Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingEnterprise Services

Building a secure bridge for point-to-point connectivity

By Michael Abad-Santos
SEC0819-5G-Feat-slide_900px
August 24, 2020

The year 2020 has served up some unprecedented challenges for the human race in every aspect, with wireless connectivity more important than ever. Particularly as millions continue to work and learn remotely, our connected world of devices, vehicles, homes and cities is expanding exponentially. According to a report from GSMA and ABI Research, the number of mobile subscriptions worldwide had already reached 8.1 billion by 2017 at an annual growth rate of 5.4 percent. It’s now predicted that by 2025 the number will increase to 9.8 billion, with 3G and 4G representing 51 percent of total subscriptions and 91 percent of the total traffic generated, while 5G subscriptions are expected to exceed 849 million.

There’s no doubt that the fifth generation of connectivity will provide faster download speeds and more capacity than 3G and 4G networks when fully deployed. But until then, there are significant challenges to overcome, one of the most important of which is security. In addition to a larger attack surface as a result of the massive increase in connectivity and a greater number of devices accessing the network, new vulnerabilities have surfaced due in large part to the extension of security policies for new types of Internet of Things (IoT) devices, as well as the insufficiency of perimeter defenses. There’s also the fact that 5G networks will interoperate with legacy 3G and 4G networks, which rely on General Packet Radio Service GPRS Tunneling Protocol (GTP). According to a report from Positive Technologies, as long as GTP is in use, the protocol’s security issues will impact 5G networks.

Perhaps even more pressing for 5G is the need for the right technology to connect the network to the core. Particularly as the big three U.S. telecom providers — Verizon, AT&T and T-Mobile — roll out the first 5G networks in stages, mobile operators are seeking high-speed, high-capacity, low-latency backhaul solutions that can be rapidly and flexibly deployed wherever needed. While RF millimeter wave (mmWave) has become a preferred wireless technology for backhaul, offering high capacity, efficiency and throughput, there are fundamental issues. For instance, because of the limited reach of mmWave, arrays of antennas will be required, with no clear understanding of how many base stations and small cells will be necessary to provide adequate coverage in urban, suburban and remote regions. Even then, objects (buildings, tress, etc.) and weather can interfere with mmWave signals. Finally, RF is inherently less secure than fiber.

With the critical need to address and satisfy not only latency, data security and bandwidth limitation but also licensing, cost and last mile access issues, governments and telecom companies are exploring a range of options, including optical wireless communication (OWC). A license-free wireless technology NASA has been using for decades in its Laser Communications Relay Demonstration and the Orion Exploration Mission 2 Optical Communications project, OWC offers rapid point-to-point data transmission via beams of light that connect from one telescope to another using low-power, eye-safe, infrared lasers in the terahertz spectrum. Many military applications have also relied on OWC for decades to communicate securely over unknown terrain. Over the years, OWC has benefited from advancements in amplifiers, lasers and detectors, as well as commercial investment from the traditional defense and aerospace companies in the U.S., Japan and Europe.

While OWC is still relatively new in the commercial space, and thus not as prominent in the 5G discussion, it offers significant benefits over mmWave backhaul. In addition to delivering huge volumes of data at super-fast speeds — 20 to 50 Gigabits per user — OWC works in dense urban areas where spectrum is limited. More important, it offers built-in security. Here’s why:

  • Precision - Because lasers are highly directional and more precise by nature, OWC has very low beam divergence, thus the chances for being intercepted by an unintended receiver is very low compared to traditional RF communications, which broadcasts signals to a large field of regard.
  • Power efficiency - Since the individual photons of a laser beam have much more energy than the radio photon, and because OWC beams are so tightly focused, they require much less power than traditional RF to transmit signals yet deliver significantly higher throughputs. Very low power transmission also aids in the ability for OWC signals to remain “unseen” from potential threats of detection, thus increasing confidence in securing the wireless transmission.
  • Encoded data – OWC offers an opportunity to encode data in polarization, quadrature amplitude modulation (QAM ) and wavelength-division multiplexing (WDM), as well as other methods. In certain systems such as Multimedia over Coax Alliance (MoCA), for example, outgoing beams are right-hand circular polarized (RHCP) while incoming beams are left-hand circular polarized. This allows for full bi-directional transmission of data. Adaptations to this architecture, however, could also allow for either higher data throughputs (double the data rate) or for the encoding of information (i.e. security keys) into the relationship between the beams to ensure the transmission stream has not been compromised.

 

With security a top concern for 5G operators, the future of 5G will arguably depend on the industry’s ability to collaborate to find solutions that augment RF and serve the last mile securely while fulfilling its promise to improve communication and connectivity on every level — for everyone.

 

KEYWORDS: 5G cyber security data security information security Internet of Things (IoT)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Michael abad santos

Michael Abad-Santos is Senior Vice President of Business Development and Strategy at BridgeComm, bringing more than 20 years of experience in the telecommunications and satellite industries with a focus on the government market sectors, both domestic and international. Prior to BridgeComm, Michael served as chief commercial officer at satellite communications solutions provider Trustcomm, Inc. before joining LeoSat Enterprises as senior vice president, Americas, overseeing commercial activities, strategy development and execution in the Americas region as well as government activities worldwide. Michael also held various leadership roles at Inmarsat over a 10-year period, including serving as senior vice president of its global government division. A sought-after subject matter expert and speaker, he has presented at industry-leading events including SpaceCom, ITEXPO and MILCOM among others and is a consultant at the Software Engineering Institute at Carnegie Mellon University working with Department of Defense leadership on the intersection of software engineering and space and weapons systems development.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Person holding cellphone

Millions of Android, iPhone Users Could Be Sending Data to China

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Old Newswire Feature Image

    Security Lieutenant Files Lawsuit Saying Indian Point Isn’t Secure

    See More
  • crit infrastructure 2 feat

    Experts Point to Terrorism for Metcalf Power Substation Attack

    See More
  • Point-to-point, 2-frequency Wireless Overcomes Wind, Cold

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!