表紙
市場調査レポート

LTEネットワークにおけるワイヤレスセキュリティ市場

Wireless Security Market in LTE Networks 2013-2018

発行 Mind Commerce Publishing LLC 商品コード 258734
出版日 ページ情報 英文 74 Pages
納期: 即日から翌営業日
価格
詳細については [お問い合わせ] ボタンよりお問い合わせ下さい。
Back to Top
LTEネットワークにおけるワイヤレスセキュリティ市場 Wireless Security Market in LTE Networks 2013-2018
出版日: 2013年01月04日 ページ情報: 英文 74 Pages
概要

当レポートでは、LTEセキュリティ市場について調査し、LTEにおけるワイヤレスセキュリティ、脅威の入り口、主なワイヤレスセキュリティ事件、ワイヤレスセキュリティ手段、ワイヤレスセキュリテベンダー、今後のワイヤレスセキュリティ市場予測、今後のワイヤレスLTEセキュリティ10大問題などをまとめ、概略以下の構成でお届けいたします。

第1章 エグゼクティブサマリー

第2章 イントロダクション

第3章 LTEにおけるワイヤレスセキュリティ

  • LTEにおけるワイヤレスセキュリティが異なる理由
  • LTEとモバイルWiMAXの技術比較
  • ワイヤレスセキュリティの脆弱性:モバイルデバイスの緊急課題
  • スマートフォン&タブレットデバイス:攻撃者の新しい選択
  • 3GPP/LTEセキュリティ標準仕様:3GPP NDS
  • ワイヤレスセキュリティにおけるDNS

第4章 IP環境におけるモバイルセキュリティ:LTEパターン

  • モバイルセキュリティ脅威の動向
  • より強いセキュリティ手段としてのRAN & バックホール
  • コアネットワークの脅威
  • DIAMETER SIGNALLING派生の脅威
  • サードパーティーがもたらす脅威
  • IWLANセキュリティ
  • 小型セルセキュリティ
  • RCS(RICH COMMUNICATION SERVICES)セキュリティ

第5章  LTEパターンにおけるワイヤレスセキュリティ分析

  • ワイヤレスLTE脅威の分析
  • ワイヤレスLTE脅威の展望

第6章 モバイルデバイスにおけるワイヤレスセキュリティ脅威の入り口:LTEパターン

  • ワイヤレスLTEのサーバー脅威情勢
  • ウェブセキュリティ脅威
  • カテゴリーがもたらす脅威
  • プラットフォームがもたらす脅威
  • LTE脅威の全種類の分析

第7章 ワイヤレスセキュリティ事件のグラフ表示

  • ワイヤレス事件:ソース別
  • 分野別のLTE脅威

第8章 3Gに取って代わるLTE

  • 世界のLTEユーザー分析
  • ワイヤレスセキュリティ事件:ソース別
  • 世界のモバイルアンチウィルスユーザー
  • LTEユーザーの結論とその将来

第9章 ワイヤレスセキュリティ手段の導入

  • 国別のLTEセキュリティ認識
  • 国別のLTEネットワーク(プライバシー&セキュリティを備えた)プロバイダー市場のシェア

第10章 ワイヤレスセキュリテベンダーの企業分析

  • 世界のセキュリテベンダー分析

第11章 ワイヤレス事件を防ぐ代表的イニシアチブ

  • 英国企業によるユニークなモバイルセキュリティ
  • 予防アプリケーションを通したワイヤレスLTE脅威の特定

第12章 ワイヤレスセキュリティ市場の予測

  • LTE導入の地域別割合(%)
  • 脆弱性の割合(%):スマートフォンvs.タブレットデバイス
  • 地域別の市場額予測
  • ワイヤレスセキュリティ企業の市場シェア
  • LTEインフラのコマーシャル:ベンダー別
  • LTE対応タブレット&スマートフォンのメーカー

第13章 事例分析

  • 感謝祭:ハッカーにとっての重要な日
  • 企業環境におけるワイヤレス脅威
  • ひとつの単純なトリックが都市のLTEネットワークを無効にする
  • 高速LTEはテロリストの攻撃の元
  • モバイルペイメントにおけるサイバー犯罪のネットワーク
  • ウィルスダウンロードの基礎となるモバイルアプリケーションダウンロード
  • モバイルWiFiハッキング
  • スマートフォン&タブレットのゲームアプリケーションハッキング

第14章 総論・提言

  • 総論
  • 来るワイヤレスLTEセキュリティ問題トップ10
  • 提案
  • モバイルアプリケーションディベロッパーへの提案
  • iOS:WiFiルーター・アクセスポイントの推奨設定
  • モバイルペイメントの推奨セキュリティ
  • IPネットワークセキュリティ手段

図表

目次

With the rapid expansion of broadband wireless, end-users increasingly rely upon handheld devices for almost all daily living activities. Fourth generation (4G) cellular LTE in particular represents a unique opportunity/challenge as device attacks are growing at a rapid rate, exposing vulnerabilities that must be addressed. Our research indicates that Android malware in particular will grow rapidly and will be considered most vulnerable OS for LTE.

This research is most reading for anyone involved in LTE network planning, device procurement, and/or application development and management. This report includes extensive LTE Security Market forecasting for the period 2013 - 2018. The report complements Mind Commerce research in LTE device, subscriptions, and application market analysis as well as security threats for specific applications such as mobile games.

Companies in Report:

Apple, Samsung Asus, Motorola, Kaspersky, AVG, McAffee, F-secure, Trojon, Verizon Wireless ,NTT DocoMo, AT & T Mobility USA ,Metro PCS ,Vodafone D2 EMOBILE NTT DOCOMO SoftBank Mobile,KDDIVodafone,3(Hutchison),O2(Telefonica)Everything Everywhere, Zain,Nawras, Omantel, Mobily, Saudi Telecom Company (STC),Zain, du Etisalat, Movicel, Orange Mauritius, MTC Namibia, Vodacom, China Mobile Hong Kong,CSL, PCCW, Smartone, Aircel, Airtel, Augere, Qualcomm, Tikona, Megafon, MTS, Yota

Table of Contents

1.0. EXECUTIVE SUMMARY

2.0. INTRODUCTION

3.0. WIRELESS SECURITY IN LTE

  • 3.1. WHY WIRELESS SECURITY IS DIFFERENT IN LTE
  • 3.2. LTE AND MOBILE WIMAX TECHNICAL COMPARISON
  • 3.3. WIRELESS SECURITY VULNERABILITY : A BURNING ISSUE FOR MOBILE DEVICES
    • 3.3.1. CORRELATED RISK IN LTE:
  • 3.4. SMARTPHONE & TABLET DEVICE: NEW CHOICE OF ATTACKER
    • 3.4.1. ANDROID MALWARE SAMPLES:
  • 3.5. 3GPP/LTE SECURITY STANDARDIZATION SPECIFICATIONS: 3GPP NDS
  • 3.6. DNS IN WIRELESS SECURITY

4.0. MOBILE SECURITY IN IP ENVIRONMENT: LTE PATTERN

  • 4.1. TRENDS OF MOBILE SECURITY THREATS
    • 4.1.1. WIRELESS MOBILE DEVICE ADVANCEMENT
    • 4.1.2. INCREASING NUMBER OF MALICIOUS APPLICATION
    • 4.1.3. ANDROID'S POPULARITY
    • 4.1.4. ADAPTION OF MOBILE DEVICE IN CORPORATE AREA
    • 4.1.5. LACK OF AWARENESS AMONG SUBSCRIBER
  • 4.2. RAN & BACKHAUL AS MEANS FOR STRONGER SECURITY
  • 4.3. CORE NETWORK THREATS
  • 4.4. DIAMETER SIGNALLING DERIVED THREAT:
  • 4.5. THIRD PARTY SOURCED THREAT
    • 4.5.1. ROAMING PARTNERS:
    • 4.5.2. MVNO
    • 4.5.3. INFRASTRUCTURE
    • 4.5.4. ENTERPRISE NETWORK
  • 4.6. IWLAN SECURITY
  • 4.7. SMALL CELL SECURITY
  • 4.8. RCS (RICH COMMUNICATION SERVICES) SECURITY
    • FIGURE 10: RCS (RICH COMMUNICATION SERVICES) SECURITY ARCHITECTURE (COPYRIGHT: RADISYS)

5.0. WIRELESS SECURITY ANALYSIS ON LTE PATTERN

  • 5.1. ANALYSIS OF WIRELESS LTE THREAT:
    • 5.1.1. LTE APPLICATION USER FORECASTING 2013-2018*
    • 5.1.2. CONSUMER AWARENESS OVER WIRELESS SECURITY 2013 - 2018
    • 5.1.3. WORLDWIDE WIRELESS ANTIVIRUS USER 2013-2018*
  • 5.2. OUTLOOK OF WIRELESS LTE THREAT:

6.0. WIRELESS SECURITY THREATS GATEWAY ON MOBILE DEVICE: LTE PATTERN

  • 6.1. WIRELESS LTE CYBER THREAT LANDSCAPE:
  • 6.2. WEB SECURITY THREAT
  • 6.3. CATEGORY POSED THREAT
  • 6.4. PLATFORM POSED THREAT
  • 6.5. ANALYSIS OF ALL TYPES OF LTE THREAT

7.0. GRAPHICAL PRESENTATION OF WIRELESS SECURITY INCIDENT

  • 7.1. WIRELESS INCIDENT BY THROUGH SOURCES
    • 7.1.1. VOIP
    • 7.1.2. MMS
    • 7.1.3. MOBILE GAMING
    • 7.1.4. MOBILE PAYMENT
    • 7.1.5. MOBILE APPLICATION
  • 7.2. REGION WISE LTE THREAT
    • 7.2.1. VOIP THREAT
    • 7.2.2. MMS THREAT:
    • 7.2.3. GAMING THREAT:
    • 7.2.4. MOBILE PAYMENT THREAT:
    • 7.2.5. APPLICATION DOWNLOAD THREAT

8.0. LTE TAKING THE PLACE OF 3G

  • 8.1. WORLDWIDE LTE USER ANALYSIS
    • 8.1.1. LTE USER EXPANSION GLOBALLY
    • 8.1.2. LTE USER REGION WISE:
  • 8.2. WIRELESS SECURITY INCIDENT BY SOURCE
  • 8.3. WORLDWIDE MOBILE ANTIVIRUS USER
  • 8.4. UPSHOT ON LTE USERS AND ITS FUTURE

9.0. WIRELESS SECURITY MEASURE DEPLOYMENT

  • 9.1. COUNTRY WISE LTE SECURITY AWARENESS (2013-2018)
    • 9.1.1. USA
    • 9.1.2. UK
    • 9.1.3. SOUTH KOREA
    • 9.1.4. AFRICA
    • 9.1.5. AUSTRALIA
    • 9.1.6. BRAZIL
    • 9.1.7. CANADA
    • 9.1.8. BELGIUM
    • 9.1.9. FRANCE
    • 9.1.10. GERMANY
    • 9.1.11. RUSSIA
    • 9.1.12. MIDDLE EAST
    • 9.1.13. JAPAN
    • 9.1.14. CHINA
    • 9.1.15. INDIA
  • 9.2. COUNTRY WISE LTE NETWORK (WITH PRIVACY & SECURITY) PROVIDER MARKET SHARE
    • 9.2.1. USA
    • 9.2.2. UK
    • 9.2.3. AFRICA
    • 9.2.4. MIDDLE EAST
    • 9.2.5. SOUTH KOREA
    • 9.2.6. JAPAN
    • 9.2.7. RUSSIA
    • 9.2.8. BELGIUM
    • 9.2.9. GERMANY
    • 9.2.10. AUSTRALIA
    • 9.2.11. HONGKONG
    • 9.2.12. CHINA
    • 9.2.13. INDIA

10.0. WIRELESS SECURITY VENDOR COMPANY ANALYSIS

  • 10.1. WORLDWIDE SECURITY VENDOR ANALYSIS

11.0. DISTINCTIVE INITIATIVE TO PREVENT WIRELESS INCIDENT

  • 11.1. UNIQUE MOBILE SECURITY BY BRITISH FIRM
  • 11.2. WIRELESS LTE THREAT IDENTIFICATION THROUGH PREVENTION APPLICATION

12.0. WIRELESS SECURITY MARKET PROJECTION 2013 - 2018

  • 12.1. REGION WISE % OF LTE DEPLOYMENT 2013
    • FIGURE 63: REGION WISE % OF LTE DEPLOYMENT 2013
  • 12.2. VULNERABILITY %: SMARTPHONE VS. TABLET DEVICE 2013-2018
  • 12.3. REGION WISE MARKET VALUE PROJECTION
    • FIGURE 65: REGION WISE SECURE LTE SUBSCRIBERS (IN MILLION) 2013-2018*
  • 12.4. WIRELESS SECURITY COMPANY MARKET SHARE 2013
  • 12.5. LTE INFRASTRUCTURE COMMERCIAL BY VENDORS
  • 12.6. LTE SUPPORTING TABLET & SMARTPHONE MANUFACTURERS
    • FIGURE 68: LTE SUPPORTING TABLET & SMARTPHONE MANUFACTURERS

13.0. CASE ANALYSIS

  • 13.1. THANKS GIVING: BIG DAY FOR HACKERS
    • 13.1.1. INTRODUCTION: HACKERS TARGETING SHOPPERS' SMARTPHONES
    • 13.1.2. HOW THE SMARTPHONE ATTACKED
    • 13.1.3. RESEARCHERS OPINION AND CONCLUSION
  • 13.2. WIRELESS THREAT IN CORPORATE ENVIRONMENT
    • 13.2.1. INTRODUCTION
    • 13.2.2. ATTACK IN CORPORATE ENVIRONMENT:
  • 13.3. ONE SIMPLE TRICK COULD DISABLE A CITY'S LTE NETWORK
    • 13.3.1. INTRODUCTION
    • 13.3.2. FEMTOCELL IS A CONTRIBUTOR IN LTE ATTACK
  • 13.4. HIGH SPEED LTE IS A SOURCE OF ATTACK FOR TERRORIST
    • 13.4.1. INTRODUCTION
    • 13.4.2. RESEARCHERS QUOTE ON "LTE AS A SOURCE OF TERRORIST ATTACK"
  • 13.5. CYBERCRIMINAL'S NETWORK ON MOBILE PAYMENT
    • 13.5.1. INTRODUCTION
  • 13.6. MOBILE APPLICATION DOWNLOAD FOUNDATION OF VIRUS DOWNLOAD
    • 13.6.1. INTRODUCTION
    • 13.6.2. HOW THE VIRUS DOWNLOAD BY APPLICATION DOWNLOAD
  • 13.7. MOBILE WIFI HACKING
  • 13.8. GAME APPLICATION HACKED SMARTPHONE & TABLET

14.0. CONCLUSION & RECOMMENDATION

  • 14.1. CONCLUSION
  • 14.2. UPCOMING TOP 10 WIRELESS LTE SECURITY ISSUES IN 2013
    • 14.2.1. TARGETED ATTACKS
    • 14.2.2. MORE HACTIVISM
    • 14.2.3. CYBER ESPIONAGE & WARFARE
    • 14.2.4. BIG BROTHER WATCHING EVEN MORE
    • 14.2.5. INCREASE IN MALWARE
    • 14.2.6. PRIVACY RIGHTS ERODING
    • 14.2.7. CYBER EXTORTION
    • 14.2.8. APPLE UNDER ATTACK
    • 14.2.9. ANDROID, EVEN WORSE
    • 14.2.10 UN-PATCHED EXPLOITS IN JAVA
  • 14.3. RECOMMENDATION
    • 14.3.1. PROTECTING CORPORATE NETWORK
  • 14.4. RECOMMENDATION FOR MOBILE APPLICATION DEVELOPERS:
  • 14.5. IOS: RECOMMENDED SETTINGS FOR WI-FI ROUTERS AND ACCESS POINTS
  • 14.6. RECOMMENDED SECURITY FOR MOBILE PAYMENT
    • 14.6.1. DETECTING IF CARDHOLDER DATA IS BEING SKIMMED
    • 14.6.2. IDENTIFYING AND PROTECTING WLAN FROM UNAUTHORIZED DEVICES
  • 14.7. IP NETWORK SECURITY MEASURES:

Graphs

  • Figure 1: System Architecture of Wireless LTE
  • Figure 2: LTE and GPRS networks - Comparison between Equivalent Functionalities
  • Figure 3: Android Malware Samples
  • Figure 4: Model of NDS
  • Figure 5: Ran & Black-haul in LTE
  • Figure 6: Diameter Signaling Threat Structure
  • Figure 7: Structure of LTE roaming
  • Figure 8: IWLAN Security Architecture
  • Figure 9: Small Cell Security Architecture
  • Figure 10: Rich Communication Services (RCS) Security Architecture
  • Figure 11: LTE application usage rate 2013-2018
  • Figure 12: Consumer Awareness over Wireless Security 2013 - 2018
  • Figure 13: Worldwide Wireless Antivirus User
  • Figure 14: Wireless Security Landscape
  • Figure 15: LTE Web Security Threats
  • Figure 16: Category Posed Threats
  • Figure 17: Platform Posed LTE Threats
  • Figure 18: Worldwide VOIP Incidents 2013-2018
  • Figure 19: Worldwide MMS Incidents 2013-2018
  • Figure 20: Worldwide Mobile Gaming Incidents 2013-2018
  • Figure 21: Worldwide Mobile Payment Incidents 2013-2018
  • Figure 22: Worldwide Mobile Application Download Incident 2013-2018
  • Figure 23: Region-based VOIP incident
  • Figure 24: Region wise MMS incident
  • Figure 25: Region0based Mobile Gaming incident
  • Figure 26: Region-based Mobile Payment incident
  • Figure 27: Region-based Application Download Incident
  • Figure 28: LTE Global User Expansion
  • Figure 29: LTE Deployment Regionally
  • Figure 30: Wireless Security Incident by Source 2013-2018
  • Figure 31: Worldwide Mobile Antivirus Users by Region 2013-2018
  • Figure 32: USA: LTE Incident Awareness (2013-2018)
  • Figure 33: UK: LTE Incident Awareness (2013-2018)
  • Figure 34: South Korea: LTE Incident Awareness (2013-2018)
  • Figure 35: Africa: LTE Incident Awareness (2013-2018)
  • Figure 36: Australia: LTE Incident Awareness (2013-2018)
  • Figure 37: Brazil: LTE Incident Awareness (2013-2018)
  • Figure 38: Canada: LTE Incident Awareness (2013-2018)
  • Figure 39: Belgium: LTE Incident Awareness (2013-2018)
  • Figure 40: France: LTE Incident Awareness (2013-2018)
  • Figure 41: Germany: LTE Incident Awareness (2013-2018)
  • Figure 42: Russia: LTE Incident Awareness (2013-2018)
  • Figure 43: Middle East: Incident Awareness (2013-2018)
  • Figure 44: Japan: LTE Incident Awareness (2013-2018)
  • Figure 45: China: LTE Incident Awareness (2013-2018)
  • Figure 46: India: LTE Incident Awareness (2013-2018)
  • Figure 47: USA: LTE Service Providers
  • Figure 48: UK: LTE Service Providers
  • Figure 49: Africa: LTE Service Providers
  • Figure 50: Middle East: LTE Service Providers
  • Figure 51: South Korea: LTE Service Providers
  • Figure 52: Japan: LTE Service Providers
  • Figure 53: Russia: LTE Service Providers
  • Figure 54: Belgium: LTE Service Providers
  • Figure 55: Germany: LTE Service Providers
  • Figure 56: Australia: LTE Service Providers
  • Figure 57: Hong Kong: LTE Service Providers
  • Figure 58: China: LTE Service Providers
  • Figure 59: India : LTE Service Providers
  • Figure 60: Wireless Security Antivirus Global Market Share 2013-2018
  • Figure 61: Tie Mobile Security Model
  • Figure 62: LTE Threat Identification Application
  • Figure 63: Region-based % of LTE Deployment 2013
  • Figure 64: Vulnerability % Smartphone vs. Tablet Devices 2013-2018
  • Figure 65: Region-based Secure LTE Subscribers 2013-2018
  • Figure 66: Global Security Vendor Company Market share 2013
  • Figure 67: LTE Infrastructure Commercial by Vendors 2013-2018
  • Figure 68: LTE Supporting Tablet & Smartphone Manufacturers
  • Figure 69: Attacker Targeting Smartphones & Tablets
  • Figure 70: Wireless Threat in Corporate Environment
  • Figure 71: Mobile Payment Attack
  • Figure 72: Virus Spread through Application Downloads
  • Figure 73: Game Application on Smartphones

Tables

  • Table 1: Types of Wireless Attack

c

Back to Top