SlideShare a Scribd company logo
1 of 29
Download to read offline
Security at the Speed of VoLTE
An Infonetics Research Webinar
Co-produced with Stoke
#VoLTE The Webinar Will Begin Shortly
#VoLTE
Security at the Speed of VoLTE
An Infonetics Research Webinar
Co-produced with Stoke
Today’s  Speakers
3
JoAnne Emery
Event Director
Infonetics Research
(Moderator)
Dilip Pillaipakam
VP Product Management
and Marketing
Stoke
Stéphane Téral
Principal Analyst,
Mobile Infrastructure and
Carrier Economics
Infonetics Research
#VoLTE
Audience Q&A
LTE Use Cases
Agenda
4
LTE Market Trends
4
LTE Pain Points
LTE Security Framework
Sponsor Approach
Conclusions
1
2
3
4
5
6
4
#VoLTE
7
The Mobile World Is Steadily Moving to LTE
So far so good: 6.6 billion people have been enjoying mobile
communications with no major hacking of core networks!
5
© Infonetics: 2G, 3G, LTE Mobile Infrastructure & Subscribers Market Share & Forecasts, February 2014
0.0
0.5
1.0
2012 2013 2014 2015 2016 2017 2018
Billions
LTE Subscribers Worldwide
Voice over LTE Subscribers Are Following Suit
‣ Despite its decline, voice remains a half-trillion-dollar business
that is undeniably moving to IP
• But remember: No one can be trusted on the Internet
6
© Infonetics: Mobile VoIP & Subscribers Worldwide & Regional Market Size & Forecasts, June 2013
0
160
0.0
1.5
3.0
2012 2013 2014 2015 2016 2017
SubscribersinMillions
RevenueinUS$Billions
Global VoLTE Subscribers and Revenue
VoLTE Revenue VoLTE Subscribers
Flat IP Architecture Is Vulnerable
‣ The direct route from eNodeBs (eNBs) to the evolved packet core
(EPC) opens the door for denial of service (DoS) attacks and
interception of user communications
‣ Accidental or deliberate DoS attacks against customers remain the
most common security threat
7
Source: Arbor Networks, Inc.; Worldwide Infrastructure Security Report Volume IX (3Q2013)
The LTE Security Framework
8
S9
S1-C
Internet
S1-U
S5/S8
S6A
SGi
Gx
Gz/Gy
Other LTE
Network
S11
RAN-Core
Border
IMS Core
SEG
Webinar Focus: RAN-Core (S1) Protection
CSCF
Internet
Border
Policy/ Charging
Control
Device and
Application
MME
SGW
LTE Security at the S1 Link – Emerging Trends
9
Challenge Requirements
Stronger Security
• 2048 bit key length
• PKI
Signaling Protection
• Protect core from exponential
rise in transactions
VoLTE Rollout
• Low latency transport
• Sub-1 second recovery
New Threat Vectors
• S1 protocol/state validation
• SCTP filtering
Audience Q&A
LTE Use Cases
Agenda
10
LTE Market Trends
4
LTE Pain Points
LTE Security Framework
Sponsor Approach
Conclusions
1
2
3
4
5
6
10
#VoLTE
7
How Secure Is Your Network?
1111
“They  had reason to think, insiders said, that their
private, internal networks were safe from prying eyes.”
“Simply  having a ‘private’  line doesn't mean that
you're not actually on a party line with the NSA.”
Caught in the Storm
121212
Common themes
“Unforeseen…”
“Widespread”…
“Costly  to  repair…”…
…
Unique RAN – Core Challenges
131313
‣ Unsecured backhaul
‣ Rapidly increasing throughput
‣ High tunnel density
‣ Ultra-low latency
‣ Directly impacts subscriber QoE
MME
SGW
Office
Home
Outdoor
Metrocell
Small
Cells
4G LTE
EPC
MME
SGW
EPC
E2E Latency Budget = 100 ms
VoLTE:
Low Latency
Small Packets
Impact of IPsec and Smaller Packets
141414
0%
20%
40%
60%
80%
100%
1518 1460 1280 1024 768 512 384 256 128 96
Throughput:%ofLineRate
Packet Size (Bytes)
512
Bytes
Loss of
Capacity
%ofTotalPackets
%EncryptedThroughput
IPsec
Small
Packets
Increased
Latency
Source: Stoke analysis of cumulative packet size distribution
Audience Q&A
LTE Use Cases
Agenda
15
LTE Market Trends
4
LTE Pain Points
LTE Security Framework
Sponsor Approach
Conclusions
1
2
3
4
5
6
15
#VoLTE
7
The LTE Security Framework
16
S9
S1-C
Internet
S1-U S5/S8
S6A
Gx
Gz/Gy
Other LTE
Network
S11
RAN-Core
Border
SEG
The border between RAN and Core (S1) requires protection
against specific risks to critical infrastructure at that interface
New Protection Functions
- Control + user plane visibility
- RAN awareness
- Deeper EPC protection
DRA
SBC
IMS
Core
SGW
MME
CSCF
Internet Border
Policy / Charging
Control
SGi
Audience Q&A
LTE Use Cases
Agenda
17
LTE Market Trends
4
LTE Pain Points
LTE Security Framework
Sponsor Approach
Conclusions
1
2
3
4
5
6
17
#VoLTE
7
Use Case: Security During Rapid Growth
and Unpredictability
181818
1.1
19.0
41.0
1Q11 2Q11 3Q11 4Q11 1Q12 3Q12 4Q12 2Q13 3Q13 4Q13 2014 2015
‣ Rapid 9-month
expansion
• 0–5k base stations
• 1 million subscribers
‣ Keep up with
demand
• 20x subscriber
increase
• Increased usage
‣ Maintain competitive
edge
• Add VoLTE
• Increase speed
New
Devices
New
Apps
Operator Objective:
Security + High Throughput + Low Latency
New
Services
Subscribers (M)
Source: Asian operator network fact book, press releases, and annual reports
Office
Home
Outdoor
Metrocell
Small
Cells
Use Case: Signaling Overload
‣ Signaling Overload Threats
• Application initiated
• Compromised eNodeBs
• Natural disasters
‣ Prioritized Traffic
• Already connected subscribers
• Specific eNodeBs
SGW
4G LTE
EPCMillions of
Service
Requests
MME
Application
Update
Server
QoE: Prioritize
19
Use Case: Small Cell Security
‣ Unsophisticated home owners
‣ Unsecured locations
‣ Much higher tunnel density
‣ Higher throughput per tunnel
MME
SGW
Office
Home
Small
Cells
4G LTE
EPC
100,000s Tunnels
Millions of
Tunnels
20
Audience Q&A
LTE Use Cases
Agenda
21
LTE Market Trends
4
LTE Pain Points
LTE Security Framework
Sponsor Approach
Conclusions
1
2
3
4
5
6
21
#VoLTE
7
Stoke Security eXchange™
222222
MME
SGW
Office
Home
Outdoor
Metrocell
Small
Cells
4G LTE
EPC
Stoke Security eXchange
• 30 Micro seconds or less
• 0.03% of latency budget
E2E VoLTE Latency Budget = 100 ms
Stoke Industry Insight: Charting the Signaling Storms
Stoke Security eXchange™
232323
VoLTE:
Small Packets
Stoke maintains encrypted performance
with the smallest packet sizes
Stoke Industry Insight: Charting the Signaling Storms
Calming the Storm
24
MME
SGW
Office
Home
Outdoor
Metrocell
Small
Cells
4G LTE
EPC
MBA
Stoke Mobile Border Agent
S1 Policing and Metering
MME
MBA
MME
SGW
EPC
MBA
Audience Q&A
LTE Use Cases
Agenda
25
LTE Market Trends
4
LTE Pain Points
LTE Security Framework
Sponsor Approach
Conclusions
1
2
3
4
5
6
25
#VoLTE
7
In Summary
‣ Network security is of increasing importance and even
so-called  “private”  networks  are  at  risk
‣ VoLTE offers new, unique challenges to operators
‣ Signaling storms have already caused costly outages
‣ Carriers need a dedicated security element to secure the
RAN and protect the EPC
26
Audience Q&A
LTE Use Cases
Agenda
27
LTE Market Trends
4
LTE Pain Points
LTE Security Framework
Sponsor Approach
Conclusions
1
2
3
4
5
6
27
#VoLTE
7
Audience Q&A
28
JoAnne Emery
Event Director
joanne@infonetics.com
Infonetics Research
(Moderator)
Dilip Pillaipakam
VP Product Management
and Marketing
dpillaipakam@stoke.com
Stoke
Stéphane Téral
Principal Analyst,
Mobile Infrastructure and
Carrier Economics
stephane@infonetics.com
Infonetics Research
#VoLTE
Thank You
This webcast will be available on-demand for 90 days
For additional Infonetics events, visit
https://www.infonetics.com/infonetics-events/
#VoLTE

More Related Content

What's hot

Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTAlcatel-Lucent Enterprise
 
Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...AllSeen Alliance
 
Mobile interoperability and business productivity
Mobile interoperability and business productivityMobile interoperability and business productivity
Mobile interoperability and business productivityAllSeen Alliance
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveChuck Petras
 
IoT Platform Meetup - Sigfox
IoT Platform Meetup - SigfoxIoT Platform Meetup - Sigfox
IoT Platform Meetup - SigfoxFilip Kolář
 
Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...
Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...
Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...mfrancis
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsAlan Percy
 
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial 053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial voracle
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Alan Percy
 
Is Visibility The Next Big Thing V3
Is Visibility The Next Big Thing   V3Is Visibility The Next Big Thing   V3
Is Visibility The Next Big Thing V3Jeffrey Irland
 
Designing For Interoperability in Mobile
Designing For Interoperability in MobileDesigning For Interoperability in Mobile
Designing For Interoperability in MobileAllSeen Alliance
 
Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...
Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...
Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...mfrancis
 
New Business Opportunities created by the IoT Explosion - WebRTCSummit - San...
New Business Opportunities created by the IoT Explosion - WebRTCSummit  - San...New Business Opportunities created by the IoT Explosion - WebRTCSummit  - San...
New Business Opportunities created by the IoT Explosion - WebRTCSummit - San...telestax
 
WiFi; It's Not Just Connectivity
WiFi; It's Not Just ConnectivityWiFi; It's Not Just Connectivity
WiFi; It's Not Just ConnectivityWestbase.io
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Jiunn-Jer Sun
 
Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0Ian Skerrett
 

What's hot (20)

Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoT
 
Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...
 
Mobile interoperability and business productivity
Mobile interoperability and business productivityMobile interoperability and business productivity
Mobile interoperability and business productivity
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) Wave
 
IoT Platform Meetup - Sigfox
IoT Platform Meetup - SigfoxIoT Platform Meetup - Sigfox
IoT Platform Meetup - Sigfox
 
Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...
Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...
Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...
 
Zig bee
Zig beeZig bee
Zig bee
 
The Social Home
The Social HomeThe Social Home
The Social Home
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial 053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
 
Is Visibility The Next Big Thing V3
Is Visibility The Next Big Thing   V3Is Visibility The Next Big Thing   V3
Is Visibility The Next Big Thing V3
 
Designing For Interoperability in Mobile
Designing For Interoperability in MobileDesigning For Interoperability in Mobile
Designing For Interoperability in Mobile
 
Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...
Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...
Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...
 
MAC Randomization
MAC RandomizationMAC Randomization
MAC Randomization
 
New Business Opportunities created by the IoT Explosion - WebRTCSummit - San...
New Business Opportunities created by the IoT Explosion - WebRTCSummit  - San...New Business Opportunities created by the IoT Explosion - WebRTCSummit  - San...
New Business Opportunities created by the IoT Explosion - WebRTCSummit - San...
 
WiFi; It's Not Just Connectivity
WiFi; It's Not Just ConnectivityWiFi; It's Not Just Connectivity
WiFi; It's Not Just Connectivity
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
Forti wifi
Forti wifiForti wifi
Forti wifi
 
Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0
 

Similar to Security at the Speed of VoLTE: Protecting LTE Networks from Signaling Storms

Infonetics white paper: Security at the Speed of VoLTE
Infonetics white paper:  Security at the Speed of VoLTEInfonetics white paper:  Security at the Speed of VoLTE
Infonetics white paper: Security at the Speed of VoLTEMary McEvoy Carroll
 
Small Cell Forum State of the Market Workshop 2016
Small Cell Forum State of the Market Workshop 2016Small Cell Forum State of the Market Workshop 2016
Small Cell Forum State of the Market Workshop 2016Small Cell Forum
 
Security lte environment_cook_zuong
Security lte environment_cook_zuongSecurity lte environment_cook_zuong
Security lte environment_cook_zuongHoanPeterDuongPronou
 
NEDAS DC - November 29, 2016 Presentations
NEDAS DC - November 29, 2016 Presentations NEDAS DC - November 29, 2016 Presentations
NEDAS DC - November 29, 2016 Presentations Ilissa Miller
 
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)Thierry Lestable
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networksinside-BigData.com
 
Operators strategy for supporting the ‘Mobile Data Explosion’
Operators strategy for supporting the ‘Mobile Data Explosion’Operators strategy for supporting the ‘Mobile Data Explosion’
Operators strategy for supporting the ‘Mobile Data Explosion’eXplanoTech
 
Unleash the Power of 5G and Enhance Your SD-WAN Experience
Unleash the Power of 5G and Enhance Your SD-WAN ExperienceUnleash the Power of 5G and Enhance Your SD-WAN Experience
Unleash the Power of 5G and Enhance Your SD-WAN ExperienceMartello Technologies
 
Focused technology choices - Analyst & Journalist Briefing 2014
Focused technology choices - Analyst & Journalist Briefing 2014Focused technology choices - Analyst & Journalist Briefing 2014
Focused technology choices - Analyst & Journalist Briefing 2014Tele2
 
Squire Technologies: Rolling Out A VoLTE Network
Squire Technologies: Rolling Out A VoLTE NetworkSquire Technologies: Rolling Out A VoLTE Network
Squire Technologies: Rolling Out A VoLTE NetworkSquire Technologies
 
Virtualisation: Reaching tipping point?
Virtualisation: Reaching tipping point? Virtualisation: Reaching tipping point?
Virtualisation: Reaching tipping point? Matt Pooley
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsGordon Haff
 
VoLTE from delay to deploy_webinar 7914
VoLTE from delay to deploy_webinar 7914VoLTE from delay to deploy_webinar 7914
VoLTE from delay to deploy_webinar 7914Radisys Corporation
 
Wireless technologies and .11n
Wireless technologies and .11nWireless technologies and .11n
Wireless technologies and .11nswathi b
 
New world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter managementNew world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter managementInnovation Assured
 
KPN Innovation Playground webinar 2 sep 2020
KPN Innovation Playground webinar 2 sep 2020 KPN Innovation Playground webinar 2 sep 2020
KPN Innovation Playground webinar 2 sep 2020 Fabian van Prooijen
 
Radisys & Airspan - Small Cells and LTE-A Webinar Presentation
Radisys & Airspan -  Small Cells and LTE-A Webinar PresentationRadisys & Airspan -  Small Cells and LTE-A Webinar Presentation
Radisys & Airspan - Small Cells and LTE-A Webinar PresentationRadisys Corporation
 

Similar to Security at the Speed of VoLTE: Protecting LTE Networks from Signaling Storms (20)

Infonetics white paper: Security at the Speed of VoLTE
Infonetics white paper:  Security at the Speed of VoLTEInfonetics white paper:  Security at the Speed of VoLTE
Infonetics white paper: Security at the Speed of VoLTE
 
Small Cell Forum State of the Market Workshop 2016
Small Cell Forum State of the Market Workshop 2016Small Cell Forum State of the Market Workshop 2016
Small Cell Forum State of the Market Workshop 2016
 
Security lte environment_cook_zuong
Security lte environment_cook_zuongSecurity lte environment_cook_zuong
Security lte environment_cook_zuong
 
NEDAS DC - November 29, 2016 Presentations
NEDAS DC - November 29, 2016 Presentations NEDAS DC - November 29, 2016 Presentations
NEDAS DC - November 29, 2016 Presentations
 
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
 
Vo ip overview
Vo ip overviewVo ip overview
Vo ip overview
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
 
Operators strategy for supporting the ‘Mobile Data Explosion’
Operators strategy for supporting the ‘Mobile Data Explosion’Operators strategy for supporting the ‘Mobile Data Explosion’
Operators strategy for supporting the ‘Mobile Data Explosion’
 
Unleash the Power of 5G and Enhance Your SD-WAN Experience
Unleash the Power of 5G and Enhance Your SD-WAN ExperienceUnleash the Power of 5G and Enhance Your SD-WAN Experience
Unleash the Power of 5G and Enhance Your SD-WAN Experience
 
Focused technology choices - Analyst & Journalist Briefing 2014
Focused technology choices - Analyst & Journalist Briefing 2014Focused technology choices - Analyst & Journalist Briefing 2014
Focused technology choices - Analyst & Journalist Briefing 2014
 
Squire Technologies: Rolling Out A VoLTE Network
Squire Technologies: Rolling Out A VoLTE NetworkSquire Technologies: Rolling Out A VoLTE Network
Squire Technologies: Rolling Out A VoLTE Network
 
Virtualisation: Reaching tipping point?
Virtualisation: Reaching tipping point? Virtualisation: Reaching tipping point?
Virtualisation: Reaching tipping point?
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of Things
 
VoLTE from delay to deploy_webinar 7914
VoLTE from delay to deploy_webinar 7914VoLTE from delay to deploy_webinar 7914
VoLTE from delay to deploy_webinar 7914
 
Wireless technologies and .11n
Wireless technologies and .11nWireless technologies and .11n
Wireless technologies and .11n
 
Wireless technologies
Wireless technologiesWireless technologies
Wireless technologies
 
New world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter managementNew world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter management
 
KPN Innovation Playground webinar 2 sep 2020
KPN Innovation Playground webinar 2 sep 2020 KPN Innovation Playground webinar 2 sep 2020
KPN Innovation Playground webinar 2 sep 2020
 
Radisys & Airspan - Small Cells and LTE-A Webinar Presentation
Radisys & Airspan -  Small Cells and LTE-A Webinar PresentationRadisys & Airspan -  Small Cells and LTE-A Webinar Presentation
Radisys & Airspan - Small Cells and LTE-A Webinar Presentation
 
LTE CONCEPTS.pdf
LTE CONCEPTS.pdfLTE CONCEPTS.pdf
LTE CONCEPTS.pdf
 

More from Mary McEvoy Carroll

Hadoop top 20 influencers of 2015
Hadoop top 20 influencers of 2015Hadoop top 20 influencers of 2015
Hadoop top 20 influencers of 2015Mary McEvoy Carroll
 
Machine learning's 2015 top influencers
Machine learning's 2015 top influencersMachine learning's 2015 top influencers
Machine learning's 2015 top influencersMary McEvoy Carroll
 
What is the connected retail environment?
What is the connected retail environment?What is the connected retail environment?
What is the connected retail environment?Mary McEvoy Carroll
 
A guided tour to the internet of things in the sim connected world
A guided tour to the internet of things in the sim connected worldA guided tour to the internet of things in the sim connected world
A guided tour to the internet of things in the sim connected worldMary McEvoy Carroll
 
Connectem VCM powered by VMware - partner brief
Connectem VCM powered by VMware - partner briefConnectem VCM powered by VMware - partner brief
Connectem VCM powered by VMware - partner briefMary McEvoy Carroll
 
Top5 protectiondomains infographic_final
Top5 protectiondomains infographic_finalTop5 protectiondomains infographic_final
Top5 protectiondomains infographic_finalMary McEvoy Carroll
 
Securing the LTE Core: the Road to NFV
Securing the LTE Core:  the Road to NFVSecuring the LTE Core:  the Road to NFV
Securing the LTE Core: the Road to NFVMary McEvoy Carroll
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerationsMary McEvoy Carroll
 
Secure from GO: Design considerations for the integration of security into L...
Secure from GO:  Design considerations for the integration of security into L...Secure from GO:  Design considerations for the integration of security into L...
Secure from GO: Design considerations for the integration of security into L...Mary McEvoy Carroll
 
Secure from go: Stoke Guide to Securing LTE Networks from Day 1
Secure from go:  Stoke Guide to Securing LTE Networks from Day 1Secure from go:  Stoke Guide to Securing LTE Networks from Day 1
Secure from go: Stoke Guide to Securing LTE Networks from Day 1Mary McEvoy Carroll
 

More from Mary McEvoy Carroll (14)

Hadoop top 20 influencers of 2015
Hadoop top 20 influencers of 2015Hadoop top 20 influencers of 2015
Hadoop top 20 influencers of 2015
 
Machine learning's 2015 top influencers
Machine learning's 2015 top influencersMachine learning's 2015 top influencers
Machine learning's 2015 top influencers
 
What is the connected retail environment?
What is the connected retail environment?What is the connected retail environment?
What is the connected retail environment?
 
A guided tour to the internet of things in the sim connected world
A guided tour to the internet of things in the sim connected worldA guided tour to the internet of things in the sim connected world
A guided tour to the internet of things in the sim connected world
 
Connectem VCM powered by VMware - partner brief
Connectem VCM powered by VMware - partner briefConnectem VCM powered by VMware - partner brief
Connectem VCM powered by VMware - partner brief
 
Latency considerations in_lte
Latency considerations in_lteLatency considerations in_lte
Latency considerations in_lte
 
Securing the shared network
Securing the shared networkSecuring the shared network
Securing the shared network
 
Top5 protectiondomains infographic_final
Top5 protectiondomains infographic_finalTop5 protectiondomains infographic_final
Top5 protectiondomains infographic_final
 
Sec conf london_v07
Sec conf london_v07Sec conf london_v07
Sec conf london_v07
 
Securing the LTE Core: the Road to NFV
Securing the LTE Core:  the Road to NFVSecuring the LTE Core:  the Road to NFV
Securing the LTE Core: the Road to NFV
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerations
 
Secure from GO: Design considerations for the integration of security into L...
Secure from GO:  Design considerations for the integration of security into L...Secure from GO:  Design considerations for the integration of security into L...
Secure from GO: Design considerations for the integration of security into L...
 
Secure from go: Stoke Guide to Securing LTE Networks from Day 1
Secure from go:  Stoke Guide to Securing LTE Networks from Day 1Secure from go:  Stoke Guide to Securing LTE Networks from Day 1
Secure from go: Stoke Guide to Securing LTE Networks from Day 1
 
Lte transport requirements
Lte transport requirementsLte transport requirements
Lte transport requirements
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Security at the Speed of VoLTE: Protecting LTE Networks from Signaling Storms

  • 1. Security at the Speed of VoLTE An Infonetics Research Webinar Co-produced with Stoke #VoLTE The Webinar Will Begin Shortly
  • 2. #VoLTE Security at the Speed of VoLTE An Infonetics Research Webinar Co-produced with Stoke
  • 3. Today’s  Speakers 3 JoAnne Emery Event Director Infonetics Research (Moderator) Dilip Pillaipakam VP Product Management and Marketing Stoke Stéphane Téral Principal Analyst, Mobile Infrastructure and Carrier Economics Infonetics Research #VoLTE
  • 4. Audience Q&A LTE Use Cases Agenda 4 LTE Market Trends 4 LTE Pain Points LTE Security Framework Sponsor Approach Conclusions 1 2 3 4 5 6 4 #VoLTE 7
  • 5. The Mobile World Is Steadily Moving to LTE So far so good: 6.6 billion people have been enjoying mobile communications with no major hacking of core networks! 5 © Infonetics: 2G, 3G, LTE Mobile Infrastructure & Subscribers Market Share & Forecasts, February 2014 0.0 0.5 1.0 2012 2013 2014 2015 2016 2017 2018 Billions LTE Subscribers Worldwide
  • 6. Voice over LTE Subscribers Are Following Suit ‣ Despite its decline, voice remains a half-trillion-dollar business that is undeniably moving to IP • But remember: No one can be trusted on the Internet 6 © Infonetics: Mobile VoIP & Subscribers Worldwide & Regional Market Size & Forecasts, June 2013 0 160 0.0 1.5 3.0 2012 2013 2014 2015 2016 2017 SubscribersinMillions RevenueinUS$Billions Global VoLTE Subscribers and Revenue VoLTE Revenue VoLTE Subscribers
  • 7. Flat IP Architecture Is Vulnerable ‣ The direct route from eNodeBs (eNBs) to the evolved packet core (EPC) opens the door for denial of service (DoS) attacks and interception of user communications ‣ Accidental or deliberate DoS attacks against customers remain the most common security threat 7 Source: Arbor Networks, Inc.; Worldwide Infrastructure Security Report Volume IX (3Q2013)
  • 8. The LTE Security Framework 8 S9 S1-C Internet S1-U S5/S8 S6A SGi Gx Gz/Gy Other LTE Network S11 RAN-Core Border IMS Core SEG Webinar Focus: RAN-Core (S1) Protection CSCF Internet Border Policy/ Charging Control Device and Application MME SGW
  • 9. LTE Security at the S1 Link – Emerging Trends 9 Challenge Requirements Stronger Security • 2048 bit key length • PKI Signaling Protection • Protect core from exponential rise in transactions VoLTE Rollout • Low latency transport • Sub-1 second recovery New Threat Vectors • S1 protocol/state validation • SCTP filtering
  • 10. Audience Q&A LTE Use Cases Agenda 10 LTE Market Trends 4 LTE Pain Points LTE Security Framework Sponsor Approach Conclusions 1 2 3 4 5 6 10 #VoLTE 7
  • 11. How Secure Is Your Network? 1111 “They  had reason to think, insiders said, that their private, internal networks were safe from prying eyes.” “Simply  having a ‘private’  line doesn't mean that you're not actually on a party line with the NSA.”
  • 12. Caught in the Storm 121212 Common themes “Unforeseen…” “Widespread”… “Costly  to  repair…”… …
  • 13. Unique RAN – Core Challenges 131313 ‣ Unsecured backhaul ‣ Rapidly increasing throughput ‣ High tunnel density ‣ Ultra-low latency ‣ Directly impacts subscriber QoE MME SGW Office Home Outdoor Metrocell Small Cells 4G LTE EPC MME SGW EPC E2E Latency Budget = 100 ms VoLTE: Low Latency Small Packets
  • 14. Impact of IPsec and Smaller Packets 141414 0% 20% 40% 60% 80% 100% 1518 1460 1280 1024 768 512 384 256 128 96 Throughput:%ofLineRate Packet Size (Bytes) 512 Bytes Loss of Capacity %ofTotalPackets %EncryptedThroughput IPsec Small Packets Increased Latency Source: Stoke analysis of cumulative packet size distribution
  • 15. Audience Q&A LTE Use Cases Agenda 15 LTE Market Trends 4 LTE Pain Points LTE Security Framework Sponsor Approach Conclusions 1 2 3 4 5 6 15 #VoLTE 7
  • 16. The LTE Security Framework 16 S9 S1-C Internet S1-U S5/S8 S6A Gx Gz/Gy Other LTE Network S11 RAN-Core Border SEG The border between RAN and Core (S1) requires protection against specific risks to critical infrastructure at that interface New Protection Functions - Control + user plane visibility - RAN awareness - Deeper EPC protection DRA SBC IMS Core SGW MME CSCF Internet Border Policy / Charging Control SGi
  • 17. Audience Q&A LTE Use Cases Agenda 17 LTE Market Trends 4 LTE Pain Points LTE Security Framework Sponsor Approach Conclusions 1 2 3 4 5 6 17 #VoLTE 7
  • 18. Use Case: Security During Rapid Growth and Unpredictability 181818 1.1 19.0 41.0 1Q11 2Q11 3Q11 4Q11 1Q12 3Q12 4Q12 2Q13 3Q13 4Q13 2014 2015 ‣ Rapid 9-month expansion • 0–5k base stations • 1 million subscribers ‣ Keep up with demand • 20x subscriber increase • Increased usage ‣ Maintain competitive edge • Add VoLTE • Increase speed New Devices New Apps Operator Objective: Security + High Throughput + Low Latency New Services Subscribers (M) Source: Asian operator network fact book, press releases, and annual reports
  • 19. Office Home Outdoor Metrocell Small Cells Use Case: Signaling Overload ‣ Signaling Overload Threats • Application initiated • Compromised eNodeBs • Natural disasters ‣ Prioritized Traffic • Already connected subscribers • Specific eNodeBs SGW 4G LTE EPCMillions of Service Requests MME Application Update Server QoE: Prioritize 19
  • 20. Use Case: Small Cell Security ‣ Unsophisticated home owners ‣ Unsecured locations ‣ Much higher tunnel density ‣ Higher throughput per tunnel MME SGW Office Home Small Cells 4G LTE EPC 100,000s Tunnels Millions of Tunnels 20
  • 21. Audience Q&A LTE Use Cases Agenda 21 LTE Market Trends 4 LTE Pain Points LTE Security Framework Sponsor Approach Conclusions 1 2 3 4 5 6 21 #VoLTE 7
  • 22. Stoke Security eXchange™ 222222 MME SGW Office Home Outdoor Metrocell Small Cells 4G LTE EPC Stoke Security eXchange • 30 Micro seconds or less • 0.03% of latency budget E2E VoLTE Latency Budget = 100 ms Stoke Industry Insight: Charting the Signaling Storms
  • 23. Stoke Security eXchange™ 232323 VoLTE: Small Packets Stoke maintains encrypted performance with the smallest packet sizes Stoke Industry Insight: Charting the Signaling Storms
  • 24. Calming the Storm 24 MME SGW Office Home Outdoor Metrocell Small Cells 4G LTE EPC MBA Stoke Mobile Border Agent S1 Policing and Metering MME MBA MME SGW EPC MBA
  • 25. Audience Q&A LTE Use Cases Agenda 25 LTE Market Trends 4 LTE Pain Points LTE Security Framework Sponsor Approach Conclusions 1 2 3 4 5 6 25 #VoLTE 7
  • 26. In Summary ‣ Network security is of increasing importance and even so-called  “private”  networks  are  at  risk ‣ VoLTE offers new, unique challenges to operators ‣ Signaling storms have already caused costly outages ‣ Carriers need a dedicated security element to secure the RAN and protect the EPC 26
  • 27. Audience Q&A LTE Use Cases Agenda 27 LTE Market Trends 4 LTE Pain Points LTE Security Framework Sponsor Approach Conclusions 1 2 3 4 5 6 27 #VoLTE 7
  • 28. Audience Q&A 28 JoAnne Emery Event Director joanne@infonetics.com Infonetics Research (Moderator) Dilip Pillaipakam VP Product Management and Marketing dpillaipakam@stoke.com Stoke Stéphane Téral Principal Analyst, Mobile Infrastructure and Carrier Economics stephane@infonetics.com Infonetics Research #VoLTE
  • 29. Thank You This webcast will be available on-demand for 90 days For additional Infonetics events, visit https://www.infonetics.com/infonetics-events/ #VoLTE