top of page
The Communiqué News

The IBM Institute for Business Value (IBV) identified data management as one of the most significant difficulties that operators, OEMs, and regulatory agencies will confront as vehicles become more autonomous, forecasting a boom in associated data.


Swati Bhat

ree

According to research undertaken jointly by the company, industry association the GSMA, and vehicle manufacturer Jaguar Land Rover, the volume of data sent across telecom networks by the connected car sector will increase over the next two years.

According to Siemens research, if 20% of the world's 1.5 billion cars become highly autonomous, it would generate approximately 300 zettabytes of data.

According to Counterpoint Research, connected auto sales topped disconnected models for the first time in 2022, and a CAGR of roughly 17% is expected until 2027 for a total of 367 million vehicles.


Artificial Intelligence

  • According to the organisation, generative AI could be the key to unlocking totally autonomous vehicles by using algorithms to generate fresh content for virtual environments and simulating real-world scenarios for training purposes.

  • Vehicles could also include a generative AI interface, allowing drivers to interact in natural language rather than predefined orders.

  • Non-terrestrial networks are highlighted as a critical component of the connectivity puzzle, offering coverage in locations that ground-based networks cannot reach, while the firms cautioned that this may cost car manufacturers and users more.

  • Hyperscalers with competence in delivering and protecting cloud, IoT, and edge computing could also play an important role in developing new vehicle connectivity services.

The panel observed that industry organisations and governments appear to be on the same page regarding the cellular V2X communication protocol. The GSMA is collaborating with operators, OEMs, and regulatory organisations to create a unified approach to security, regulatory, and infrastructure platforms.


Energy

According to IBM et al, "Data is the new fuel powering modern cars, and networks are the pipelines," but they also underlined the need for increased coverage, data authentication, and cooperation to keep up with the growing number of connected vehicles.

For car connections with other vehicles, pedestrians, traffic systems, and IoT devices, network performance, cybersecurity, and data reliability are becoming safety imperatives.

According to the group, telecommunications service providers have a clear duty to provide high-bandwidth, low-latency, dependable, and secure connectivity services to enable many of the services.

According to Juniper Research, the operator opportunity for 5 G-connected automobiles alone is $3.6 billion.

In addition to operators, vehicle manufacturers, governments, industry associations, intelligent traffic system developers, and cloud providers must work together to create an ecosystem that will allow the sector to thrive.








A recent episode of the Unchained podcast addressed how ERC 6551 could revolutionise the crypto market by providing NFTs with their own wallets. The planned ERC 6551 token standard for NFTs has piqued the curiosity of crypto fans since it would allow digital assets to hold other tokens, a development that has the potential to radically alter the NFT and metaverse scene.


Pritish Bagdi

ERC 6551
ERC 6551

What exactly is ERC 6551?

The token standard proposal, announced in February, aims to create a system that provides a smart contract account to every ERC-721 (non-fungible token). These tokens will be able to hold assets and interact with applications without requiring any changes to existing ERC-721 smart contracts or infrastructure.

The key components of this system are a permissionless registry for deploying token-bound accounts and a standard implementation interface.

Each ERC-721 coin will be assigned a unique smart contract account, allowing it to interact with the blockchain, record transaction history, and possess on-chain assets. The owner of the ERC-721 token has control over each token-bound account, allowing them to initiate on-chain operations on behalf of their token.

The proposal aims to be as backward compatible as possible with existing non-fungible token contracts. EIP-155 chain IDs are also used to uniquely identify ERC-721 tokens, allowing for the optional support of multi-chain token-bound accounts.


What are the benefits of ERC 6551?

The ERC 6551 standard was a potential solution to past attempts to standardise NFTs owning assets, such as the requirement for custom logic in their smart contract. The ERC 6551 standard eliminates these limitations by offering NFTs the same rights as Ethereum users, allowing them to hold assets and execute actions.

While ERC 721, ERC 1155, and soul-bound tokens exist as means to own objects on Ethereum, the podcast panelists emphasised that ERC 6551 is not a token standard in the traditional sense because it offers every current ERC 721 its own wallet, unlocking a new layer of compatibility for NFTs.








Cybersecurity is very important to all of us because we’re living in an era where information and data are our most valuable assets. That’s why today’s world is so focused on data privacy and personal information. Cyberattacks are a potential threat to everyone, with viruses and phishing able to target individuals’ mobile devices, companies, and governments. So it’s crucial for us to focus on developing and producing secure technologies.


Dr. Jassim Haji

How Can We Develop a New Approach to Cybersecurity & National Security

A New Approach to Cybersecurity and National Security


Information security is like an onion in that it has multiple layers. People assume that technology is everything, but it is only one layer and perhaps the easiest one, People tend to overlook that ecosystem ownerships, patents, regulations, laws, directives, cyber strategies, processes, standard operating procedures, best practices, and cyber diplomacy are equally important. And sometimes even more challenging.

Huawei's goal is to provide a fresh approach to cybersecurity and national digital sovereignty. Complying with national legislation and taking a responsible attitude to the legal context of security, is something that every 5G network vendor has a responsibility to do.

Huawei’s 5G networking equipment allows nations to use their own encryption algorithms, the encryption keys of which are not available to Huawei, outsiders, or other governments – only local mobile operators are allowed to perform decryption when legally required to do so. Thus they don't have access to data that is flowing through their equipment. Central our strategy is to support the national data sovereignty of every country.


The Importance of Standards in Cybersecurity


Huawei is a strong advocate for cybersecurity standards that are globally recognized and agreed upon. They believe that trust needs to be based on facts, facts need to be verifiable, and verification needs to be based on common standards. Based on industry practices, certification is the most effective way to address security issues. Certification is verification that everyone reads standards in the same way and it therefore guarantees interoperability. That means that different vendors’ equipment can work seamlessly together.


5G Security Challenges


5G faces security challenges due to new services, architectures, and technologies, as well as higher user privacy and protection requirements. However, 5G is the most secure telecommunications standard that the industry has developed to date.

The assets of wireless and core networks, computing resources, accounts, passwords, logs, configurations, and charging data records (CDRs) are operated and maintained by operators, not equipment vendors. Hackers attack wireless networks in an attempt to steal and tamper with users’ personal data or compromise the availability of networks or computing resources. The way in which equipment vendors work together with operators to make this more difficult for hackers is by implementing 3GPP specifications.





bottom of page