The Fourth generation (4G) Long Term Evolution (LTE) standard for cellular communications represents a substantial leap forward in terms of capacity and services capabilities. However, it also presents a unique challenge as its all-IP nature exposes vulnerabilities that were heretofore not substantial concerns. LTE network planners need to address many physical and logical security aspects. For example, there is a critical need to protect the communication links between Ues, base stations, and the EPC network from protocol attacks and physical intrusions.
This research is highly recommended for anyone involved in LTE network planning, device procurement, and/or application development and management. The report evaluates the state of threats (malware, cyber-attacks, etc.), solutions, and the overall market for wireless security in cellular with an emphasis on LTE and M2M networks. This report includes forecasting for the period 2015 - 2020. All purchases of Mind Commerce reports includes time with an expert analyst who will help you link key findings in the report to the business issues you're addressing. This needs to be used within three months of purchasing the report.
Table of Contents
1.0. EXECUTIVE SUMMARY
2.0. INTRODUCTION
3.0. EVOLUTION OF LTE
- 3.1. EVOLUTION OF WIRELESS TECHNOLOGIES
- 3.2. CDMA TO LTE
- 3.3. TRANSITION FROM 2G TO 3G AND NOW LTE
- 3.4. LTE TO LTE ADVANCED
4.0. TECHNICAL COMPARISON BETWEEN LTE AND WIRELESS TECHNOLOGIES
- 4.1. WIRELESS SECURITY IN LTE: DIFFERENT CHALLENGES AND OPPORTUNITIES
- 4.2. INTRODUCTION TO WIRELESS SECURITY
- 4.3. SECURITY ARCHITECTURE: UMTS (3G) AND LTE (4G)
- 4.4. DOMAIN NAME SYSTEM (DNS) AND LTE SECURITY
5.0. TECHNICAL CHALLENGES IN WIRELESS LTE SECURITY
- 5.1. OFDM
- 5.2. MIMO
- 5.3. SAE
6.0. WIRELESS SECURITY THREATS: GENERAL AND LTE
- 6.1. CYBER THREAT LANDSCAPE
- 6.2. WEB SECURITY THREAT
- 6.3. SECURITY THREATS AND BUSINESS IMPACTS
- 6.4. THREATS BY CATEGORY
- 6.5. LTE THREAT AGENT TRENDS
7.0. MOBILE SECURITY IN IP ENVIRONMENT: LTE PERSPECTIVE
- 7.1. IMPORTANT TO RECOGNIZE LTE IS AN ALL IP BASED NETWORK
- 7.2. MOBILE SECURITY THREAT TYPES
- 7.2.1. APPLICATION BASED THREATS
- 7.2.2. WEB BASED THREATS
- 7.2.3. NETWORK BASED THREATS
- 7.2.4. PHYSICAL THREATS
- 7.3. MALWARE: BIG THREATS FOR LTE
- 7.4. WIRELESS SECURITY: ENVIRONMENTAL CHANGE OUTLOOK
- 7.5. SIGNALLING DERIVED THREATS: DIAMETER
- 7.6. THIRD PARTY SOURCED THREATS
- 7.7. RAN AND BACKHAUL: WEAK POINTS IN LTE FOR MOBILE "HACTIVISTS"
8.0. M2M SECURITY VULNERABILITIES IN LTE
- 8.1. MACHINE TO MACHINE (M2M) SECURITY
- 8.2. APPLICATIONS INVOLVED IN M2M COMMUNICATION
- 8.3. ARCHITECTURAL INFRASTRUCTURE OF M2M SYSTEM IN WIRELESS LTE
- 8.4. CHALLENGES IN M2M SECURITY
9.0. GLOBAL LTE MARKET ANALYSIS & FORECASTING 2015-2020
- 9.1. LTE: GLOBAL MARKET SCENARIO
- 9.2. COMPARISON OF LTE USERS BY REGION
- 9.3. GLOBAL LTE CONNECTIONS BY OPERATORS
- 9.4. WORLDWIDE LTE DEPLOYMENT STATUS
- 9.5. M2M SERVICE PROVIDERS GLOBALLY
- 9.6. MOBILE PHONE SUBSCRIPTION AND MOBILE TECHNOLOGY SUBSCRIPTION
- 9.7. GLOBAL M2M SERVICE REVENUE 2015 - 2020
- 9.8. WIRELESS LTE NETWORK OUTLOOK
10.0. WIRELESS LTE DEVICE MARKET PROJECTIONS 2015 - 2020
- 10.1. OVERALL WIRELESS DEVICE MARKET FORECAST
- 10.2. LTE SUBSCRIBED WIRELESS DEVICE USERS MARKET FORECAST BY REGION
- 10.3. WORLDWIDE LTE SUBSCRIBER GROWTH 2015 - 2020
11.0. WIRELESS LTE THREAT ANALYSIS
- 11.1. LTE NETWORKS: ACCESS POINT AND THREAT FOR APPLICATIONS
- 11.2. REGIONAL LTE NETWORK DISTRIBUTION BY USERS
- 11.3. MOBILE USER AWARENESS OF WIRELESS SECURITY 2015 - 2020
- 11.4. WIRELESS LTE THREATS AND OPPORTUNITIES
12.0. WIRELESS LTE SECURITY MARKET ANALYSIS
- 12.1. GLOBAL LTE SECURITY MARKET SHARE
- 12.2. GLOBAL LTE NETWORK (WITH PRIVACY AND SECURITY) PROVIDER MARKET SHARE
- 12.3. WIRELESS SECURITY MARKET PROJECTION 2015 - 2020
- 12.4. WIRELESS SECURITY VENDOR MARKET SHARE
- 12.5. LTE INFRASTRUCTURE COMMERCIAL BY VENDOR
- 12.6. LTE STAKEHOLDERS AND VENDOR MARKET SHARE
- 12.7. VULNERABILITY: SMARTPHONE VS. TABLET DEVICE 2015 - 2020
- 12.8. GLOBAL M2M SECURITY MARKET REVENUE 2015 - 2020
13.0. LTE SECURITY AWARENESS BY COUNTRY 2015 - 2020
- 13.1. USA
- 13.2. UK
- 13.3. SOUTH KOREA
- 13.4. AFRICA (VARIOUS COUNTRIES)
- 13.5. AUSTRALIA
- 13.6. BRAZIL
- 13.7. CANADA
- 13.8. BELGIUM
- 13.9. FRANCE
- 13.10. GERMANY
- 13.11. RUSSIA
- 13.12. MIDDLE EAST
- 13.13. JAPAN
- 13.14. CHINA
- 13.15. INDIA
14.0. LTE NETWORK PROVIDER MARKET SHARE
- 14.1. USA
- 14.2. UNITED KINGDOM
- 14.3. AFRICAN REGION
- 14.4. MIDDLE EAST REGION
- 14.5. SOUTH KOREA
- 14.6. JAPAN
- 14.7. RUSSIA
- 14.8. GERMANY
- 14.9. AUSTRALIA
- 14.10. HONG KONG
- 14.11. CHINA
- 14.12. INDIA
15.0. EXPERT OPINION ABOUT M2M SECURITY IN WIRELESS LTE
16.0. CONCLUSION AND RECOMMENDATIONS
- 16.1. CONCLUSIONS
- 16.2. RECOMMENDATION
- 16.2.1. INITIATIVE TO PREVENT CYBERCRIMINALS IN LTE M2M SERVICES
- 16.2.2. INDUSTRY APPROACHES TO PRESERVING CYBER SECURITY
- 16.2.3. NHTSA APPROACH TO PREVENT M2M CYBER SECURITY THREATS
- 16.2.4. WIRELESS INDUSTRY EFFORTS TO REDUCE CYBER SECURITY THREATS
- 16.2.5. PROTECTING CORPORATE NETWORKS
- 16.3. EXISTING SOLUTIONS FOR LTE SECURITY ISSUES
- 16.4. RECOMMENDATION FOR MOBILE APPLICATION DEVELOPERS
- 16.5. IOS RECOMMENDED SETTINGS FOR WI-FI ROUTERS AND ACCESS POINTS
- 16.6. RECOMMENDED SECURITY FOR MOBILE PAYMENTS
- 16.6.1. DETECTING IF CARDHOLDER DATA IS BEING "SKIMMED"
- 16.6.2. IDENTIFYING AND PROTECTING WLAN FROM UNAUTHORIZED DEVICES
- 16.7. IP NETWORK SECURITY MEASURES
Figures
- Figure 1: Wireless Technologies
- Figure 2: LTE Evolution
- Figure 3: LTE to Advanced LTE Evolution
- Figure 4: LTE Security Infrastructure
- Figure 5: The UTRAN Architecture
- Figure 6: The E-UTRAN Architecture
- Figure 7: OFDM Technological challenges in LTE
- Figure 8: MIMO Technological challenges in LTE
- Figure 9: SAE Technological challenges in LTE
- Figure 10: Wireless Security Threats
- Figure 11: Web Security Threat Pattern in LTE
- Figure 12: Threats in Business Technology
- Figure 13: LTE Security Threats by Category
- Figure 14: LTE in IP Address
- Figure 15: E-UTRAN and EPC
- Figure 16: Web Based Threats
- Figure 17: Malware Infection rate on Wireless LTE device by Region
- Figure 18: Applications hit by Malware in LTE Devices
- Figure 19: RAN and Black-haul in LTE
- Figure 20: Major Applications involved in Wireless LTE M2M Communication
- Figure 21: Architectural Infrastructure of M2M system in Wireless LTE
- Figure 22: LTE Subscribers Globally
- Figure 23: LTE Users by Region
- Figure 24: LTE Coverage Globally by Operator
- Figure 25: Worldwide LTE Deployment Status
- Figure 26: Mobile Phone and Technology Subscription
- Figure 27: Global M2M LTE based Service Revenue 2015 - 2020
- Figure 28: Wireless Device Market 2015 - 2020
- Figure 29: LTE Subscription 2015 - 2020
- Figure 30: Worldwide LTE Subscriber Growth 2015 - 2020
- Figure 31: Average Daily Subscribers for LTE and 3G
- Figure 32: Regional LTE Users
- Figure 33: Mobile User Awareness of Wireless Security 2015 - 2020
- Figure 34: Global LTE Security Market Share Distribution
- Figure 35: Global LTE Network (with Privacy and Security) Provider Market Share
- Figure 36: Wireless Security Market Projection 2015 - 2020
- Figure 37: Wireless Security Vendors Market Share
- Figure 38: Top LTE Infrastructure Commercial Vendors
- Figure 39: LTE Equipment Market Share
- Figure 40: Vulnerability % Smartphone vs. Tablet Devices 2015 - 2020
- Figure 41: Global M2M Security Market Revenue 2015 - 2020
- Figure 42: USA LTE Incident Awareness 2015 - 2020
- Figure 43: UK LTE Incident Awareness 2015 - 2020
- Figure 44: South Korea LTE Incident Awareness 2015 - 2020
- Figure 45: Africa LTE Incident Awareness 2015 - 2020
- Figure 46: Australia LTE Incident Awareness 2015 - 2020
- Figure 47: Brazil LTE Incident Awareness 2015 - 2020
- Figure 48: Canada LTE Incident Awareness 2015 - 2020
- Figure 49: Belgium LTE Incident Awareness 2015 - 2020
- Figure 50: France LTE Incident Awareness 2015 - 2020
- Figure 51: Germany LTE Incident Awareness 2015 - 2020
- Figure 52: Russia LTE Incident Awareness 2015 - 2020
- Figure 53: Middle East LTE Incident Awareness 2015 - 2020
- Figure 54: Japan: LTE Incident Awareness 2015 - 2020
- Figure 55: China LTE Incident Awareness 2015 - 2020
- Figure 56: India LTE Incident Awareness 2015 - 2020
- Figure 57: USA LTE Service Providers
- Figure 58: UK LTE Service Providers
- Figure 59: Africa LTE Service Providers
- Figure 60: Middle East LTE Service Providers
- Figure 61: South Korea LTE Service Providers
- Figure 62: Japan LTE Service Providers
- Figure 63: Russia LTE Service Providers
- Figure 64: Germany LTE Service Providers
- Figure 65: Australia LTE Service Providers
- Figure 66: Hong Kong LTE Service Providers
- Figure 67: China LTE Service Providers
- Figure 68: India LTE Service Providers
- Figure 69: Industrial Approach to Preserve Cyber Security in M2M Services
Tables
- Table 1: Application based Threats in LTE
- Table 2: Types of Wireless Attacks
- Table 3: Wireless Security Changes
- Table 4: M2M Wireless Security Challenges
- Table 5: Global M2M LTE Service Providers
- Table 6 : LTE Smartphone Market Analysis
- Table 7: Wireless Industry Efforts to Prevent Cyber Security Threats