Industrial manufacturing
Industrial Internet of Things | Industrial materials | Equipment Maintenance and Repair | Industrial programming |
home  MfgRobots >> Industrial manufacturing >  >> Industrial Internet of Things >> Internet of Things Technology

Security, not COVID‑19, hinders 5G’s commercial rollout

Security, not COVID‑19, hinders 5G’s commercial rollout

Since the onset of the COVID‑19 pandemic, misinformation linking 5G to health risks has spread rapidly across social media. In several European countries, telecom towers were vandalised or destroyed, and in the UK, dozens of masts were targeted and technicians harassed, according to regional VP of sales for A10 Networks, Adrian Taylor.

The WHO’s COVID‑19 myth‑buster page has explicitly debunked the claim that “viruses cannot travel on radio waves,” noting that the virus spreads in countries without 5G. Despite this, fear of 5G remains a tangible barrier to commercial rollout.

In response, A10 Networks published “Toward a More Secure 5G World.” The study finds that while COVID‑19 may cause short‑term delays, the market demand for high‑speed, high‑capacity 5G remains strong. A striking 81 % of respondents say the industry is moving rapidly—especially in key markets.

However, the report highlights cybersecurity as the primary concern. As traffic, connected devices, and mission‑critical IoT expand, so does the attack surface. Ninety‑nine percent of respondents expect security challenges to rise, and 93 % say they will adjust investments in light of 5G.

Service providers therefore need cost‑effective, scalable security that protects every layer of the network while enabling cloud and edge integration. A comprehensive stack must include a Gi/SGi firewall, deep‑packet inspection, carrier‑grade NAT, IPv6 migration tools, DDoS protection, intelligent traffic steering, and analytics.

Below is a concise blueprint of five essential solutions for a secure 5G migration.

Gi‑LAN Security – Gi/SGi Firewall

Threats to subscribers and infrastructure most often enter through the internet interface. A dedicated Gi/SGi firewall offers the performance and scalability carriers demand while reducing CAPEX and OPEX. The solution can be deployed as a virtual appliance for rapid, on‑demand scaling.

Mobile Roaming Security – GTP Firewall

The GTP protocol, used in roaming and other EPC interfaces, has known vulnerabilities that attackers can exploit. A GTP firewall delivers stateful inspection, rate limiting, and traffic filtering to neutralise protocol abuses, fraud, and DDoS attacks. It is typically inserted on the S5‑Gn and S8‑Gp interfaces.

Network Slicing – Intelligent Traffic Steering

Network slicing enables operators to isolate traffic for distinct verticals, delivering tailored security and monetisation while preserving shared infrastructure economies. By classifying traffic by radio type, IP, DNS, device, and subscriber, the solution redirects each slice to specialised protection platforms, enhancing security without over‑loading the core.

Network‑Wide DDoS Detection and Mitigation

Mobile operators must maintain constant availability. DDoS attacks can overwhelm core elements or target specific services. A layered, network‑wide approach that detects and mitigates volumetric and sophisticated attacks preserves critical traffic and reduces the need for costly over‑provisioning.

Secure, Efficient MEC

Security, not COVID‑19, hinders 5G’s commercial rollout

Multi‑Access Edge Compute moves processing to the network edge, but the distributed architecture demands robust automation and analytics. A10’s Thunder CFW delivers low‑latency, high‑performance firewall, CGNAT, IPv6 migration, and traffic steering in a single, cost‑effective appliance—virtual, bare‑metal, or container—simplifying operations and reducing TCO.

According to the 2020 A10 study, leading carriers worldwide are on track with their 5G plans and will begin commercial build‑outs soon. Operators must pre‑emptively fortify key edge points, adopt cloud‑native infrastructure, consolidate functions, and embrace DevOps‑driven, service‑based architectures. These investments pay immediate dividends and accelerate broader 5G adoption.

The author is Adrian Taylor, regional VP of sales for A10 Networks.

Internet of Things Technology

  1. HIMSS18: Healthcare Innovation Requires More Than Technology
  2. Securing Manufacturing Networks: Cisco’s Advanced Cell/Area Zone Security & Industry Standards
  3. Four Critical IoT Security Threats in 2015 — What Developers Need to Know
  4. Proactive Strategies to Secure IoT Development from the Ground Up
  5. IoT Security Alarm Bells Ring: Survey Shows 84% Expect Breach
  6. Essential Hardware Security Vulnerabilities Every Engineer Must Understand
  7. IoT Security: Overcoming Deployment Barriers
  8. Building a Managed IoT Ecosystem That Works: Flexibility, Security & Standardization
  9. Navigating Security Challenges in Next‑Generation 5G and IPv6 Networks
  10. 8 Key Security Challenges Facing Industrial IoT