experience america's largest & fastest 5G network
At REALLY, we are committed to delivering a fully encrypted and private network that ensures the most secure and reliable IoT connectivity, surpassing previous generations of wireless networks.
Advanced Encryption and Network Slicing Technologies
REALLY enhances IoT security through encryption and network slicing technologies. REALLY’s 5G network integrates more IT industry standard protocols, such as HTTPS, rather than cellular-specific ones used in 4G and earlier generations. This includes Transport Layer Security (TLS) and other specifications for encrypting data in transit, which are now integral to 5G standards. Additionally, 5G brings greater protections for privacy and trust by using Public Key Cryptography, Digital Certificates, and advanced forms of authentication to ensure both devices and the network are authenticated and protected.
REALLY's 5G Standalone network supports network slicing, which adds another layer of data protection by creating private, designated paths for data transmission.
Addressing the Cybersecurity Challenge
A forecast by International Data Corporation (IDC) estimates that there will be 41.6 billion IoT devices in 2025, capable of generating 79.4 zettabytes (ZB) of data.On the REALLY network, data is protected using industry-recommended encryption algorithms. In many situations, REALLY's 5G wireless encryption serves as the outer wrapper for several layers of encryption. Customers using end-to-end application layer encryption, such as HTTPS, can further protect against potential man-in-the-middle (MITM) attacks.
A Multi-Pronged Approach to Security
REALLY’s network employs a multi-pronged approach to enhance the security of IoT environments. This begins with the integrity of 5G network infrastructure and extends to rigorous security standards and platform requirements at every level, from the chipset and booting process to the operating system, communications interfaces, and storage. Equipment is not deployed on the REALLY network until it passes rigorous security tests, including attempts by cybersecurity engineers to break or hack into a device.
More About How Our Encryption Works
1. Authentication
User Authentication: The user's device (UE - User Equipment) must authenticate to the network using its SIM card credentials. This process uses the IMSI (International Mobile Subscriber Identity) and a secret key stored on the SIM card.
Network Authentication: The network also authenticates itself to the user's device, ensuring mutual authentication.
2. Key Agreement
AKA Protocol: The Authentication and Key Agreement (AKA) protocol is used to generate encryption keys. This involves the exchange of authentication vectors between the user's device and the Home Subscriber Server (HSS).
KASME Generation: A root key (KASME) is derived during the authentication process. KASME is used to generate further keys for encryption and integrity protection.
3. Establishing Secure Channels
Encryption Key (KeNB): The KASME key is used to derive the KeNB (Key for eNodeB), which is specific to the Radio Access Network (RAN) and used for encrypting the radio interface.
DRB Encryption: Dedicated Radio Bearers (DRBs) are established for the user’s data and signaling. Each DRB is associated with an encryption key derived from KeNB.
4.Encryption Algorithms
User Plane Encryption: on the air interface, data encryption is done using algorithms such as AES and SNOW 3G, EAP-TLS/EPS-AKA for 4G.
Control Plane Encryption: The control plane’s signaling traffic is encrypted using similar algorithms.
5.Secure Data Transmission
Radio Interface Encryption: The keys derived from KeNB are used to encrypt all data transmitted between the user’s device and the eNodeB (base station) using IPsec connection with encrypted certificates over VPN.
6.End-to-End Encryption
Application-Level Encryption: Some applications have their own end-to-end encryption. For instance, VoIP applications use the SRTP protocol in addition to the network-layer encryption provided by 4G, e.g. Signal and WhatsApp messages: end-to-end encryption.
Conclusion
This means that both its signaling and user data are protected against eavesdropping and tampering. 4G/5G security relies on strong encryption algorithms, as well as mutual identification mechanisms, so that mobile phone calls or data connections would be securely encrypted over a network.