This article originally appeared in the June 2021 issue of Security Business magazine. When sharing, don’t forget to mention Security Business magazine on LinkedIn and @SecBusinessMag on Twitter.
Editor's Note: Security Business welcomes seasoned security consultant Jon Polly of ProTecht Solutions Partners as our newest Tech Trends contributor.
It seems like on most ads and media platforms, 5G is being touted as the next big thing. To be quite honest, it is. Most people in the general public are excited for the “unlimited bandwidth” they will have to watch movies from their phone and the ability to further cut the cable from “hardwired” internet.
For businesses, critical infrastructure and cities, 5G means a cybersecure cellular network with high bandwidth and low latency that enables them to put devices on the network where they need them – in places traditional infrastructure either cannot go or is not fiscally possible.
5G connectivity is now being built into business continuity, as businesses prepare for the future. While 5G providers advertise 5G as the future of connectivity, it is not magic. At its heart, 5G is frequency and math.
The 5G Ecosystem Explained
5G is a cellular technology that incorporates three blocks of FCC frequencies to provide gigabit or better bandwidth for subscribers. The three blocks of frequencies have been broken into High, Mid and Low band connectivity. Connectivity is achieved by connection to a singular frequency at a time, but to the user, it should be seamless as to which frequency they are in.
This mix of frequencies and Dynamic Spectrum Sharing (DSS) – a technology that allows cellular providers to interweave and dynamically share the three frequencies – creates high bandwidth throughput and low latency for exponentially connected devices.
High Band – 24Ghz to 40Ghz mmWave frequency. This “new” frequency has been reallocated for 5G connectivity. Millimeter Wave (mmWave) is akin to a quarter-inch drill bit or smaller in which 1Gb+ of data will travel. For all FCC frequencies, the higher the frequency, the higher the throughput available. For the 24Ghz to 40Ghz range, line of sight between radios is required, which prevents building penetration.
Mid Band – 3.55Ghz to 3.7Ghz frequency. This frequency has been around for a while with specific uses as ship-to-shore radio. Recently, the FCC auctioned this frequency off as a Citizens Band Radio Service (CBRS) for mid-band 5G frequency and rural internet connectivity. The CBRS frequency offers 150Mb throughput per link. The CBRS band is being used by 5G providers as the connectivity when there is no line of sight (learn more about CBRS in Ray Coulombe’s Tech Trends article from one year ago at www.securityinfowatch.com/21138612).
Low Band – These are 4G LTE frequencies that will be incorporated with the 5G offer. This is where some 5G providers are claiming 5G today when 4G LTE is the only offer. 4G LTE offers limited throughput, but increased building penetration.
The addition of these three frequency bands completes the 5G offer. The current 5G offer is not fully built out with varying experts saying 5% to 60% completion. Today, some major metropolitan areas are seeing mediocre connectivity; minor metropolitan areas are still being built out; and rural areas may see 5G in their cell phone store’s window, but they are currently only on 4G LTE with a higher price. Additionally, since the CBRS frequency is shared with ship-to-shore communications, in coastal areas the 5G offer may be limited.
5G for the Security Industry
Where does the 5G future come for the security industry?
To begin with, security industry vendors and integrators must realize that that are part of the Internet of Things (IoT) machine. Security endpoints are now IoT edge sensors. Security panels and NVRS are now IoT appliances. Video Management Systems (VMS) and access control systems are now edge applications. 5G will offer connectivity to these IoT devices in time.
By implementing Dynamic Spectrum Sharing (DSS) as more people move from 4G LTE to 5G bandwidths, the 4G LTE bandwidths will be opened up for the use of IoT connectivity. Today, some 5G providers offer an IoT “backchannel” that is like an eight-lane highway with only six cars on it. In the future, this highway will be used for a majority of IoT connectivity. Since it is a “backchannel,” data is secured from public cellular traffic.
IoT sim cards are already being offered with cheaper activation fees and specialized data plans offered through specific resellers. This offers security integrators increased revenue opportunities.
Going forward, IoT sensors – including traditional security edge devices – will have connectivity limited only by interference. Businesses, critical infrastructure, and cities will require IoT devices in the harshest conditions with mission-critical critical connectivity and remote access. 5G connectivity will, in time, allow this.
Higher megapixel cameras require higher bandwidth with reduced latency to bring video from the edge to where it is needed. 5G connectivity will enhance cloud offerings or real-time dashboards of customer sensors. This connectivity will add to SaaS offerings, and both integrator and manufacturer direct offers.
5G will offer connectivity to millions of devices – some of which are security industry IoT devices. Unlike traditional networks though, 5G will be primarily a distributed software defined network with millions of connected devices. With a target-rich environment, cybersecurity is critical of all 5G implementations. This may be built in by the 5G providers, but most implementation will require additional cybersecurity hardening to keep hackers from infiltrating the network.
Like it or not, the 5G behemoth is coming. It is not magic; more importantly it is opening new doors for the security industry. Traditional security sensors, appliances, and applications are being moved to the edge. Businesses are now requiring connectivity to remote locations and to technology never before connected to.
Opportunity is knocking. Now is the time for the security industry to look to where the world is heading.
Jon Polly is the Chief Solutions Officer for ProTecht Solutions Partners www.protechtsolutionspartners.com, a security consulting company focused on smart city surveillance. Connect with him on linkedin: www.linkedin.com/in/jonpolly.
Jon Polly
Jon Polly is the Chief Solutions Officer for ProTecht Solutions Partners (www.protechtsolutionspartners.com), , a security technology consulting firm that works with smart cities and corporations to bring business intelligence and public safety through security IoT applications. He has worked as a Project Manager and System Designer for City-Wide surveillance and Transportation camera projects in Raleigh and Charlotte, N.C.; Charleston, S.C.; and Washington, D.C. He is certified in Critical Chain Project Management (IC3PM) by the International Supply Chain Education Alliance (ISCEA). • (704) 759-6837