表紙
市場調査レポート

LTEネットワークとM2Mにおけるワイヤレスセキュリティ:市場と予測 (2015年〜2020年)

Wireless Security in LTE Networks and M2M: Market and Forecasts 2015 - 2020

発行 Mind Commerce 商品コード 327398
出版日 ページ情報 英文 86 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=101.75円で換算しております。
Back to Top
LTEネットワークとM2Mにおけるワイヤレスセキュリティ:市場と予測 (2015年〜2020年) Wireless Security in LTE Networks and M2M: Market and Forecasts 2015 - 2020
出版日: 2015年03月27日 ページ情報: 英文 86 Pages
概要

当レポートでは、LTEとM2Mネットワークについて調査分析し、脅威の状況 (マルウェア、サイバー攻撃など) 、ソリューション、ワイヤレスセキュリティ市場全体に焦点を当てて、市場予測も含めて、体系的な情報を提供しています。

第1章 エグゼクティブサマリー

第2章 イントロダクション

第3章 LTEの進化

  • ワイヤレス技術の進化
  • CDMAからLTEへ
  • 2Gから3Gへ移行、現在はLTE
  • LTEからLTE-Advanced

第4章 LTEとワイヤレステクノロジーの技術比較

  • LTEのワイヤレスセキュリティ:課題と機会
  • ワイヤレスセキュリティとは
  • セキュリティアーキテクチャー:UMTS (3G) とLTE (4G)
  • DNSとLTEセキュリティ

第5章 ワイヤレスLTEセキュリティの技術課題

  • OFDM
  • NIMO
  • SAE

第6章 ワイヤレスセキュリティ脅威:一般、LTE

  • サイバー脅威情勢
  • ウェブセキュリティ脅威
  • セキュリティ脅威とビジネス影響
  • 脅威:カテゴリー別
  • LTE脅威

第7章 IP環境のモバイルセキュリティ:LTEの見通し

  • LTEはIPベースネットワーク
  • モバイルセキュリティ脅威のタイプ
  • マルウェア:大きな脅威
  • ワイヤレスセキュリティ
  • シグナリング
  • サードパーティ
  • RANバックホール

第8章 LTEのM2Mセキュリティ脆弱性

  • M2Mセキュリティ
  • M2M通信のアプリケーション
  • ワイヤレスLTEのM2Mシステムの構造上インフラ
  • M2Mセキュリティの課題

第9章 世界のLTE市場分析と予測

  • LTE:世界市場シナリオ
  • LTEユーザーの比較:地域別
  • 世界のLTE接続:オペレーター別
  • 世界のLTE展開状況
  • 世界のM2Mサービスプロバイダー
  • 携帯電話加入とモバイル技術加入
  • 世界のM2Mサービス収益
  • ワイヤレスLTEネットワークの見通し

第10章 ワイヤレスLTEデバイス市場予測

  • ワイヤレスデバイス市場全体の予測
  • LTE加入ワイヤレスデバイスユーザー市場予測:地域別
  • 世界のLTE加入者成長率

第11章 ワイヤレスLTE脅威分析

  • LTEネットワーク:アクセスポイントとアプリケーションの脅威
  • 地域のLTEネットワーク分布:ユーザー別
  • ワイヤレスセキュリティのモバイルユーザー意識
  • ワイヤレスLTE脅威・機会

第12章 ワイヤレスLTEセキュリティ市場分析

  • 世界のLTEセキュリティ市場シェア
  • 世界のLTEネットワークプロバイダー市場シェア
  • ワイヤレスセキュリティ市場予測
  • ワイヤレスセキュリティベンダー市場シェア
  • 商用LTEインフラ:ベンダー別
  • LTEステークホルダーとベンダー市場シェア
  • 脆弱性:スマートフォン vs. タブレット端末
  • 世界のM2Mセキュリティ市場の収益

第13章 LTEセキュリティ意識:国別

  • 米国
  • 英国
  • 韓国
  • アフリカ (諸国)
  • オーストラリア
  • ブラジル
  • カナダ
  • ベルギー
  • フランス
  • ドイツ
  • ロシア
  • 中東
  • 日本
  • 中国
  • インド

第14章 LTEネットワークプロバイダー市場シェア

  • 米国
  • 英国
  • アフリカ地域
  • 中東地域
  • 韓国
  • 日本
  • ロシア
  • ドイツ
  • オーストラリア
  • 香港
  • 中国
  • インド

第15章 ワイヤレスLTEのM2Mセキュリティに関する専門家の見解

第16章 結論と提言

図表

目次

The Fourth generation (4G) Long Term Evolution (LTE) standard for cellular communications represents a substantial leap forward in terms of capacity and services capabilities. However, it also presents a unique challenge as its all-IP nature exposes vulnerabilities that were heretofore not substantial concerns. LTE network planners need to address many physical and logical security aspects. For example, there is a critical need to protect the communication links between Ues, base stations, and the EPC network from protocol attacks and physical intrusions.

This research is highly recommended for anyone involved in LTE network planning, device procurement, and/or application development and management. The report evaluates the state of threats (malware, cyber-attacks, etc.), solutions, and the overall market for wireless security in cellular with an emphasis on LTE and M2M networks. This report includes forecasting for the period 2015 - 2020. All purchases of Mind Commerce reports includes time with an expert analyst who will help you link key findings in the report to the business issues you're addressing. This needs to be used within three months of purchasing the report.

Table of Contents

1.0. EXECUTIVE SUMMARY

2.0. INTRODUCTION

3.0. EVOLUTION OF LTE

  • 3.1. EVOLUTION OF WIRELESS TECHNOLOGIES
  • 3.2. CDMA TO LTE
  • 3.3. TRANSITION FROM 2G TO 3G AND NOW LTE
  • 3.4. LTE TO LTE ADVANCED

4.0. TECHNICAL COMPARISON BETWEEN LTE AND WIRELESS TECHNOLOGIES

  • 4.1. WIRELESS SECURITY IN LTE: DIFFERENT CHALLENGES AND OPPORTUNITIES
  • 4.2. INTRODUCTION TO WIRELESS SECURITY
  • 4.3. SECURITY ARCHITECTURE: UMTS (3G) AND LTE (4G)
  • 4.4. DOMAIN NAME SYSTEM (DNS) AND LTE SECURITY

5.0. TECHNICAL CHALLENGES IN WIRELESS LTE SECURITY

  • 5.1. OFDM
  • 5.2. MIMO
  • 5.3. SAE

6.0. WIRELESS SECURITY THREATS: GENERAL AND LTE

  • 6.1. CYBER THREAT LANDSCAPE
  • 6.2. WEB SECURITY THREAT
  • 6.3. SECURITY THREATS AND BUSINESS IMPACTS
  • 6.4. THREATS BY CATEGORY
  • 6.5. LTE THREAT AGENT TRENDS

7.0. MOBILE SECURITY IN IP ENVIRONMENT: LTE PERSPECTIVE

  • 7.1. IMPORTANT TO RECOGNIZE LTE IS AN ALL IP BASED NETWORK
  • 7.2. MOBILE SECURITY THREAT TYPES
    • 7.2.1. APPLICATION BASED THREATS
    • 7.2.2. WEB BASED THREATS
    • 7.2.3. NETWORK BASED THREATS
    • 7.2.4. PHYSICAL THREATS
  • 7.3. MALWARE: BIG THREATS FOR LTE
  • 7.4. WIRELESS SECURITY: ENVIRONMENTAL CHANGE OUTLOOK
  • 7.5. SIGNALLING DERIVED THREATS: DIAMETER
  • 7.6. THIRD PARTY SOURCED THREATS
  • 7.7. RAN AND BACKHAUL: WEAK POINTS IN LTE FOR MOBILE "HACTIVISTS"

8.0. M2M SECURITY VULNERABILITIES IN LTE

  • 8.1. MACHINE TO MACHINE (M2M) SECURITY
  • 8.2. APPLICATIONS INVOLVED IN M2M COMMUNICATION
  • 8.3. ARCHITECTURAL INFRASTRUCTURE OF M2M SYSTEM IN WIRELESS LTE
  • 8.4. CHALLENGES IN M2M SECURITY

9.0. GLOBAL LTE MARKET ANALYSIS & FORECASTING 2015-2020

  • 9.1. LTE: GLOBAL MARKET SCENARIO
  • 9.2. COMPARISON OF LTE USERS BY REGION
  • 9.3. GLOBAL LTE CONNECTIONS BY OPERATORS
  • 9.4. WORLDWIDE LTE DEPLOYMENT STATUS
  • 9.5. M2M SERVICE PROVIDERS GLOBALLY
  • 9.6. MOBILE PHONE SUBSCRIPTION AND MOBILE TECHNOLOGY SUBSCRIPTION
  • 9.7. GLOBAL M2M SERVICE REVENUE 2015 - 2020
  • 9.8. WIRELESS LTE NETWORK OUTLOOK

10.0. WIRELESS LTE DEVICE MARKET PROJECTIONS 2015 - 2020

  • 10.1. OVERALL WIRELESS DEVICE MARKET FORECAST
  • 10.2. LTE SUBSCRIBED WIRELESS DEVICE USERS MARKET FORECAST BY REGION
  • 10.3. WORLDWIDE LTE SUBSCRIBER GROWTH 2015 - 2020

11.0. WIRELESS LTE THREAT ANALYSIS

  • 11.1. LTE NETWORKS: ACCESS POINT AND THREAT FOR APPLICATIONS
  • 11.2. REGIONAL LTE NETWORK DISTRIBUTION BY USERS
  • 11.3. MOBILE USER AWARENESS OF WIRELESS SECURITY 2015 - 2020
  • 11.4. WIRELESS LTE THREATS AND OPPORTUNITIES

12.0. WIRELESS LTE SECURITY MARKET ANALYSIS

  • 12.1. GLOBAL LTE SECURITY MARKET SHARE
  • 12.2. GLOBAL LTE NETWORK (WITH PRIVACY AND SECURITY) PROVIDER MARKET SHARE
  • 12.3. WIRELESS SECURITY MARKET PROJECTION 2015 - 2020
  • 12.4. WIRELESS SECURITY VENDOR MARKET SHARE
  • 12.5. LTE INFRASTRUCTURE COMMERCIAL BY VENDOR
  • 12.6. LTE STAKEHOLDERS AND VENDOR MARKET SHARE
  • 12.7. VULNERABILITY: SMARTPHONE VS. TABLET DEVICE 2015 - 2020
  • 12.8. GLOBAL M2M SECURITY MARKET REVENUE 2015 - 2020

13.0. LTE SECURITY AWARENESS BY COUNTRY 2015 - 2020

  • 13.1. USA
  • 13.2. UK
  • 13.3. SOUTH KOREA
  • 13.4. AFRICA (VARIOUS COUNTRIES)
  • 13.5. AUSTRALIA
  • 13.6. BRAZIL
  • 13.7. CANADA
  • 13.8. BELGIUM
  • 13.9. FRANCE
  • 13.10. GERMANY
  • 13.11. RUSSIA
  • 13.12. MIDDLE EAST
  • 13.13. JAPAN
  • 13.14. CHINA
  • 13.15. INDIA

14.0. LTE NETWORK PROVIDER MARKET SHARE

  • 14.1. USA
  • 14.2. UNITED KINGDOM
  • 14.3. AFRICAN REGION
  • 14.4. MIDDLE EAST REGION
  • 14.5. SOUTH KOREA
  • 14.6. JAPAN
  • 14.7. RUSSIA
  • 14.8. GERMANY
  • 14.9. AUSTRALIA
  • 14.10. HONG KONG
  • 14.11. CHINA
  • 14.12. INDIA

15.0. EXPERT OPINION ABOUT M2M SECURITY IN WIRELESS LTE

16.0. CONCLUSION AND RECOMMENDATIONS

  • 16.1. CONCLUSIONS
  • 16.2. RECOMMENDATION
    • 16.2.1. INITIATIVE TO PREVENT CYBERCRIMINALS IN LTE M2M SERVICES
    • 16.2.2. INDUSTRY APPROACHES TO PRESERVING CYBER SECURITY
    • 16.2.3. NHTSA APPROACH TO PREVENT M2M CYBER SECURITY THREATS
    • 16.2.4. WIRELESS INDUSTRY EFFORTS TO REDUCE CYBER SECURITY THREATS
    • 16.2.5. PROTECTING CORPORATE NETWORKS
  • 16.3. EXISTING SOLUTIONS FOR LTE SECURITY ISSUES
  • 16.4. RECOMMENDATION FOR MOBILE APPLICATION DEVELOPERS
  • 16.5. IOS RECOMMENDED SETTINGS FOR WI-FI ROUTERS AND ACCESS POINTS
  • 16.6. RECOMMENDED SECURITY FOR MOBILE PAYMENTS
    • 16.6.1. DETECTING IF CARDHOLDER DATA IS BEING "SKIMMED"
    • 16.6.2. IDENTIFYING AND PROTECTING WLAN FROM UNAUTHORIZED DEVICES
  • 16.7. IP NETWORK SECURITY MEASURES

Figures

  • Figure 1: Wireless Technologies
  • Figure 2: LTE Evolution
  • Figure 3: LTE to Advanced LTE Evolution
  • Figure 4: LTE Security Infrastructure
  • Figure 5: The UTRAN Architecture
  • Figure 6: The E-UTRAN Architecture
  • Figure 7: OFDM Technological challenges in LTE
  • Figure 8: MIMO Technological challenges in LTE
  • Figure 9: SAE Technological challenges in LTE
  • Figure 10: Wireless Security Threats
  • Figure 11: Web Security Threat Pattern in LTE
  • Figure 12: Threats in Business Technology
  • Figure 13: LTE Security Threats by Category
  • Figure 14: LTE in IP Address
  • Figure 15: E-UTRAN and EPC
  • Figure 16: Web Based Threats
  • Figure 17: Malware Infection rate on Wireless LTE device by Region
  • Figure 18: Applications hit by Malware in LTE Devices
  • Figure 19: RAN and Black-haul in LTE
  • Figure 20: Major Applications involved in Wireless LTE M2M Communication
  • Figure 21: Architectural Infrastructure of M2M system in Wireless LTE
  • Figure 22: LTE Subscribers Globally
  • Figure 23: LTE Users by Region
  • Figure 24: LTE Coverage Globally by Operator
  • Figure 25: Worldwide LTE Deployment Status
  • Figure 26: Mobile Phone and Technology Subscription
  • Figure 27: Global M2M LTE based Service Revenue 2015 - 2020
  • Figure 28: Wireless Device Market 2015 - 2020
  • Figure 29: LTE Subscription 2015 - 2020
  • Figure 30: Worldwide LTE Subscriber Growth 2015 - 2020
  • Figure 31: Average Daily Subscribers for LTE and 3G
  • Figure 32: Regional LTE Users
  • Figure 33: Mobile User Awareness of Wireless Security 2015 - 2020
  • Figure 34: Global LTE Security Market Share Distribution
  • Figure 35: Global LTE Network (with Privacy and Security) Provider Market Share
  • Figure 36: Wireless Security Market Projection 2015 - 2020
  • Figure 37: Wireless Security Vendors Market Share
  • Figure 38: Top LTE Infrastructure Commercial Vendors
  • Figure 39: LTE Equipment Market Share
  • Figure 40: Vulnerability % Smartphone vs. Tablet Devices 2015 - 2020
  • Figure 41: Global M2M Security Market Revenue 2015 - 2020
  • Figure 42: USA LTE Incident Awareness 2015 - 2020
  • Figure 43: UK LTE Incident Awareness 2015 - 2020
  • Figure 44: South Korea LTE Incident Awareness 2015 - 2020
  • Figure 45: Africa LTE Incident Awareness 2015 - 2020
  • Figure 46: Australia LTE Incident Awareness 2015 - 2020
  • Figure 47: Brazil LTE Incident Awareness 2015 - 2020
  • Figure 48: Canada LTE Incident Awareness 2015 - 2020
  • Figure 49: Belgium LTE Incident Awareness 2015 - 2020
  • Figure 50: France LTE Incident Awareness 2015 - 2020
  • Figure 51: Germany LTE Incident Awareness 2015 - 2020
  • Figure 52: Russia LTE Incident Awareness 2015 - 2020
  • Figure 53: Middle East LTE Incident Awareness 2015 - 2020
  • Figure 54: Japan: LTE Incident Awareness 2015 - 2020
  • Figure 55: China LTE Incident Awareness 2015 - 2020
  • Figure 56: India LTE Incident Awareness 2015 - 2020
  • Figure 57: USA LTE Service Providers
  • Figure 58: UK LTE Service Providers
  • Figure 59: Africa LTE Service Providers
  • Figure 60: Middle East LTE Service Providers
  • Figure 61: South Korea LTE Service Providers
  • Figure 62: Japan LTE Service Providers
  • Figure 63: Russia LTE Service Providers
  • Figure 64: Germany LTE Service Providers
  • Figure 65: Australia LTE Service Providers
  • Figure 66: Hong Kong LTE Service Providers
  • Figure 67: China LTE Service Providers
  • Figure 68: India LTE Service Providers
  • Figure 69: Industrial Approach to Preserve Cyber Security in M2M Services

Tables

  • Table 1: Application based Threats in LTE
  • Table 2: Types of Wireless Attacks
  • Table 3: Wireless Security Changes
  • Table 4: M2M Wireless Security Challenges
  • Table 5: Global M2M LTE Service Providers
  • Table 6 : LTE Smartphone Market Analysis
  • Table 7: Wireless Industry Efforts to Prevent Cyber Security Threats
Back to Top