世界各国のリアルタイムなデータ・インテリジェンスで皆様をお手伝い

LTEネットワークとM2Mにおける無線セキュリティ市場と予測 2015-2020年

Wireless Security in LTE Networks and M2M: Market and Forecasts 2015 - 2020

 

出版社 出版年月電子版価格 ページ数
Mind Commerce
マインドコマース
2015年3月US$1,995
シングルユーザライセンス
86

サマリー

この調査レポートは、LTEネットワークにおける無線セキュリティ市場を調査し、市場動向や脅威などを解説・分析しています。

Overview

The Fourth generation (4G) Long Term Evolution (LTE) standard for cellular communications represents a substantial leap forward in terms of capacity and services capabilities.  However, it also presents a unique challenge as its all-IP nature exposes vulnerabilities that were heretofore not substantial concerns.    LTE network planners need to address many physical and logical security aspects. For example, there is a critical need to protect the communication links between UEs, base stations, and the EPC network from protocol attacks and physical intrusions.

This research is highly recommended for anyone involved in LTE network planning, device procurement, and/or application development and management.  The report evaluates the state of threats (malware, cyber-attacks, etc.), solutions, and the overall market for wireless security in cellular with an emphasis on LTE and M2M networks. This report includes forecasting for the period 2015 - 2020.   All purchases of Mind Commerce reports includes time with an expert analyst who will help you link key findings in the report to the business issues you're addressing. This needs to be used within three months of purchasing the report.

Target Audience:

  • M2M companies
  • Wireless companies
  • LTE device manufacturers
  • Mobile network operators
  • LTE infrastructure providers
  • Cellular application developers
  • Managed communications providers


目次

Table of Contents

1.0          EXECUTIVE SUMMARY
2.0          INTRODUCTION          
3.0          EVOLUTION OF LTE   
3.1          EVOLUTION OF WIRELESS TECHNOLOGIES      
3.2          CDMA TO LTE    
3.3          TRANSITION FROM 2G TO 3G AND NOW LTE 
3.4          LTE TO LTE ADVANCED  
4.0          TECHNICAL COMPARISON BETWEEN LTE AND WIRELESS TECHNOLOGIES         
4.1          WIRELESS SECURITY IN LTE: DIFFERENT CHALLENGES AND OPPORTUNITIES    
4.2          INTRODUCTION TO WIRELESS SECURITY          
4.3          SECURITY ARCHITECTURE: UMTS (3G) AND LTE (4G)  
4.4          DOMAIN NAME SYSTEM (DNS) AND LTE SECURITY     
5.0          TECHNICAL CHALLENGES IN WIRELESS LTE SECURITY  
5.1          OFDM  
5.2          MIMO  
5.3          SAE  
6.0          WIRELESS SECURITY THREATS: GENERAL AND LTE        
6.1          CYBER THREAT LANDSCAPE   
6.2          WEB SECURITY THREAT
6.3          SECURITY THREATS AND BUSINESS IMPACTS 
6.4          THREATS BY CATEGORY
6.5          LTE THREAT AGENT TRENDS  
7.0          MOBILE SECURITY IN IP ENVIRONMENT: LTE PERSPECTIVE      
7.1          IMPORTANT TO RECOGNIZE LTE IS AN ALL IP BASED NETWORK
7.2          MOBILE SECURITY THREAT TYPES        
7.2.1      APPLICATION BASED THREATS  
7.2.2      WEB BASED THREATS    
7.2.3      NETWORK BASED THREATS    
7.2.4      PHYSICAL THREATS    
7.3          MALWARE: BIG THREATS FOR LTE       
7.4          WIRELESS SECURITY: ENVIRONMENTAL CHANGE OUTLOOK   
7.5          SIGNALLING DERIVED THREATS: DIAMETER   
7.6          THIRD PARTY SOURCED THREATS        
7.7          RAN AND BACKHAUL: WEAK POINTS IN LTE FOR MOBILE "HACTIVISTS"
8.0          M2M SECURITY VULNERABILITIES IN LTE         
8.1          MACHINE TO MACHINE (M2M) SECURITY       
8.2          APPLICATIONS INVOLVED IN M2M COMMUNICATION
8.3          ARCHITECTURAL INFRASTRUCTURE OF M2M SYSTEM IN WIRELESS LTE  
8.4          CHALLENGES IN M2M SECURITY          
9.0          GLOBAL LTE MARKET ANALYSIS & FORECASTING 2015-2020   
9.1          LTE: GLOBAL MARKET SCENARIO        
9.2          COMPARISON OF LTE USERS BY REGION         
9.3          GLOBAL LTE CONNECTIONS BY OPERATORS   
9.4          WORLDWIDE LTE DEPLOYMENT STATUS          
9.5          M2M SERVICE PROVIDERS GLOBALLY    
9.6          MOBILE PHONE SUBSCRIPTION AND MOBILE TECHNOLOGY SUBSCRIPTION   
9.7          GLOBAL M2M SERVICE REVENUE 2015 - 2020
9.8          WIRELESS LTE NETWORK OUTLOOK   
10.0        WIRELESS LTE DEVICE MARKET PROJECTIONS 2015 - 2020        
10.1        OVERALL WIRELESS DEVICE MARKET FORECAST
10.2        LTE SUBSCRIBED WIRELESS DEVICE USERS MARKET FORECAST BY REGION       
10.3        WORLDWIDE LTE SUBSCRIBER GROWTH 2015 - 2020   
11.0        WIRELESS LTE THREAT ANALYSIS         
11.1        LTE NETWORKS: ACCESS POINT AND THREAT FOR APPLICATIONS        
11.2        REGIONAL LTE NETWORK DISTRIBUTION BY USERS     
11.3        MOBILE USER AWARENESS OF WIRELESS SECURITY 2015 - 2020  
11.4        WIRELESS LTE THREATS AND OPPORTUNITIES    
12.0        WIRELESS LTE SECURITY MARKET ANALYSIS   
12.1        GLOBAL LTE SECURITY MARKET SHARE  
12.2        GLOBAL LTE NETWORK (WITH PRIVACY AND SECURITY) PROVIDER MARKET SHARE     
12.3        WIRELESS SECURITY MARKET PROJECTION 2015 - 2020   
12.4        WIRELESS SECURITY VENDOR MARKET SHARE    
12.5        LTE INFRASTRUCTURE COMMERCIAL BY VENDOR       
12.6        LTE STAKEHOLDERS AND VENDOR MARKET SHARE     
12.7        VULNERABILITY: SMARTPHONE VS. TABLET DEVICE 2015 - 2020
12.8        GLOBAL M2M SECURITY MARKET REVENUE 2015 - 2020
13.0        LTE SECURITY AWARENESS BY COUNTRY 2015 - 2020 
13.1        USA 
13.2        UK    
13.3        SOUTH KOREA  
13.4        AFRICA (VARIOUS COUNTRIES)
13.5        AUSTRALIA   
13.6        BRAZIL
13.7        CANADA        
13.8        BELGIUM       
13.9        FRANCE          
13.10     GERMANY     
13.11     RUSSIA
13.12     MIDDLE EAST    
13.13     JAPAN
13.14     CHINA  
13.15     INDIA   
14.0        LTE NETWORK PROVIDER MARKET SHARE       
14.1        USA 
14.2        UNITED KINGDOM    
14.3        AFRICAN REGION      
14.4        MIDDLE EAST REGION   
14.5        SOUTH KOREA  
14.6        JAPAN
14.7        RUSSIA
14.8        GERMANY     
14.9        AUSTRALIA   
14.10     HONG KONG    
14.11     CHINA  
14.12     INDIA   
15.0        EXPERT OPINION ABOUT M2M SECURITY IN WIRELESS LTE     
16.0        CONCLUSION AND RECOMMENDATIONS       
16.1        CONCLUSIONS
16.2        RECOMMENDATION
16.2.1    INITIATIVE TO PREVENT CYBERCRIMINALS IN LTE M2M SERVICES        
16.2.2    INDUSTRY APPROACHES TO PRESERVING CYBER SECURITY     
16.2.3    NHTSA APPROACH TO PREVENT M2M CYBER SECURITY THREATS         
16.2.4    WIRELESS INDUSTRY EFFORTS TO REDUCE CYBER SECURITY THREATS 
16.2.5    PROTECTING CORPORATE NETWORKS  
16.3        EXISTING SOLUTIONS FOR LTE SECURITY ISSUES          
16.4        RECOMMENDATION FOR MOBILE APPLICATION DEVELOPERS   
16.5        IOS RECOMMENDED SETTINGS FOR WI-FI ROUTERS AND ACCESS POINTS       
16.6        RECOMMENDED SECURITY FOR MOBILE PAYMENTS
16.6.1    DETECTING IF CARDHOLDER DATA IS BEING "SKIMMED"         
16.6.2    IDENTIFYING AND PROTECTING WLAN FROM UNAUTHORIZED DEVICES          
16.7        IP NETWORK SECURITY MEASURES   

Figures

Figure 1: Wireless Technologies
Figure 2: LTE Evolution  
Figure 3: LTE to Advanced LTE Evolution
Figure 4: LTE Security Infrastructure  
Figure 5: The UTRAN Architecture      
Figure 6: The E-UTRAN Architecture  
Figure 7: OFDM Technological challenges in LTE
Figure 8: MIMO Technological challenges in LTE
Figure 9: SAE Technological challenges in LTE 
Figure 10: Wireless Security Threats  
Figure 11: Web Security Threat Pattern in LTE    
Figure 12: Threats in Business Technology      
Figure 13: LTE Security Threats by Category    
Figure 14: LTE in IP Address   
Figure 15: E-UTRAN and EPC 
Figure 16: Web Based Threats   
Figure 17: Malware Infection rate on Wireless LTE device by Region   
Figure 18: Applications hit by Malware in LTE Devices
Figure 19: RAN and Black-haul in LTE  
Figure 20: Major Applications involved in Wireless LTE M2M Communication 
Figure 21: Architectural Infrastructure of M2M system in Wireless LTE   
Figure 22: LTE Subscribers Globally     
Figure 23: LTE Users by Region  
Figure 24: LTE Coverage Globally by Operator    
Figure 25: Worldwide LTE Deployment Status    
Figure 26: Mobile Phone and Technology Subscription   
Figure 27: Global M2M LTE based Service Revenue 2015 - 2020  
Figure 28: Wireless Device Market 2015 - 2020   
Figure 29: LTE Subscription 2015 - 2020
Figure 30: Worldwide LTE Subscriber Growth 2015 - 2020         
Figure 31: Average Daily Subscribers for LTE and 3G   
Figure 32: Regional LTE Users
Figure 33: Mobile User Awareness of Wireless Security 2015 - 2020    
Figure 34: Global LTE Security Market Share Distribution          
Figure 35: Global LTE Network (with Privacy and Security) Provider Market Share        
Figure 36: Wireless Security Market Projection 2015 - 2020     
Figure 37: Wireless Security Vendors Market Share    
Figure 38: Top LTE Infrastructure Commercial Vendors  
Figure 39: LTE Equipment Market Share
Figure 40: Vulnerability % Smartphone vs. Tablet Devices 2015 - 2020
Figure 41: Global M2M Security Market Revenue 2015 - 2020
Figure 42: USA LTE Incident Awareness 2015 - 2020    
Figure 43: UK LTE Incident Awareness 2015 - 2020       
Figure 44: South Korea LTE Incident Awareness 2015 - 2020    
Figure 45: Africa LTE Incident Awareness 2015 - 2020 
Figure 46: Australia LTE Incident Awareness 2015 - 2020
Figure 47: Brazil LTE Incident Awareness 2015 - 2020  
Figure 48: Canada LTE Incident Awareness 2015 - 2020   
Figure 49: Belgium LTE Incident Awareness 2015 - 2020  
Figure 50: France LTE Incident Awareness 2015 - 2020    
Figure 51: Germany LTE Incident Awareness 2015 - 2020          
Figure 52: Russia LTE Incident Awareness 2015 - 2020
Figure 53: Middle East LTE Incident Awareness 2015 - 2020     
Figure 54: Japan: LTE Incident Awareness 2015 - 2020
Figure 55: China LTE Incident Awareness 2015 - 2020  
Figure 56: India LTE Incident Awareness 2015 - 2020   
Figure 57: USA LTE Service Providers 
Figure 58: UK LTE Service Providers    
Figure 59: Africa LTE Service Providers   
Figure 60: Middle East LTE Service Providers  
Figure 61: South Korea LTE Service Providers 
Figure 62: Japan LTE Service Providers   
Figure 63: Russia LTE Service Providers  
Figure 64: Germany LTE Service Providers       
Figure 65: Australia LTE Service Providers        
Figure 66: Hong Kong LTE Service Providers    
Figure 67: China LTE Service Providers   
Figure 68: India LTE Service Providers
Figure 69: Industrial Approach to Preserve Cyber Security in M2M Services  

Tables

Table 1: Application based Threats in LTE         
Table 2: Types of Wireless Attacks      
Table 3: Wireless Security Changes    
Table 4: M2M Wireless Security Challenges    
Table 5: Global M2M LTE Service Providers     
Table 6 : LTE Smartphone Market Analysis      
Table 7: Wireless Industry Efforts to Prevent Cyber Security Threats

 

ページTOPに戻る

あなたが最近チェックしたレポート一覧

  • 最近チェックしたレポートはありません。

お問合は、お電話またはWEBから承ります。お見積もりの作成もお気軽にご相談ください。

webからのお問合せはこちらのフォームから承ります

このレポートへのお問合せ

03-3582-2531

電話お問合せもお気軽に

<無料>メルマガに登録する

 

 

ページTOPに戻る