile Broadband (eMBB), Massive Internet of Things (MIoT), and Ultra-Reliable Low Latency Communication (uRLLC). These three standards will help usher in explosive developments in the industries that use them.

Spotlight

Prempoint Inc

Prempoint Inc. designs and develops a mobile solution that is revolutionizing access control and publishing for the Internet of Things. Our solution streamlines access control through self-service and provides workflow automation for industries like property management, home services, events, and travel/hospitality with a simple mission: Share secure access to anything using just your smart device. Visit www.prempoint.com to learn more about our solution for the Internet of Things.

OTHER ARTICLES

How Retail Security Can Welcome IoT Innovations Without Putting Customers at Risk

Article | March 11, 2020

Retail businesses, from mom-and-pop shops to major department stores, are investing heavily in technology to enhance the in-store experience. With the imminent arrival of mainstream 5G, smarter systems are expected to dominate the retail space as the internet of things (IoT) expands. But as we know from connected device deployments in other sectors, such as financial services and healthcare, the IoT is fraught with security vulnerabilities. For retail security, the risks of deploying IoT devices are no less dire. As organizations rely more on the IoT to enable internet connection at every stage of the retail process, protecting IoT infrastructure is critical. Getting on board with the right mindset can go a long way toward achieving a win-win for retail security.

Read More

Breaking Down IoT Standards and Protocols

Article | March 10, 2020

The Internet of Things has given rise to a host of new standards and protocols. Still more protocols that originally existed for other purposes but are well suited to new IoT applications have been adopted by device manufacturers and application creators. Though in some senses IoT devices are the same as any other internet-connected device, the bandwidth, power, and transmission distance constraints inherent in many IoT applications require novel new solutions to the fundamental actions of connectivity, data transfer, device discovery, and communication. This article will serve as a brief glossary of terms related to IoT communication protocols and standards. Click here for a more complete introduction to connectivity options.

Read More

Run-Time Provisioning of Security Credentials for IoT Devices

Article | March 20, 2020

To prevent counterfeit devices from joining a network or to limit the opportunity for network attacks, it’s important to authenticate devices attempting to join Internet of Things (IoT) networks and subsequently connect only authorized devices. The standard mechanism to securely authenticate clients connecting to a server is transport-layer-security (TLS) client-side authentication. To implement such authentication in an IoT network, the appropriate certificate authority (CA)—usually the IoT device provider—issues a unique X.509 certificate to each IoT device and the associated private key that functions as a unique security credential for the IoT device. Once the certificate and associated private key are stored on the IoT device, it may use them during the TLS client-authentication process to securely join the IoT network.

Read More

An Introduction to IoT Sensors

Article | March 5, 2020

This post will cover various important sensors that are possibilities for an IoT deployment. Sensors are the backbone of any IoT deployment. They gather information and provide software with sensory information it needs to achieve its full potential. In addition, this post will go over considerations and decision-making for selecting sensors in an IoT deployment. Often times, a single sensor is not the best implementation, a suite of sensors can gather more data and even affect behavior for other sensors. In many cases, more than one sensor is necessary to perform the IoT deployment’s function. Sensors are just as critical to every IoT application as the internet. Imagine Alexa or Google Home without a microphone: it wouldn’t work. People wouldn’t be able to interact with the device, or it would need some other kind of sensor such as a keyboard to obtain input from a user.

Read More

Spotlight

Prempoint Inc

Prempoint Inc. designs and develops a mobile solution that is revolutionizing access control and publishing for the Internet of Things. Our solution streamlines access control through self-service and provides workflow automation for industries like property management, home services, events, and travel/hospitality with a simple mission: Share secure access to anything using just your smart device. Visit www.prempoint.com to learn more about our solution for the Internet of Things.

Events