How Will Mobile Devices Access The Internet Of Tomorrow?

Chad Leverenz, VP IT Infrastructure, Development, Mercy Housing
7
16
4

Chad Leverenz, VP IT Infrastructure, Development, Mercy Housing

Do you remember surfing the Internet in 1996 without regard for security and performance?

Do you remember vampire taps and the beginning of man-in-the-middle?

The future access to the internet must be more secure than today including biometric multi-factor authentication, converged multi-token security, and multi-NIC encrypted IPv6 addressing. Why? Because I do not want to use passphrases anymore. They must be the most insecure design requirement and we still architect solutions around this very human setback.

Here comes the self-awareness and humility warning: I am not an expert and likely use terms incorrectly. Please read this article with positive intent as this article is simply mind-provoking fodder.

In the very near future mobile devices will need more than Ethernet and Wireless Network Interface Cards (NICs) and the mobile device form factor might contain all the following:

• 802.11ac-w2 [wireless Internet access]
• XBee/ZigBee/802.15.4 [because spatiality, time, force, and heat need Internet access to bypass the OS]
• Bluetooth [because attached devices will need access to the Internet bypassing the OS]
• Near Field Communications [because data sharing will need access to Internet bypassing the OS]
• Light Fidelity [Internet access]
• 5G and LTE of tomorrow [Internet access]
• Wearable and/or implanted IoT [because our clothes, bodies, organs, and movement will need direct access to the Internet bypassing the OS]

  â€‹The future access to the internet must be more secure than today including biometric multi-factor authentication, converged multi-token security, and multi-NIC encrypted IPv6 addressing   

The problem will arise when the user’s mobile device travels amongst different networks while traveling through time and space in our daily lives. Now I hear the whispering in your head; why would we be moving and surfing at the same time? And you know the answer exists already and we simply expect more in the future. Likewise and conversely, imagine when we are not moving and the access to the internet changes around us to yield more capabilities improving the user experience.

The NICs of tomorrow will endure a logic process to create a real-time matrix such as the following in order to select the best NIC to access the Internet at any given moment:

• Which NIC is the most secure right now?
• Which NIC has the lowest latency and best throughput right now?
• Which NIC has the best radio signal right now?
• Which network has the least amount of traffic right now?

Once that NIC has been identified, our mobile device will utilize that specific NIC to access the internet at that given moment (every 90 seconds). The selected NIC could change at any moment given the situation, security, environment, congestion, uptime, etc.

Information Security, cloud services, cloud applications, and secure network hand-off will need to incorporate increasingly more secure converged token hand-off between networks while continuing smooth and integrated data transmission. The convergence of Event-triggered, Time-based, and biometric multi-factor challenge-based token authentication and real-time synchronization is the future of secure data transmission. Think of keyboards that expect your heated 3-D fingerprints, cameras that require your responsive 3-D iris, and the expectation of an encrypted virtual IPv6 address paired every 90 seconds to continue using the cloud service/app. Notice that passwords have been removed from the list of requirements in the future.

The acceptance of data ingress from one NIC and data egress out on another in real-time will utilize new algorithms that the mobile device optimizes to select real-time data transmission routing. The convergence of token synchronization will require a virtual “reverse” ARP table within the OS of the mobile device to utilize the best NIC available (the ARP table will assign one unique IPv6 IP address and map to all the available NICs and networks, DHCP IP addresses, and MAC addresses native to the LANs). The picture below is from NI.com and it shows a small sample of two NICs plus the virtual IPv6 address I added:

Okay, so I’ve reached the limits of my small brain and hence the article ends abruptly. I hope I communicated the issue– passphrases stink. I hope the innovative idea is heard–how do we get to use biometric data (at least two; heated 3-D fingerprints, responsive 3-D iris, recognized heart rates, blood pressure, walking gait, etc.) and approved mobile device encrypted virtual NIC addressing to make my user experience much more secure, much more timely, much higher performance (selecting the best NIC), and without thought of security so that I can go back to 1996 surfing.

Read Also

Mastering the Art of Successful Implementations

W. Alexander Holmes, EVP, CFO/COO, MoneyGram International

Heightened ERP - The Spinal Cord of Every Business

Eric Newell, President, Stoneridge Software

Building a one-stop-shop with Microsoft centric environment

Phillip R. Kennedy, Director-IT, Pandora Jewelry

Leverage SharePoint to Foster the Culture of Collaboration

Dave Long, Director in the Velocity Solutions Practice, Tribridge