Securing 5G Networks With Blockchain

Wallet.Services is passionate about the transformative social, business and technological potential of blockchain. We know that the current underpinnings of the internet – databases (a fifty year old technology not designed for data sharing) and TCP IP (a sixty year old network tech not built for security) – are not fit for the level of digital life and business activities we do online today. Our sensitive data is overexposed leaving our identities and bank accounts in danger of being exploited. The multiple identities usernames and passwords give us are not controlled by us, the data owners. Businesses’ commercially sensitive data is regularly breached and hacked, and we can’t trust that emails or payment transactions have only been exchanged by sender and receiver. Not being able to work with each others’ digital systems leaves private enterprises and public organisations with an IT, transparency, security and trust gap.

 

5G Logo

We explore some of the potential blockchain could have for citizens and government in our report Distributed Ledger Technologies in the Public Sector, commissioned and published by The Scottish Government. But it’s not the only new kid on the block (chain!). 5G is an emerging technology which is obviously a huge opportunity for telecommunications companies. They can sell access to the boost in bandwidth created by the fifth generation of global mobile communication protocols, which is transmitted by their towers and hardware to citizen and business consumers. Society and business will benefit as IoT sensors can finally connect, collect, send, receive, analyse and share data in real time with 5G speed and bandwidth, and this will massively impact industry 4.0 and connected citizen settings. But without trust in the (cabled, wifi, 3G, 4G) internet, with 5G are we not simply expanding the surface through which IoT sensors data and sensitive data can be attacked?

 

Blockchain can make safe the complexity of activities we undertake online through the security of its end-to-end encryption. Its capacity to govern nuanced and permissioned data sharing means sensitive data disclosure without overexposure is possible. As a distributed ledger requiring consensus from parties in the network, transparency and trust can be built in competitive environments. multiple parties want to collaborate digitally to make efficiencies and show provenance in multiparty supply chains, and track and trace chains of custody of assets such as goods, sensitive data, healthcare appliances, luxury items, pharmaceuticals, and critical parts. Wallet. Services’ SICCAR software enforces privacy and data protection for citizens and consumers, as well as commercial confidentiality for businesses working with complex chains of custody. It was global winner of the Citibank Technology for Integrity Challenge. SICCAR software enables business analysts and developers in business and government to define flows of sensitive B2B and B2C data, and connect interorganisational processes securely, to define real-world complex multiparty processes. Citizens and consumers know that their sensitive data can be given only to organisations they have agreed to share it with. Organisations can be confident to collaborate with commercially sensitive data used only in the way they have agreed, meaning they can work together according to agreed rules of consensus and governance. SICCAR software is in use. We have a 2 year contract to work with the Scottish Government’s Improvement Service. We have pilot projects ongoing in the oil and gas and food and drink and agriculture sectors. SICCAR is being used here to enable competing organisations to collaborate to digitally track and trace assets as they move through supply chains, and to certify their provenance. Our markets are those with complex industry 4.0 supply chains that require secure, trusted and true digitally twinned records. Also, the public sector where multiple parties have to collaborate to provide citizen services, and where in the UK it has been estimated that reducing back office administration of public services by 40%, the type of scale DLT would achieve, could free up £46bn per year.

 

Cell Tower

5G public networks can assist with that service optimisation through enabling faster, better data sharing - 5G will enable software-defined-radio (SDR) and software-defined-network (SDN) capabilities. SICCAR blockchain software can secure sensitive personal data exchange on expanded mobile networks. SICCAR can also secure the telcos’ inter-carrier data.

 

5G slicing provides the foundation on which organisations can build private sensitive large-scale, data-rich IoT systems. Enterprises with IoT enabled remotely located supply chains (e.g. energy, oil & gas sector, food drink & agriculture, transport and logistics sectors) can ensure using SICCAR that the 5G needed to connect is secure. Wallet.Services can provide the end-to-end cryptographic security evidence, the trust, and the transparency proving data from IoT devices in complex networks has been kept safe according to the rules.

 

 
Telefonica Logo

We’re thrilled to announce that we are working with the Scottish Government as they develop their 5G Strategy, and that we have won a place on Telefonica’s scale-up accelerator, Wayra which selects the best European start-ups in their respective fields to scale globally. We are excited to be working with Telefonica, O2, Movistar and Verifone and their clients to ensure 5G services and innovations have trust, transparency and security at their core.



Are you interested in the application of blockchain technology with 5G? Take our quick Use Case Checker and find out how suitable your project is for blockchain technology.