SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
Wireless Security Market in LTE Networks 2013-2018
Report Details:
Published:January 2013
No. of Pages: 74
Price: Single User License – US$1995




With the rapid expansion of broadband wireless, end-users increasingly rely upon handheld
devices for almost all daily living activities. Fourth generation (4G) cellular LTE in particular
represents a unique opportunity/challenge as device attacks are growing at a rapid rate, exposing
vulnerabilities that must be addressed. Our research indicates that Android malware in particular
will grow rapidly and will be considered most vulnerable OS for LTE.
This research is most reading for anyone involved in LTE network planning, device procurement,
and/or application development and management. This report includes extensive LTE Security
Market forecasting for the period 2013 - 2018. The report complements Mind Commerce
research in LTE device, subscriptions, and application market analysis as well as security threats
for specific applications such as mobile games.
Companies in Report:
Apple, Samsung Asus, Motorola, Kaspersky, AVG, McAffee, F-secure, Trojon, Verizon Wireless
,NTT DocoMo, AT & T Mobility USA, Metro PCS, Vodafone, D2, EMOBILE, NTT DOCOMO,
SoftBank Mobile ,KDDI, Vodafone, 3(Hutchison), O2(Telefonica), Everything Everywhere,
Zain,Nawras, Omantel, Mobily, Saudi Telecom Company (STC), Zain, du Etisalat, Movicel,
Orange Mauritius, MTC Namibia, Vodacom, China Mobile Hong Kong, CSL, PCCW, Smartone,
Aircel, Airtel, Augere, Qualcomm, Tikona,, Megafon, MTS, Yota.
Target Audience:
•LTE device manufacturers
•Mobile network operators
•LTE infrastructure providers
•Cellular application developers
•Managed communications providers

Get your copy of this report @
http://www.reportsnreports.com/reports/213314-wireless-security-market-in-lte-networks-2013-2018.html

Major points covered in Table of Contents of this report include
TABLE OF CONTENTS
1. EXECUTIVE SUMMARY 8
2. INTRODUCTION 9
3. WIRELESS SECURITY IN LTE 10
3.1 WHY WIRELESS SECURITY IS DIFFERENT IN LTE 10
3.2 LTE AND MOBILE WIMAX TECHNICAL COMPARISON 11
3.3 WIRELESS SECURITY VULNERABILITY : A BURNING ISSUE FOR MOBILE DEVICES 11
3.3.1 CORRELATED RISK IN LTE: 12
3.4 SMARTPHONE & TABLET DEVICE: NEW CHOICE OF ATTACKER 12
3.4.1 ANDROID MALWARE SAMPLES: 12
3.5 3GPP/LTE SECURITY STANDARDIZATION SPECIFICATIONS: 3GPP NDS 14
3.6 DNS IN WIRELESS SECURITY 15
4. MOBILE SECURITY IN IP ENVIRONMENT: LTE PATTERN 16
4.1 TRENDS OF MOBILE SECURITY THREATS 16
4.1.1 WIRELESS MOBILE DEVICE ADVANCEMENT 16
4.1.2 INCREASING NUMBER OF MALICIOUS APPLICATION 16
4.1.3 ANDROID'S POPULARITY 16
4.1.4 ADAPTION OF MOBILE DEVICE IN CORPORATE AREA 16
4.1.5 LACK OF AWARENESS AMONG SUBSCRIBER 16
4.2 RAN & BACKHAUL AS MEANS FOR STRONGER SECURITY 17
4.3 CORE NETWORK THREATS 18
4.4 DIAMETER SIGNALLING DERIVED THREAT: 19
4.5 THIRD PARTY SOURCED THREAT 20
4.5.1 ROAMING PARTNERS: 20
4.5.2 MVNO 21
4.5.3 INFRASTRUCTURE 21
4.5.4 ENTERPRISE NETWORK 22
4.6 IWLAN SECURITY 22
4.7 SMALL CELL SECURITY 22
4.8 RCS (RICH COMMUNICATION SERVICES) SECURITY 23
FIGURE 10: RCS (RICH COMMUNICATION SERVICES) SECURITY ARCHITECTURE
(COPYRIGHT: RADISYS) 23
5. WIRELESS SECURITY ANALYSIS ON LTE PATTERN 24
5.1 ANALYSIS OF WIRELESS LTE THREAT: 24
5.1.1 LTE APPLICATION USER FORECASTING 2013-2018* 24
5.1.2 CONSUMER AWARENESS OVER WIRELESS SECURITY 2013 - 2018 25
5.1.3 WORLDWIDE WIRELESS ANTIVIRUS USER 2013-2018* 25
5.2 OUTLOOK OF WIRELESS LTE THREAT: 26
6. WIRELESS SECURITY THREATS GATEWAY ON MOBILE DEVICE: LTE PATTERN 27
6.1 WIRELESS LTE CYBER THREAT LANDSCAPE: 27
6.2 WEB SECURITY THREAT 28
6.3 CATEGORY POSED THREAT 28
6.4 PLATFORM POSED THREAT 29
6.5 ANALYSIS OF ALL TYPES OF LTE THREAT 29
7. GRAPHICAL PRESENTATION OF WIRELESS SECURITY INCIDENT 30
7.1 WIRELESS INCIDENT BY THROUGH SOURCES 30
7.1.1 VOIP 30
7.1.2 MMS 30
7.1.3 MOBILE GAMING 31
7.1.4 MOBILE PAYMENT 31
7.1.5 MOBILE APPLICATION 32
7.2 REGION WISE LTE THREAT 32
7.2.1 VOIP THREAT 32
7.2.2 MMS THREAT: 33
7.2.3 GAMING THREAT: 33
7.2.4 MOBILE PAYMENT THREAT: 34
7.2.5 APPLICATION DOWNLOAD THREAT 34
8. LTE TAKING THE PLACE OF 3G 35
8.1 WORLDWIDE LTE USER ANALYSIS 35
8.1.1 LTE USER EXPANSION GLOBALLY 35
8.1.2 LTE USER REGION WISE: 36
8.2 WIRELESS SECURITY INCIDENT BY SOURCE 36
8.3 WORLDWIDE MOBILE ANTIVIRUS USER 37
8.4 UPSHOT ON LTE USERS AND ITS FUTURE 37
9. WIRELESS SECURITY MEASURE DEPLOYMENT 38
9.1 COUNTRY WISE LTE SECURITY AWARENESS (2013-2018) 38
9.1.1 USA 38
9.1.2 UK 39
9.1.3 SOUTH KOREA 39
9.1.4 AFRICA 40
9.1.5 AUSTRALIA 40
9.1.6 BRAZIL 41
9.1.7 CANADA 41
9.1.8 BELGIUM 42
9.1.9 FRANCE 42
9.1.10 GERMANY 43
9.1.11 RUSSIA 43
9.1.12 MIDDLE EAST 44
9.1.13 JAPAN 44
9.1.14 CHINA 45
9.1.15 INDIA 45
9.2 COUNTRY WISE LTE NETWORK (WITH PRIVACY & SECURITY) PROVIDER MARKET
SHARE 46
9.2.1 USA 46
9.2.2 UK 46
9.2.3 AFRICA 47
9.2.4 MIDDLE EAST 47
9.2.5 SOUTH KOREA 48
9.2.6 JAPAN 48
9.2.7 RUSSIA 49
9.2.8 BELGIUM 49
9.2.9 GERMANY 50
9.2.10 AUSTRALIA 50
9.2.11 HONGKONG 51
9.2.12 CHINA 51
9.2.13 INDIA 52
10. WIRELESS SECURITY VENDOR COMPANY ANALYSIS 53
10.1 WORLDWIDE SECURITY VENDOR ANALYSIS 53
11. DISTINCTIVE INITIATIVE TO PREVENT WIRELESS INCIDENT 54
11.1 UNIQUE MOBILE SECURITY BY BRITISH FIRM 54
11.2 WIRELESS LTE THREAT IDENTIFICATION THROUGH PREVENTION APPLICATION 55
12. WIRELESS SECURITY MARKET PROJECTION 2013 - 2018 56
12.1 REGION WISE % OF LTE DEPLOYMENT 2013 56
FIGURE 63: REGION WISE % OF LTE DEPLOYMENT 2013 56
12.2 VULNERABILITY %: SMARTPHONE VS. TABLET DEVICE 2013-2018 56
12.3 REGION WISE MARKET VALUE PROJECTION 57
FIGURE 65: REGION WISE SECURE LTE SUBSCRIBERS (IN MILLION) 2013-2018* 57
12.4 WIRELESS SECURITY COMPANY MARKET SHARE 2013 57
12.5 LTE INFRASTRUCTURE COMMERCIAL BY VENDORS 58
12.6 LTE SUPPORTING TABLET & SMARTPHONE MANUFACTURERS 58
FIGURE 68: LTE SUPPORTING TABLET & SMARTPHONE MANUFACTURERS 58
13. CASE ANALYSIS 59
13.1 THANKS GIVING: BIG DAY FOR HACKERS 59
13.1.1 INTRODUCTION: HACKERS TARGETING SHOPPERS' SMARTPHONES 59
13.1.2 HOW THE SMARTPHONE ATTACKED 59
13.1.3 RESEARCHERS OPINION AND CONCLUSION 60
13.2 WIRELESS THREAT IN CORPORATE ENVIRONMENT 60
13.2.1 INTRODUCTION 60
13.2.2 ATTACK IN CORPORATE ENVIRONMENT: 61
13.3 ONE SIMPLE TRICK COULD DISABLE A CITY'S LTE NETWORK 62
13.3.1 INTRODUCTION 62
13.3.2 FEMTOCELL IS A CONTRIBUTOR IN LTE ATTACK 62
13.4 HIGH SPEED LTE IS A SOURCE OF ATTACK FOR TERRORIST 62
13.4.1 INTRODUCTION 62
13.4.2 RESEARCHERS QUOTE ON "LTE AS A SOURCE OF TERRORIST ATTACK" 63
13.5 CYBERCRIMINAL'S NETWORK ON MOBILE PAYMENT 63
13.5.1 INTRODUCTION 63
13.6 MOBILE APPLICATION DOWNLOAD FOUNDATION OF VIRUS DOWNLOAD 65
13.6.1 INTRODUCTION 65
13.6.2 HOW THE VIRUS DOWNLOAD BY APPLICATION DOWNLOAD 65
13.7 MOBILE WIFI HACKING 66
13.8 GAME APPLICATION HACKED SMARTPHONE & TABLET 66
14. CONCLUSION & RECOMMENDATION 67
14.1 CONCLUSION 67
14.2 UPCOMING TOP 10 WIRELESS LTE SECURITY ISSUES IN 2013 67
14.2.1 TARGETED ATTACKS 67
14.2.2 MORE HACTIVISM 68
14.2.3 CYBER ESPIONAGE & WARFARE 68
14.2.4 BIG BROTHER WATCHING EVEN MORE 68
14.2.5 INCREASE IN MALWARE 68
14.2.6 PRIVACY RIGHTS ERODING 69
14.2.7 CYBER EXTORTION 69
14.2.8 APPLE UNDER ATTACK 69
14.2.9 ANDROID, EVEN WORSE 69
14.2.10 UN-PATCHED EXPLOITS IN JAVA 70
14.3 RECOMMENDATION 70
14.3.1 PROTECTING CORPORATE NETWORK 70
14.4 RECOMMENDATION FOR MOBILE APPLICATION DEVELOPERS: 73
14.5 IOS: RECOMMENDED SETTINGS FOR WI-FI ROUTERS AND ACCESS POINTS 73
14.6 RECOMMENDED SECURITY FOR MOBILE PAYMENT 74
14.6.1 DETECTING IF CARDHOLDER DATA IS BEING SKIMMED 74
14.6.2 IDENTIFYING AND PROTECTING WLAN FROM UNAUTHORIZED DEVICES 74
14.7 IP NETWORK SECURITY MEASURES: 74
LIST OF TABLES
Table 1:Types of Wireless Attack 19
LIST OF FIGURES
Figure 1:System Architecture of Wireless LTE 9
Figure 2: LTE and GPRS networks - Comparison between Equivalent Functionalities 10
Figure 3:Android Malware Samples 13
Figure 4: Model of NDS
Figure 5:Ran & Black-haul in LTE 17
Figure 6:Diameter Signaling Threat Structure 20
Figure 7:Structure of LTE roaming 21
Figure 8: IWLAN Security Architecture 22
Figure 9: Small Cell Security Architecture 23
Figure 10: Rich Communication Services (RCS) Security Architecture 23
Figure 11: LTE application usage rate 2013-2018 24
Figure 12: Consumer Awareness over Wireless Security 2013 - 2018 25
Figure 13: Worldwide Wireless Antivirus User 25
Figure 14: Wireless Security Landscape 27
Figure 15: LTE Web Security Threats 28
Figure 16: Category Posed Threats 28
Figure 17: Platform Posed LTE Threats 29
Figure 18: Worldwide VOIP Incidents 2013-2018 30
Figure 19: Worldwide MMS Incidents 2013-2018 30
Figure 20: Worldwide Mobile Gaming Incidents 2013-2018 31
Figure 21: Worldwide Mobile Payment Incidents 2013-2018 31
Figure 22: Worldwide Mobile Application Download Incident 2013-2018 32
Figure 23: Region-based VOIP incident 32
Figure 24: Region wise MMS incident 33
Figure 25: Region0based Mobile Gaming incident 33
Figure 26: Region-based Mobile Payment incident 34
Figure 27: Region-based Application Download Incident 34
Figure 28: LTE Global User Expansion 35
Figure 29:LTE Deployment Regionally 36
Figure 30: Wireless Security Incident by Source 2013-2018 37
Figure 31: Worldwide Mobile Antivirus Users by Region 2013-2018 37
Figure 32: USA:LTE Incident Awareness (2013-2018) 38
Figure 33: UK: LTE Incident Awareness (2013-2018) 39
Figure 34: South Korea: LTE Incident Awareness (2013-2018) 39
Figure 35: Africa: LTE Incident Awareness (2013-2018) 40
Figure 36: Australia: LTE Incident Awareness (2013-2018) 40
Figure 37: Brazil: LTE Incident Awareness (2013-2018) 41
Figure 38: Canada: LTE Incident Awareness (2013-2018) 41
Figure 39: Belgium: LTE Incident Awareness (2013-2018) 42
Figure 40: France: LTE Incident Awareness (2013-2018) 43
Figure 41: Germany: LTE Incident Awareness (2013-2018) 43
Figure 42: Russia: LTE Incident Awareness (2013-2018) 43
Figure 43: Middle East: Incident Awareness (2013-2018) 44
Figure 44: Japan: LTE Incident Awareness (2013-2018) 44
Figure 45: China: LTE Incident Awareness (2013-2018) 45
Figure 46: India: LTE Incident Awareness (2013-2018) 45
Figure 47: USA: LTE Service Providers 46
Figure 48: UK: LTE Service Providers 46
Figure 49: Africa: LTE Service Providers 47
Figure 50: Middle East: LTE Service Providers 47
Figure 51: South Korea: LTE Service Providers 48
Figure 52: Japan: LTE Service Providers 48
Figure 53: Russia: LTE Service Providers 49
Figure 54: Belgium: LTE Service Providers 49
Figure 55: Germany: LTE Service Providers 50
Figure 56: Australia: LTE Service Providers 50
Figure 57: Hong Kong: LTE Service Providers 51
Figure 58: China: LTE Service Providers 51
Figure 59: India :LTE Service Providers 52
Figure 60: Wireless Security Antivirus Global Market Share 2013-2018 53
Figure 61:Tie Mobile Security Model 54
Figure 62:LTE Threat Identification Application 55
Figure 63: Region-based % of LTE Deployment 2013 56
Figure 64: Vulnerability % Smartphone vs. Tablet Devices 2013-2018 56
Figure 65: Region-based Secure LTE Subscribers 2013-2018 57
Figure 66: Global Security Vendor Company Market share 2013 57
Figure 67: LTE Infrastructure Commercial by Vendors 2013-2018 58
Figure 68: LTE Supporting Tablet & Smartphone Manufacturers 58
Figure 69: Attacker Targeting Smartphones & Tablets 59
Figure 70:Wireless Threat in Corporate Environment 61
Figure 71:Mobile Payment Attack 64
Figure 72: Virus Spread through Application Downloads 65
Figure 73:Game Application on Smartphones 66


Contact: sales@reportsandreports.com for more information.

Más contenido relacionado

Destacado

Senhora da encarnação
Senhora da encarnaçãoSenhora da encarnação
Senhora da encarnaçãomcruzgago
 
Innovation Spotlight: InteraXon | Ariel Garten, InteraXon
Innovation Spotlight: InteraXon | Ariel Garten, InteraXonInnovation Spotlight: InteraXon | Ariel Garten, InteraXon
Innovation Spotlight: InteraXon | Ariel Garten, InteraXonDealmaker Media
 
La Inteligencia emocional
La Inteligencia emocionalLa Inteligencia emocional
La Inteligencia emocionalkarla Gimenez
 
Blogging Workshop opportunity for Every Industry professional in India
Blogging Workshop opportunity for Every Industry professional in IndiaBlogging Workshop opportunity for Every Industry professional in India
Blogging Workshop opportunity for Every Industry professional in IndiaYogesh M. A.
 
Electronic Mentoring Evaluations
Electronic Mentoring EvaluationsElectronic Mentoring Evaluations
Electronic Mentoring EvaluationsCTSI at UCSF
 

Destacado (8)

Senhora da encarnação
Senhora da encarnaçãoSenhora da encarnação
Senhora da encarnação
 
Innovation Spotlight: InteraXon | Ariel Garten, InteraXon
Innovation Spotlight: InteraXon | Ariel Garten, InteraXonInnovation Spotlight: InteraXon | Ariel Garten, InteraXon
Innovation Spotlight: InteraXon | Ariel Garten, InteraXon
 
Jose
JoseJose
Jose
 
Handbuch
HandbuchHandbuch
Handbuch
 
Staff
StaffStaff
Staff
 
La Inteligencia emocional
La Inteligencia emocionalLa Inteligencia emocional
La Inteligencia emocional
 
Blogging Workshop opportunity for Every Industry professional in India
Blogging Workshop opportunity for Every Industry professional in IndiaBlogging Workshop opportunity for Every Industry professional in India
Blogging Workshop opportunity for Every Industry professional in India
 
Electronic Mentoring Evaluations
Electronic Mentoring EvaluationsElectronic Mentoring Evaluations
Electronic Mentoring Evaluations
 

Wireless Security Market in LTE Networks 2013-2018

  • 1. Wireless Security Market in LTE Networks 2013-2018 Report Details: Published:January 2013 No. of Pages: 74 Price: Single User License – US$1995 With the rapid expansion of broadband wireless, end-users increasingly rely upon handheld devices for almost all daily living activities. Fourth generation (4G) cellular LTE in particular represents a unique opportunity/challenge as device attacks are growing at a rapid rate, exposing vulnerabilities that must be addressed. Our research indicates that Android malware in particular will grow rapidly and will be considered most vulnerable OS for LTE. This research is most reading for anyone involved in LTE network planning, device procurement, and/or application development and management. This report includes extensive LTE Security Market forecasting for the period 2013 - 2018. The report complements Mind Commerce research in LTE device, subscriptions, and application market analysis as well as security threats for specific applications such as mobile games. Companies in Report: Apple, Samsung Asus, Motorola, Kaspersky, AVG, McAffee, F-secure, Trojon, Verizon Wireless ,NTT DocoMo, AT & T Mobility USA, Metro PCS, Vodafone, D2, EMOBILE, NTT DOCOMO, SoftBank Mobile ,KDDI, Vodafone, 3(Hutchison), O2(Telefonica), Everything Everywhere, Zain,Nawras, Omantel, Mobily, Saudi Telecom Company (STC), Zain, du Etisalat, Movicel, Orange Mauritius, MTC Namibia, Vodacom, China Mobile Hong Kong, CSL, PCCW, Smartone, Aircel, Airtel, Augere, Qualcomm, Tikona,, Megafon, MTS, Yota. Target Audience: •LTE device manufacturers •Mobile network operators •LTE infrastructure providers •Cellular application developers •Managed communications providers Get your copy of this report @ http://www.reportsnreports.com/reports/213314-wireless-security-market-in-lte-networks-2013-2018.html Major points covered in Table of Contents of this report include TABLE OF CONTENTS 1. EXECUTIVE SUMMARY 8 2. INTRODUCTION 9
  • 2. 3. WIRELESS SECURITY IN LTE 10 3.1 WHY WIRELESS SECURITY IS DIFFERENT IN LTE 10 3.2 LTE AND MOBILE WIMAX TECHNICAL COMPARISON 11 3.3 WIRELESS SECURITY VULNERABILITY : A BURNING ISSUE FOR MOBILE DEVICES 11 3.3.1 CORRELATED RISK IN LTE: 12 3.4 SMARTPHONE & TABLET DEVICE: NEW CHOICE OF ATTACKER 12 3.4.1 ANDROID MALWARE SAMPLES: 12 3.5 3GPP/LTE SECURITY STANDARDIZATION SPECIFICATIONS: 3GPP NDS 14 3.6 DNS IN WIRELESS SECURITY 15 4. MOBILE SECURITY IN IP ENVIRONMENT: LTE PATTERN 16 4.1 TRENDS OF MOBILE SECURITY THREATS 16 4.1.1 WIRELESS MOBILE DEVICE ADVANCEMENT 16 4.1.2 INCREASING NUMBER OF MALICIOUS APPLICATION 16 4.1.3 ANDROID'S POPULARITY 16 4.1.4 ADAPTION OF MOBILE DEVICE IN CORPORATE AREA 16 4.1.5 LACK OF AWARENESS AMONG SUBSCRIBER 16 4.2 RAN & BACKHAUL AS MEANS FOR STRONGER SECURITY 17 4.3 CORE NETWORK THREATS 18 4.4 DIAMETER SIGNALLING DERIVED THREAT: 19 4.5 THIRD PARTY SOURCED THREAT 20 4.5.1 ROAMING PARTNERS: 20 4.5.2 MVNO 21 4.5.3 INFRASTRUCTURE 21 4.5.4 ENTERPRISE NETWORK 22 4.6 IWLAN SECURITY 22 4.7 SMALL CELL SECURITY 22 4.8 RCS (RICH COMMUNICATION SERVICES) SECURITY 23 FIGURE 10: RCS (RICH COMMUNICATION SERVICES) SECURITY ARCHITECTURE (COPYRIGHT: RADISYS) 23 5. WIRELESS SECURITY ANALYSIS ON LTE PATTERN 24 5.1 ANALYSIS OF WIRELESS LTE THREAT: 24 5.1.1 LTE APPLICATION USER FORECASTING 2013-2018* 24 5.1.2 CONSUMER AWARENESS OVER WIRELESS SECURITY 2013 - 2018 25 5.1.3 WORLDWIDE WIRELESS ANTIVIRUS USER 2013-2018* 25 5.2 OUTLOOK OF WIRELESS LTE THREAT: 26 6. WIRELESS SECURITY THREATS GATEWAY ON MOBILE DEVICE: LTE PATTERN 27 6.1 WIRELESS LTE CYBER THREAT LANDSCAPE: 27 6.2 WEB SECURITY THREAT 28 6.3 CATEGORY POSED THREAT 28 6.4 PLATFORM POSED THREAT 29 6.5 ANALYSIS OF ALL TYPES OF LTE THREAT 29
  • 3. 7. GRAPHICAL PRESENTATION OF WIRELESS SECURITY INCIDENT 30 7.1 WIRELESS INCIDENT BY THROUGH SOURCES 30 7.1.1 VOIP 30 7.1.2 MMS 30 7.1.3 MOBILE GAMING 31 7.1.4 MOBILE PAYMENT 31 7.1.5 MOBILE APPLICATION 32 7.2 REGION WISE LTE THREAT 32 7.2.1 VOIP THREAT 32 7.2.2 MMS THREAT: 33 7.2.3 GAMING THREAT: 33 7.2.4 MOBILE PAYMENT THREAT: 34 7.2.5 APPLICATION DOWNLOAD THREAT 34 8. LTE TAKING THE PLACE OF 3G 35 8.1 WORLDWIDE LTE USER ANALYSIS 35 8.1.1 LTE USER EXPANSION GLOBALLY 35 8.1.2 LTE USER REGION WISE: 36 8.2 WIRELESS SECURITY INCIDENT BY SOURCE 36 8.3 WORLDWIDE MOBILE ANTIVIRUS USER 37 8.4 UPSHOT ON LTE USERS AND ITS FUTURE 37 9. WIRELESS SECURITY MEASURE DEPLOYMENT 38 9.1 COUNTRY WISE LTE SECURITY AWARENESS (2013-2018) 38 9.1.1 USA 38 9.1.2 UK 39 9.1.3 SOUTH KOREA 39 9.1.4 AFRICA 40 9.1.5 AUSTRALIA 40 9.1.6 BRAZIL 41 9.1.7 CANADA 41 9.1.8 BELGIUM 42 9.1.9 FRANCE 42 9.1.10 GERMANY 43 9.1.11 RUSSIA 43 9.1.12 MIDDLE EAST 44 9.1.13 JAPAN 44 9.1.14 CHINA 45 9.1.15 INDIA 45 9.2 COUNTRY WISE LTE NETWORK (WITH PRIVACY & SECURITY) PROVIDER MARKET SHARE 46 9.2.1 USA 46 9.2.2 UK 46 9.2.3 AFRICA 47
  • 4. 9.2.4 MIDDLE EAST 47 9.2.5 SOUTH KOREA 48 9.2.6 JAPAN 48 9.2.7 RUSSIA 49 9.2.8 BELGIUM 49 9.2.9 GERMANY 50 9.2.10 AUSTRALIA 50 9.2.11 HONGKONG 51 9.2.12 CHINA 51 9.2.13 INDIA 52 10. WIRELESS SECURITY VENDOR COMPANY ANALYSIS 53 10.1 WORLDWIDE SECURITY VENDOR ANALYSIS 53 11. DISTINCTIVE INITIATIVE TO PREVENT WIRELESS INCIDENT 54 11.1 UNIQUE MOBILE SECURITY BY BRITISH FIRM 54 11.2 WIRELESS LTE THREAT IDENTIFICATION THROUGH PREVENTION APPLICATION 55 12. WIRELESS SECURITY MARKET PROJECTION 2013 - 2018 56 12.1 REGION WISE % OF LTE DEPLOYMENT 2013 56 FIGURE 63: REGION WISE % OF LTE DEPLOYMENT 2013 56 12.2 VULNERABILITY %: SMARTPHONE VS. TABLET DEVICE 2013-2018 56 12.3 REGION WISE MARKET VALUE PROJECTION 57 FIGURE 65: REGION WISE SECURE LTE SUBSCRIBERS (IN MILLION) 2013-2018* 57 12.4 WIRELESS SECURITY COMPANY MARKET SHARE 2013 57 12.5 LTE INFRASTRUCTURE COMMERCIAL BY VENDORS 58 12.6 LTE SUPPORTING TABLET & SMARTPHONE MANUFACTURERS 58 FIGURE 68: LTE SUPPORTING TABLET & SMARTPHONE MANUFACTURERS 58 13. CASE ANALYSIS 59 13.1 THANKS GIVING: BIG DAY FOR HACKERS 59 13.1.1 INTRODUCTION: HACKERS TARGETING SHOPPERS' SMARTPHONES 59 13.1.2 HOW THE SMARTPHONE ATTACKED 59 13.1.3 RESEARCHERS OPINION AND CONCLUSION 60 13.2 WIRELESS THREAT IN CORPORATE ENVIRONMENT 60 13.2.1 INTRODUCTION 60 13.2.2 ATTACK IN CORPORATE ENVIRONMENT: 61 13.3 ONE SIMPLE TRICK COULD DISABLE A CITY'S LTE NETWORK 62 13.3.1 INTRODUCTION 62 13.3.2 FEMTOCELL IS A CONTRIBUTOR IN LTE ATTACK 62 13.4 HIGH SPEED LTE IS A SOURCE OF ATTACK FOR TERRORIST 62 13.4.1 INTRODUCTION 62 13.4.2 RESEARCHERS QUOTE ON "LTE AS A SOURCE OF TERRORIST ATTACK" 63 13.5 CYBERCRIMINAL'S NETWORK ON MOBILE PAYMENT 63 13.5.1 INTRODUCTION 63 13.6 MOBILE APPLICATION DOWNLOAD FOUNDATION OF VIRUS DOWNLOAD 65
  • 5. 13.6.1 INTRODUCTION 65 13.6.2 HOW THE VIRUS DOWNLOAD BY APPLICATION DOWNLOAD 65 13.7 MOBILE WIFI HACKING 66 13.8 GAME APPLICATION HACKED SMARTPHONE & TABLET 66 14. CONCLUSION & RECOMMENDATION 67 14.1 CONCLUSION 67 14.2 UPCOMING TOP 10 WIRELESS LTE SECURITY ISSUES IN 2013 67 14.2.1 TARGETED ATTACKS 67 14.2.2 MORE HACTIVISM 68 14.2.3 CYBER ESPIONAGE & WARFARE 68 14.2.4 BIG BROTHER WATCHING EVEN MORE 68 14.2.5 INCREASE IN MALWARE 68 14.2.6 PRIVACY RIGHTS ERODING 69 14.2.7 CYBER EXTORTION 69 14.2.8 APPLE UNDER ATTACK 69 14.2.9 ANDROID, EVEN WORSE 69 14.2.10 UN-PATCHED EXPLOITS IN JAVA 70 14.3 RECOMMENDATION 70 14.3.1 PROTECTING CORPORATE NETWORK 70 14.4 RECOMMENDATION FOR MOBILE APPLICATION DEVELOPERS: 73 14.5 IOS: RECOMMENDED SETTINGS FOR WI-FI ROUTERS AND ACCESS POINTS 73 14.6 RECOMMENDED SECURITY FOR MOBILE PAYMENT 74 14.6.1 DETECTING IF CARDHOLDER DATA IS BEING SKIMMED 74 14.6.2 IDENTIFYING AND PROTECTING WLAN FROM UNAUTHORIZED DEVICES 74 14.7 IP NETWORK SECURITY MEASURES: 74 LIST OF TABLES Table 1:Types of Wireless Attack 19 LIST OF FIGURES Figure 1:System Architecture of Wireless LTE 9 Figure 2: LTE and GPRS networks - Comparison between Equivalent Functionalities 10 Figure 3:Android Malware Samples 13 Figure 4: Model of NDS Figure 5:Ran & Black-haul in LTE 17 Figure 6:Diameter Signaling Threat Structure 20 Figure 7:Structure of LTE roaming 21 Figure 8: IWLAN Security Architecture 22 Figure 9: Small Cell Security Architecture 23 Figure 10: Rich Communication Services (RCS) Security Architecture 23 Figure 11: LTE application usage rate 2013-2018 24 Figure 12: Consumer Awareness over Wireless Security 2013 - 2018 25 Figure 13: Worldwide Wireless Antivirus User 25 Figure 14: Wireless Security Landscape 27
  • 6. Figure 15: LTE Web Security Threats 28 Figure 16: Category Posed Threats 28 Figure 17: Platform Posed LTE Threats 29 Figure 18: Worldwide VOIP Incidents 2013-2018 30 Figure 19: Worldwide MMS Incidents 2013-2018 30 Figure 20: Worldwide Mobile Gaming Incidents 2013-2018 31 Figure 21: Worldwide Mobile Payment Incidents 2013-2018 31 Figure 22: Worldwide Mobile Application Download Incident 2013-2018 32 Figure 23: Region-based VOIP incident 32 Figure 24: Region wise MMS incident 33 Figure 25: Region0based Mobile Gaming incident 33 Figure 26: Region-based Mobile Payment incident 34 Figure 27: Region-based Application Download Incident 34 Figure 28: LTE Global User Expansion 35 Figure 29:LTE Deployment Regionally 36 Figure 30: Wireless Security Incident by Source 2013-2018 37 Figure 31: Worldwide Mobile Antivirus Users by Region 2013-2018 37 Figure 32: USA:LTE Incident Awareness (2013-2018) 38 Figure 33: UK: LTE Incident Awareness (2013-2018) 39 Figure 34: South Korea: LTE Incident Awareness (2013-2018) 39 Figure 35: Africa: LTE Incident Awareness (2013-2018) 40 Figure 36: Australia: LTE Incident Awareness (2013-2018) 40 Figure 37: Brazil: LTE Incident Awareness (2013-2018) 41 Figure 38: Canada: LTE Incident Awareness (2013-2018) 41 Figure 39: Belgium: LTE Incident Awareness (2013-2018) 42 Figure 40: France: LTE Incident Awareness (2013-2018) 43 Figure 41: Germany: LTE Incident Awareness (2013-2018) 43 Figure 42: Russia: LTE Incident Awareness (2013-2018) 43 Figure 43: Middle East: Incident Awareness (2013-2018) 44 Figure 44: Japan: LTE Incident Awareness (2013-2018) 44 Figure 45: China: LTE Incident Awareness (2013-2018) 45 Figure 46: India: LTE Incident Awareness (2013-2018) 45 Figure 47: USA: LTE Service Providers 46 Figure 48: UK: LTE Service Providers 46 Figure 49: Africa: LTE Service Providers 47 Figure 50: Middle East: LTE Service Providers 47 Figure 51: South Korea: LTE Service Providers 48 Figure 52: Japan: LTE Service Providers 48 Figure 53: Russia: LTE Service Providers 49 Figure 54: Belgium: LTE Service Providers 49 Figure 55: Germany: LTE Service Providers 50 Figure 56: Australia: LTE Service Providers 50
  • 7. Figure 57: Hong Kong: LTE Service Providers 51 Figure 58: China: LTE Service Providers 51 Figure 59: India :LTE Service Providers 52 Figure 60: Wireless Security Antivirus Global Market Share 2013-2018 53 Figure 61:Tie Mobile Security Model 54 Figure 62:LTE Threat Identification Application 55 Figure 63: Region-based % of LTE Deployment 2013 56 Figure 64: Vulnerability % Smartphone vs. Tablet Devices 2013-2018 56 Figure 65: Region-based Secure LTE Subscribers 2013-2018 57 Figure 66: Global Security Vendor Company Market share 2013 57 Figure 67: LTE Infrastructure Commercial by Vendors 2013-2018 58 Figure 68: LTE Supporting Tablet & Smartphone Manufacturers 58 Figure 69: Attacker Targeting Smartphones & Tablets 59 Figure 70:Wireless Threat in Corporate Environment 61 Figure 71:Mobile Payment Attack 64 Figure 72: Virus Spread through Application Downloads 65 Figure 73:Game Application on Smartphones 66 Contact: sales@reportsandreports.com for more information.