[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

Wireless Security in LTE Networks and M2M: Market and Forecasts 2015 - 2020

February 2015 | 86 pages | ID: WA111AA438EEN
Mind Commerce Publishing LLC

US$ 1,995.00

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
The Fourth generation (4G) Long Term Evolution (LTE) standard for cellular communications represents a substantial leap forward in terms of capacity and services capabilities. However, it also presents a unique challenge as its all-IP nature exposes vulnerabilities that were heretofore not substantial concerns. LTE network planners need to address many physical and logical security aspects. For example, there is a critical need to protect the communication links between UEs, base stations, and the EPC network from protocol attacks and physical intrusions.

This research is highly recommended for anyone involved in LTE network planning, device procurement, and/or application development and management. The report evaluates the state of threats (malware, cyber-attacks, etc.), solutions, and the overall market for wireless security in cellular with an emphasis on LTE and M2M networks. This report includes forecasting for the period 2015 - 2020. All purchases of Mind Commerce reports includes time with an expert analyst who will help you link key findings in the report to the business issues you're addressing. This needs to be used within three months of purchasing the report.

Target Audience:
  • M2M companies
  • Wireless companies
  • LTE device manufacturers
  • Mobile network operators
  • LTE infrastructure providers
  • Cellular application developers
  • Managed communications providers
1. EXECUTIVE SUMMARY

2. INTRODUCTION

3. EVOLUTION OF LTE

3.1 EVOLUTION OF WIRELESS TECHNOLOGIES
3.2 CDMA TO LTE
3.3 TRANSITION FROM 2G TO 3G AND NOW LTE
3.4 LTE TO LTE ADVANCED

4. TECHNICAL COMPARISON BETWEEN LTE AND WIRELESS TECHNOLOGIES

4.1 WIRELESS SECURITY IN LTE: DIFFERENT CHALLENGES AND OPPORTUNITIES
4.2 INTRODUCTION TO WIRELESS SECURITY
4.3 SECURITY ARCHITECTURE: UMTS (3G) AND LTE (4G)
4.4 DOMAIN NAME SYSTEM (DNS) AND LTE SECURITY

5. TECHNICAL CHALLENGES IN WIRELESS LTE SECURITY

5.1 OFDM
5.2 MIMO
5.3 SAE

6. WIRELESS SECURITY THREATS: GENERAL AND LTE

6.1 CYBER THREAT LANDSCAPE
6.2 WEB SECURITY THREAT
6.3 SECURITY THREATS AND BUSINESS IMPACTS
6.4 THREATS BY CATEGORY
6.5 LTE THREAT AGENT TRENDS

7. MOBILE SECURITY IN IP ENVIRONMENT: LTE PERSPECTIVE

7.1 IMPORTANT TO RECOGNIZE LTE IS AN ALL IP BASED NETWORK
7.2 MOBILE SECURITY THREAT TYPES
  7.2.1 APPLICATION BASED THREATS
  7.2.2 WEB BASED THREATS
  7.2.3 NETWORK BASED THREATS
  7.2.4 PHYSICAL THREATS
7.3 MALWARE: BIG THREATS FOR LTE
7.4 WIRELESS SECURITY: ENVIRONMENTAL CHANGE OUTLOOK
7.5 SIGNALLING DERIVED THREATS: DIAMETER
7.6 THIRD PARTY SOURCED THREATS
7.7 RAN AND BACKHAUL: WEAK POINTS IN LTE FOR MOBILE ""HACTIVISTS""

8. M2M SECURITY VULNERABILITIES IN LTE

8.1 MACHINE TO MACHINE (M2M) SECURITY
8.2 APPLICATIONS INVOLVED IN M2M COMMUNICATION
8.3 ARCHITECTURAL INFRASTRUCTURE OF M2M SYSTEM IN WIRELESS LTE
8.4 CHALLENGES IN M2M SECURITY

9. GLOBAL LTE MARKET ANALYSIS & FORECASTING 2015-2020

9.1 LTE: GLOBAL MARKET SCENARIO
9.2 COMPARISON OF LTE USERS BY REGION
9.3 GLOBAL LTE CONNECTIONS BY OPERATORS
9.4 WORLDWIDE LTE DEPLOYMENT STATUS
9.5 M2M SERVICE PROVIDERS GLOBALLY
9.6 MOBILE PHONE SUBSCRIPTION AND MOBILE TECHNOLOGY SUBSCRIPTION
9.7 GLOBAL M2M SERVICE REVENUE 2015 - 2020
9.8 WIRELESS LTE NETWORK OUTLOOK

10. WIRELESS LTE DEVICE MARKET PROJECTIONS 2015 - 2020

10.1 OVERALL WIRELESS DEVICE MARKET FORECAST
10.2 LTE SUBSCRIBED WIRELESS DEVICE USERS MARKET FORECAST BY REGION
10.3 WORLDWIDE LTE SUBSCRIBER GROWTH 2015 - 2020

11. WIRELESS LTE THREAT ANALYSIS

11.1 LTE NETWORKS: ACCESS POINT AND THREAT FOR APPLICATIONS
11.2 REGIONAL LTE NETWORK DISTRIBUTION BY USERS
11.3 MOBILE USER AWARENESS OF WIRELESS SECURITY 2015 - 2020
11.4 WIRELESS LTE THREATS AND OPPORTUNITIES

12. WIRELESS LTE SECURITY MARKET ANALYSIS

12.1 GLOBAL LTE SECURITY MARKET SHARE
12.2 GLOBAL LTE NETWORK (WITH PRIVACY AND SECURITY) PROVIDER MARKET SHARE
12.3 WIRELESS SECURITY MARKET PROJECTION 2015 - 2020
12.4 WIRELESS SECURITY VENDOR MARKET SHARE
12.5 LTE INFRASTRUCTURE COMMERCIAL BY VENDOR
12.6 LTE STAKEHOLDERS AND VENDOR MARKET SHARE
12.7 VULNERABILITY: SMARTPHONE VS. TABLET DEVICE 2015 - 2020
12.8 GLOBAL M2M SECURITY MARKET REVENUE 2015 - 2020

13. LTE SECURITY AWARENESS BY COUNTRY 2015 - 2020

13.1 USA
13.2 UK
13.3 SOUTH KOREA
13.4 AFRICA (VARIOUS COUNTRIES)
13.5 AUSTRALIA
13.6 BRAZIL
13.7 CANADA
13.8 BELGIUM
13.9 FRANCE
13.10 GERMANY
13.11 RUSSIA
13.12 MIDDLE EAST
13.13 JAPAN
13.14 CHINA
13.15 INDIA

14. LTE NETWORK PROVIDER MARKET SHARE

14.1 USA
14.2 UNITED KINGDOM
14.3 AFRICAN REGION
14.4 MIDDLE EAST REGION
14.5 SOUTH KOREA
14.6 JAPAN
14.7 RUSSIA
14.8 GERMANY
14.9 AUSTRALIA
14.10 HONG KONG
14.11 CHINA
14.12 INDIA

15. EXPERT OPINION ABOUT M2M SECURITY IN WIRELESS LTE

16. CONCLUSION AND RECOMMENDATIONS

16.1 CONCLUSIONS
16.2 RECOMMENDATION
  16.2.1 INITIATIVE TO PREVENT CYBERCRIMINALS IN LTE M2M SERVICES
  16.2.2 INDUSTRY APPROACHES TO PRESERVING CYBER SECURITY
  16.2.3 NHTSA APPROACH TO PREVENT M2M CYBER SECURITY THREATS
  16.2.4 WIRELESS INDUSTRY EFFORTS TO REDUCE CYBER SECURITY THREATS
  16.2.5 PROTECTING CORPORATE NETWORKS
16.3 EXISTING SOLUTIONS FOR LTE SECURITY ISSUES
16.4 RECOMMENDATION FOR MOBILE APPLICATION DEVELOPERS
16.5 IOS RECOMMENDED SETTINGS FOR WI-FI ROUTERS AND ACCESS POINTS
16.6 RECOMMENDED SECURITY FOR MOBILE PAYMENTS
  16.6.1 DETECTING IF CARDHOLDER DATA IS BEING ""SKIMMED""
  16.6.2 IDENTIFYING AND PROTECTING WLAN FROM UNAUTHORIZED DEVICES
16.7 IP NETWORK SECURITY MEASURES

LIST OF FIGURES

Figure 1: Wireless Technologies
Figure 2: LTE Evolution
Figure 3: LTE to Advanced LTE Evolution
Figure 4: LTE Security Infrastructure
Figure 5: The UTRAN Architecture
Figure 6: The E-UTRAN Architecture
Figure 7: OFDM Technological challenges in LTE
Figure 8: MIMO Technological challenges in LTE
Figure 9: SAE Technological challenges in LTE
Figure 10: Wireless Security Threats
Figure 11: Web Security Threat Pattern in LTE
Figure 12: Threats in Business Technology
Figure 13: LTE Security Threats by Category
Figure 14: LTE in IP Address
Figure 15: E-UTRAN and EPC
Figure 16: Web Based Threats
Figure 17: Malware Infection rate on Wireless LTE device by Region
Figure 18: Applications hit by Malware in LTE Devices
Figure 19: RAN and Black-haul in LTE
Figure 20: Major Applications involved in Wireless LTE M2M Communication
Figure 21: Architectural Infrastructure of M2M system in Wireless LTE
Figure 22: LTE Subscribers Globally
Figure 23: LTE Users by Region
Figure 24: LTE Coverage Globally by Operator
Figure 25: Worldwide LTE Deployment Status
Figure 26: Mobile Phone and Technology Subscription
Figure 27: Global M2M LTE based Service Revenue 2015 - 2020
Figure 28: Wireless Device Market 2015 - 2020
Figure 29: LTE Subscription 2015 - 2020
Figure 30: Worldwide LTE Subscriber Growth 2015 - 2020
Figure 31: Average Daily Subscribers for LTE and 3G
Figure 32: Regional LTE Users
Figure 33: Mobile User Awareness of Wireless Security 2015 - 2020
Figure 34: Global LTE Security Market Share Distribution
Figure 35: Global LTE Network (with Privacy and Security) Provider Market Share
Figure 36: Wireless Security Market Projection 2015 - 2020
Figure 37: Wireless Security Vendors Market Share
Figure 38: Top LTE Infrastructure Commercial Vendors
Figure 39: LTE Equipment Market Share
Figure 40: Vulnerability % Smartphone vs. Tablet Devices 2015 - 2020
Figure 41: Global M2M Security Market Revenue 2015 - 2020
Figure 42: USA LTE Incident Awareness 2015 - 2020
Figure 43: UK LTE Incident Awareness 2015 - 2020
Figure 44: South Korea LTE Incident Awareness 2015 - 2020
Figure 45: Africa LTE Incident Awareness 2015 - 2020
Figure 46: Australia LTE Incident Awareness 2015 - 2020
Figure 47: Brazil LTE Incident Awareness 2015 - 2020
Figure 48: Canada LTE Incident Awareness 2015 - 2020
Figure 49: Belgium LTE Incident Awareness 2015 - 2020
Figure 50: France LTE Incident Awareness 2015 - 2020
Figure 51: Germany LTE Incident Awareness 2015 - 2020
Figure 52: Russia LTE Incident Awareness 2015 - 2020
Figure 53: Middle East LTE Incident Awareness 2015 - 2020
Figure 54: Japan: LTE Incident Awareness 2015 - 2020
Figure 55: China LTE Incident Awareness 2015 - 2020
Figure 56: India LTE Incident Awareness 2015 - 2020
Figure 57: USA LTE Service Providers
Figure 58: UK LTE Service Providers
Figure 59: Africa LTE Service Providers
Figure 60: Middle East LTE Service Providers
Figure 61: South Korea LTE Service Providers
Figure 62: Japan LTE Service Providers
Figure 63: Russia LTE Service Providers
Figure 64: Germany LTE Service Providers
Figure 65: Australia LTE Service Providers
Figure 66: Hong Kong LTE Service Providers
Figure 67: China LTE Service Providers
Figure 68: India LTE Service Providers
Figure 69: Industrial Approach to Preserve Cyber Security in M2M Services

LIST OF TABLES

Table 1: Application based Threats in LTE
Table 2: Types of Wireless Attacks
Table 3: Wireless Security Changes
Table 4: M2M Wireless Security Challenges
Table 5: Global M2M LTE Service Providers
Table 6: LTE Smartphone Market Analysis
Table 7: Wireless Industry Efforts to Prevent Cyber Security Threats"


More Publications