Wireless Security Market in LTE Networks 2013-2018Report Details:Published:January 2013No. of Pages: 74Price: Single User ...
3. WIRELESS SECURITY IN LTE 103.1 WHY WIRELESS SECURITY IS DIFFERENT IN LTE 103.2 LTE AND MOBILE WIMAX TECHNICAL COMPARISO...
7. GRAPHICAL PRESENTATION OF WIRELESS SECURITY INCIDENT 307.1 WIRELESS INCIDENT BY THROUGH SOURCES 307.1.1 VOIP 307.1.2 MM...
9.2.4 MIDDLE EAST 479.2.5 SOUTH KOREA 489.2.6 JAPAN 489.2.7 RUSSIA 499.2.8 BELGIUM 499.2.9 GERMANY 509.2.10 AUSTRALIA 509....
13.6.1 INTRODUCTION 6513.6.2 HOW THE VIRUS DOWNLOAD BY APPLICATION DOWNLOAD 6513.7 MOBILE WIFI HACKING 6613.8 GAME APPLICA...
Figure 15: LTE Web Security Threats 28Figure 16: Category Posed Threats 28Figure 17: Platform Posed LTE Threats 29Figure 1...
Figure 57: Hong Kong: LTE Service Providers 51Figure 58: China: LTE Service Providers 51Figure 59: India :LTE Service Prov...
Upcoming SlideShare
Loading in...5
×

Wireless Security Market in LTE Networks 2013-2018

370

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
370
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Wireless Security Market in LTE Networks 2013-2018

  1. 1. Wireless Security Market in LTE Networks 2013-2018Report Details:Published:January 2013No. of Pages: 74Price: Single User License – US$1995With the rapid expansion of broadband wireless, end-users increasingly rely upon handhelddevices for almost all daily living activities. Fourth generation (4G) cellular LTE in particularrepresents a unique opportunity/challenge as device attacks are growing at a rapid rate, exposingvulnerabilities that must be addressed. Our research indicates that Android malware in particularwill grow rapidly and will be considered most vulnerable OS for LTE.This research is most reading for anyone involved in LTE network planning, device procurement,and/or application development and management. This report includes extensive LTE SecurityMarket forecasting for the period 2013 - 2018. The report complements Mind Commerceresearch in LTE device, subscriptions, and application market analysis as well as security threatsfor specific applications such as mobile games.Companies in Report:Apple, Samsung Asus, Motorola, Kaspersky, AVG, McAffee, F-secure, Trojon, Verizon Wireless,NTT DocoMo, AT & T Mobility USA, Metro PCS, Vodafone, D2, EMOBILE, NTT DOCOMO,SoftBank Mobile ,KDDI, Vodafone, 3(Hutchison), O2(Telefonica), Everything Everywhere,Zain,Nawras, Omantel, Mobily, Saudi Telecom Company (STC), Zain, du Etisalat, Movicel,Orange Mauritius, MTC Namibia, Vodacom, China Mobile Hong Kong, CSL, PCCW, Smartone,Aircel, Airtel, Augere, Qualcomm, Tikona,, Megafon, MTS, Yota.Target Audience:•LTE device manufacturers•Mobile network operators•LTE infrastructure providers•Cellular application developers•Managed communications providersGet your copy of this report @http://www.reportsnreports.com/reports/213314-wireless-security-market-in-lte-networks-2013-2018.htmlMajor points covered in Table of Contents of this report includeTABLE OF CONTENTS1. EXECUTIVE SUMMARY 82. INTRODUCTION 9
  2. 2. 3. WIRELESS SECURITY IN LTE 103.1 WHY WIRELESS SECURITY IS DIFFERENT IN LTE 103.2 LTE AND MOBILE WIMAX TECHNICAL COMPARISON 113.3 WIRELESS SECURITY VULNERABILITY : A BURNING ISSUE FOR MOBILE DEVICES 113.3.1 CORRELATED RISK IN LTE: 123.4 SMARTPHONE & TABLET DEVICE: NEW CHOICE OF ATTACKER 123.4.1 ANDROID MALWARE SAMPLES: 123.5 3GPP/LTE SECURITY STANDARDIZATION SPECIFICATIONS: 3GPP NDS 143.6 DNS IN WIRELESS SECURITY 154. MOBILE SECURITY IN IP ENVIRONMENT: LTE PATTERN 164.1 TRENDS OF MOBILE SECURITY THREATS 164.1.1 WIRELESS MOBILE DEVICE ADVANCEMENT 164.1.2 INCREASING NUMBER OF MALICIOUS APPLICATION 164.1.3 ANDROIDS POPULARITY 164.1.4 ADAPTION OF MOBILE DEVICE IN CORPORATE AREA 164.1.5 LACK OF AWARENESS AMONG SUBSCRIBER 164.2 RAN & BACKHAUL AS MEANS FOR STRONGER SECURITY 174.3 CORE NETWORK THREATS 184.4 DIAMETER SIGNALLING DERIVED THREAT: 194.5 THIRD PARTY SOURCED THREAT 204.5.1 ROAMING PARTNERS: 204.5.2 MVNO 214.5.3 INFRASTRUCTURE 214.5.4 ENTERPRISE NETWORK 224.6 IWLAN SECURITY 224.7 SMALL CELL SECURITY 224.8 RCS (RICH COMMUNICATION SERVICES) SECURITY 23FIGURE 10: RCS (RICH COMMUNICATION SERVICES) SECURITY ARCHITECTURE(COPYRIGHT: RADISYS) 235. WIRELESS SECURITY ANALYSIS ON LTE PATTERN 245.1 ANALYSIS OF WIRELESS LTE THREAT: 245.1.1 LTE APPLICATION USER FORECASTING 2013-2018* 245.1.2 CONSUMER AWARENESS OVER WIRELESS SECURITY 2013 - 2018 255.1.3 WORLDWIDE WIRELESS ANTIVIRUS USER 2013-2018* 255.2 OUTLOOK OF WIRELESS LTE THREAT: 266. WIRELESS SECURITY THREATS GATEWAY ON MOBILE DEVICE: LTE PATTERN 276.1 WIRELESS LTE CYBER THREAT LANDSCAPE: 276.2 WEB SECURITY THREAT 286.3 CATEGORY POSED THREAT 286.4 PLATFORM POSED THREAT 296.5 ANALYSIS OF ALL TYPES OF LTE THREAT 29
  3. 3. 7. GRAPHICAL PRESENTATION OF WIRELESS SECURITY INCIDENT 307.1 WIRELESS INCIDENT BY THROUGH SOURCES 307.1.1 VOIP 307.1.2 MMS 307.1.3 MOBILE GAMING 317.1.4 MOBILE PAYMENT 317.1.5 MOBILE APPLICATION 327.2 REGION WISE LTE THREAT 327.2.1 VOIP THREAT 327.2.2 MMS THREAT: 337.2.3 GAMING THREAT: 337.2.4 MOBILE PAYMENT THREAT: 347.2.5 APPLICATION DOWNLOAD THREAT 348. LTE TAKING THE PLACE OF 3G 358.1 WORLDWIDE LTE USER ANALYSIS 358.1.1 LTE USER EXPANSION GLOBALLY 358.1.2 LTE USER REGION WISE: 368.2 WIRELESS SECURITY INCIDENT BY SOURCE 368.3 WORLDWIDE MOBILE ANTIVIRUS USER 378.4 UPSHOT ON LTE USERS AND ITS FUTURE 379. WIRELESS SECURITY MEASURE DEPLOYMENT 389.1 COUNTRY WISE LTE SECURITY AWARENESS (2013-2018) 389.1.1 USA 389.1.2 UK 399.1.3 SOUTH KOREA 399.1.4 AFRICA 409.1.5 AUSTRALIA 409.1.6 BRAZIL 419.1.7 CANADA 419.1.8 BELGIUM 429.1.9 FRANCE 429.1.10 GERMANY 439.1.11 RUSSIA 439.1.12 MIDDLE EAST 449.1.13 JAPAN 449.1.14 CHINA 459.1.15 INDIA 459.2 COUNTRY WISE LTE NETWORK (WITH PRIVACY & SECURITY) PROVIDER MARKETSHARE 469.2.1 USA 469.2.2 UK 469.2.3 AFRICA 47
  4. 4. 9.2.4 MIDDLE EAST 479.2.5 SOUTH KOREA 489.2.6 JAPAN 489.2.7 RUSSIA 499.2.8 BELGIUM 499.2.9 GERMANY 509.2.10 AUSTRALIA 509.2.11 HONGKONG 519.2.12 CHINA 519.2.13 INDIA 5210. WIRELESS SECURITY VENDOR COMPANY ANALYSIS 5310.1 WORLDWIDE SECURITY VENDOR ANALYSIS 5311. DISTINCTIVE INITIATIVE TO PREVENT WIRELESS INCIDENT 5411.1 UNIQUE MOBILE SECURITY BY BRITISH FIRM 5411.2 WIRELESS LTE THREAT IDENTIFICATION THROUGH PREVENTION APPLICATION 5512. WIRELESS SECURITY MARKET PROJECTION 2013 - 2018 5612.1 REGION WISE % OF LTE DEPLOYMENT 2013 56FIGURE 63: REGION WISE % OF LTE DEPLOYMENT 2013 5612.2 VULNERABILITY %: SMARTPHONE VS. TABLET DEVICE 2013-2018 5612.3 REGION WISE MARKET VALUE PROJECTION 57FIGURE 65: REGION WISE SECURE LTE SUBSCRIBERS (IN MILLION) 2013-2018* 5712.4 WIRELESS SECURITY COMPANY MARKET SHARE 2013 5712.5 LTE INFRASTRUCTURE COMMERCIAL BY VENDORS 5812.6 LTE SUPPORTING TABLET & SMARTPHONE MANUFACTURERS 58FIGURE 68: LTE SUPPORTING TABLET & SMARTPHONE MANUFACTURERS 5813. CASE ANALYSIS 5913.1 THANKS GIVING: BIG DAY FOR HACKERS 5913.1.1 INTRODUCTION: HACKERS TARGETING SHOPPERS SMARTPHONES 5913.1.2 HOW THE SMARTPHONE ATTACKED 5913.1.3 RESEARCHERS OPINION AND CONCLUSION 6013.2 WIRELESS THREAT IN CORPORATE ENVIRONMENT 6013.2.1 INTRODUCTION 6013.2.2 ATTACK IN CORPORATE ENVIRONMENT: 6113.3 ONE SIMPLE TRICK COULD DISABLE A CITYS LTE NETWORK 6213.3.1 INTRODUCTION 6213.3.2 FEMTOCELL IS A CONTRIBUTOR IN LTE ATTACK 6213.4 HIGH SPEED LTE IS A SOURCE OF ATTACK FOR TERRORIST 6213.4.1 INTRODUCTION 6213.4.2 RESEARCHERS QUOTE ON "LTE AS A SOURCE OF TERRORIST ATTACK" 6313.5 CYBERCRIMINALS NETWORK ON MOBILE PAYMENT 6313.5.1 INTRODUCTION 6313.6 MOBILE APPLICATION DOWNLOAD FOUNDATION OF VIRUS DOWNLOAD 65
  5. 5. 13.6.1 INTRODUCTION 6513.6.2 HOW THE VIRUS DOWNLOAD BY APPLICATION DOWNLOAD 6513.7 MOBILE WIFI HACKING 6613.8 GAME APPLICATION HACKED SMARTPHONE & TABLET 6614. CONCLUSION & RECOMMENDATION 6714.1 CONCLUSION 6714.2 UPCOMING TOP 10 WIRELESS LTE SECURITY ISSUES IN 2013 6714.2.1 TARGETED ATTACKS 6714.2.2 MORE HACTIVISM 6814.2.3 CYBER ESPIONAGE & WARFARE 6814.2.4 BIG BROTHER WATCHING EVEN MORE 6814.2.5 INCREASE IN MALWARE 6814.2.6 PRIVACY RIGHTS ERODING 6914.2.7 CYBER EXTORTION 6914.2.8 APPLE UNDER ATTACK 6914.2.9 ANDROID, EVEN WORSE 6914.2.10 UN-PATCHED EXPLOITS IN JAVA 7014.3 RECOMMENDATION 7014.3.1 PROTECTING CORPORATE NETWORK 7014.4 RECOMMENDATION FOR MOBILE APPLICATION DEVELOPERS: 7314.5 IOS: RECOMMENDED SETTINGS FOR WI-FI ROUTERS AND ACCESS POINTS 7314.6 RECOMMENDED SECURITY FOR MOBILE PAYMENT 7414.6.1 DETECTING IF CARDHOLDER DATA IS BEING SKIMMED 7414.6.2 IDENTIFYING AND PROTECTING WLAN FROM UNAUTHORIZED DEVICES 7414.7 IP NETWORK SECURITY MEASURES: 74LIST OF TABLESTable 1:Types of Wireless Attack 19LIST OF FIGURESFigure 1:System Architecture of Wireless LTE 9Figure 2: LTE and GPRS networks - Comparison between Equivalent Functionalities 10Figure 3:Android Malware Samples 13Figure 4: Model of NDSFigure 5:Ran & Black-haul in LTE 17Figure 6:Diameter Signaling Threat Structure 20Figure 7:Structure of LTE roaming 21Figure 8: IWLAN Security Architecture 22Figure 9: Small Cell Security Architecture 23Figure 10: Rich Communication Services (RCS) Security Architecture 23Figure 11: LTE application usage rate 2013-2018 24Figure 12: Consumer Awareness over Wireless Security 2013 - 2018 25Figure 13: Worldwide Wireless Antivirus User 25Figure 14: Wireless Security Landscape 27
  6. 6. Figure 15: LTE Web Security Threats 28Figure 16: Category Posed Threats 28Figure 17: Platform Posed LTE Threats 29Figure 18: Worldwide VOIP Incidents 2013-2018 30Figure 19: Worldwide MMS Incidents 2013-2018 30Figure 20: Worldwide Mobile Gaming Incidents 2013-2018 31Figure 21: Worldwide Mobile Payment Incidents 2013-2018 31Figure 22: Worldwide Mobile Application Download Incident 2013-2018 32Figure 23: Region-based VOIP incident 32Figure 24: Region wise MMS incident 33Figure 25: Region0based Mobile Gaming incident 33Figure 26: Region-based Mobile Payment incident 34Figure 27: Region-based Application Download Incident 34Figure 28: LTE Global User Expansion 35Figure 29:LTE Deployment Regionally 36Figure 30: Wireless Security Incident by Source 2013-2018 37Figure 31: Worldwide Mobile Antivirus Users by Region 2013-2018 37Figure 32: USA:LTE Incident Awareness (2013-2018) 38Figure 33: UK: LTE Incident Awareness (2013-2018) 39Figure 34: South Korea: LTE Incident Awareness (2013-2018) 39Figure 35: Africa: LTE Incident Awareness (2013-2018) 40Figure 36: Australia: LTE Incident Awareness (2013-2018) 40Figure 37: Brazil: LTE Incident Awareness (2013-2018) 41Figure 38: Canada: LTE Incident Awareness (2013-2018) 41Figure 39: Belgium: LTE Incident Awareness (2013-2018) 42Figure 40: France: LTE Incident Awareness (2013-2018) 43Figure 41: Germany: LTE Incident Awareness (2013-2018) 43Figure 42: Russia: LTE Incident Awareness (2013-2018) 43Figure 43: Middle East: Incident Awareness (2013-2018) 44Figure 44: Japan: LTE Incident Awareness (2013-2018) 44Figure 45: China: LTE Incident Awareness (2013-2018) 45Figure 46: India: LTE Incident Awareness (2013-2018) 45Figure 47: USA: LTE Service Providers 46Figure 48: UK: LTE Service Providers 46Figure 49: Africa: LTE Service Providers 47Figure 50: Middle East: LTE Service Providers 47Figure 51: South Korea: LTE Service Providers 48Figure 52: Japan: LTE Service Providers 48Figure 53: Russia: LTE Service Providers 49Figure 54: Belgium: LTE Service Providers 49Figure 55: Germany: LTE Service Providers 50Figure 56: Australia: LTE Service Providers 50
  7. 7. Figure 57: Hong Kong: LTE Service Providers 51Figure 58: China: LTE Service Providers 51Figure 59: India :LTE Service Providers 52Figure 60: Wireless Security Antivirus Global Market Share 2013-2018 53Figure 61:Tie Mobile Security Model 54Figure 62:LTE Threat Identification Application 55Figure 63: Region-based % of LTE Deployment 2013 56Figure 64: Vulnerability % Smartphone vs. Tablet Devices 2013-2018 56Figure 65: Region-based Secure LTE Subscribers 2013-2018 57Figure 66: Global Security Vendor Company Market share 2013 57Figure 67: LTE Infrastructure Commercial by Vendors 2013-2018 58Figure 68: LTE Supporting Tablet & Smartphone Manufacturers 58Figure 69: Attacker Targeting Smartphones & Tablets 59Figure 70:Wireless Threat in Corporate Environment 61Figure 71:Mobile Payment Attack 64Figure 72: Virus Spread through Application Downloads 65Figure 73:Game Application on Smartphones 66Contact: sales@reportsandreports.com for more information.

×