February 26, 2024

We are creating some awesome events for you. Kindly bear with us.

Creating Robust 5G, IoT Situational Awareness System

The Cybersecurity and Infrastructure Security Agency (CISA) is asking researchers and entrepreneurs for information on developing a ubiquitous and robust 5G/ Internet-of-Things (IoT) Situational Awareness System (5i SAS). The system must enhance situational awareness of current platforms and identify potentially dangerous 5G components and internet-of-things devices.

Without a way to distinguish normal 5G and IoT conditions from suspicious environments, exploits on personnel or systems could go undetected and cyberattacks would be untraceable. As the introduction of 5G will enable billions of devices connected to the network with direct communication to one another, the development of a 5i SAS capability essential

For example, modified 5G smartphones could serve as 5i SAS devices because they are common in populated areas and already outfitted with a variety of sensors that could detect anomalous activity, such as irregular heartbeats, gunshots or explosions, extreme heat or changes in acceleration.

5G-enabled devices could also be enlisted to detect suspicious electromagnetic activity in secure facilities, jamming or interference on 5G or IoT channels, unexplained device downgrades from 5G to 3G, sudden radiofrequency energy spikes that can harm personnel as well as rogue networks.

In support of CISA, the Department of Homeland Security’s Small Business Innovation Program outlined features it envisions in a 5i SAS mobile device:

  • Secure containers operating on a 5i SAS would require a mobile operating system platform with enough memory and computational power to perform its sensor functions without significantly affecting the normal phone or device functions (e.g., calls, text, app use, device telemetry, or GPS function, other containers).
  • Mobile devices with secure containers may be capable of having several different functions in one device, such as a 5i SAS sensor, a UNCLASS smartphone (not intended to need controlled unclassified information [CUI] protections) with defences against compromised microphones and cameras, a similar CUI-use smartphone with secure voice and text apps, a laptop replacement (if mated to a dumb terminal), and optionally a classified container for Type 1 secure voice, video, and text capabilities.
  • Mobile operating systems should allow for separate 5i SAS virtual containers that can operate autonomously from the user, and is centrally managed, and whose data is sent to a cloud-based data analysis engine to determine if safety or security is potentially at risk.
  • If enough of these 5i SAS devices are issued, then they could not only detect unhealthy/insecure situations, they could also triangulate the physical location of suspicious IoT and 5G devices, or jamming sources, or anomalous network behaviour.
  • 5i SAS may include federal and state, local, tribal and territorial (SLTT) users; so, managing need to know should be a design consideration.
  • Applicable certifications and manufacturing readiness will need to be performed for commercialisation.

Although the request for the technology has been made on behalf of CISA, other federal and state, local, tribal and territorial governments may need to use it. If enough 5i SAS devices are issued, they could not only detect unhealthy/insecure situations, they could also triangulate the physical location of suspicious IoT and 5G devices, or jamming sources or anomalous network behaviour.

Considering the significance of 5G architectures to many industries, governments also need to mitigate and calculate its risks. As reported by OpenGov Asia, Cybersecurity and Infrastructure Security Agency (CISA) collaborates with the National Security Agency  (NSA) and the Office of the Director of National Intelligence to outline the risks to 5G that threaten national and economic security and could impact other national and global interests. They released a paper titled Potential Threat Vectors to 5G Infrastructure. This paper identifies and assesses risks and vulnerabilities introduced by 5G.

PARTNER

Qlik’s vision is a data-literate world, where everyone can use data and analytics to improve decision-making and solve their most challenging problems. A private company, Qlik offers real-time data integration and analytics solutions, powered by Qlik Cloud, to close the gaps between data, insights and action. By transforming data into Active Intelligence, businesses can drive better decisions, improve revenue and profitability, and optimize customer relationships. Qlik serves more than 38,000 active customers in over 100 countries.

PARTNER

CTC Global Singapore, a premier end-to-end IT solutions provider, is a fully owned subsidiary of ITOCHU Techno-Solutions Corporation (CTC) and ITOCHU Corporation.

Since 1972, CTC has established itself as one of the country’s top IT solutions providers. With 50 years of experience, headed by an experienced management team and staffed by over 200 qualified IT professionals, we support organizations with integrated IT solutions expertise in Autonomous IT, Cyber Security, Digital Transformation, Enterprise Cloud Infrastructure, Workplace Modernization and Professional Services.

Well-known for our strengths in system integration and consultation, CTC Global proves to be the preferred IT outsourcing destination for organizations all over Singapore today.

PARTNER

Planview has one mission: to build the future of connected work. Our solutions enable organizations to connect the business from ideas to impact, empowering companies to accelerate the achievement of what matters most. Planview’s full spectrum of Portfolio Management and Work Management solutions creates an organizational focus on the strategic outcomes that matter and empowers teams to deliver their best work, no matter how they work. The comprehensive Planview platform and enterprise success model enables customers to deliver innovative, competitive products, services, and customer experiences. Headquartered in Austin, Texas, with locations around the world, Planview has more than 1,300 employees supporting 4,500 customers and 2.6 million users worldwide. For more information, visit www.planview.com.

SUPPORTING ORGANISATION

SIRIM is a premier industrial research and technology organisation in Malaysia, wholly-owned by the Minister​ of Finance Incorporated. With over forty years of experience and expertise, SIRIM is mandated as the machinery for research and technology development, and the national champion of quality. SIRIM has always played a major role in the development of the country’s private sector. By tapping into our expertise and knowledge base, we focus on developing new technologies and improvements in the manufacturing, technology and services sectors. We nurture Small Medium Enterprises (SME) growth with solutions for technology penetration and upgrading, making it an ideal technology partner for SMEs.

PARTNER

HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. HashiCorp tools allow organizations to deliver applications faster by helping enterprises transition from manual processes and ITIL practices to self-service automation and DevOps practices. 

PARTNER

IBM is a leading global hybrid cloud and AI, and business services provider. We help clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. Nearly 3,000 government and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM’s hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently and securely. IBM’s breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and business services deliver open and flexible options to our clients. All of this is backed by IBM’s legendary commitment to trust, transparency, responsibility, inclusivity and service.

Send this to a friend