5g basado en open source como una solución de bajo costo para el fortalecimiento de las comunicaciones inalámbricas del gobierno autónomo descentralizado municipal del cantón Babahoyo
This research describes how mobile communications networks connect a large part of the population of the Babahoyo Canton, specifically in the Municipal Decentralized Autonomous Government Building of the Babahoyo Canton. The security of the transfer of information, messages and user data depends on...
Gardado en:
| Autor Principal: | |
|---|---|
| Formato: | bachelorThesis |
| Publicado: |
2022
|
| Subjects: | |
| Acceso en liña: | http://dspace.utb.edu.ec/handle/49000/11673 |
| Tags: |
Engadir etiqueta
Sen Etiquetas, Sexa o primeiro en etiquetar este rexistro!
|
| Summary: | This research describes how mobile communications networks connect a large part of the population of the Babahoyo Canton, specifically in the Municipal Decentralized Autonomous Government Building of the Babahoyo Canton. The security of the transfer of information, messages and user data depends on the guarantees provided by authentication protocols and encryption techniques. In the Fifth Generation (5G) network for wireless environments, new protocols must be developed to guarantee data integrity, privacy and consistency. This document presents an exhaustive study on the characteristics and security challenges of 5G wireless network systems based on Open Source. In each case of vulnerabilities described, possible solutions are recommended vis-à-vis the attacks and the weaknesses found; Therefore, based on the current research work on a new architecture for the Internet of Things (IoT) with the strengthening of an open source operating system, an approach is also made to the main challenges and potential threats in Internet networks. 5G wireless communication. It should be noted that the advanced features of wireless network systems range from the 5G mobile network plane, generating new requirements and security challenges for wireless communication systems compared to traditional cellular networks; The document addresses a review of the particularities of 5G wireless networks, as well as the new requirements and motivations of 5G wireless security. Potential attacks and security services are summarized with consideration of new service requirements and new use cases in 5G wireless networks. |
|---|