polito.it
Politecnico di Torino (logo)

A survey on cybersecurity in 5G

Seyed Mohammad Mousavi

A survey on cybersecurity in 5G.

Rel. Roberto Garello. Politecnico di Torino, Corso di laurea magistrale in Communications And Computer Networks Engineering (Ingegneria Telematica E Delle Comunicazioni), 2021

[img]
Preview
PDF (Tesi_di_laurea) - Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives.

Download (2MB) | Preview
Abstract:

In today’s era, mobile communications play an important role in our modern life. In recent years, mobile technology attracted the focus of industry attention to itself. In last 4 decades by the evolution of mobile wireless technology from 1G in 1980 to 5G in 2019 by introducing new features and capabilities in each mobile network generations and growth of them, the number of demands for using these new technologies also has gradually increased and the mobile interaction has become an important part of our life [1]. Through the big leap in mobile networks, new opportunities and challenges for mobile wireless networks have emerged. On one side, 5G technology, claims can make a dramatic change in mobile broadband networks. 5G would guarantee bigger channels (to accelerate data transfer), less latency (to be increasingly responsive), and also the ability to link more devices at once (for sensors and intelligent devices) [2]. On another side, with the dramatic advancement of new technologies and the emergence of concepts such as the Internet of Things, as well as the proliferation of wireless network users, the security of users of these technologies seems obvious and important. For example, global operators started launching 5G networks in early 2019 but this enables the movement and access of vastly higher quantities of data especially through the Internet of things (IoT). As a result, it broadens attack surfaces and new cyber threats will emerge. Thus, it is clear that the infrastructure equipment providers should pay more attention to Cybersecurity of 5G mobile networks by finding the latest tactics to deal with threats and be one step ahead of attackers to protect our digital communications world. This chapter begins with an explanation about the Aim of the thesis. Next, in the Motivation and research questions section, problem statement and research questions are pinpointed to specify the current problems. Then the research Limitations are described. This chapter ends with a brief description of the audience and readers to point out the thesis structure and methodology

Relatori: Roberto Garello
Anno accademico: 2020/21
Tipo di pubblicazione: Elettronica
Numero di pagine: 52
Soggetti:
Corso di laurea: Corso di laurea magistrale in Communications And Computer Networks Engineering (Ingegneria Telematica E Delle Comunicazioni)
Classe di laurea: Nuovo ordinamento > Laurea magistrale > LM-27 - INGEGNERIA DELLE TELECOMUNICAZIONI
Aziende collaboratrici: NON SPECIFICATO
URI: http://webthesis.biblio.polito.it/id/eprint/19156
Modifica (riservato agli operatori) Modifica (riservato agli operatori)