The mobile broadband industry’s rapid migration to LTE has opened the door to malicious and non-malicious threats as a result of fundamental vulnerabilities in the all-IP LTE architecture. Consequently, security must be a foundational element of LTE network deployments. As the adoption of IPsec encryption for transporting LTE traffic continues to grow significantly, there is increasing need for a security gateway. This white paper discusses the evolving threat landscape, the economics and performance requirements of security solutions, and the role of the security gateway in LTE networks as subscribers ramp up by the millions every quarter and VoLTE services start to emerge.
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
Infonetics white paper: Security at the Speed of VoLTE
1. I N F O N E T I C S R E S E A R C H W H I T E P A P E R
Security at the Speed of VoLTE
Infonetics Research White Paper
Written by Principal Analyst Stéphane Téral
February 2014
2. i
Contents
Executive Summary 1
The Need for Securing LTE Networks Has Never Been Greater 2
The world is moving to LTE at a fast and unstoppable pace 3
Exhibit 1: Worldwide LTE Subscriptions 3
And voice, still half of total mobile service revenue, is inevitably moving to LTE as well 4
Exhibit 2: Worldwide VoLTE Market Opportunity 4
This Developing LTE World Provides Hackers with a New Eldorado! 5
Exhibit 3: LTE Network Architecture 5
Meanwhile, potential threats to mobile networks are real and fully documented 6
Exhibit 4: Monthly ATLAS Peak Monitored Attack Sizes 6
Consequently, Security Must Be a Foundational Element of LTE Deployments 7
IPsec encryption is the key mechanism. . . 7
. . . but full IPsec introduces new considerations 7
Now IPsec is gaining momentum, setting the stage for security gateway implementations 8
Security Gateways Also Provide High VoLTE Network Performance and QoS Control 8
Focusing on the S1 interface provides the highest benefits 8
An S1-focused security gateway can process tiny VoLTE packets 9
And manage signaling storms 9
Bottom Line 9
About Infonetics Research 10