Market Research Logo

Wireless Security in 3G and LTE Networks: Market and Forecast 2014 - 2019

1.0 Executive Summary
2.0 Introduction
3.0 Evolution Of Lte: Global Perspective
3.1 Transition From 2g To 3g And Now Lte
3.2 Lte To Lte Advanced
3.3 Wireless Network: Global Market Scenario:
3.4 Lte: Global Market Scenario:
3.5 Comparison Of Lte Users By Region
3.6 Worldwide Lte Deployment Status:
4.0 Lte Market Projection 2014 - 2019
4.1 Mobile Phone Subscription And Mobile Technology Subscription
5.0 Wireless Security Comparison: Utms (3g) Vs. Lte (4g)
5.1 Introduction To Wireless Security
5.2 Security Architecture: Utms (3g) And Lte (4g)
5.3 Why Wireless Security Is Different In Lte
5.4 Wireless Security Vulnerability: A Burning Issue For Mobile Devices
5.5 Security Risks In Wireless Devices:
5.6 Facts About Security Issues In Mobile Environment
5.7 Domain Name System (Dns) And Lte Security
6.0 Wireless Security Threats On Mobile: Lte Pattern
6.1 Wireless Lte Cyber Threat Landscape
6.2 Web Security Threat
6.3 Security Threats And Business Impacts
6.4 Category Posed Threats
6.5 Platform Posed Threats
6.6 Lte Threat Agents Trends
7.0 Wireless Lte Device Market Projections 2014-2019
7.1 Overall Wireless Device Market Forecast:
7.2 Regional Wireless Device Market Forecast
7.3 Lte Subscribed Wireless Device Users Market Forecast:
8.0 Mobile Application Market Projection 2014-2019
8.1 Mobile Application Market: Introduction
8.2 Mobile Application Market Forecast 2014 – 2019
9.0 Mobile Security In Ip Environment: Lte Perspective
9.1 Lte – An Ip Based Network
9.2 Types Of Mobile Security Threats
9.2.1 Application Based Threats
9.2.2 Web Based Threats
9.2.3 Network Based Threats
9.2.4 Physical Threats
9.3 Malware: Big Threats For Lte
9.4 Wireless Security: Environmental Change Outlook
9.5 Signalling Derived Threats: Diameter
9.6 Third Party Sourced Threats
9.7 Ran And Backhaul: Weak Points In Lte For Mobile “hactivists”
10.0 Wireless Security Analysis On Lte Perspective
10.1 Analysis Of Wireless Lte Threats
10.1.1 Lte Networks: An Access Point And Threat For Applications
10.1.1 Lte Networks: Regional Distribution Of Mobile Application Users
10.1.2 Mobile User Awareness Of Wireless Security 2013 – 2019
10.2 Wireless Lte Threats Market Status And Outlook
10.2.1 Wireless Lte Threats And Opportunities
10.2.2 Outlook Of Wireless Lte Networks Threats
10.2.1 Global Lte Connections
11.0 Lte Wireless Network – Country-wise Analysis
11.1 Lte Security Awareness 2014 - 2019
11.1.1 Usa
11.1.2 United Kingdom
11.1.3 South Korea
11.1.4 Africa
11.1.5 Australia
11.1.6 Brazil
11.1.7 Canada
11.1.8 Belgium
11.1.9 France
11.1.10 Germany
11.1.11 Russia
11.1.12 Middle East
11.1.13 Japan
11.1.14 China
11.1.15 India
11.2 Lte Network Provider Market Share
11.2.1 Usa
11.2.2 United Kingdom
11.2.3 African Region
11.2.4 Middle East Region
11.2.5 South Korea
11.2.6 Japan
11.2.7 Russia
11.2.8 Germany
11.2.9 Australia
11.2.10 Hongkong
11.2.11 China
11.2.12 India
11.2.13 Global Top 10 Service Provider Of Lte Network Subscriber Base
12.0 Distinctive Initiative To Prevent Wireless Incident
12.1 Unique Mobile Security By British Firm
12.2 Wireless Lte Threat Identification Through Prevention Application
12.3 Mobile Security Against Antivirus And Theft
13.0 Lte Stakeholders And Vendor Market Share
13.1 Regional Lte Deployment 2014
13.2 Vulnerability % Smartphone Vs. Tablet Device 2014 - 2019
13.3 Wireless Antivirus Vendors Market Share 2013
13.4 Wireless Security Company Market Share 2013
13.5 Lte Infrastructure Commercial By Vendors
13.6 Lte Supporting Tablet And Smartphone Manufacturers
14.0 Key Opinion Leaders View On Lte Security Market
14.1 Lowell Mcadam, Ceo, Verizon
14.2 Dan Hesse, Ceo, Sprint
14.3 John T Chamber, Ceo, Cisco
14.4 Vince Steckler, Ceo, Avast
14.5 Steve Bennet, Ceo, Symantec
15.0 Case Analysis
15.1 Droiddream Malware: Spoiling Your Dream
15.2 Bad News: Real Bad News For Mobile Users
15.3 Hacking Your Money: Banking Frauds Over Mobile
15.3.1 Uk Banks Attacked Using Malware: £1m Fraud
15.3.2 Eurograbber Attack
15.4 Thanks Giving: Big Day For Hackers
15.4.1 Introduction: Hackers Targeting Shoppers' Smartphones
15.4.2 How The Smartphone Attacked
15.4.3 Researchers Opinion And Conclusion
15.5 Wireless Threat In Corporate Environment
15.5.1 Introduction
15.5.2 Attack In Corporate Environment:
15.6 One Simple Trick Could Disable A City’s Lte Network
15.6.1 Introduction
15.6.2 Femtocell Is A Contributor In Lte Attacks
15.7 High Speed Lte Is A Source Of Attack For Terrorist
15.7.1 Introduction
15.7.2 Researchers Quote On “lte As A Source Of Terrorist Attack”
15.8 Cybercriminal’s Network On Mobile Payments
15.8.1 Introduction
15.9 Mobile Application Download Foundation Of Virus Download
15.9.1 Introduction
15.9.2 Viruses Infiltrate By Applications Downloads
15.10 Mobile Wifi Hacking
15.11 Game Application Hacked Smartphone And Tablet
16.0 Conclusion & Recommendations
16.1 Conclusions
16.2 Trending Wireless Lte Security Issues In 2014
16.2.1 Targeted Attacks
16.2.2 More Hactivism
16.2.3 Cyber Espionage And Warfare
16.2.4 Big Brother Watching Even More
16.2.5 Increase In Malware
16.2.6 Privacy Rights Eroding
16.2.7 Cyber Extortion
16.2.8 Apple Under Attack
16.2.9 Android Is Even Worse
16.2.10 Un-patched Exploits In Java
16.3 Vulnerabilities In Lte
16.3.1 Vulnerability In Lte System Architecture
16.3.2 Vulnerability In Access And Handover Procedures
16.3.3 Vulnerability In Ims Security And Henb Security
16.4 Other Lte Security Issues
16.5 Recommendation
16.5.1 Protecting Corporate Network
16.6 Existing Solutions For Lte Security Issues
16.7 Recommendation For Mobile Application Developers
16.8 Ios Recommended Settings For Wi-fi Routers And Access Points
16.9 Recommended Security For Mobile Payment
16.9.1 Detecting If Cardholder Data Is Being Skimmed
16.9.2 Identifying And Protecting Wlan From Unauthorized Devices
16.10 Ip Network Security Measures:
17.0 Acronyms
List of Figures
Figure 1: System Architecture of Wireless LTE
Figure 2: Wireless Technologies
Figure 3: LTE Evolution
Figure 4: LTE and Mobile Evolution
Figure 5: Wireless Network and comparison
Figure 6: Wireless Network Global Market Scenario
Figure 7: LTE Global Market Scenario
Figure 8: LTE by Region
Figure 9: LTE Worldwide Deployment Status
Figure 10: Mobile Phone and Technology Subscription
Figure 11: Global LTE User Projection 2014 – 2019
Figure 12: The UTRAN Architecture
Figure 13: The E-UTRAN Architecture
Figure 14: The LTE Security Architecture
Figure 15: Top 10 Mobile Malware Encounters
Figure 16: Wireless Security Threats
Figure 17: LTE Web Security Threats
Figure 18: Security Implications on Organizational Goals
Figure 19: Business Technology and Threats
Figure 20: Category Posed Threats
Figure 21: Platform Posed LTE Threats
Figure 22: Top Threats and Sources
Figure 23: Wireless Devices Market Projection 2014 – 2019
Figure 24: Regional Wireless Devices Market 2014 – 2019
Figure 25: LTE Subscription 2014 – 2019
Figure 26: Types of Mobile Applications
Figure 27: Free Apps vs. Paid Apps 2014 - 2019
Figure 28: Mobile Application Market 2014 - 2019
Figure 29: LTE Network Architecture
Figure 30: Functionalities of E-UTRAN and EPC
Figure 31: Web-based Threats
Figure 32: Worldwide Malware Infection Rate
Figure 33: Malware Infected Applications
Figure 34: Wireless Security Changes
Figure 35: RAN and Black-haul in LTE
Figure 36: Average Daily Subscribers for LTE and 3G
Figure 37: Regional Mobile Application LTE Users
Figure 38: Mobile User Awareness of Wireless Security 2014 – 2019
Figure 39: LTE Smartphone Sales Forecast
Figure 40: Global LTE Connections
Figure 41: USA: LTE Incident Awareness 2014 - 2019
Figure 42: UK: LTE Incident Awareness 2014 - 2019
Figure 43: South Korea: LTE Incident Awareness 2014 - 2019
Figure 44: Africa: LTE Incident Awareness 2014 - 2019
Figure 45: Australia: LTE Incident Awareness 2014 - 2019
Figure 46: Brazil: LTE Incident Awareness 2014 - 2019
Figure 47: Canada: LTE Incident Awareness 2014 - 2019
Figure 48: Belgium: LTE Incident Awareness 2014 - 2019
Figure 49: France: LTE Incident Awareness 2014 - 2019
Figure 50: Germany: LTE Incident Awareness 2014 - 2019
Figure 51: Russia: LTE Incident Awareness 2014 - 2019
Figure 52: Middle East: LTE Incident Awareness 2014 - 2019
Figure 53: Japan: LTE Incident Awareness 2014 - 2019
Figure 54: China: LTE Incident Awareness 2014 - 2019
Figure 55: India LTE incident Awareness 2014 - 2019
Figure 56: USA LTE Service Provider
Figure 57: UK LTE Service Provider
Figure 58: Africa LTE Service Provider
Figure 59: Middle East LTE Service Provider
Figure 60: South Korea LTE Service Provider
Figure 61: Japan LTE Service Provider
Figure 62: Russia LTE Service Provider
Figure 63: Germany LTE Service Provider
Figure 64: Australia LTE Service Provider
Figure 65: Hong Kong LTE Service Provider
Figure 66: China LTE Service Provider
Figure 67: India LTE Service Provider
Figure 68: Mobile Security Model
Figure 69: LTE threat identification application
Figure 70: Regional Percentage of LTE deployment 2014
Figure 71: Vulnerability % Smartphone vs. Tablet Devices 2014 - 2019
Figure 72: Wireless Antivirus Vendors Market Share 2013
Figure 73: Global Security Vendor Company Market Share 2013
Figure 74: Top LTE Infrastructure Commercial Vendors 2013
Figure 75: LTE Supporting Tablet and Smartphone Manufacturers 2013
Figure 76: BOWLTIME: DROIDDREAM Infected Application
Figure 77: BADNEWS infected Application
Figure 78: Attacker Targeting Smartphones and Tablets
Figure 79: Wireless Threats in Corporate Environment
Figure 71: Mobile Payment Attacks
Figure 72: Virus Spread through Application Download
Figure 73: Game Application on Smartphone
List of Tables
Table 1: Types of Application Based Threats
Table 2: Types of Wireless Attacks
Table 3: Top 10 Service Provider of LTE Network Worldwide
Table 4: Top Cellular and WiFi Threats in 2014

Wireless Security in 3G and LTE Networks: Market and Forecast 2014 - 2019

With the rapid expansion of broadband wireless, end-users increasingly rely upon handheld devices for almost all daily living activities. Fourth generation (4G) cellular LTE in particular represents a unique opportunity/challenge as device attacks are growing at a rapid rate, exposing vulnerabilities that must be addressed. Our research indicates that Android malware in particular will grow rapidly and will be considered most vulnerable OS for LTE.

This report evaluates the issues, challenges, and market potential for the wireless security in 3G and LTE. The latter in particular brings new challenges. For example, as the adoption of IPsec encryption for transporting LTE traffic continues to grow significantly, there is increasing need for security gateways, which help prevent unauthorized access into the evolved packet core and provide quality of service control for the LTE network.

This research is most reading for anyone involved in LTE network planning, device procurement, and/or application development and management. This report includes forecasting for the period 2014 - 2019. The report complements Mind Commerce research in LTE device, subscriptions, and application market analysis as well as security threats for specific applications such as mobile games.

Target Audience:

  • Wireless companies
  • LTE device manufacturers
  • Mobile network operators
  • LTE infrastructure providers
  • Cellular application developers
  • Managed communications providers


General Methodology

Mind Commerce Publishing's research methodology encompasses input from a wide variety of sources.

We rely heavily upon our Subject Matter Experts (SME) in terms of their market knowledge, unique perspective, and vision. We utilize SME industry contacts as well as previous customers and participants in our market surveys and interactive interviews.

In addition, we rely upon our extensive internal database, which contains modeling, qualitative analysis, and quantitative data. We review secondary sources and compare to our primary sources to update previous findings (for prior version reports) and/or compile baseline information for technology and market modeling.

We share preliminary models with industry contacts (select previous clients, experts, and thought leaders) to verify the veracity of initial modeling. Prior to final report production (analysis, findings, and conclusions), we engage in an internal review with internal SMEs as well as cross-expertise, senior staff members to challenge results.

We believe that forecasts should be prepared as part of an integrated process which involves both quantitative as well as qualitative factors. We follow the following 3-step process for forecasting.

Forecasting Methodology

Step 1 - Forecasts Input: The inputs for the present and historical revenues are derived from industry players. Financial and other quantitative data for individual sub-market categories are derived from original research and tested with interviews with major industry constituents.

Step 2 - Forecasting of Future Years: Mind Commerce extends forecasts based on a variety of factors including demand drivers as well as supply side data. Key success factors and assumptions are considered.

Step 3 - Validation of Data: The final step is to validate projections, which is accomplished in consultation with both internal and external industry experts, including both topic and regional experts. Adjustments are made to the forecasts based on factors identified throughout this process.


Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook

Share this report

;