Wi-Fi 6 and 5G: Which is more secure, and where will our data go?

Wi-Fi 6 and 5G: Which is more secure, and where will our data go?

Historically, one of the biggest drawbacks of Wi-Fi, especially compared to cellular networks, is the level of security it can provide. Unlike Wi-Fi, wireless cellular technology has an over-the-air security layer as well as the security provided by SIM card authentication introduced in 2G. These features make 5G a more secure option for enterprises or venues, said Adam Smith, director of product marketing at LitePoint.

[[339176]]

However, Kevin Robinson, senior vice president of marketing at the Wi-Fi Alliance, corrected that statement slightly, noting that comparisons are just as important as deployment models.

"If you compare the security that W-Fi provides when needed with a device that has credentials configured, and compare that to cellular security, you'll find that both Wi-Fi and cellular provide adequate security for this model," he said. "They both meet the requirements."

He added that Wi-Fi offers an extremely flexible deployment architecture that can stretch from unauthenticated networks all the way up to very secure enterprise or government networks.

Add to that the fact that the Wi-Fi Alliance has introduced higher levels of Wi-Fi security, WPA3 and Wi-Fi Enhanced Open, both of which will be required in every W-Fi certified device starting July 1, 2020. WPA3 promises to be able to handle the flexibility that Robinson mentioned, ranging from use cases with no security needs at all to those that require government-grade security.

Smith agreed that with the recent WPA3 update, Wi-Fi 6 and 5G are more comparable from a security perspective, and that Wi-Fi is now "basically on par with any cellular security at the physical layer."

While Wi-Fi is trying to improve its security to make it a more reliable choice for handling all kinds of data, cellular networks are trying to be more than just a mobile technology, which also means achieving greater flexibility.

Robinson provided further details: "Cellular is moving toward things that Wi-Fi is already doing, such as Extensible Authentication Protocol (EAP), so [cellular] is actually leveraging a lot of the technology that Wi-Fi is already using."

"The reason for this and why Wi-Fi is sometimes adopted," Robinson continued, "is that Wi-Fi doesn't just support a single deployment model. Wi-Fi supports multiple deployment models, including the unauthenticated experience where you can walk into a coffee shop, tell no one who you are, and join a network. Try doing that with your phone."

The problem with increased flexibility in cellular networks is that with increased flexibility comes concerns about who has access to the data, Smith said.

Data Ownership

Perry Correll, director of product marketing at Extreme Networks, also believes that companies should think seriously about data ownership in the 5G era.

After reading about Verizon's plan to beam 5G signals from inside a company or enterprise to the carrier's small cell towers, which would send traffic to the carrier's core network, he hesitated.

He explained: “When I read that, the first thing that resonated with me was all the data that goes back to the carriers. How am I going to get that data back to me as a business, as a business?”

Data sourcing and analysis has become critical in business operations because with this data you can apply machine learning and artificial intelligence, potentially improving every aspect of your business dramatically.

“If we get into an environment where we’ve replaced all of our Wi-Fi devices with some type of small cell base station and we’ve moved from Wi-Fi to a carrier-based network, all of that data for what’s happening on my network is actually happening on the carrier’s network,” Correll believes.

From there, what happened to the data?

"As a business or enterprise, do I have free access to this data? Can I go into the cloud service and see everything and have it returned to me? Do I need permission?" he asked, admitting he didn't know yet.

"I can only answer those questions based on where you are in the world, with different rules, and with different software packages that different vendors might offer," he said.

Either way, Correll argues that a process will need to be put in place to address data ownership when it sits on a cellular network that doesn’t exist today.

He believes that discussion on this particular topic is lacking because when people think of cellular communications, they think of smartphones. However, in a pure 5G environment, or even in a Wi-Fi and 5G venue environment, other devices such as laptops, tablets, IoT devices and any other wireless-enabled device will be on the network.

"Right now, if I have a Wi-Fi access point and I have data flowing through it, that's mine ... and I can do whatever I want with it as long as I keep track of whatever application is running on the network," he said. "But in a pure 5G environment, all the data flowing through them will be delivered to someone else first."

<<:  Division of wireless AP channels in WLAN

>>:  5G brings edge cloud services to the forefront

Recommend

What exactly does edge computing mean?

The word "edge" has been given a new de...

Let’s talk about the stories behind Cookie, Session and Token

Hello everyone, I am Director Dabai(●—●). Today I...

Internet of Things Lecture: NB-IoT\eMTC\LoRa have their own division of labor

In 2018, the year of the explosion of IoT connect...

Why do you need to consider whether IPv6 is supported when adopting SD-WAN?

The Internet of Things (IoT) has fundamentally ch...

6G will usher in a new era for all industries

At this early stage, 6G wide-area wireless has fe...

The Dilemma and Hope of SRv6

Operators have been fighting "pipelining&quo...

GSA: More than 100 commercial 5G networks launched worldwide

On September 25, according to foreign media repor...