5G networks: a review from the perspectives of architecture, business models, cybersecurity, and research developments

5G technology is transforming our critical networks, with long-term implications. Since 5G is transitioning to a purely software-based network, potential improvements will be software updates, like how smartphones are upgraded. For the global enterprise, the 5G arrival would be disruptive. Long-awai...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Aranda, Juan, Sacoto Cabrera, Erwin J., Haro Mendoza, Eduardo Daniel, Astudillo Salinas, Fabián
Formato: Articulo
Lenguaje:Inglés
Publicado: 2021
Materias:
Acceso en línea:http://sedici.unlp.edu.ar/handle/10915/126029
Aporte de:
id I19-R120-10915-126029
record_format dspace
spelling I19-R120-10915-1260292024-09-12T14:52:08Z http://sedici.unlp.edu.ar/handle/10915/126029 5G networks: a review from the perspectives of architecture, business models, cybersecurity, and research developments Redes 5G: una revisión desde las perspectivas de arquitectura, modelos de negocio, ciberseguridad y desarrollos de investigación Aranda, Juan Sacoto Cabrera, Erwin J. Haro Mendoza, Eduardo Daniel Astudillo Salinas, Fabián 2021-06-01 2021-10-01T14:40:30Z en Informática 5G networks Architecture Business models Network security Research developments Arquitectura Desarrollos de investigación Modelos de negocio Redes 5G Seguridad de red 5G technology is transforming our critical networks, with long-term implications. Since 5G is transitioning to a purely software-based network, potential improvements will be software updates, like how smartphones are upgraded. For the global enterprise, the 5G arrival would be disruptive. Long-awaited solutions to various flaws in critical networking systems will arise due to 5G network adoption. Furthermore, the shortcomings of technology in contributing to business growth and success would be turned on their heads. The more complicated part of the actual 5G race is retooling how we protect the most critical network of the twenty-first century and the ecosystem of devices and applications that sprout from that network due to cyber software vulnerabilities. The new technologies enabled by new applications running on 5G networks have much potential. However, as we move toward a connected future, equal or more attention should be paid to protecting those links, computers, and applications. We address critical aspects of 5G standardization and architecture in this article. We also provide a detailed summary of 5G network business models, use cases, and cybersecurity. Furthermore, we perform a study of computer simulation methods and testbeds for the research and development of potential 5G network proposals, which are elements that are rarely addressed in current surveys and review articles. La tecnología 5G está transformando nuestras redes críticas, con implicaciones a largo plazo. Dado que 5G está en transición a una red puramente basada en software, las mejoras potenciales serán las actualizaciones de software, como la forma en que se actualizan los teléfonos inteligentes en la actualidad. Para la empresa global, la llegada de 5G sería disruptiva. Las soluciones largamente esperadas para una variedad de fallas en los sistemas clave de networking surgirán debido a la adopción de la red 5G. Además, las deficiencias de la tecnología en términos de contribuir al crecimiento empresarial y al éxito se pondrán de cabeza. La parte más complicada de la carrera 5G real es reestructurar la forma en que protegemos la red más crítica del siglo XXI y el ecosistema de dispositivos y aplicaciones que surgen de esa red debido a las vulnerabilidades cibernéticas del software. Las nuevas tecnologías habilitadas por las nuevas aplicaciones que se ejecutan en redes 5G tienen mucho potencial. Sin embargo, a medida que avanzamos hacia un futuro conectado, se debe prestar igual o mayor atención a la protección de esos enlaces, computadoras y aplicaciones. En este artículo se abordan los aspectos clave de la estandarización y la arquitectura 5G. También se proporciona un resumen detallado de los modelos comerciales de redes 5G, casos de uso y ciberseguridad. Además, se realiza un estudio de métodos de simulación por computadora y bancos de pruebas para la investigación y el desarrollo de posibles propuestas de redes 5G, que son elementos que rara vez se abordan en estudios y artículos de revisión actuales. Facultad de Informática Articulo Articulo http://creativecommons.org/licenses/by-nc/4.0/ Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) application/pdf 6-41
institution Universidad Nacional de La Plata
institution_str I-19
repository_str R-120
collection SEDICI (UNLP)
language Inglés
topic Informática
5G networks
Architecture
Business models
Network security
Research developments
Arquitectura
Desarrollos de investigación
Modelos de negocio
Redes 5G
Seguridad de red
spellingShingle Informática
5G networks
Architecture
Business models
Network security
Research developments
Arquitectura
Desarrollos de investigación
Modelos de negocio
Redes 5G
Seguridad de red
Aranda, Juan
Sacoto Cabrera, Erwin J.
Haro Mendoza, Eduardo Daniel
Astudillo Salinas, Fabián
5G networks: a review from the perspectives of architecture, business models, cybersecurity, and research developments
topic_facet Informática
5G networks
Architecture
Business models
Network security
Research developments
Arquitectura
Desarrollos de investigación
Modelos de negocio
Redes 5G
Seguridad de red
description 5G technology is transforming our critical networks, with long-term implications. Since 5G is transitioning to a purely software-based network, potential improvements will be software updates, like how smartphones are upgraded. For the global enterprise, the 5G arrival would be disruptive. Long-awaited solutions to various flaws in critical networking systems will arise due to 5G network adoption. Furthermore, the shortcomings of technology in contributing to business growth and success would be turned on their heads. The more complicated part of the actual 5G race is retooling how we protect the most critical network of the twenty-first century and the ecosystem of devices and applications that sprout from that network due to cyber software vulnerabilities. The new technologies enabled by new applications running on 5G networks have much potential. However, as we move toward a connected future, equal or more attention should be paid to protecting those links, computers, and applications. We address critical aspects of 5G standardization and architecture in this article. We also provide a detailed summary of 5G network business models, use cases, and cybersecurity. Furthermore, we perform a study of computer simulation methods and testbeds for the research and development of potential 5G network proposals, which are elements that are rarely addressed in current surveys and review articles.
format Articulo
Articulo
author Aranda, Juan
Sacoto Cabrera, Erwin J.
Haro Mendoza, Eduardo Daniel
Astudillo Salinas, Fabián
author_facet Aranda, Juan
Sacoto Cabrera, Erwin J.
Haro Mendoza, Eduardo Daniel
Astudillo Salinas, Fabián
author_sort Aranda, Juan
title 5G networks: a review from the perspectives of architecture, business models, cybersecurity, and research developments
title_short 5G networks: a review from the perspectives of architecture, business models, cybersecurity, and research developments
title_full 5G networks: a review from the perspectives of architecture, business models, cybersecurity, and research developments
title_fullStr 5G networks: a review from the perspectives of architecture, business models, cybersecurity, and research developments
title_full_unstemmed 5G networks: a review from the perspectives of architecture, business models, cybersecurity, and research developments
title_sort 5g networks: a review from the perspectives of architecture, business models, cybersecurity, and research developments
publishDate 2021
url http://sedici.unlp.edu.ar/handle/10915/126029
work_keys_str_mv AT arandajuan 5gnetworksareviewfromtheperspectivesofarchitecturebusinessmodelscybersecurityandresearchdevelopments
AT sacotocabreraerwinj 5gnetworksareviewfromtheperspectivesofarchitecturebusinessmodelscybersecurityandresearchdevelopments
AT haromendozaeduardodaniel 5gnetworksareviewfromtheperspectivesofarchitecturebusinessmodelscybersecurityandresearchdevelopments
AT astudillosalinasfabian 5gnetworksareviewfromtheperspectivesofarchitecturebusinessmodelscybersecurityandresearchdevelopments
AT arandajuan redes5gunarevisiondesdelasperspectivasdearquitecturamodelosdenegociociberseguridadydesarrollosdeinvestigacion
AT sacotocabreraerwinj redes5gunarevisiondesdelasperspectivasdearquitecturamodelosdenegociociberseguridadydesarrollosdeinvestigacion
AT haromendozaeduardodaniel redes5gunarevisiondesdelasperspectivasdearquitecturamodelosdenegociociberseguridadydesarrollosdeinvestigacion
AT astudillosalinasfabian redes5gunarevisiondesdelasperspectivasdearquitecturamodelosdenegociociberseguridadydesarrollosdeinvestigacion
_version_ 1823259424908640256