Section Menu

Wireless Security in LTE Networks 2013-2018

January 2013

Pages: 74

Single-user License: $ 1,995 USD
Company-wide License: $ 4,995 USD
Team License (Up to 5 Users): $ 2,865 USD

Keywords: LTE, Long Term Evolution, 4G, LTE Security, LTE Malware, LTE Security Applications


With the rapid expansion of broadband wireless, end-users increasingly rely upon handheld devices for almost all daily living activities. Fourth generation (4G) cellular LTE in particular represents a unique opportunity/challenge as device attacks are growing at a rapid rate, exposing vulnerabilities that must be addressed. Our research indicates that Android malware in particular will grow rapidly and will be considered most vulnerable OS for LTE.

This research is most reading for anyone involved in LTE network planning, device procurement, and/or application development and management. This report includes extensive LTE Security Market forecasting for the period 2013 - 2018. The report complements Mind Commerce research in LTE device, subscriptions, and application market analysis as well as security threats for specific applications such as mobile games.

See Table of Contents for complete list of areas covered.

Companies in Report

Apple, Samsung Asus, Motorola, Kaspersky, AVG, McAffee, F-secure, Trojon, Verizon Wireless ,NTT DocoMo, AT & T Mobility USA ,Metro PCS ,Vodafone D2 EMOBILE NTT DOCOMO SoftBank Mobile,KDDIVodafone,3(Hutchison),O2(Telefonica)Everything Everywhere, Zain,Nawras, Omantel, Mobily, Saudi Telecom Company (STC),Zain, du Etisalat, Movicel, Orange Mauritius, MTC Namibia, Vodacom, China Mobile Hong Kong,CSL, PCCW, Smartone, Aircel, Airtel, Augere, Qualcomm, Tikona, Megafon, MTS, Yota


  • LTE device manufacturers
  • Mobile network operators
  • LTE infrastructure providers
  • Cellular application developers
  • Managed communications providers

Table of Contents

  • Executive Summary
  • Introduction
  • Wireless Security in LTE
  • Why Wireless Security is Different in LTE
  • LTE and Mobile WiMax Technical Comparison
  • Wireless Security Vulnerability: A Burning Issue for Mobile Devices
  • Correlated Risk in LTE
  • Smartphone and Tablet Device: New Choice of Attacker
  • Android Malware Samples
  • 3GPP/LTE Security Standardization Specifications: 3GPP NDS
  • DNS in Wireless Security
  • Mobile Security in IP Environment: LTE Pattern
  • Trends of Mobile Security Threats
  • Wireless Mobile Device Advancement
  • Increasing Number of Malicious Applications
  • Android’s Popularity
  • Adaption of Mobile Devices in Corporate Area
  • Lack of Awareness Among Subscribers
  • RAN and Backhaul as Means for Stronger Security
  • Core Network Threats
  • Diameter Signalling Derived TGhreat
  • Third Party Sourced Threat
  • Roaming Partners
  • MVNO 21
  • Infrastructure
  • Enterprise Network
  • IWLAN Security
  • Small Cell Security
  • RCS (Rich Communication Services) Security
  • Figure 10: RCS (Rich Communication Services) Security Architecture (Copyright: RADISYS)
  • Wireless Security Analysis on LTE Pattern
  • Analysis of Wireless LTE Threat
  • LTE Application User Forecasting 2013-2018*
  • Consumer Awareness Over Wireless Security 2013 - 2018
  • Worldwide Wireless Antivirus User 2013-2018*
  • Outlook of Wireless LTE Threat
  • Wireless Security Threats Gateway on Mobile Device: LTE Pattern
  • Wireless LTE Cyber Threat Landscape
  • Web Security Threat
  • Category Posed Threat
  • Platform Posed Threat
  • Analysis of All Types of LTE Threat
  • Graphical Presentation of Wireless Security Incident
  • Wireless Incident by Through Sources
  • VOIP
  • MMS
  • Mobile Gaming
  • Mobile Payment
  • Mobile Application
  • Region Wise LTE Threat
  • VOIP Threat
  • MMS Threat
  • Gaming Threat
  • Mobile Payment Threat
  • Application download Threat
  • LTE Taking the Place of 3G
  • Worldwide LTE User Analysis
  • LTE User Expansion Globally
  • LTE User Region Wise
  • Wireless Security Incident by Source
  • Worldwide Mobile Antivirus User
  • Upshot on LTE Users and its Future
  • Wireless Security Measure Deployment
  • Countrywise LTE Security Awareness (2013-2018)
  • Countrywise LTE Network (with Privacy and Security) Provider Market Share
  • Wireless Security Vendor Company Analysis
  • Worldwide Security Vendor Analysis
  • Distinctive Initiative to Prevent Wireless Incident
  • Unique Mobile Security by British Firm
  • Wireless LTE Threat Identification through Prevention Application
  • Wireless Security Market Projection 2013 - 2018
  • Region Wise % of LTE Deployment 2013
  • Figure 63: Region Wise % of LTE Deployment 2013
  • Vulnerability %: Smartphone Vs. Tablet Device 2013-2018
  • Region Wise Market Value Projection
  • Figure 65: Regioin Wise Secuire LTE Subscribers (in Millions) 2013-2018*
  • Wireless Security Company Market Share 2013
  • LTE Infrastructure Commercial by Vendors
  • LTE Supporting Tablet and Smartphone Manufacturers
  • Figure 68: LTE Supporting Tablet and Smartphone Manufacturers
  • Case Analysis
  • Thanksgiving: Big Day for Hackers
  • Introduction: Hackers Targeting Shoppers’ Smartphones
  • How the Smartphone is Attacked
  • Researchers Opinion and Conclusion
  • Wireless Threat in Corporate Environment
  • Introduction
  • Attack in Corporate Environment
  • One Simple Trick Could Disable a City’s LTE Network
  • Introduction
  • Femtocell is a Contributor in LTE Attack
  • High Speed LTE is a Source of Attack for Terrorists
  • Introduction
  • Researchers Quote on “LTE as a Source of Terrorist Attack”
  • Cybercriminals’ Network on Mobile Payment
  • Introduction
  • Mobile Application Download Foundation of Virus Download
  • Introduction
  • How the Virus Download by Application Download
  • Mobile WiFi Hacking
  • Game Application Hacked Smartphone and Tablet
  • Conclusion and Recommendation
  • Conclusion
  • Upcoming Top 10 Wireless LTE Security Issues in 2013
  • Targeted Attacks
  • More Hactivism
  • Cyber Espionage and Warfare
  • Big Brother Watching Even More
  • Increase in Malware
  • Privacy Rights Eroding
  • Cyber Extortion
  • Apple Under Attack
  • Android, Even Worse
  • Un-Patched Exploits in Java
  • Recommendation
  • Protecting Corporate Network
  • Recommendation for Mobile Application Developers
  • IOS: Recommended Settings for Wi-Fi Routers and Access Points
  • Recommended Security for Mobile Payment
  • Detecting if Cardholder Data is Being Skimmed
  • Identifying and Protecting WLAN from Unauthorised Devices
  • IP Network Security Measures