Blockchain Can Improve 5G

The biggest issue in the mobile industry right now is the introduction of fith generation of wireless network technology, generally referred to as 5G. The introduction of new 5G networks has become an urgent issue both network operators and carriers and handset manufacturers.

In particular, the combination of 5G and blockchain technology has the potential to unleash a surge of economic value. In order to understand this connection between 5G and blockchain, one must think of the relationship as multifold. 

The power of 5G coverage through its reduced latency, high speeds and capacity allows for IoT devices to become widely used. Simultaneously, these devices can leverage the security, decentralisation, immutability and consensus arbitration of blockchains as foundational layers.

Many telecoms industry experts think  that blockchain technology has significant use cases that could improve the 5G mobile network. 

According to estimates by China Telecom in 2019, China’s 5G services are expected to have approximately 170 million subscribers by the end of 2020. China Telecom expects blockchain to play a crucial role in trusted management, secure interaction, and efficient collaboration among multiple participants of the network and devices. The application of Blockchain in 5G will introduce 'social capital' in the 5G landscape, helping the industry crowdsource the 5G infrastructure.

The key issues of scalability and interoperability are two challenges that hinder the integration of these two technologies. ​The benefits of 5G are its high speeds, capacity, low latency and ability to connect with vast numbers of devices. Latency refers to the time between when a signal is sent and received. In Blockchain terms, latency is the time between a transaction being broadcast and it being received by nodes. 

While 5G will directly assist blockchains by increasing node participation and decentralisation, as well as allowing for shorter block times, driving forward on-chain scalability, all of which, in turn, further supporting growth of the IoT economy.

Asia Times:       Coin Telegraph:      Coin Tetelgraph:

You Might Also Read:

5G Security: Possible Risks & Challenges:
 

 

 

« The Influence Of AI On Cyber Security
PIN Authentication Significantly Reduces Cyber Attacks & Data Breaches »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

Alan Boswell Group

Alan Boswell Group

We are a Group of Companies providing specialist Insurance Broking and Risk Management advice and services including Cyber Risk cover.

Sepio Cyber

Sepio Cyber

Sepio is the leading asset risk management platform that operates on asset existence rather than activity.

Niksun

Niksun

Niksun's forensics-based cyber security and network performance monitoring products provide customers with actionable insight into security threats, performance issues, and compliance risks.

Achtwerk

Achtwerk

Achtwerk manufacture the security appliance IRMA for critical infrastructures and networked automation in production plants.

Crayonic

Crayonic

Crayonic digital identity technologies protect and guarantee the identity of people and things.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

Council to Secure the Digital Economy (CSDE)

Council to Secure the Digital Economy (CSDE)

CSDE brings together companies from across the ICT sector to combat increasingly sophisticated and emerging cyber threats through collaborative actions.

Nettoken

Nettoken

Nettoken is the first identity management platform designed for everyday internet users, to encourage awareness and control of our ever expanding digital footprint and personal cybersecurity.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

Broadcom

Broadcom

Broadcom is a global technology leader that designs, develops and supplies a broad range of semiconductor and infrastructure software solutions.

European Cyber Competence Network

European Cyber Competence Network

The purpose of the European Cyber Competence Network is to retain and develop the cybersecurity technological and industrial capacities of the EU necessary to secure its Digital Single Market.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.

SquareX

SquareX

Squarex secures your online activities without compromising productivity.

Ventum Consulting

Ventum Consulting

Ventum Consulting stands for digitalization, networking and agilization. We take this up on the strategic, professional and technical side and support our customers in the digital transformation.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.