Home | Reports | Technical Documents | Tech-Blog | One-Shot Gallery | Korea ICT News | About Us | List of Contributors | Become a Contributor |  How to Advertise  
 
  KT SK Telecom LG U+ Korean Vendors Network Architectures  
 
Section 5G 4G LTE C-RAN/Fronthaul Gigabit Internet IPTV/Video Streaming IoT SDN/NFV Wi-Fi KT SK Telecom LG U+ Network Protocol Samsung  
 
NETMANIAS
TECH-BLOG
Online viewer:
Friday, 22 September, 2017, I gave a talk at the IEEE 5G Summit held at Kogakuin University in Tokyo. My talk was about 5G security reality check where I covered 3GPP standardization status, solutions that are already in specifications and several other aspects necessary to make 5G secure. I wil...
Date: 11/15/2017
Author: Anand R. Prasad @ 3GPP/NEC
Tags: 5G, Security
693
  
 0
Online viewer:
In a previous article I had pleaded for the identification of the DTE (the computer, the smartphone or other connected object), not the DCE (modem) or NIC (Network Interface Card). A digital identity for the IoT, which we started calling the "telecoin" here at Nokia. Telecoins can be mined in a f...
Date: 11/02/2017
Author: Thierry Van de Velde @ Nokia Networks
676
  
 0
Online viewer:
My observation after the two days was that there are several security solutions around but vehicle (connected or not) industry has still a lot to work on. As vehicles get more and more connected, vehicle industry will face issues beyond their normal comfort zone. The industry will have to take se...
Date: 10/04/2017
Author: Anand R. Prasad @ 3GPP/NEC
599
  
 1
Online viewer:
Going by a recent BI Intelligence report, there will be close to 35 billion ‘connected devices’ in active use by the end of this decade – with business being the biggest sector to use this technology. However, in the rush to come up with new and innovative IoT tools, platforms and gateways – the...
Date: 07/24/2017
Author: Romit Atta @ Teknowledge Mobile Studio
Tags: IoT, Security
1,212
  
 3
Online viewer:
Most of SD-WAN players focus on site-to-site links (through MPLS or VPNs) or site-to-cloud (mainly AWS and Azure). This means that this devices will be exposed on internet. Are they strong enough to protect themselves from botnets, scripts kiddies or some other basic attaks? Most of SD-WAN manufa...
Date: 07/03/2017
Author: Michel Boulay @ FMlogistic
2,106
  
 7
Online viewer:
There are several opinion out there in security, some referring to a vehicle as a Internet of things (IOT) device but vehicle should not be bunched in the IOT lot. Vehicle is a collection of IOT devices with different services and deserves a different angle for security considerations.
Date: 05/15/2017
Author: Anand R. Prasad @ 3GPP/NEC
1,545
  
 1
Online viewer:
Microsegmentation allows a flexible and optimized way of providing security services to the places where traditional security technologies can’t reach or don’t scale. Microsegmentation can be equally applied to Virtual as well as Bare Metal workloads or Overlay / Underlay Networks.
Date: 05/01/2017
Author: Ari Chakrabarti @ Financial Institution Consulting
1,384
  
 0
Online viewer:
AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization, and accounting (AAA) services. The AAA server typically interacts with network access and gateway servers and with databases and directories c...
Date: 01/20/2017
Author: Mojtaba HOUSHMAND @ MobinNet Telecom
3,081
  
 0
Online viewer:
Last week’s DDOS (Distributed Denial of Service) attack may have caused companies up to $110 million in lost revenue and sales
Date: 11/09/2016
Author: Zeeshan Rizvi @ Cisco
3,022
  
 0
Online viewer:
In this part I present rest of the security considerations for 5G IOT on spectrum, security credentials, devices, services, business, user space and more. Once again, on purpose I do not discuss about global activities on 5G IOT and security.
Date: 09/22/2016
Author: Anand R. Prasad @ 3GPP/NEC
Tags: 5G, IoT, Security
3,024
  
 0
1
         
   

We are pleased to share with you all interesting articles contributed by industrial experts

 

List of Contributors

 

Become a Contributor

 
         
         

 

 


 

 

View All (734)
4.5G (1) 5G (66) AI (3) AR (1) ARP (3) AT&T (1) Akamai (1) Authentication (5) Big Data (2) C-RAN/Fronthaul (17) CDN (4) CPRI (4) Carrier Ethernet (3) China Mobile (2) Cloud (2) CoMP (6) Connected Car (4) DHCP (5) Ericsson (1) FTTH (6) GSLB (1) GiGAtopia (2) Gigabit Internet (19) Google (7) Google Global Cache (3) HLS (5) HSDPA (2) HTTP Adaptive Streaming (5) Handover (1) Huawei (1) IEEE 802.1 (1) IP Routing (7) IPTV (21) IoST (3) IoT (51) KT (40) Korea (19) Korea ICT Market (1) Korea ICT Service (13) Korea ICT Vendor (1) LG U+ (18) LTE (74) LTE-A (16) LTE-B (1) LTE-H (2) LTE-M (3) LTE-U (4) LoRa (7) MPLS (1) MPTCP (3) MWC 2015 (8) NB-IoT (6) Netflix (2) Network Protocol (20) Network Slicing (4) New Radio (6) Nokia (1) OSPF (2) OTT (3) PCRF (1) Platform (2) QoS (3) RCS (3) SD-WAN (15) SDN/NFV (57) SK Broadband (2) SK Telecom (33) Samsung (5) Security (13) Self-Driving (1) Small Cell (2) Spectrum Sharing (2) Switching (6) TAU (2) UHD (5) VR (2) Video Streaming (12) VoLTE (8) VoWiFi (2) Wi-Fi (27) YouTube (6) eICIC (1) eMBMS (1) iBeacon (1) telecoin (1)

 

 

     
         
     

 

     
     

Subscribe FREE

Currently, 47,000+ subscribed to Netmanias.

  • You can get Netmanias Newsletter

  • You can download all netmanias' contents in pdf file

     
     

 

     
         
     

 

 

     
  SPONSOR CONTENTS  
     
     
   
 HFR »  LTE Fronthaul Solution

 

HFR's flexiHaulTM Active WDM Fronthaul Solution

 

    Datasheet
  flexiHaulTM Product Overview