Michael: So, part of the standards that happened with 3GPP align the absolute security that's being used in part of the LTE infrastructure. So, looking at encryption, and looking at the way that there's data integrity with those particular elements, specifically how the UE, or user equipment, connects directly to the eNodeB, or the network itself, to make sure that the integrity of the data hasn't been compromised… there are alerts and notifications, and then there's a well-defined encryption methodology that happens with it. So, with the identity and encryption and connectivity between those elements, we're able to really prove that the devices are connected in a secure way.
And then, when you take the other elements within, say, Phil's system, on the router side, or even when we start looking at Kyle's software, to be able to do further intrusion detection, to see if it's been compromised, I think you end up having layers of really good security that happens not only at the LTE layer, but then all the way down to the device and UE layer, and down to the application layer. So, that maybe helps to explain a little bit. There's a slide that I had earlier in my presentation that hopefully you'll be able to get your hands on, that shows a little bit about how the encryption and how the keys are mapped, specifically in LTE. Hopefully, that answers the question. Kyle, maybe you want to add a little bit to that?
Kyle: I think that really it will end up depending per system, but when you talk about the private LTE support, the two things that you get are: one, the device authentication, meaning that by using the actual identifiers within the devices and the SIM cards, you can actually provide some authentication, authorization to a network, to help you know that what's on your network is trusted. You aren't able to just plug into a network switch and add devices. It is kind of scary how much I've seen that in military bases. But that is one thing that's actually very useful, is you now know everything that's connected to your network.
And then, where it also helps you is it does help from a cost reduction standpoint, of enforcing other standards. So, LTE itself helps give you a network that gives you a lot of the device authentication, if you're not going through, like, a lot of your RADIUS or types of authentication and device inventory management. That's frankly not very widely adopted. So, LTE gives you an ability to get that jump. And then, being able to layer on top of that other security processes is a lot more streamlined to do, because you're using this wireless network to be able to do it, as opposed to having to lay fiber to get to somewhere.
Michael: Just to chime in, to wrap it up, and I didn't really highlight this, but this is a private network, right? Meaning that the utility itself owns the infrastructure, sees all the elements behind it, and basically has control, end to end, including the prioritization of that traffic, the authentication of the traffic, and how it works, to their SIM and to their identity. They have control in every step of that and are able to do interrogation. So it doesn't just go into the mobile operator's network and they no longer have any visibility into it. Now they have complete end-to-end visibility, through all the elements. I think that's a very important point here, is they have every layer that they can be able to interrogate and be able to resolve problems if needed.