• Japanese
  • Korean
  • Chinese
Cover Image

Wireless Security Market in LTE Networks 2013-2018

With the rapid expansion of broadband wireless, end-users increasingly rely upon handheld devices for almost all daily living activities. Fourth generation (4G) cellular LTE in particular represents a unique opportunity/challenge as device attacks are growing at a rapid rate, exposing vulnerabilities that must be addressed. Our research indicates that Android malware in particular will grow rapidly and will be considered most vulnerable OS for LTE.

This research is most reading for anyone involved in LTE network planning, device procurement, and/or application development and management. This report includes extensive LTE Security Market forecasting for the period 2013 - 2018. The report complements Mind Commerce research in LTE device, subscriptions, and application market analysis as well as security threats for specific applications such as mobile games.

Companies in Report:

Apple, Samsung Asus, Motorola, Kaspersky, AVG, McAffee, F-secure, Trojon, Verizon Wireless ,NTT DocoMo, AT & T Mobility USA ,Metro PCS ,Vodafone D2 EMOBILE NTT DOCOMO SoftBank Mobile,KDDIVodafone,3(Hutchison),O2(Telefonica)Everything Everywhere, Zain,Nawras, Omantel, Mobily, Saudi Telecom Company (STC),Zain, du Etisalat, Movicel, Orange Mauritius, MTC Namibia, Vodacom, China Mobile Hong Kong,CSL, PCCW, Smartone, Aircel, Airtel, Augere, Qualcomm, Tikona, Megafon, MTS, Yota

Table of Contents

1.0. EXECUTIVE SUMMARY

2.0. INTRODUCTION

3.0. WIRELESS SECURITY IN LTE

  • 3.1. WHY WIRELESS SECURITY IS DIFFERENT IN LTE
  • 3.2. LTE AND MOBILE WIMAX TECHNICAL COMPARISON
  • 3.3. WIRELESS SECURITY VULNERABILITY : A BURNING ISSUE FOR MOBILE DEVICES
    • 3.3.1. CORRELATED RISK IN LTE:
  • 3.4. SMARTPHONE & TABLET DEVICE: NEW CHOICE OF ATTACKER
    • 3.4.1. ANDROID MALWARE SAMPLES:
  • 3.5. 3GPP/LTE SECURITY STANDARDIZATION SPECIFICATIONS: 3GPP NDS
  • 3.6. DNS IN WIRELESS SECURITY

4.0. MOBILE SECURITY IN IP ENVIRONMENT: LTE PATTERN

  • 4.1. TRENDS OF MOBILE SECURITY THREATS
    • 4.1.1. WIRELESS MOBILE DEVICE ADVANCEMENT
    • 4.1.2. INCREASING NUMBER OF MALICIOUS APPLICATION
    • 4.1.3. ANDROID'S POPULARITY
    • 4.1.4. ADAPTION OF MOBILE DEVICE IN CORPORATE AREA
    • 4.1.5. LACK OF AWARENESS AMONG SUBSCRIBER
  • 4.2. RAN & BACKHAUL AS MEANS FOR STRONGER SECURITY
  • 4.3. CORE NETWORK THREATS
  • 4.4. DIAMETER SIGNALLING DERIVED THREAT:
  • 4.5. THIRD PARTY SOURCED THREAT
    • 4.5.1. ROAMING PARTNERS:
    • 4.5.2. MVNO
    • 4.5.3. INFRASTRUCTURE
    • 4.5.4. ENTERPRISE NETWORK
  • 4.6. IWLAN SECURITY
  • 4.7. SMALL CELL SECURITY
  • 4.8. RCS (RICH COMMUNICATION SERVICES) SECURITY
    • FIGURE 10: RCS (RICH COMMUNICATION SERVICES) SECURITY ARCHITECTURE (COPYRIGHT: RADISYS)

5.0. WIRELESS SECURITY ANALYSIS ON LTE PATTERN

  • 5.1. ANALYSIS OF WIRELESS LTE THREAT:
    • 5.1.1. LTE APPLICATION USER FORECASTING 2013-2018*
    • 5.1.2. CONSUMER AWARENESS OVER WIRELESS SECURITY 2013 - 2018
    • 5.1.3. WORLDWIDE WIRELESS ANTIVIRUS USER 2013-2018*
  • 5.2. OUTLOOK OF WIRELESS LTE THREAT:

6.0. WIRELESS SECURITY THREATS GATEWAY ON MOBILE DEVICE: LTE PATTERN

  • 6.1. WIRELESS LTE CYBER THREAT LANDSCAPE:
  • 6.2. WEB SECURITY THREAT
  • 6.3. CATEGORY POSED THREAT
  • 6.4. PLATFORM POSED THREAT
  • 6.5. ANALYSIS OF ALL TYPES OF LTE THREAT

7.0. GRAPHICAL PRESENTATION OF WIRELESS SECURITY INCIDENT

  • 7.1. WIRELESS INCIDENT BY THROUGH SOURCES
    • 7.1.1. VOIP
    • 7.1.2. MMS
    • 7.1.3. MOBILE GAMING
    • 7.1.4. MOBILE PAYMENT
    • 7.1.5. MOBILE APPLICATION
  • 7.2. REGION WISE LTE THREAT
    • 7.2.1. VOIP THREAT
    • 7.2.2. MMS THREAT:
    • 7.2.3. GAMING THREAT:
    • 7.2.4. MOBILE PAYMENT THREAT:
    • 7.2.5. APPLICATION DOWNLOAD THREAT

8.0. LTE TAKING THE PLACE OF 3G

  • 8.1. WORLDWIDE LTE USER ANALYSIS
    • 8.1.1. LTE USER EXPANSION GLOBALLY
    • 8.1.2. LTE USER REGION WISE:
  • 8.2. WIRELESS SECURITY INCIDENT BY SOURCE
  • 8.3. WORLDWIDE MOBILE ANTIVIRUS USER
  • 8.4. UPSHOT ON LTE USERS AND ITS FUTURE

9.0. WIRELESS SECURITY MEASURE DEPLOYMENT

  • 9.1. COUNTRY WISE LTE SECURITY AWARENESS (2013-2018)
    • 9.1.1. USA
    • 9.1.2. UK
    • 9.1.3. SOUTH KOREA
    • 9.1.4. AFRICA
    • 9.1.5. AUSTRALIA
    • 9.1.6. BRAZIL
    • 9.1.7. CANADA
    • 9.1.8. BELGIUM
    • 9.1.9. FRANCE
    • 9.1.10. GERMANY
    • 9.1.11. RUSSIA
    • 9.1.12. MIDDLE EAST
    • 9.1.13. JAPAN
    • 9.1.14. CHINA
    • 9.1.15. INDIA
  • 9.2. COUNTRY WISE LTE NETWORK (WITH PRIVACY & SECURITY) PROVIDER MARKET SHARE
    • 9.2.1. USA
    • 9.2.2. UK
    • 9.2.3. AFRICA
    • 9.2.4. MIDDLE EAST
    • 9.2.5. SOUTH KOREA
    • 9.2.6. JAPAN
    • 9.2.7. RUSSIA
    • 9.2.8. BELGIUM
    • 9.2.9. GERMANY
    • 9.2.10. AUSTRALIA
    • 9.2.11. HONGKONG
    • 9.2.12. CHINA
    • 9.2.13. INDIA

10.0. WIRELESS SECURITY VENDOR COMPANY ANALYSIS

  • 10.1. WORLDWIDE SECURITY VENDOR ANALYSIS

11.0. DISTINCTIVE INITIATIVE TO PREVENT WIRELESS INCIDENT

  • 11.1. UNIQUE MOBILE SECURITY BY BRITISH FIRM
  • 11.2. WIRELESS LTE THREAT IDENTIFICATION THROUGH PREVENTION APPLICATION

12.0. WIRELESS SECURITY MARKET PROJECTION 2013 - 2018

  • 12.1. REGION WISE % OF LTE DEPLOYMENT 2013
    • FIGURE 63: REGION WISE % OF LTE DEPLOYMENT 2013
  • 12.2. VULNERABILITY %: SMARTPHONE VS. TABLET DEVICE 2013-2018
  • 12.3. REGION WISE MARKET VALUE PROJECTION
    • FIGURE 65: REGION WISE SECURE LTE SUBSCRIBERS (IN MILLION) 2013-2018*
  • 12.4. WIRELESS SECURITY COMPANY MARKET SHARE 2013
  • 12.5. LTE INFRASTRUCTURE COMMERCIAL BY VENDORS
  • 12.6. LTE SUPPORTING TABLET & SMARTPHONE MANUFACTURERS
    • FIGURE 68: LTE SUPPORTING TABLET & SMARTPHONE MANUFACTURERS

13.0. CASE ANALYSIS

  • 13.1. THANKS GIVING: BIG DAY FOR HACKERS
    • 13.1.1. INTRODUCTION: HACKERS TARGETING SHOPPERS' SMARTPHONES
    • 13.1.2. HOW THE SMARTPHONE ATTACKED
    • 13.1.3. RESEARCHERS OPINION AND CONCLUSION
  • 13.2. WIRELESS THREAT IN CORPORATE ENVIRONMENT
    • 13.2.1. INTRODUCTION
    • 13.2.2. ATTACK IN CORPORATE ENVIRONMENT:
  • 13.3. ONE SIMPLE TRICK COULD DISABLE A CITY'S LTE NETWORK
    • 13.3.1. INTRODUCTION
    • 13.3.2. FEMTOCELL IS A CONTRIBUTOR IN LTE ATTACK
  • 13.4. HIGH SPEED LTE IS A SOURCE OF ATTACK FOR TERRORIST
    • 13.4.1. INTRODUCTION
    • 13.4.2. RESEARCHERS QUOTE ON "LTE AS A SOURCE OF TERRORIST ATTACK"
  • 13.5. CYBERCRIMINAL'S NETWORK ON MOBILE PAYMENT
    • 13.5.1. INTRODUCTION
  • 13.6. MOBILE APPLICATION DOWNLOAD FOUNDATION OF VIRUS DOWNLOAD
    • 13.6.1. INTRODUCTION
    • 13.6.2. HOW THE VIRUS DOWNLOAD BY APPLICATION DOWNLOAD
  • 13.7. MOBILE WIFI HACKING
  • 13.8. GAME APPLICATION HACKED SMARTPHONE & TABLET

14.0. CONCLUSION & RECOMMENDATION

  • 14.1. CONCLUSION
  • 14.2. UPCOMING TOP 10 WIRELESS LTE SECURITY ISSUES IN 2013
    • 14.2.1. TARGETED ATTACKS
    • 14.2.2. MORE HACTIVISM
    • 14.2.3. CYBER ESPIONAGE & WARFARE
    • 14.2.4. BIG BROTHER WATCHING EVEN MORE
    • 14.2.5. INCREASE IN MALWARE
    • 14.2.6. PRIVACY RIGHTS ERODING
    • 14.2.7. CYBER EXTORTION
    • 14.2.8. APPLE UNDER ATTACK
    • 14.2.9. ANDROID, EVEN WORSE
    • 14.2.10 UN-PATCHED EXPLOITS IN JAVA
  • 14.3. RECOMMENDATION
    • 14.3.1. PROTECTING CORPORATE NETWORK
  • 14.4. RECOMMENDATION FOR MOBILE APPLICATION DEVELOPERS:
  • 14.5. IOS: RECOMMENDED SETTINGS FOR WI-FI ROUTERS AND ACCESS POINTS
  • 14.6. RECOMMENDED SECURITY FOR MOBILE PAYMENT
    • 14.6.1. DETECTING IF CARDHOLDER DATA IS BEING SKIMMED
    • 14.6.2. IDENTIFYING AND PROTECTING WLAN FROM UNAUTHORIZED DEVICES
  • 14.7. IP NETWORK SECURITY MEASURES:

Graphs

  • Figure 1: System Architecture of Wireless LTE
  • Figure 2: LTE and GPRS networks - Comparison between Equivalent Functionalities
  • Figure 3: Android Malware Samples
  • Figure 4: Model of NDS
  • Figure 5: Ran & Black-haul in LTE
  • Figure 6: Diameter Signaling Threat Structure
  • Figure 7: Structure of LTE roaming
  • Figure 8: IWLAN Security Architecture
  • Figure 9: Small Cell Security Architecture
  • Figure 10: Rich Communication Services (RCS) Security Architecture
  • Figure 11: LTE application usage rate 2013-2018
  • Figure 12: Consumer Awareness over Wireless Security 2013 - 2018
  • Figure 13: Worldwide Wireless Antivirus User
  • Figure 14: Wireless Security Landscape
  • Figure 15: LTE Web Security Threats
  • Figure 16: Category Posed Threats
  • Figure 17: Platform Posed LTE Threats
  • Figure 18: Worldwide VOIP Incidents 2013-2018
  • Figure 19: Worldwide MMS Incidents 2013-2018
  • Figure 20: Worldwide Mobile Gaming Incidents 2013-2018
  • Figure 21: Worldwide Mobile Payment Incidents 2013-2018
  • Figure 22: Worldwide Mobile Application Download Incident 2013-2018
  • Figure 23: Region-based VOIP incident
  • Figure 24: Region wise MMS incident
  • Figure 25: Region0based Mobile Gaming incident
  • Figure 26: Region-based Mobile Payment incident
  • Figure 27: Region-based Application Download Incident
  • Figure 28: LTE Global User Expansion
  • Figure 29: LTE Deployment Regionally
  • Figure 30: Wireless Security Incident by Source 2013-2018
  • Figure 31: Worldwide Mobile Antivirus Users by Region 2013-2018
  • Figure 32: USA: LTE Incident Awareness (2013-2018)
  • Figure 33: UK: LTE Incident Awareness (2013-2018)
  • Figure 34: South Korea: LTE Incident Awareness (2013-2018)
  • Figure 35: Africa: LTE Incident Awareness (2013-2018)
  • Figure 36: Australia: LTE Incident Awareness (2013-2018)
  • Figure 37: Brazil: LTE Incident Awareness (2013-2018)
  • Figure 38: Canada: LTE Incident Awareness (2013-2018)
  • Figure 39: Belgium: LTE Incident Awareness (2013-2018)
  • Figure 40: France: LTE Incident Awareness (2013-2018)
  • Figure 41: Germany: LTE Incident Awareness (2013-2018)
  • Figure 42: Russia: LTE Incident Awareness (2013-2018)
  • Figure 43: Middle East: Incident Awareness (2013-2018)
  • Figure 44: Japan: LTE Incident Awareness (2013-2018)
  • Figure 45: China: LTE Incident Awareness (2013-2018)
  • Figure 46: India: LTE Incident Awareness (2013-2018)
  • Figure 47: USA: LTE Service Providers
  • Figure 48: UK: LTE Service Providers
  • Figure 49: Africa: LTE Service Providers
  • Figure 50: Middle East: LTE Service Providers
  • Figure 51: South Korea: LTE Service Providers
  • Figure 52: Japan: LTE Service Providers
  • Figure 53: Russia: LTE Service Providers
  • Figure 54: Belgium: LTE Service Providers
  • Figure 55: Germany: LTE Service Providers
  • Figure 56: Australia: LTE Service Providers
  • Figure 57: Hong Kong: LTE Service Providers
  • Figure 58: China: LTE Service Providers
  • Figure 59: India : LTE Service Providers
  • Figure 60: Wireless Security Antivirus Global Market Share 2013-2018
  • Figure 61: Tie Mobile Security Model
  • Figure 62: LTE Threat Identification Application
  • Figure 63: Region-based % of LTE Deployment 2013
  • Figure 64: Vulnerability % Smartphone vs. Tablet Devices 2013-2018
  • Figure 65: Region-based Secure LTE Subscribers 2013-2018
  • Figure 66: Global Security Vendor Company Market share 2013
  • Figure 67: LTE Infrastructure Commercial by Vendors 2013-2018
  • Figure 68: LTE Supporting Tablet & Smartphone Manufacturers
  • Figure 69: Attacker Targeting Smartphones & Tablets
  • Figure 70: Wireless Threat in Corporate Environment
  • Figure 71: Mobile Payment Attack
  • Figure 72: Virus Spread through Application Downloads
  • Figure 73: Game Application on Smartphones

Tables

  • Table 1: Types of Wireless Attack

c

Show More
Pricing