ResearchMoz

Wireless Security in 3G and LTE Networks: Market and Forecast 2014 - 2019

Mind Commerce Publishing
Published Date » 2014-04-15
No. Of Pages » 96
 
   
 With the rapid expansion of broadband wireless, end-users increasingly rely upon handheld devices for almost all daily living activities. Fourth generation (4G) cellular LTE in particular represents a unique opportunity/challenge as device attacks are growing at a rapid rate, exposing vulnerabilities that must be addressed. Our research indicates that Android malware in particular will grow rapidly and will be considered most vulnerable OS for LTE. 
   
 This research is most reading for anyone involved in LTE network planning, device procurement, and/or application development and management. This report includes forecasting for the period 2014 - 2019. The report complements Mind Commerce research in LTE device, subscriptions, and application market analysis as well as...
Table of Contents: 

1.0 EXECUTIVE SUMMARY 11

2.0 INTRODUCTION 12

3.0 EVOLUTION OF LTE: GLOBAL PERSPECTIVE 15
3.1 TRANSITION FROM 2G TO 3G AND NOW LTE 15
3.2 LTE TO LTE ADVANCED 16
3.3 WIRELESS NETWORK: GLOBAL MARKET SCENARIO: 17
3.4 LTE: GLOBAL MARKET SCENARIO: 17
3.5 COMPARISON OF LTE USERS BY REGION 18
3.6 WORLDWIDE LTE DEPLOYMENT STATUS: 19

4.0 LTE MARKET PROJECTION 2014 - 2019 20
4.1 MOBILE PHONE SUBSCRIPTION AND MOBILE TECHNOLOGY SUBSCRIPTION 20

5.0 WIRELESS SECURITY COMPARISON: UTMS (3G) VS. LTE (4G) 22
5.1 INTRODUCTION TO WIRELESS SECURITY 22
5.2 SECURITY ARCHITECTURE: UTMS (3G) AND LTE (4G) 22
5.3 WHY WIRELESS SECURITY IS DIFFERENT IN LTE 24
5.4 WIRELESS SECURITY VULNERABILITY: A BURNING ISSUE FOR MOBILE DEVICES 25
5.5 SECURITY RISKS IN WIRELESS DEVICES: 26
5.6 FACTS ABOUT SECURITY ISSUES IN MOBILE ENVIRONMENT 27
5.7 DOMAIN NAME SYSTEM (DNS) AND LTE SECURITY 28

6.0 WIRELESS SECURITY THREATS ON MOBILE: LTE PATTERN 29
6.1 WIRELESS LTE CYBER THREAT LANDSCAPE 29
6.2 WEB SECURITY THREAT 30
6.3 SECURITY THREATS AND BUSINESS IMPACTS 30
6.4 CATEGORY POSED THREATS 32
6.5 PLATFORM POSED THREATS 33
6.6 LTE THREAT AGENTS TRENDS 33

7.0 WIRELESS LTE DEVICE MARKET PROJECTIONS 2014-2019 35
7.1 OVERALL WIRELESS DEVICE MARKET FORECAST: 35
7.2 REGIONAL WIRELESS DEVICE MARKET FORECAST 35
7.3 LTE SUBSCRIBED WIRELESS DEVICE USERS MARKET FORECAST: 36

8.0 MOBILE APPLICATION MARKET PROJECTION 2014-2019 37
8.1 MOBILE APPLICATION MARKET: INTRODUCTION 37
8.2 MOBILE APPLICATION MARKET FORECAST 2014 – 2019 38

9.0 MOBILE SECURITY IN IP ENVIRONMENT: LTE PERSPECTIVE 39
9.1 LTE – AN IP BASED NETWORK 39
9.2 TYPES OF MOBILE SECURITY THREATS 40
9.2.1 APPLICATION BASED THREATS 40
9.2.2 WEB BASED THREATS 41
9.2.3 NETWORK BASED THREATS 41
9.2.4 PHYSICAL THREATS 42
9.3 MALWARE: BIG THREATS FOR LTE 43
9.4 WIRELESS SECURITY: ENVIRONMENTAL CHANGE OUTLOOK 44
9.5 SIGNALLING DERIVED THREATS: DIAMETER 45
9.6 THIRD PARTY SOURCED THREATS 45
9.7 RAN AND BACKHAUL: WEAK POINTS IN LTE FOR MOBILE “HACTIVISTS” 45

10.0 WIRELESS SECURITY ANALYSIS ON LTE PERSPECTIVE 47
10.1 ANALYSIS OF WIRELESS LTE THREATS 47
10.1.1 LTE NETWORKS: AN ACCESS POINT AND THREAT FOR APPLICATIONS 47
10.1.1 LTE NETWORKS: REGIONAL DISTRIBUTION OF MOBILE APPLICATION USERS 48
10.1.2 MOBILE USER AWARENESS OF WIRELESS SECURITY 2013 – 2019 48
10.2 WIRELESS LTE THREATS MARKET STATUS AND OUTLOOK 49
10.2.1 WIRELESS LTE THREATS AND OPPORTUNITIES 49
10.2.2 OUTLOOK OF WIRELESS LTE NETWORKS THREATS 49
10.2.1 GLOBAL LTE CONNECTIONS 50

11.0 LTE WIRELESS NETWORK – COUNTRY-WISE ANALYSIS 51
11.1 LTE SECURITY AWARENESS 2014 - 2019 51
11.1.1 USA 51
11.1.2 UNITED KINGDOM 51
11.1.3 SOUTH KOREA 52
11.1.4 AFRICA 52
11.1.5 AUSTRALIA 53
11.1.6 BRAZIL 53
11.1.7 CANADA 54
11.1.8 BELGIUM 54
11.1.9 FRANCE 55
11.1.10 GERMANY 55
11.1.11 RUSSIA 56
11.1.12 MIDDLE EAST 56
11.1.13 JAPAN 57
11.1.14 CHINA 57
11.1.15 INDIA 58
11.2 LTE NETWORK PROVIDER MARKET SHARE 58
11.2.1 USA 58
11.2.2 UNITED KINGDOM 59
11.2.3 AFRICAN REGION 59
11.2.4 MIDDLE EAST REGION 60
11.2.5 SOUTH KOREA 60
11.2.6 JAPAN 61
11.2.7 RUSSIA 61
11.2.8 GERMANY 62
11.2.9 AUSTRALIA 62
11.2.10 HONGKONG 63
11.2.11 CHINA 63
11.2.12 INDIA 64
11.2.13 GLOBAL TOP 10 SERVICE PROVIDER OF LTE NETWORK SUBSCRIBER BASE 64

12.0 DISTINCTIVE INITIATIVE TO PREVENT WIRELESS INCIDENT 65
12.1 UNIQUE MOBILE SECURITY BY BRITISH FIRM 65
12.2 WIRELESS LTE THREAT IDENTIFICATION THROUGH PREVENTION APPLICATION 66
12.3 MOBILE SECURITY AGAINST ANTIVIRUS AND THEFT 66

13.0 LTE STAKEHOLDERS AND VENDOR MARKET SHARE 67
13.1 REGIONAL LTE DEPLOYMENT 2014 67
13.2 VULNERABILITY % SMARTPHONE VS. TABLET DEVICE 2014 - 2019 67
13.3 WIRELESS ANTIVIRUS VENDORS MARKET SHARE 2013 68
13.4 WIRELESS SECURITY COMPANY MARKET SHARE 2013 68
13.5 LTE INFRASTRUCTURE COMMERCIAL BY VENDORS 69
13.6 LTE SUPPORTING TABLET AND SMARTPHONE MANUFACTURERS 69

14.0 KEY OPINION LEADERS VIEW ON LTE SECURITY MARKET 71
14.1 LOWELL MCADAM, CEO, VERIZON 71
14.2 DAN HESSE, CEO, SPRINT 71
14.3 JOHN T CHAMBER, CEO, CISCO 71
14.4 VINCE STECKLER, CEO, AVAST 72
14.5 STEVE BENNET, CEO, SYMANTEC 72

15.0 CASE ANALYSIS 73
15.1 DROIDDREAM MALWARE: SPOILING YOUR DREAM 73
15.2 BAD NEWS: REAL BAD NEWS FOR MOBILE USERS 74
15.3 HACKING YOUR MONEY: BANKING FRAUDS OVER MOBILE 74
15.3.1 UK BANKS ATTACKED USING MALWARE: £1M FRAUD 74
15.3.2 EUROGRABBER ATTACK 75
15.4 THANKS GIVING: BIG DAY FOR HACKERS 75
15.4.1 INTRODUCTION: HACKERS TARGETING SHOPPERS' SMARTPHONES 75
15.4.2 HOW THE SMARTPHONE ATTACKED 76
15.4.3 RESEARCHERS OPINION AND CONCLUSION 76
15.5 WIRELESS THREAT IN CORPORATE ENVIRONMENT 77
15.5.1 INTRODUCTION 77
15.5.2 ATTACK IN CORPORATE ENVIRONMENT: 77
15.6 ONE SIMPLE TRICK COULD DISABLE A CITY’S LTE NETWORK 78
15.6.1 INTRODUCTION 78
15.6.2 FEMTOCELL IS A CONTRIBUTOR IN LTE ATTACKS 78
15.7 HIGH SPEED LTE IS A SOURCE OF ATTACK FOR TERRORIST 79
15.7.1 INTRODUCTION 79
15.7.2 RESEARCHERS QUOTE ON “LTE AS A SOURCE OF TERRORIST ATTACK” 79
15.8 CYBERCRIMINAL’S NETWORK ON MOBILE PAYMENTS 80
15.8.1 INTRODUCTION 80
15.9 MOBILE APPLICATION DOWNLOAD FOUNDATION OF VIRUS DOWNLOAD 81
15.9.1 INTRODUCTION 81
15.9.2 VIRUSES INFILTRATE BY APPLICATIONS DOWNLOADS 82
15.10 MOBILE WIFI HACKING 82
15.11 GAME APPLICATION HACKED SMARTPHONE AND TABLET 82

16.0 CONCLUSION & RECOMMENDATIONS 83
16.1 CONCLUSIONS 83
16.2 TRENDING WIRELESS LTE SECURITY ISSUES IN 2014 83
16.2.1 TARGETED ATTACKS 84
16.2.2 MORE HACTIVISM 84
16.2.3 CYBER ESPIONAGE AND WARFARE 84
16.2.4 BIG BROTHER WATCHING EVEN MORE 84
16.2.5 INCREASE IN MALWARE 85
16.2.6 PRIVACY RIGHTS ERODING 85
16.2.7 CYBER EXTORTION 85
16.2.8 APPLE UNDER ATTACK 86
16.2.9 ANDROID IS EVEN WORSE 86
16.2.10 UN-PATCHED EXPLOITS IN JAVA 86
16.3 VULNERABILITIES IN LTE 86
16.3.1 VULNERABILITY IN LTE SYSTEM ARCHITECTURE 87
16.3.2 VULNERABILITY IN ACCESS AND HANDOVER PROCEDURES 87
16.3.3 VULNERABILITY IN IMS SECURITY AND HENB SECURITY 87
16.4 OTHER LTE SECURITY ISSUES 88
16.5 RECOMMENDATION 88
16.5.1 PROTECTING CORPORATE NETWORK 88
16.6 EXISTING SOLUTIONS FOR LTE SECURITY ISSUES 91
16.7 RECOMMENDATION FOR MOBILE APPLICATION DEVELOPERS 91
16.8 IOS RECOMMENDED SETTINGS FOR WI-FI ROUTERS AND ACCESS POINTS 92
16.9 RECOMMENDED SECURITY FOR MOBILE PAYMENT 92
16.9.1 DETECTING IF CARDHOLDER DATA IS BEING SKIMMED 92
16.9.2 IDENTIFYING AND PROTECTING WLAN FROM UNAUTHORIZED DEVICES 93
16.10 IP NETWORK SECURITY MEASURES: 93

17.0 ACRONYMS 94

List of Tables


Table 1: Types of Application Based Threats 41
Table 2: Types of Wireless Attacks 42
Table 3: Top 10 Service Provider of LTE Network Worldwide 64
Table 4: Top Cellular and WiFi Threats in 2014 83

List of Figures


Figure 1: System Architecture of Wireless LTE 12
Figure 2: Wireless Technologies 13
Figure 3: LTE Evolution 14
Figure 4: LTE and Mobile Evolution 15
Figure 5: Wireless Network and comparison 16
Figure 6: Wireless Network Global Market Scenario 17
Figure 7: LTE Global Market Scenario 18
Figure 8: LTE by Region 18
Figure 9: LTE Worldwide Deployment Status 19
Figure 10: Mobile Phone and Technology Subscription 20
Figure 11: Global LTE User Projection 2014 – 2019 21
Figure 12: The UTRAN Architecture 23
Figure 13: The E-UTRAN Architecture 24
Figure 14: The LTE Security Architecture 25
Figure 15: Top 10 Mobile Malware Encounters 27
Figure 16: Wireless Security Threats 29
Figure 17: LTE Web Security Threats 30
Figure 18: Security Implications on Organizational Goals 31
Figure 19: Business Technology and Threats 32
Figure 20: Category Posed Threats 32
Figure 21: Platform Posed LTE Threats 33
Figure 22: Top Threats and Sources 34
Figure 23: Wireless Devices Market Projection 2014 – 2019 35
Figure 24: Regional Wireless Devices Market 2014 – 2019 35
Figure 25: LTE Subscription 2014 – 2019 36
Figure 26: Types of Mobile Applications 37
Figure 27: Free Apps vs. Paid Apps 2014 - 2019 38
Figure 28: Mobile Application Market 2014 - 2019 38
Figure 29: LTE Network Architecture 39
Figure 30: Functionalities of E-UTRAN and EPC 40
Figure 31: Web-based Threats 41
Figure 32: Worldwide Malware Infection Rate 43
Figure 33: Malware Infected Applications 44
Figure 34: Wireless Security Changes 44
Figure 35: RAN and Black-haul in LTE 46
Figure 36: Average Daily Subscribers for LTE and 3G 47
Figure 37: Regional Mobile Application LTE Users 48
Figure 38: Mobile User Awareness of Wireless Security 2014 – 2019 48
Figure 39: LTE Smartphone Sales Forecast 50
Figure 40: Global LTE Connections 50
Figure 41: USA: LTE Incident Awareness 2014 - 2019 51
Figure 42: UK: LTE Incident Awareness 2014 - 2019 51
Figure 43: South Korea: LTE Incident Awareness 2014 - 2019 52
Figure 44: Africa: LTE Incident Awareness 2014 - 2019 52
Figure 45: Australia: LTE Incident Awareness 2014 - 2019 53
Figure 46: Brazil: LTE Incident Awareness 2014 - 2019 53
Figure 47: Canada: LTE Incident Awareness 2014 - 2019 54
Figure 48: Belgium: LTE Incident Awareness 2014 - 2019 54
Figure 49: France: LTE Incident Awareness 2014 - 2019 55
Figure 50: Germany: LTE Incident Awareness 2014 - 2019 55
Figure 51: Russia: LTE Incident Awareness 2014 - 2019 56
Figure 52: Middle East: LTE Incident Awareness 2014 - 2019 56
Figure 53: Japan: LTE Incident Awareness 2014 - 2019 57
Figure 54: China: LTE Incident Awareness 2014 - 2019 57
Figure 55: India LTE incident Awareness 2014 - 2019 58
Figure 56: USA LTE Service Provider 58
Figure 57: UK LTE Service Provider 59
Figure 58: Africa LTE Service Provider 59
Figure 59: Middle East LTE Service Provider 60
Figure 60: South Korea LTE Service Provider 60
Figure 61: Japan LTE Service Provider 61
Figure 62: Russia LTE Service Provider 61
Figure 63: Germany LTE Service Provider 62
Figure 64: Australia LTE Service Provider 62
Figure 65: Hong Kong LTE Service Provider 63
Figure 66: China LTE Service Provider 63
Figure 67: India LTE Service Provider 64
Figure 68: Mobile Security Model 65
Figure 69: LTE threat identification application 66
Figure 70: Regional Percentage of LTE deployment 2014 67
Figure 71: Vulnerability % Smartphone vs. Tablet Devices 2014 - 2019 67
Figure 72: Wireless Antivirus Vendors Market Share 2013 68
Figure 73: Global Security Vendor Company Market Share 2013 68
Figure 74: Top LTE Infrastructure Commercial Vendors 2013 69
Figure 75: LTE Supporting Tablet and Smartphone Manufacturers 2013 69
Figure 76: BOWLTIME: DROIDDREAM Infected Application 73
Figure 77: BADNEWS infected Application 74
Figure 78: Attacker Targeting Smartphones and Tablets 76
Figure 79: Wireless Threats in Corporate Environment 77
Figure 71: Mobile Payment Attacks 80
Figure 72: Virus Spread through Application Download 81
Figure 73: Game Application on Smartphone 82

Upcoming Reports:

CSF Management Market - Global Industry Analysis, Size, Share, Growth, Trends And Forecast, 2014 - 2020
By - Transparency Market Research
CSF, is an abbreviation for Cerebrospinal Fluid, is an essential component of the brain and the central nervous system. Produced by the choroid plexus (Lower arterial part) of the brain, the CSF not only acts as a protection mechanism, but also as a chemical stabilizer, brain buoyancy regulator, toxin clearance system, and pressure maintenance system. It is produced daily and circulated throughout the exterior of the brain (subarachnoid space), such that only 100-160ml is circulated at any given time. The relevance of CSF therefore lies in the diseases that can cause any disruptions in the...
Extra High Voltage (EHV) Transmission Systems Market - Global Industry Analysis, Size, Share, Trends, Analysis, Growth And Forecast 2014 - 2020
By - Transparency Market Research
Growing power demand coupled with rising concerns over curbing transmission related losses are likely to boost the demand for Extra High Voltage (EHV) transmission systems in the future. The exact voltage requirement for qualifying as an EHV transmission system varies regionally; however in most regions the 765 KV voltage class is considered as EHV. With increasingly stringent emission regulations being implemented around the world, there are multiple clearances required by generating companies before constructing a power plant. In most cases large power plants are located very far away...
Vena Cava Filters Market - Global Industry Analysis, Size, Share, Growth, Trends and Forecast, 2013 - 2019
By - Transparency Market Research
Inferior vena cava or posterior vena cava is the largest vein in the human body responsible for carrying de-oxygenated blood from the lower extremities of the body into the right atrium of heart and then to the lungs. Vena cava filter is a medical device designed to prevent blood clots from travelling to lungs. These filters are implanted by interventional radiologists or vascular surgeons and are used as prophylactic aid for pulmonary emboli. The two general types of vena cava filters are permanent and optionally retrievable filters. Such filters are surgically placed in the inferior...

Research Assistance

We will be happy to help you find what you need.
Please call us or write us:

866-997-4948 (Us-Canada Toll Free)
Tel: +1-518-618-1030
Email: sales@researchmoz.us
Select License type:

Share this report

Related News

Natural Products Store Handed Over to the Younger Generation
Apr 30, 2015  
Emily Kanter states that growing up as the smallest of the three kids, she widely remembers the numerous discussion over dinners along with her parents, Elizabeth Stagl and Michael Kanter, regarding their natural products retail store based in Cambridge. Ms. Kanter informs that the natural products business has been like the fourth kid for our family. She further added that the fourth...
New Haven Looking Forward to Enjoy the Festival of Food
Apr 30, 2015  
The second-largest city of Connecticut, New Haven has been planning up a new and exciting event in a few days time. The city is going to hold a festival of food truck, which will be held for the first time in the city. And the New Havens citizens are eagerly waiting for it to start. However, this festival invites everyone to enjoy the different cuisines, which will need a good...
China is All Set to Open Milan Expo from May 1st
Apr 30, 2015  
On Wednesday, a Chinese official informed that in the Expo, which is going to be inaugurated on 1st of May, which will bear duration of six months, the expo-visitors from across the globe will be able to enjoy marvelous agriculture exhibits of China. The Vice-Chairman of China Council for the Promotion of International Trade and the Commissioner General of China Pavilion, Wang Jinzhen...
Household Plastic Consumed Focus of IMAS Exhibition
Apr 30, 2015  
Household products such as toothbrushes, children’s toys, and cigarette lighters have been found in the stomach of seabirds. This has prompted artists to have an exhibition that shows the danger posed to wildlife on account of ocean pollution. The exhibition called Vanishing Point is organized in collaboration of researchers at Institute for Marine and Antarctic Studies (IIMAS)...
China Polyethylene and Polypropylene Prices to Exhibit Uptrend in May
Apr 30, 2015  
xThe import prices of polyethylene (PE) and polypropylene (PP) in China is expected to exhibit uptrend in prices in May. This is on account of tight back end supply in the middle of a heavy maintenance schedule in a production plant.  In the region, prices for PE and PP have been rising steadily in the region since February. In the domestic market in China, major suppliers namely...