Blockchain Can Improve 5G

The biggest issue in the mobile industry right now is the introduction of fith generation of wireless network technology, generally referred to as 5G. The introduction of new 5G networks has become an urgent issue both network operators and carriers and handset manufacturers.

In particular, the combination of 5G and blockchain technology has the potential to unleash a surge of economic value. In order to understand this connection between 5G and blockchain, one must think of the relationship as multifold. 

The power of 5G coverage through its reduced latency, high speeds and capacity allows for IoT devices to become widely used. Simultaneously, these devices can leverage the security, decentralisation, immutability and consensus arbitration of blockchains as foundational layers.

Many telecoms industry experts think  that blockchain technology has significant use cases that could improve the 5G mobile network. 

According to estimates by China Telecom in 2019, China’s 5G services are expected to have approximately 170 million subscribers by the end of 2020. China Telecom expects blockchain to play a crucial role in trusted management, secure interaction, and efficient collaboration among multiple participants of the network and devices. The application of Blockchain in 5G will introduce 'social capital' in the 5G landscape, helping the industry crowdsource the 5G infrastructure.

The key issues of scalability and interoperability are two challenges that hinder the integration of these two technologies. ​The benefits of 5G are its high speeds, capacity, low latency and ability to connect with vast numbers of devices. Latency refers to the time between when a signal is sent and received. In Blockchain terms, latency is the time between a transaction being broadcast and it being received by nodes. 

While 5G will directly assist blockchains by increasing node participation and decentralisation, as well as allowing for shorter block times, driving forward on-chain scalability, all of which, in turn, further supporting growth of the IoT economy.

Asia Times:       Coin Telegraph:      Coin Tetelgraph:

You Might Also Read:

5G Security: Possible Risks & Challenges:
 

 

 

« The Influence Of AI On Cyber Security
PIN Authentication Significantly Reduces Cyber Attacks & Data Breaches »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

Sucuri

Sucuri

Sucuri have offered holistic website security solutions since 2008 including malware removal, malware monitoring and website protection services.

We Watch Your Website

We Watch Your Website

We Watch Your Website provide website monitoring, protection, malware removal and root cause analysis services to help you keep your website secure.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

NFIR

NFIR

NFIR is a specialist in the field of cyber security incident response and digital forensics.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

NeuShield

NeuShield

NeuShield is the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup.

CoverWallet

CoverWallet

CoverWallet combines deep analytics, thoughtful design and state of the art technology to help small businesses with all their insurance needs including Cyber Liability.

QNu Labs

QNu Labs

QNu Labs’s quantum-safe cryptography products and solutions assure unconditional security of critical data on the internet and cloud across all industry verticals, globally.

Wavex Technology

Wavex Technology

Wavex Technology is an award winning IT Services firm offering clients a secure and fully managed IT service.

Panther Labs

Panther Labs

Panther’s mission is to make security monitoring fast, flexible and scalable for all security teams.

CyberUSA

CyberUSA

CyberUSA is a collaboration of leaders and states focused on a common mission purpose of enabling innovation, education, workforce development, enhanced cyber readiness and resilience.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.

View

View

View is the leader in smart building technologies including OT cybersecurity to securely connect buildings to the cloud and manage building networks and OT devices.