For me, the key conference today was The Future of Healthcare – Scotland: paving the way, by Pr. William (Bill) BUCHANAN (@billatnapier). This conference blew my mind away.
It is known for all of us that the current technologies that we use to access Internet and the services built over it, use inventions developed more than 30 years ago. Improvements to the web, IP and TCP have been made by patching new features over them or creating new layers over them to provide new functions. And it is not only IP, or TCP: this involves also the use of STP on L2 networks, or BGP as a protocol used on Internet route announcement (and now inside data centers). Attention please, those layers are not like abstraction layers, but layers that obscure and makes difficult the operation of the system. We are using the same old tools to try to fix new problems envisioned by the massive growth of the Internet ecosystem and all the services that are supported. As suggested by Prof. Buchanan, a master reset should be done, in order to re-create the foundations of Internet having a security framework in mind. But so far, we know this is very difficult. Just check out the example of IPv6, in which its adoption has had a low pace, because of the lack of incentive$ for telecoms to fully deploy it. All is about businesses and the return of investment after a change in a network.
The key message here is that we are in the middle of a great opportunity to “make things right” in the foundation of the standardization process for 5G. Learn from the old technologies, have a security and privacy mindset in the implementation. The network may be seen by others like a dumb pipe, but the communication service operators are the aggregators of those pipes, and have to make sure that those pipes behave well and do not mess one with another. On the other hand, the deployment of (virtual) network functions and applications should be taken care too: this because 5G relies on software to provide functionality and is easily corruptible. How to make sure that the (virtual) network function is issued by a trusted entity? How I make sure that the orders from OSS/BSS are legitimate?
Assorted ideas in my conversation with Prof. Buchanan: encryption should be made on the source of data generation, or near the edge. The user must have the power over the data. The network must provide the necessary QoS according to the type of data, but has to be agnostic to the content: the operator must not know about the data.
On the other side, since this focus day is centered on healthcare, convinces me once more on my quest to have a human approach of technology: to empower, enable him to pursue its dreams, to protect the user and his data. This way, people will trust the system.