|
IoT device issue | 5G Support |
|
Low complexity devices | Broad standardization leads to simplification e.g., SOC (System on a Chip) and/or ASIC (Application Specific IC) development |
|
Limited on-board power | Technology allows a battery life ~10 years |
|
Device mobility | Good mobility support in a cellular/5G system |
|
Open environment | Broad standardization leads to broad acceptance of the technology |
|
Devices universe by type and by cardinality | Standardized air interfaces can reduce certain aspects of the end-node, just like Ethernet simplified connectivity to a network, regardless of the functionality of the processor per se |
|
Always connected/always on mode of operation | Cost-effective connectivity services allow the always on mode of operation |
|
IoT security (IoTSec) concerns [59, 60] | Security capabilities are being added. The use of 256-bit symmetric cryptography mechanisms is expected to be fully incorporated. The encryption algorithms are based on SNOW 3G, AES-CTR, and ZUC; and integrity algorithms are based on SNOW 3G, AES-CMAC, and ZUC. The main key derivation function is based on HMAC-SHA-256. Identity management (e.g., via the 5G authentication and key agreement [5G AKA] protocol and/or the Extensible Authentication Protocol [EAP]), Privacy (conforming to the General Data Protection Regulation [GDPR]), and Security assurance (e.g., using Network Equipment Security Assurance Scheme [NESAS]) are supported. Some of these mechanisms are described [61ā65]. As another example, the ETSI Technical Committee on Cybersecurity issued in 2018 two encryption specifications for access control in highly distributed systems such as G and IoT. Attribute-Based Encryption (ABE) that describes how to secure personal data. |
|
Lack of agreed-upon end-to-end standards | Broad standardization possible with 5G if the technology is broadly deployed and is cost-effective |
|
Lack of agreed-upon end-to-end architecture | Standardization at the lower layers (Data Link Control and Physical) can drive the development of a more inclusive multi-layer multi-application architecture |
|