In this Information Age article, Dr. Karpliuk provides several reasons for building security into IoT devices rather than trying to bolt it on later. This is exactly the case for 5G deployments – attention must be given to evaluating privacy and security, especially for 5G applications where processing IoT data at the edge is crucial.
For this to be a reality, manufacturers must have methods in place to support secure key generation and key provisioning during manufacture and after being deployed. Effective key management throughout the product lifecycle directly affects the security of the device and the entire ecosystem.
Information Age takes a more in-depth look at how the “IoT and privacy, IoT and data insights: four considerations.”