SlideShare a Scribd company logo
1 of 22
Download to read offline
Security	
  in	
  an	
  	
  
LTE	
  Environment	
  
Neil	
  Cook,	
  Chief	
  Technology	
  Officer,	
  Cloudmark	
  
Peter	
  Zuong,	
  Head	
  of	
  Technology,	
  Security	
  and	
  Privacy,	
  Ericsson	
  
Agenda	
  
LTE	
  security	
  differences	
  
Impact	
  of	
  LTE	
  on	
  mobile	
  network	
  security	
  	
  
QuesHons	
  and	
  Answers	
  
Panel	
  discussion	
  
2	
  
3	
  
4	
  
5	
  
LTE	
  global	
  expansion	
  and	
  trends	
  1	
  
Agenda	
  
LTE	
  security	
  differences	
  
Impact	
  of	
  LTE	
  on	
  mobile	
  network	
  security	
  	
  
QuesHons	
  and	
  Answers	
  
Panel	
  discussion	
  
2	
  
3	
  
4	
  
5	
  
LTE	
  global	
  expansion	
  and	
  trends	
  1	
  
European Summit 2013: Enabling innovation, driving profitability
© Analysys Mason Limited 2013
Global LTE Outlook
LTE	
  is	
  spreading	
  around	
  the	
  globe,	
  thanks	
  to	
  flexible	
  spectrum	
  
uHlizaHon,	
  and	
  MBB	
  services	
  
4	
  
▪ By	
  the	
  end	
  of	
  2013,	
  there	
  were	
  over	
  200	
  
million	
  LTE	
  connecHons	
  world-­‐wide,	
  
accounHng	
  for	
  just	
  3%	
  of	
  total	
  mobile	
  
connecHons.	
  Total	
  LTE	
  connecHons	
  will	
  
reach	
  1.5	
  billion	
  by	
  2018.	
  
▪ Emerging	
  Asia	
  Pacific	
  is	
  set	
  to	
  become	
  
the	
  dominant	
  world	
  LTE	
  market,	
  with	
  its	
  
420	
  million	
  connecHons	
  accounHng	
  for	
  
27%	
  of	
  LTE	
  connecHons	
  globally	
  by	
  2018.	
  	
  	
  
▪ Only	
  11%	
  of	
  that	
  region’s	
  connecHons	
  
will	
  have	
  migrated	
  to	
  LTE,	
  as	
  so	
  there	
  will	
  
sHll	
  be	
  considerable	
  un-­‐tapped	
  potenHal	
  
for	
  further	
  take-­‐up	
  of	
  LTE	
  in	
  that	
  region.	
  
	
  
2013
Mobile	
  Security:	
  	
  
Threat	
  overlay	
  on	
  mobility	
  ecosystem	
  
1	
  
The	
  United	
  States	
  is	
  the	
  world’s	
  
largest	
  market	
  for	
  LTE	
  phones	
  and	
  
LTE	
  tablets,	
  but	
  China	
  will	
  catch	
  up	
  
very	
  quickly	
  in	
  2014	
  /	
  2015.	
  
SUMMARY	
  :	
  
Conclusions	
  	
  
2	
  
Wearables	
  are	
  emerging	
  into	
  a	
  100-­‐
million-­‐plus	
  unit	
  global	
  market,	
  led	
  by	
  
fitness	
  bands	
  and	
  smart	
  watches.	
  
Samsung	
  is	
  likely	
  to	
  lead	
  the	
  global	
  
LTE	
  smartwatch	
  market	
  in	
  2014.	
  
3	
  
LTE-­‐Advanced	
  (4.5G)	
  is	
  emerging	
  in	
  
South	
  Korea.	
  It	
  will	
  be	
  a	
  100-­‐million	
  
unit	
  smartphone	
  market	
  worldwide	
  
and	
  in	
  Japan	
  by	
  2015	
  /	
  2016.	
  TD-­‐LTE	
  
also	
  emerging	
  fast	
  in	
  2014.	
  
Agenda	
  
LTE	
  security	
  differences	
  
Impact	
  of	
  LTE	
  on	
  mobile	
  network	
  security	
  	
  
QuesHons	
  and	
  Answers	
  
Panel	
  discussion	
  
2	
  
3	
  
4	
  
5	
  
LTE	
  global	
  expansion	
  and	
  trends	
  1	
  
LTE	
  Security	
  Differences:	
  
No	
  E2E	
  EncrypHon	
  
Mobile operators have become so used to world-class network security being
baked in to their network infrastructure that many executives in these companies
tend to just assume it is there. When they initially rolled out 3G, for example, there
was one single, seamless instance of 3GPP encryption all the way from the
handset to the base station and on, deep in the network, to the RNC. Moreover,
the E1 or DS1 pipes between the base station and the RNC were based on TDM, a
highly-robust, highly-secure telecom grade networking technology.
Figure 1: Encryption in 3G & LTE Networks
Source: Heavy Reading
LTE	
  Security	
  Differences:	
  	
  
All	
  Links	
  are	
  IP	
  
•  Aiacker	
  can	
  gain	
  access	
  at:	
  
–  Cell	
  Site,	
  S1,	
  X2	
  Interfaces	
  
–  And	
  see	
  all	
  traffic	
  that	
  is	
  not	
  applicaHon-­‐encrypted	
  
•  No	
  RNC	
  thus	
  no	
  central	
  control	
  point	
  
•  Increase	
  in	
  small	
  cells	
  leads	
  to	
  increased	
  security	
  
concerns	
  
–  No	
  physical	
  security	
  for	
  small	
  cells	
  
–  Simple	
  network	
  tap	
  to	
  access	
  all	
  data	
  
Agenda	
  
LTE	
  security	
  differences	
  
Impact	
  of	
  LTE	
  on	
  mobile	
  network	
  security	
  	
  
QuesHons	
  and	
  Answers	
  
Panel	
  discussion	
  
2	
  
3	
  
4	
  
5	
  
LTE	
  global	
  expansion	
  and	
  trends	
  1	
  
How	
  LTE	
  Networks	
  Impact	
  MNO	
  Security	
  
11	
  
4G	
  /	
  LTE	
  
More	
  Bandwidth	
  
&	
  
Capacity	
  	
  
Data-­‐Centric,	
  	
  
Connected	
  Devices	
  
All-­‐IP	
  Network	
  
Evolving	
  	
  
Aiackers	
  
• Enables	
  DDOS,	
  spam	
  relaying,	
  
and	
  other	
  aiacks	
  	
  
• Reduces	
  cost	
  to	
  send	
  spam	
  
• Open	
  environment	
  	
  
and	
  protocols	
  increase	
  
vulnerability	
  to	
  threats	
  
• Easier	
  to	
  hack	
  than	
  SS7	
  
• Power	
  compuHng	
  devices	
  vs.	
  
feature	
  phones	
  environment	
  	
  	
  
• Can	
  be	
  hacked,	
  spoofed,	
  and	
  
harnessed	
  to	
  run	
  botnets	
  
• Danger	
  of	
  IP	
  blacklisHng	
  	
  
• Much	
  more	
  skilled	
  at	
  IP	
  aiacks	
  
than	
  voice	
  oriented	
  networks	
  	
  	
  
• Airacted	
  to	
  scale	
  and	
  scope	
  of	
  
environment	
  
Top	
  Messaging	
  Security	
  Challenges	
  with	
  LTE	
  
12	
  
LTE	
  allows	
  aiackers	
  to	
  send	
  more	
  spam,	
  faster	
  than	
  
ever	
  before	
  	
  
LTE	
  driving	
  email,	
  MMS,	
  IMS-­‐based	
  messaging,	
  OTT	
  
messaging,	
  VoIP	
  calls,	
  social	
  network	
  messaging,	
  M2M	
  
communicaHons	
  and	
  evolving	
  protocols	
  
“Every	
  spam	
  received	
  over	
  [mobile	
  messaging]	
  by	
  our	
  
customers	
  is	
  a	
  potenHal	
  reason	
  for	
  them	
  to	
  switch	
  to	
  
OTT	
  messaging”	
  –	
  Tier	
  I	
  Mobile	
  Operator	
  in	
  US	
  	
  
Stop	
  new	
  spam	
  and	
  
messaging	
  aiacks	
  
Protect	
  across	
  
mulHple	
  protocols	
  
Manage	
  threats	
  
from	
  OTT	
  players	
  
How	
  Can	
  Mobile	
  Network	
  Operators…	
  
Agenda	
  
LTE	
  security	
  differences	
  
Impact	
  of	
  LTE	
  on	
  mobile	
  network	
  security	
  	
  
QuesHons	
  and	
  Answers	
  
Panel	
  discussion	
  
2	
  
3	
  
4	
  
5	
  
LTE	
  global	
  expansion	
  and	
  trends	
  1	
  
 
Statements	
  For	
  Discussion	
  
 
AdopHon	
  of	
  LTE	
  will	
  force	
  operators	
  to	
  
decide	
  between	
  network	
  versus	
  consumer.	
  
	
  
	
  
	
  
	
  
 
Mobile	
  Operators	
  will	
  implement	
  security	
  to	
  
protect	
  their	
  network	
  but	
  consumers	
  will	
  not.	
  	
  
	
  
Growth	
  in	
  video	
  consumpHon	
  in	
  an	
  LTE	
  
environment	
  will	
  have	
  a	
  profound	
  effect	
  on	
  
network	
  security.	
  
 
Mobile	
  malware	
  has	
  or	
  has	
  not	
  taken	
  off	
  
the	
  way	
  we	
  thought	
  it	
  would.	
  
	
  
 
The	
  adopHon	
  of	
  LTE	
  presents	
  an	
  onslaught	
  
of	
  privacy	
  concerns	
  and	
  the	
  mobile	
  
operator	
  will	
  be	
  held	
  accountable.	
  	
  
LTE	
  will	
  give	
  operators	
  an	
  intelligent	
  
network	
  allowing	
  them	
  to	
  offer	
  value	
  
added	
  services	
  to	
  subscribers	
  and	
  3rd	
  party	
  
vendors.	
  Security	
  will	
  or	
  will	
  not	
  be	
  
important	
  in	
  this	
  process.	
  	
  
LegislaHve,	
  legal	
  and	
  regulatory	
  acHvity	
  are	
  
are	
  making	
  an	
  impact	
  on	
  mobile	
  security.	
  
Agenda	
  
LTE	
  security	
  differences	
  
Impact	
  of	
  LTE	
  on	
  mobile	
  network	
  security	
  	
  
QuesHons	
  and	
  Answers	
  
Panel	
  discussion	
  
2	
  
3	
  
4	
  
5	
  
LTE	
  global	
  expansion	
  and	
  trends	
  1	
  

More Related Content

What's hot

LTE Security Training – LTE and LTE-Advanced Security
LTE Security Training – LTE and LTE-Advanced SecurityLTE Security Training – LTE and LTE-Advanced Security
LTE Security Training – LTE and LTE-Advanced Security
Bryan Len
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
Fabio Pietrosanti
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
Lindsey Landolfi
 

What's hot (20)

LTE Security Training – LTE and LTE-Advanced Security
LTE Security Training – LTE and LTE-Advanced SecurityLTE Security Training – LTE and LTE-Advanced Security
LTE Security Training – LTE and LTE-Advanced Security
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
4 g
4 g4 g
4 g
 
Voice communication security
Voice communication securityVoice communication security
Voice communication security
 
Presentation over Wi-Fi technology
Presentation over Wi-Fi technologyPresentation over Wi-Fi technology
Presentation over Wi-Fi technology
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
wireless communication system
wireless communication systemwireless communication system
wireless communication system
 
WIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my lifeWIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my life
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 
5G Expectation and Beyond - an Operator Perspective - CG Gustiana
5G Expectation and Beyond - an Operator Perspective - CG Gustiana5G Expectation and Beyond - an Operator Perspective - CG Gustiana
5G Expectation and Beyond - an Operator Perspective - CG Gustiana
 
Wifi
WifiWifi
Wifi
 
Grouping
GroupingGrouping
Grouping
 
MulteFire - Enel Use Cases
MulteFire - Enel Use CasesMulteFire - Enel Use Cases
MulteFire - Enel Use Cases
 
Wi fi ppt project by Mubeen Momin
Wi fi ppt project by Mubeen MominWi fi ppt project by Mubeen Momin
Wi fi ppt project by Mubeen Momin
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
Attacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network SecurityAttacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network Security
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 

Similar to Security lte environment_cook_zuong

LTE_Inbuilding_SWP
LTE_Inbuilding_SWPLTE_Inbuilding_SWP
LTE_Inbuilding_SWP
Ben O'Nolan
 
Lte benefits guide verizon
Lte benefits guide verizonLte benefits guide verizon
Lte benefits guide verizon
ldodnikova
 
UNIT - I -5G- Overview of 5G Broadband Wireless Communications.pptx
UNIT - I -5G- Overview of 5G Broadband Wireless Communications.pptxUNIT - I -5G- Overview of 5G Broadband Wireless Communications.pptx
UNIT - I -5G- Overview of 5G Broadband Wireless Communications.pptx
Prashant Pise
 
Digital footprint@artesis vf
Digital footprint@artesis vfDigital footprint@artesis vf
Digital footprint@artesis vf
Justino Lourenço
 

Similar to Security lte environment_cook_zuong (20)

Infonetics white paper: Security at the Speed of VoLTE
Infonetics white paper:  Security at the Speed of VoLTEInfonetics white paper:  Security at the Speed of VoLTE
Infonetics white paper: Security at the Speed of VoLTE
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
 
LTE_Inbuilding_SWP
LTE_Inbuilding_SWPLTE_Inbuilding_SWP
LTE_Inbuilding_SWP
 
LTE WP FINAL
LTE WP FINALLTE WP FINAL
LTE WP FINAL
 
LTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
LTE - Advancing the Intelligent Edge with Public Safety LTE White PaperLTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
LTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
 
A GUIDE TO MOBILE IOT
A GUIDE TO MOBILE IOTA GUIDE TO MOBILE IOT
A GUIDE TO MOBILE IOT
 
Lte benefits guide verizon
Lte benefits guide verizonLte benefits guide verizon
Lte benefits guide verizon
 
Cellular IoT deployment: Regulatory Spectrum Management challenges and actions
Cellular IoT deployment: Regulatory Spectrum Management challenges and actions Cellular IoT deployment: Regulatory Spectrum Management challenges and actions
Cellular IoT deployment: Regulatory Spectrum Management challenges and actions
 
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
 
Private LTE - White Paper
Private LTE - White PaperPrivate LTE - White Paper
Private LTE - White Paper
 
5G Huawei BTS5900
5G Huawei BTS5900 5G Huawei BTS5900
5G Huawei BTS5900
 
Selex ES at CPExpo 2013: "First responder communications requirements, evolut...
Selex ES at CPExpo 2013: "First responder communications requirements, evolut...Selex ES at CPExpo 2013: "First responder communications requirements, evolut...
Selex ES at CPExpo 2013: "First responder communications requirements, evolut...
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdf
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGen
 
UNIT - I -5G- Overview of 5G Broadband Wireless Communications.pptx
UNIT - I -5G- Overview of 5G Broadband Wireless Communications.pptxUNIT - I -5G- Overview of 5G Broadband Wireless Communications.pptx
UNIT - I -5G- Overview of 5G Broadband Wireless Communications.pptx
 
Digital footprint@artesis vf
Digital footprint@artesis vfDigital footprint@artesis vf
Digital footprint@artesis vf
 
Report on 4 g
Report on 4 gReport on 4 g
Report on 4 g
 
Next generation tech trend for global critical communication standard
Next generation tech trend for global critical communication standardNext generation tech trend for global critical communication standard
Next generation tech trend for global critical communication standard
 
Long Term Evolution
Long Term EvolutionLong Term Evolution
Long Term Evolution
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Security lte environment_cook_zuong

  • 1. Security  in  an     LTE  Environment   Neil  Cook,  Chief  Technology  Officer,  Cloudmark   Peter  Zuong,  Head  of  Technology,  Security  and  Privacy,  Ericsson  
  • 2. Agenda   LTE  security  differences   Impact  of  LTE  on  mobile  network  security     QuesHons  and  Answers   Panel  discussion   2   3   4   5   LTE  global  expansion  and  trends  1  
  • 3. Agenda   LTE  security  differences   Impact  of  LTE  on  mobile  network  security     QuesHons  and  Answers   Panel  discussion   2   3   4   5   LTE  global  expansion  and  trends  1  
  • 4. European Summit 2013: Enabling innovation, driving profitability © Analysys Mason Limited 2013 Global LTE Outlook LTE  is  spreading  around  the  globe,  thanks  to  flexible  spectrum   uHlizaHon,  and  MBB  services   4   ▪ By  the  end  of  2013,  there  were  over  200   million  LTE  connecHons  world-­‐wide,   accounHng  for  just  3%  of  total  mobile   connecHons.  Total  LTE  connecHons  will   reach  1.5  billion  by  2018.   ▪ Emerging  Asia  Pacific  is  set  to  become   the  dominant  world  LTE  market,  with  its   420  million  connecHons  accounHng  for   27%  of  LTE  connecHons  globally  by  2018.       ▪ Only  11%  of  that  region’s  connecHons   will  have  migrated  to  LTE,  as  so  there  will   sHll  be  considerable  un-­‐tapped  potenHal   for  further  take-­‐up  of  LTE  in  that  region.     2013
  • 5. Mobile  Security:     Threat  overlay  on  mobility  ecosystem  
  • 6. 1   The  United  States  is  the  world’s   largest  market  for  LTE  phones  and   LTE  tablets,  but  China  will  catch  up   very  quickly  in  2014  /  2015.   SUMMARY  :   Conclusions     2   Wearables  are  emerging  into  a  100-­‐ million-­‐plus  unit  global  market,  led  by   fitness  bands  and  smart  watches.   Samsung  is  likely  to  lead  the  global   LTE  smartwatch  market  in  2014.   3   LTE-­‐Advanced  (4.5G)  is  emerging  in   South  Korea.  It  will  be  a  100-­‐million   unit  smartphone  market  worldwide   and  in  Japan  by  2015  /  2016.  TD-­‐LTE   also  emerging  fast  in  2014.  
  • 7. Agenda   LTE  security  differences   Impact  of  LTE  on  mobile  network  security     QuesHons  and  Answers   Panel  discussion   2   3   4   5   LTE  global  expansion  and  trends  1  
  • 8. LTE  Security  Differences:   No  E2E  EncrypHon   Mobile operators have become so used to world-class network security being baked in to their network infrastructure that many executives in these companies tend to just assume it is there. When they initially rolled out 3G, for example, there was one single, seamless instance of 3GPP encryption all the way from the handset to the base station and on, deep in the network, to the RNC. Moreover, the E1 or DS1 pipes between the base station and the RNC were based on TDM, a highly-robust, highly-secure telecom grade networking technology. Figure 1: Encryption in 3G & LTE Networks Source: Heavy Reading
  • 9. LTE  Security  Differences:     All  Links  are  IP   •  Aiacker  can  gain  access  at:   –  Cell  Site,  S1,  X2  Interfaces   –  And  see  all  traffic  that  is  not  applicaHon-­‐encrypted   •  No  RNC  thus  no  central  control  point   •  Increase  in  small  cells  leads  to  increased  security   concerns   –  No  physical  security  for  small  cells   –  Simple  network  tap  to  access  all  data  
  • 10. Agenda   LTE  security  differences   Impact  of  LTE  on  mobile  network  security     QuesHons  and  Answers   Panel  discussion   2   3   4   5   LTE  global  expansion  and  trends  1  
  • 11. How  LTE  Networks  Impact  MNO  Security   11   4G  /  LTE   More  Bandwidth   &   Capacity     Data-­‐Centric,     Connected  Devices   All-­‐IP  Network   Evolving     Aiackers   • Enables  DDOS,  spam  relaying,   and  other  aiacks     • Reduces  cost  to  send  spam   • Open  environment     and  protocols  increase   vulnerability  to  threats   • Easier  to  hack  than  SS7   • Power  compuHng  devices  vs.   feature  phones  environment       • Can  be  hacked,  spoofed,  and   harnessed  to  run  botnets   • Danger  of  IP  blacklisHng     • Much  more  skilled  at  IP  aiacks   than  voice  oriented  networks       • Airacted  to  scale  and  scope  of   environment  
  • 12. Top  Messaging  Security  Challenges  with  LTE   12   LTE  allows  aiackers  to  send  more  spam,  faster  than   ever  before     LTE  driving  email,  MMS,  IMS-­‐based  messaging,  OTT   messaging,  VoIP  calls,  social  network  messaging,  M2M   communicaHons  and  evolving  protocols   “Every  spam  received  over  [mobile  messaging]  by  our   customers  is  a  potenHal  reason  for  them  to  switch  to   OTT  messaging”  –  Tier  I  Mobile  Operator  in  US     Stop  new  spam  and   messaging  aiacks   Protect  across   mulHple  protocols   Manage  threats   from  OTT  players   How  Can  Mobile  Network  Operators…  
  • 13. Agenda   LTE  security  differences   Impact  of  LTE  on  mobile  network  security     QuesHons  and  Answers   Panel  discussion   2   3   4   5   LTE  global  expansion  and  trends  1  
  • 15.   AdopHon  of  LTE  will  force  operators  to   decide  between  network  versus  consumer.          
  • 16.   Mobile  Operators  will  implement  security  to   protect  their  network  but  consumers  will  not.      
  • 17. Growth  in  video  consumpHon  in  an  LTE   environment  will  have  a  profound  effect  on   network  security.  
  • 18.   Mobile  malware  has  or  has  not  taken  off   the  way  we  thought  it  would.    
  • 19.   The  adopHon  of  LTE  presents  an  onslaught   of  privacy  concerns  and  the  mobile   operator  will  be  held  accountable.    
  • 20. LTE  will  give  operators  an  intelligent   network  allowing  them  to  offer  value   added  services  to  subscribers  and  3rd  party   vendors.  Security  will  or  will  not  be   important  in  this  process.    
  • 21. LegislaHve,  legal  and  regulatory  acHvity  are   are  making  an  impact  on  mobile  security.  
  • 22. Agenda   LTE  security  differences   Impact  of  LTE  on  mobile  network  security     QuesHons  and  Answers   Panel  discussion   2   3   4   5   LTE  global  expansion  and  trends  1