Cover Image
市場調查報告書

LTE網路和M2M的無線安全:市場與預測 (2015年∼2020年)

Wireless Security in LTE Networks and M2M: Market and Forecasts 2015 - 2020

出版商 Mind Commerce 商品編碼 327398
出版日期 內容資訊 英文 86 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
LTE網路和M2M的無線安全:市場與預測 (2015年∼2020年) Wireless Security in LTE Networks and M2M: Market and Forecasts 2015 - 2020
出版日期: 2015年03月27日 內容資訊: 英文 86 Pages
簡介

本報告提供LTE與M2M網路調查分析,以威脅狀況 (惡意程式、電腦網路攻擊等) 、解決方案、無線安全整體市場為焦點,提供市場預測等有系統的資訊。

第1章 摘要整理

第2章 簡介

第3章 LTE的演進

  • 無線技術的演進
  • 從CDMA向LTE
  • 從2G轉移到3G,現在是LTE
  • 從LTE到LTE-Advanced

第4章 LTE和無線科技的技術比較

  • LTE的無線安全:課題與機會
  • 所謂無線安全
  • 安全架構:UMTS (3G) 與LTE(4G)
  • DNS與LTE安全

第5章 無線LTE安全的技術課題

  • OFDM
  • NIMO
  • SAE

第6章 無線安全威脅:一般、LTE

  • 電腦網路威脅形勢
  • 網站安全威脅
  • 安全威脅與商務影響
  • 威脅:各類別
  • LTE威脅

第7章 IP環境的行動安全:LTE預測

  • LTEIP-based網路
  • 行動安全威脅的類型
  • 惡意程式:大的威脅
  • 無線安全
  • 信號
  • 第三方
  • RAN回程傳輸

第8章 LTE的M2M安全漏洞

  • M2M安全
  • M2M通訊的應用
  • 無線LTE的M2M系統結構上基礎設施
  • M2M安全的課題

第9章 全球LTE市場分析與預測

  • LTE:全球市場方案
  • LTE用戶比較:各地區
  • 全球LTE連接:各業者
  • 全球LTE發展情形
  • 全球M2M服務供應商
  • 行動電話加入和行動技術加入
  • 全球M2M業務收益
  • 無線LTE網路預測

第10章 無線LTE設備市場預測

  • 無線設備整體市場的預測
  • LTE加入無線設備用戶市場預測:各地區
  • 全球LTE的用戶者成長率

第11章 無線LTE威脅分析

  • LTE網路:網路基地台和應用的威脅
  • 地區的LTE網路分佈:各用戶
  • 無線安全的行動用戶意識
  • 無線LTE威脅、機會

第12章 無線LTE安全市場分析

  • 全球LTE安全市場佔有率
  • 全球LTE網路供應商市場佔有率
  • 無線安全市場預測
  • 無線安全供應商市場佔有率
  • 商用LTE基礎設施:各供應商
  • LTE相關利益者和供應商市場佔有率
  • 漏洞:智慧型手機 vs. 平板電腦終端
  • 全球M2M安全市場收益

第13章 LTE安全意識:各國

  • 美國
  • 英國
  • 韓國
  • 非洲 (各國)
  • 澳洲
  • 巴西
  • 加拿大
  • 比利時
  • 法國
  • 德國
  • 俄羅斯
  • 中東
  • 日本
  • 中國
  • 印度

第14章 LTE網路供應商市場佔有率

  • 美國
  • 英國
  • 非洲地區
  • 中東地區
  • 韓國
  • 日本
  • 俄羅斯
  • 德國
  • 澳洲
  • 香港
  • 中國
  • 印度

第15章 無線LTE的M2M安全相關專家的見解

第16章 結論與建議

圖表

目錄

The Fourth generation (4G) Long Term Evolution (LTE) standard for cellular communications represents a substantial leap forward in terms of capacity and services capabilities. However, it also presents a unique challenge as its all-IP nature exposes vulnerabilities that were heretofore not substantial concerns. LTE network planners need to address many physical and logical security aspects. For example, there is a critical need to protect the communication links between Ues, base stations, and the EPC network from protocol attacks and physical intrusions.

This research is highly recommended for anyone involved in LTE network planning, device procurement, and/or application development and management. The report evaluates the state of threats (malware, cyber-attacks, etc.), solutions, and the overall market for wireless security in cellular with an emphasis on LTE and M2M networks. This report includes forecasting for the period 2015 - 2020. All purchases of Mind Commerce reports includes time with an expert analyst who will help you link key findings in the report to the business issues you're addressing. This needs to be used within three months of purchasing the report.

Table of Contents

1.0. EXECUTIVE SUMMARY

2.0. INTRODUCTION

3.0. EVOLUTION OF LTE

  • 3.1. EVOLUTION OF WIRELESS TECHNOLOGIES
  • 3.2. CDMA TO LTE
  • 3.3. TRANSITION FROM 2G TO 3G AND NOW LTE
  • 3.4. LTE TO LTE ADVANCED

4.0. TECHNICAL COMPARISON BETWEEN LTE AND WIRELESS TECHNOLOGIES

  • 4.1. WIRELESS SECURITY IN LTE: DIFFERENT CHALLENGES AND OPPORTUNITIES
  • 4.2. INTRODUCTION TO WIRELESS SECURITY
  • 4.3. SECURITY ARCHITECTURE: UMTS (3G) AND LTE (4G)
  • 4.4. DOMAIN NAME SYSTEM (DNS) AND LTE SECURITY

5.0. TECHNICAL CHALLENGES IN WIRELESS LTE SECURITY

  • 5.1. OFDM
  • 5.2. MIMO
  • 5.3. SAE

6.0. WIRELESS SECURITY THREATS: GENERAL AND LTE

  • 6.1. CYBER THREAT LANDSCAPE
  • 6.2. WEB SECURITY THREAT
  • 6.3. SECURITY THREATS AND BUSINESS IMPACTS
  • 6.4. THREATS BY CATEGORY
  • 6.5. LTE THREAT AGENT TRENDS

7.0. MOBILE SECURITY IN IP ENVIRONMENT: LTE PERSPECTIVE

  • 7.1. IMPORTANT TO RECOGNIZE LTE IS AN ALL IP BASED NETWORK
  • 7.2. MOBILE SECURITY THREAT TYPES
    • 7.2.1. APPLICATION BASED THREATS
    • 7.2.2. WEB BASED THREATS
    • 7.2.3. NETWORK BASED THREATS
    • 7.2.4. PHYSICAL THREATS
  • 7.3. MALWARE: BIG THREATS FOR LTE
  • 7.4. WIRELESS SECURITY: ENVIRONMENTAL CHANGE OUTLOOK
  • 7.5. SIGNALLING DERIVED THREATS: DIAMETER
  • 7.6. THIRD PARTY SOURCED THREATS
  • 7.7. RAN AND BACKHAUL: WEAK POINTS IN LTE FOR MOBILE "HACTIVISTS"

8.0. M2M SECURITY VULNERABILITIES IN LTE

  • 8.1. MACHINE TO MACHINE (M2M) SECURITY
  • 8.2. APPLICATIONS INVOLVED IN M2M COMMUNICATION
  • 8.3. ARCHITECTURAL INFRASTRUCTURE OF M2M SYSTEM IN WIRELESS LTE
  • 8.4. CHALLENGES IN M2M SECURITY

9.0. GLOBAL LTE MARKET ANALYSIS & FORECASTING 2015-2020

  • 9.1. LTE: GLOBAL MARKET SCENARIO
  • 9.2. COMPARISON OF LTE USERS BY REGION
  • 9.3. GLOBAL LTE CONNECTIONS BY OPERATORS
  • 9.4. WORLDWIDE LTE DEPLOYMENT STATUS
  • 9.5. M2M SERVICE PROVIDERS GLOBALLY
  • 9.6. MOBILE PHONE SUBSCRIPTION AND MOBILE TECHNOLOGY SUBSCRIPTION
  • 9.7. GLOBAL M2M SERVICE REVENUE 2015 - 2020
  • 9.8. WIRELESS LTE NETWORK OUTLOOK

10.0. WIRELESS LTE DEVICE MARKET PROJECTIONS 2015 - 2020

  • 10.1. OVERALL WIRELESS DEVICE MARKET FORECAST
  • 10.2. LTE SUBSCRIBED WIRELESS DEVICE USERS MARKET FORECAST BY REGION
  • 10.3. WORLDWIDE LTE SUBSCRIBER GROWTH 2015 - 2020

11.0. WIRELESS LTE THREAT ANALYSIS

  • 11.1. LTE NETWORKS: ACCESS POINT AND THREAT FOR APPLICATIONS
  • 11.2. REGIONAL LTE NETWORK DISTRIBUTION BY USERS
  • 11.3. MOBILE USER AWARENESS OF WIRELESS SECURITY 2015 - 2020
  • 11.4. WIRELESS LTE THREATS AND OPPORTUNITIES

12.0. WIRELESS LTE SECURITY MARKET ANALYSIS

  • 12.1. GLOBAL LTE SECURITY MARKET SHARE
  • 12.2. GLOBAL LTE NETWORK (WITH PRIVACY AND SECURITY) PROVIDER MARKET SHARE
  • 12.3. WIRELESS SECURITY MARKET PROJECTION 2015 - 2020
  • 12.4. WIRELESS SECURITY VENDOR MARKET SHARE
  • 12.5. LTE INFRASTRUCTURE COMMERCIAL BY VENDOR
  • 12.6. LTE STAKEHOLDERS AND VENDOR MARKET SHARE
  • 12.7. VULNERABILITY: SMARTPHONE VS. TABLET DEVICE 2015 - 2020
  • 12.8. GLOBAL M2M SECURITY MARKET REVENUE 2015 - 2020

13.0. LTE SECURITY AWARENESS BY COUNTRY 2015 - 2020

  • 13.1. USA
  • 13.2. UK
  • 13.3. SOUTH KOREA
  • 13.4. AFRICA (VARIOUS COUNTRIES)
  • 13.5. AUSTRALIA
  • 13.6. BRAZIL
  • 13.7. CANADA
  • 13.8. BELGIUM
  • 13.9. FRANCE
  • 13.10. GERMANY
  • 13.11. RUSSIA
  • 13.12. MIDDLE EAST
  • 13.13. JAPAN
  • 13.14. CHINA
  • 13.15. INDIA

14.0. LTE NETWORK PROVIDER MARKET SHARE

  • 14.1. USA
  • 14.2. UNITED KINGDOM
  • 14.3. AFRICAN REGION
  • 14.4. MIDDLE EAST REGION
  • 14.5. SOUTH KOREA
  • 14.6. JAPAN
  • 14.7. RUSSIA
  • 14.8. GERMANY
  • 14.9. AUSTRALIA
  • 14.10. HONG KONG
  • 14.11. CHINA
  • 14.12. INDIA

15.0. EXPERT OPINION ABOUT M2M SECURITY IN WIRELESS LTE

16.0. CONCLUSION AND RECOMMENDATIONS

  • 16.1. CONCLUSIONS
  • 16.2. RECOMMENDATION
    • 16.2.1. INITIATIVE TO PREVENT CYBERCRIMINALS IN LTE M2M SERVICES
    • 16.2.2. INDUSTRY APPROACHES TO PRESERVING CYBER SECURITY
    • 16.2.3. NHTSA APPROACH TO PREVENT M2M CYBER SECURITY THREATS
    • 16.2.4. WIRELESS INDUSTRY EFFORTS TO REDUCE CYBER SECURITY THREATS
    • 16.2.5. PROTECTING CORPORATE NETWORKS
  • 16.3. EXISTING SOLUTIONS FOR LTE SECURITY ISSUES
  • 16.4. RECOMMENDATION FOR MOBILE APPLICATION DEVELOPERS
  • 16.5. IOS RECOMMENDED SETTINGS FOR WI-FI ROUTERS AND ACCESS POINTS
  • 16.6. RECOMMENDED SECURITY FOR MOBILE PAYMENTS
    • 16.6.1. DETECTING IF CARDHOLDER DATA IS BEING "SKIMMED"
    • 16.6.2. IDENTIFYING AND PROTECTING WLAN FROM UNAUTHORIZED DEVICES
  • 16.7. IP NETWORK SECURITY MEASURES

Figures

  • Figure 1: Wireless Technologies
  • Figure 2: LTE Evolution
  • Figure 3: LTE to Advanced LTE Evolution
  • Figure 4: LTE Security Infrastructure
  • Figure 5: The UTRAN Architecture
  • Figure 6: The E-UTRAN Architecture
  • Figure 7: OFDM Technological challenges in LTE
  • Figure 8: MIMO Technological challenges in LTE
  • Figure 9: SAE Technological challenges in LTE
  • Figure 10: Wireless Security Threats
  • Figure 11: Web Security Threat Pattern in LTE
  • Figure 12: Threats in Business Technology
  • Figure 13: LTE Security Threats by Category
  • Figure 14: LTE in IP Address
  • Figure 15: E-UTRAN and EPC
  • Figure 16: Web Based Threats
  • Figure 17: Malware Infection rate on Wireless LTE device by Region
  • Figure 18: Applications hit by Malware in LTE Devices
  • Figure 19: RAN and Black-haul in LTE
  • Figure 20: Major Applications involved in Wireless LTE M2M Communication
  • Figure 21: Architectural Infrastructure of M2M system in Wireless LTE
  • Figure 22: LTE Subscribers Globally
  • Figure 23: LTE Users by Region
  • Figure 24: LTE Coverage Globally by Operator
  • Figure 25: Worldwide LTE Deployment Status
  • Figure 26: Mobile Phone and Technology Subscription
  • Figure 27: Global M2M LTE based Service Revenue 2015 - 2020
  • Figure 28: Wireless Device Market 2015 - 2020
  • Figure 29: LTE Subscription 2015 - 2020
  • Figure 30: Worldwide LTE Subscriber Growth 2015 - 2020
  • Figure 31: Average Daily Subscribers for LTE and 3G
  • Figure 32: Regional LTE Users
  • Figure 33: Mobile User Awareness of Wireless Security 2015 - 2020
  • Figure 34: Global LTE Security Market Share Distribution
  • Figure 35: Global LTE Network (with Privacy and Security) Provider Market Share
  • Figure 36: Wireless Security Market Projection 2015 - 2020
  • Figure 37: Wireless Security Vendors Market Share
  • Figure 38: Top LTE Infrastructure Commercial Vendors
  • Figure 39: LTE Equipment Market Share
  • Figure 40: Vulnerability % Smartphone vs. Tablet Devices 2015 - 2020
  • Figure 41: Global M2M Security Market Revenue 2015 - 2020
  • Figure 42: USA LTE Incident Awareness 2015 - 2020
  • Figure 43: UK LTE Incident Awareness 2015 - 2020
  • Figure 44: South Korea LTE Incident Awareness 2015 - 2020
  • Figure 45: Africa LTE Incident Awareness 2015 - 2020
  • Figure 46: Australia LTE Incident Awareness 2015 - 2020
  • Figure 47: Brazil LTE Incident Awareness 2015 - 2020
  • Figure 48: Canada LTE Incident Awareness 2015 - 2020
  • Figure 49: Belgium LTE Incident Awareness 2015 - 2020
  • Figure 50: France LTE Incident Awareness 2015 - 2020
  • Figure 51: Germany LTE Incident Awareness 2015 - 2020
  • Figure 52: Russia LTE Incident Awareness 2015 - 2020
  • Figure 53: Middle East LTE Incident Awareness 2015 - 2020
  • Figure 54: Japan: LTE Incident Awareness 2015 - 2020
  • Figure 55: China LTE Incident Awareness 2015 - 2020
  • Figure 56: India LTE Incident Awareness 2015 - 2020
  • Figure 57: USA LTE Service Providers
  • Figure 58: UK LTE Service Providers
  • Figure 59: Africa LTE Service Providers
  • Figure 60: Middle East LTE Service Providers
  • Figure 61: South Korea LTE Service Providers
  • Figure 62: Japan LTE Service Providers
  • Figure 63: Russia LTE Service Providers
  • Figure 64: Germany LTE Service Providers
  • Figure 65: Australia LTE Service Providers
  • Figure 66: Hong Kong LTE Service Providers
  • Figure 67: China LTE Service Providers
  • Figure 68: India LTE Service Providers
  • Figure 69: Industrial Approach to Preserve Cyber Security in M2M Services

Tables

  • Table 1: Application based Threats in LTE
  • Table 2: Types of Wireless Attacks
  • Table 3: Wireless Security Changes
  • Table 4: M2M Wireless Security Challenges
  • Table 5: Global M2M LTE Service Providers
  • Table 6 : LTE Smartphone Market Analysis
  • Table 7: Wireless Industry Efforts to Prevent Cyber Security Threats
Back to Top