Contact Us

Shaoxing ZKTel Equipment Co.,Ltd

Address:The Intersection of Sanjiang Road and Paozhong Road, Paojiang Industrial Zone, Shaoxing City, Zhejiang Prov.,China 312071

Tel: +86-575-88035326

Mobile: +8613626888520

Fax: +86-575-88039030

E-mail: sales@zktel.com.cn

The Security Risk Of Communication Internet

- May 24, 2018 -

Wisdom life leaks privacy


Imagine standing in front of the house, but it was rejected because it was not even connected with the smart lock; when it was cold and hungry, it was found that the smart rice cooker did not receive an order, or a pot of raw rice; due to control failure, The air conditioner is hot and cold, the lights are on and off, and the oven cannot automatically shut off.


If smart life is such a thing, many users would rather return to the past.


Insiders pointed out that the number of 5G network addresses is large, allowing everyone to own a lot of IoT devices, and the power consumption is relatively low, which can guarantee a long battery life, combined with a small network delay and a low probability of error. Therefore, it is a smart home, etc. The development of the Internet of Things provides technical support.


This year, China Mobile, China Unicom, and China Telecom announced that they will conduct 5G pilots in multiple locations across the country. Shanghai is the only city to be selected as the pilot list for the three major operators. Peng, a student of Fudan University, was a smart home enthusiast. She was looking forward to the pilot work in Shanghai: “Many smart homes in the early days depended on Bluetooth to connect, and they were not very stable. Later, they developed a Wifi wireless connection and the experience was greatly improved. The network channel is too important for smart homes. I expect 5G technology will further enhance the smart home experience.”


Network security issues such as the leakage of user information that are constantly emerging will also threaten the 5G era. Some netizens are worried that in the 5G era, many smart homes are controlled by mobile phones. If a mobile phone is lost or mobile phone information is leaked, a series of chain reactions will be triggered, resulting in disastrous consequences.


Zhu Xi believes that relevant departments should step up the introduction of laws to clearly define the user information that can be obtained and the user information that cannot be obtained. It should also pay attention to the security issues of smart hardware and avoid making these helpers of life and work a “land mine” for cyber security.


“In terms of information security protection, the advantages of 5G are not obvious. It can even be said that due to the increase in the total number of devices, people’s reliance on the Internet of Things has increased, and the importance of Internet of Things terminals has become higher and higher, and the security issues facing 5G have become increasingly serious. It will be more prominent. This poses a more severe test for researchers and R&D engineers," said Chen Jiang.


Related News

Related Products

  • Intelligent Clock Recovery System
  • BiDi 1x9 Transceiver
  • SFP+ Copper Transceiver
  • 100G QSFP28 Transceiver
  • GPON BOSA
  • 100G CFP2