SlideShare uma empresa Scribd logo
1 de 29
Baixar para ler offline
Security at the Speed of VoLTE
An Infonetics Research Webinar
Co-produced with Stoke
#VoLTE The Webinar Will Begin Shortly
#VoLTE
Security at the Speed of VoLTE
An Infonetics Research Webinar
Co-produced with Stoke
Today’s  Speakers
3
JoAnne Emery
Event Director
Infonetics Research
(Moderator)
Dilip Pillaipakam
VP Product Management
and Marketing
Stoke
Stéphane Téral
Principal Analyst,
Mobile Infrastructure and
Carrier Economics
Infonetics Research
#VoLTE
Audience Q&A
LTE Use Cases
Agenda
4
LTE Market Trends
4
LTE Pain Points
LTE Security Framework
Sponsor Approach
Conclusions
1
2
3
4
5
6
4
#VoLTE
7
The Mobile World Is Steadily Moving to LTE
So far so good: 6.6 billion people have been enjoying mobile
communications with no major hacking of core networks!
5
© Infonetics: 2G, 3G, LTE Mobile Infrastructure & Subscribers Market Share & Forecasts, February 2014
0.0
0.5
1.0
2012 2013 2014 2015 2016 2017 2018
Billions
LTE Subscribers Worldwide
Voice over LTE Subscribers Are Following Suit
‣ Despite its decline, voice remains a half-trillion-dollar business
that is undeniably moving to IP
• But remember: No one can be trusted on the Internet
6
© Infonetics: Mobile VoIP & Subscribers Worldwide & Regional Market Size & Forecasts, June 2013
0
160
0.0
1.5
3.0
2012 2013 2014 2015 2016 2017
SubscribersinMillions
RevenueinUS$Billions
Global VoLTE Subscribers and Revenue
VoLTE Revenue VoLTE Subscribers
Flat IP Architecture Is Vulnerable
‣ The direct route from eNodeBs (eNBs) to the evolved packet core
(EPC) opens the door for denial of service (DoS) attacks and
interception of user communications
‣ Accidental or deliberate DoS attacks against customers remain the
most common security threat
7
Source: Arbor Networks, Inc.; Worldwide Infrastructure Security Report Volume IX (3Q2013)
The LTE Security Framework
8
S9
S1-C
Internet
S1-U
S5/S8
S6A
SGi
Gx
Gz/Gy
Other LTE
Network
S11
RAN-Core
Border
IMS Core
SEG
Webinar Focus: RAN-Core (S1) Protection
CSCF
Internet
Border
Policy/ Charging
Control
Device and
Application
MME
SGW
LTE Security at the S1 Link – Emerging Trends
9
Challenge Requirements
Stronger Security
• 2048 bit key length
• PKI
Signaling Protection
• Protect core from exponential
rise in transactions
VoLTE Rollout
• Low latency transport
• Sub-1 second recovery
New Threat Vectors
• S1 protocol/state validation
• SCTP filtering
Audience Q&A
LTE Use Cases
Agenda
10
LTE Market Trends
4
LTE Pain Points
LTE Security Framework
Sponsor Approach
Conclusions
1
2
3
4
5
6
10
#VoLTE
7
How Secure Is Your Network?
1111
“They  had reason to think, insiders said, that their
private, internal networks were safe from prying eyes.”
“Simply  having a ‘private’  line doesn't mean that
you're not actually on a party line with the NSA.”
Caught in the Storm
121212
Common themes
“Unforeseen…”
“Widespread”…
“Costly  to  repair…”…
…
Unique RAN – Core Challenges
131313
‣ Unsecured backhaul
‣ Rapidly increasing throughput
‣ High tunnel density
‣ Ultra-low latency
‣ Directly impacts subscriber QoE
MME
SGW
Office
Home
Outdoor
Metrocell
Small
Cells
4G LTE
EPC
MME
SGW
EPC
E2E Latency Budget = 100 ms
VoLTE:
Low Latency
Small Packets
Impact of IPsec and Smaller Packets
141414
0%
20%
40%
60%
80%
100%
1518 1460 1280 1024 768 512 384 256 128 96
Throughput:%ofLineRate
Packet Size (Bytes)
512
Bytes
Loss of
Capacity
%ofTotalPackets
%EncryptedThroughput
IPsec
Small
Packets
Increased
Latency
Source: Stoke analysis of cumulative packet size distribution
Audience Q&A
LTE Use Cases
Agenda
15
LTE Market Trends
4
LTE Pain Points
LTE Security Framework
Sponsor Approach
Conclusions
1
2
3
4
5
6
15
#VoLTE
7
The LTE Security Framework
16
S9
S1-C
Internet
S1-U S5/S8
S6A
Gx
Gz/Gy
Other LTE
Network
S11
RAN-Core
Border
SEG
The border between RAN and Core (S1) requires protection
against specific risks to critical infrastructure at that interface
New Protection Functions
- Control + user plane visibility
- RAN awareness
- Deeper EPC protection
DRA
SBC
IMS
Core
SGW
MME
CSCF
Internet Border
Policy / Charging
Control
SGi
Audience Q&A
LTE Use Cases
Agenda
17
LTE Market Trends
4
LTE Pain Points
LTE Security Framework
Sponsor Approach
Conclusions
1
2
3
4
5
6
17
#VoLTE
7
Use Case: Security During Rapid Growth
and Unpredictability
181818
1.1
19.0
41.0
1Q11 2Q11 3Q11 4Q11 1Q12 3Q12 4Q12 2Q13 3Q13 4Q13 2014 2015
‣ Rapid 9-month
expansion
• 0–5k base stations
• 1 million subscribers
‣ Keep up with
demand
• 20x subscriber
increase
• Increased usage
‣ Maintain competitive
edge
• Add VoLTE
• Increase speed
New
Devices
New
Apps
Operator Objective:
Security + High Throughput + Low Latency
New
Services
Subscribers (M)
Source: Asian operator network fact book, press releases, and annual reports
Office
Home
Outdoor
Metrocell
Small
Cells
Use Case: Signaling Overload
‣ Signaling Overload Threats
• Application initiated
• Compromised eNodeBs
• Natural disasters
‣ Prioritized Traffic
• Already connected subscribers
• Specific eNodeBs
SGW
4G LTE
EPCMillions of
Service
Requests
MME
Application
Update
Server
QoE: Prioritize
19
Use Case: Small Cell Security
‣ Unsophisticated home owners
‣ Unsecured locations
‣ Much higher tunnel density
‣ Higher throughput per tunnel
MME
SGW
Office
Home
Small
Cells
4G LTE
EPC
100,000s Tunnels
Millions of
Tunnels
20
Audience Q&A
LTE Use Cases
Agenda
21
LTE Market Trends
4
LTE Pain Points
LTE Security Framework
Sponsor Approach
Conclusions
1
2
3
4
5
6
21
#VoLTE
7
Stoke Security eXchange™
222222
MME
SGW
Office
Home
Outdoor
Metrocell
Small
Cells
4G LTE
EPC
Stoke Security eXchange
• 30 Micro seconds or less
• 0.03% of latency budget
E2E VoLTE Latency Budget = 100 ms
Stoke Industry Insight: Charting the Signaling Storms
Stoke Security eXchange™
232323
VoLTE:
Small Packets
Stoke maintains encrypted performance
with the smallest packet sizes
Stoke Industry Insight: Charting the Signaling Storms
Calming the Storm
24
MME
SGW
Office
Home
Outdoor
Metrocell
Small
Cells
4G LTE
EPC
MBA
Stoke Mobile Border Agent
S1 Policing and Metering
MME
MBA
MME
SGW
EPC
MBA
Audience Q&A
LTE Use Cases
Agenda
25
LTE Market Trends
4
LTE Pain Points
LTE Security Framework
Sponsor Approach
Conclusions
1
2
3
4
5
6
25
#VoLTE
7
In Summary
‣ Network security is of increasing importance and even
so-called  “private”  networks  are  at  risk
‣ VoLTE offers new, unique challenges to operators
‣ Signaling storms have already caused costly outages
‣ Carriers need a dedicated security element to secure the
RAN and protect the EPC
26
Audience Q&A
LTE Use Cases
Agenda
27
LTE Market Trends
4
LTE Pain Points
LTE Security Framework
Sponsor Approach
Conclusions
1
2
3
4
5
6
27
#VoLTE
7
Audience Q&A
28
JoAnne Emery
Event Director
joanne@infonetics.com
Infonetics Research
(Moderator)
Dilip Pillaipakam
VP Product Management
and Marketing
dpillaipakam@stoke.com
Stoke
Stéphane Téral
Principal Analyst,
Mobile Infrastructure and
Carrier Economics
stephane@infonetics.com
Infonetics Research
#VoLTE
Thank You
This webcast will be available on-demand for 90 days
For additional Infonetics events, visit
https://www.infonetics.com/infonetics-events/
#VoLTE

Mais conteúdo relacionado

Mais procurados

Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTAlcatel-Lucent Enterprise
 
Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...AllSeen Alliance
 
Mobile interoperability and business productivity
Mobile interoperability and business productivityMobile interoperability and business productivity
Mobile interoperability and business productivityAllSeen Alliance
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveChuck Petras
 
IoT Platform Meetup - Sigfox
IoT Platform Meetup - SigfoxIoT Platform Meetup - Sigfox
IoT Platform Meetup - SigfoxFilip Kolář
 
Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...
Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...
Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...mfrancis
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsAlan Percy
 
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial 053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial voracle
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Alan Percy
 
Is Visibility The Next Big Thing V3
Is Visibility The Next Big Thing   V3Is Visibility The Next Big Thing   V3
Is Visibility The Next Big Thing V3Jeffrey Irland
 
Designing For Interoperability in Mobile
Designing For Interoperability in MobileDesigning For Interoperability in Mobile
Designing For Interoperability in MobileAllSeen Alliance
 
Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...
Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...
Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...mfrancis
 
New Business Opportunities created by the IoT Explosion - WebRTCSummit - San...
New Business Opportunities created by the IoT Explosion - WebRTCSummit  - San...New Business Opportunities created by the IoT Explosion - WebRTCSummit  - San...
New Business Opportunities created by the IoT Explosion - WebRTCSummit - San...telestax
 
WiFi; It's Not Just Connectivity
WiFi; It's Not Just ConnectivityWiFi; It's Not Just Connectivity
WiFi; It's Not Just ConnectivityWestbase.io
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Jiunn-Jer Sun
 
Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0Ian Skerrett
 

Mais procurados (20)

Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoT
 
Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...
 
Mobile interoperability and business productivity
Mobile interoperability and business productivityMobile interoperability and business productivity
Mobile interoperability and business productivity
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) Wave
 
IoT Platform Meetup - Sigfox
IoT Platform Meetup - SigfoxIoT Platform Meetup - Sigfox
IoT Platform Meetup - Sigfox
 
Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...
Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...
Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...
 
Zig bee
Zig beeZig bee
Zig bee
 
The Social Home
The Social HomeThe Social Home
The Social Home
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial 053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
053744r00 Zb Mwg 2005 09 11 Zig Bee Alliance Tutorial
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
 
Is Visibility The Next Big Thing V3
Is Visibility The Next Big Thing   V3Is Visibility The Next Big Thing   V3
Is Visibility The Next Big Thing V3
 
Designing For Interoperability in Mobile
Designing For Interoperability in MobileDesigning For Interoperability in Mobile
Designing For Interoperability in Mobile
 
Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...
Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...
Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...
 
MAC Randomization
MAC RandomizationMAC Randomization
MAC Randomization
 
New Business Opportunities created by the IoT Explosion - WebRTCSummit - San...
New Business Opportunities created by the IoT Explosion - WebRTCSummit  - San...New Business Opportunities created by the IoT Explosion - WebRTCSummit  - San...
New Business Opportunities created by the IoT Explosion - WebRTCSummit - San...
 
WiFi; It's Not Just Connectivity
WiFi; It's Not Just ConnectivityWiFi; It's Not Just Connectivity
WiFi; It's Not Just Connectivity
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
Forti wifi
Forti wifiForti wifi
Forti wifi
 
Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0
 

Semelhante a Infonetics and Stoke webinar: Security at the speed of VoLTE

Infonetics white paper: Security at the Speed of VoLTE
Infonetics white paper:  Security at the Speed of VoLTEInfonetics white paper:  Security at the Speed of VoLTE
Infonetics white paper: Security at the Speed of VoLTEMary McEvoy Carroll
 
Small Cell Forum State of the Market Workshop 2016
Small Cell Forum State of the Market Workshop 2016Small Cell Forum State of the Market Workshop 2016
Small Cell Forum State of the Market Workshop 2016Small Cell Forum
 
Security lte environment_cook_zuong
Security lte environment_cook_zuongSecurity lte environment_cook_zuong
Security lte environment_cook_zuongHoanPeterDuongPronou
 
NEDAS DC - November 29, 2016 Presentations
NEDAS DC - November 29, 2016 Presentations NEDAS DC - November 29, 2016 Presentations
NEDAS DC - November 29, 2016 Presentations Ilissa Miller
 
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)Thierry Lestable
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networksinside-BigData.com
 
Operators strategy for supporting the ‘Mobile Data Explosion’
Operators strategy for supporting the ‘Mobile Data Explosion’Operators strategy for supporting the ‘Mobile Data Explosion’
Operators strategy for supporting the ‘Mobile Data Explosion’eXplanoTech
 
Unleash the Power of 5G and Enhance Your SD-WAN Experience
Unleash the Power of 5G and Enhance Your SD-WAN ExperienceUnleash the Power of 5G and Enhance Your SD-WAN Experience
Unleash the Power of 5G and Enhance Your SD-WAN ExperienceMartello Technologies
 
Focused technology choices - Analyst & Journalist Briefing 2014
Focused technology choices - Analyst & Journalist Briefing 2014Focused technology choices - Analyst & Journalist Briefing 2014
Focused technology choices - Analyst & Journalist Briefing 2014Tele2
 
Squire Technologies: Rolling Out A VoLTE Network
Squire Technologies: Rolling Out A VoLTE NetworkSquire Technologies: Rolling Out A VoLTE Network
Squire Technologies: Rolling Out A VoLTE NetworkSquire Technologies
 
Virtualisation: Reaching tipping point?
Virtualisation: Reaching tipping point? Virtualisation: Reaching tipping point?
Virtualisation: Reaching tipping point? Matt Pooley
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsGordon Haff
 
VoLTE from delay to deploy_webinar 7914
VoLTE from delay to deploy_webinar 7914VoLTE from delay to deploy_webinar 7914
VoLTE from delay to deploy_webinar 7914Radisys Corporation
 
Wireless technologies and .11n
Wireless technologies and .11nWireless technologies and .11n
Wireless technologies and .11nswathi b
 
New world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter managementNew world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter managementInnovation Assured
 
KPN Innovation Playground webinar 2 sep 2020
KPN Innovation Playground webinar 2 sep 2020 KPN Innovation Playground webinar 2 sep 2020
KPN Innovation Playground webinar 2 sep 2020 Fabian van Prooijen
 
Radisys & Airspan - Small Cells and LTE-A Webinar Presentation
Radisys & Airspan -  Small Cells and LTE-A Webinar PresentationRadisys & Airspan -  Small Cells and LTE-A Webinar Presentation
Radisys & Airspan - Small Cells and LTE-A Webinar PresentationRadisys Corporation
 

Semelhante a Infonetics and Stoke webinar: Security at the speed of VoLTE (20)

Infonetics white paper: Security at the Speed of VoLTE
Infonetics white paper:  Security at the Speed of VoLTEInfonetics white paper:  Security at the Speed of VoLTE
Infonetics white paper: Security at the Speed of VoLTE
 
Small Cell Forum State of the Market Workshop 2016
Small Cell Forum State of the Market Workshop 2016Small Cell Forum State of the Market Workshop 2016
Small Cell Forum State of the Market Workshop 2016
 
Security lte environment_cook_zuong
Security lte environment_cook_zuongSecurity lte environment_cook_zuong
Security lte environment_cook_zuong
 
NEDAS DC - November 29, 2016 Presentations
NEDAS DC - November 29, 2016 Presentations NEDAS DC - November 29, 2016 Presentations
NEDAS DC - November 29, 2016 Presentations
 
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)Isep   m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
Isep m2 m - iot - course 1 - update 2013 - 09122013 - part 2 - v(0.5)
 
Vo ip overview
Vo ip overviewVo ip overview
Vo ip overview
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
 
Operators strategy for supporting the ‘Mobile Data Explosion’
Operators strategy for supporting the ‘Mobile Data Explosion’Operators strategy for supporting the ‘Mobile Data Explosion’
Operators strategy for supporting the ‘Mobile Data Explosion’
 
Unleash the Power of 5G and Enhance Your SD-WAN Experience
Unleash the Power of 5G and Enhance Your SD-WAN ExperienceUnleash the Power of 5G and Enhance Your SD-WAN Experience
Unleash the Power of 5G and Enhance Your SD-WAN Experience
 
Focused technology choices - Analyst & Journalist Briefing 2014
Focused technology choices - Analyst & Journalist Briefing 2014Focused technology choices - Analyst & Journalist Briefing 2014
Focused technology choices - Analyst & Journalist Briefing 2014
 
Squire Technologies: Rolling Out A VoLTE Network
Squire Technologies: Rolling Out A VoLTE NetworkSquire Technologies: Rolling Out A VoLTE Network
Squire Technologies: Rolling Out A VoLTE Network
 
Virtualisation: Reaching tipping point?
Virtualisation: Reaching tipping point? Virtualisation: Reaching tipping point?
Virtualisation: Reaching tipping point?
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of Things
 
VoLTE from delay to deploy_webinar 7914
VoLTE from delay to deploy_webinar 7914VoLTE from delay to deploy_webinar 7914
VoLTE from delay to deploy_webinar 7914
 
Wireless technologies and .11n
Wireless technologies and .11nWireless technologies and .11n
Wireless technologies and .11n
 
Wireless technologies
Wireless technologiesWireless technologies
Wireless technologies
 
New world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter managementNew world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter management
 
KPN Innovation Playground webinar 2 sep 2020
KPN Innovation Playground webinar 2 sep 2020 KPN Innovation Playground webinar 2 sep 2020
KPN Innovation Playground webinar 2 sep 2020
 
Radisys & Airspan - Small Cells and LTE-A Webinar Presentation
Radisys & Airspan -  Small Cells and LTE-A Webinar PresentationRadisys & Airspan -  Small Cells and LTE-A Webinar Presentation
Radisys & Airspan - Small Cells and LTE-A Webinar Presentation
 
LTE CONCEPTS.pdf
LTE CONCEPTS.pdfLTE CONCEPTS.pdf
LTE CONCEPTS.pdf
 

Mais de Mary McEvoy Carroll

Hadoop top 20 influencers of 2015
Hadoop top 20 influencers of 2015Hadoop top 20 influencers of 2015
Hadoop top 20 influencers of 2015Mary McEvoy Carroll
 
Machine learning's 2015 top influencers
Machine learning's 2015 top influencersMachine learning's 2015 top influencers
Machine learning's 2015 top influencersMary McEvoy Carroll
 
What is the connected retail environment?
What is the connected retail environment?What is the connected retail environment?
What is the connected retail environment?Mary McEvoy Carroll
 
A guided tour to the internet of things in the sim connected world
A guided tour to the internet of things in the sim connected worldA guided tour to the internet of things in the sim connected world
A guided tour to the internet of things in the sim connected worldMary McEvoy Carroll
 
Connectem VCM powered by VMware - partner brief
Connectem VCM powered by VMware - partner briefConnectem VCM powered by VMware - partner brief
Connectem VCM powered by VMware - partner briefMary McEvoy Carroll
 
Top5 protectiondomains infographic_final
Top5 protectiondomains infographic_finalTop5 protectiondomains infographic_final
Top5 protectiondomains infographic_finalMary McEvoy Carroll
 
Securing the LTE Core: the Road to NFV
Securing the LTE Core:  the Road to NFVSecuring the LTE Core:  the Road to NFV
Securing the LTE Core: the Road to NFVMary McEvoy Carroll
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerationsMary McEvoy Carroll
 
Secure from GO: Design considerations for the integration of security into L...
Secure from GO:  Design considerations for the integration of security into L...Secure from GO:  Design considerations for the integration of security into L...
Secure from GO: Design considerations for the integration of security into L...Mary McEvoy Carroll
 
Secure from go: Stoke Guide to Securing LTE Networks from Day 1
Secure from go:  Stoke Guide to Securing LTE Networks from Day 1Secure from go:  Stoke Guide to Securing LTE Networks from Day 1
Secure from go: Stoke Guide to Securing LTE Networks from Day 1Mary McEvoy Carroll
 

Mais de Mary McEvoy Carroll (14)

Hadoop top 20 influencers of 2015
Hadoop top 20 influencers of 2015Hadoop top 20 influencers of 2015
Hadoop top 20 influencers of 2015
 
Machine learning's 2015 top influencers
Machine learning's 2015 top influencersMachine learning's 2015 top influencers
Machine learning's 2015 top influencers
 
What is the connected retail environment?
What is the connected retail environment?What is the connected retail environment?
What is the connected retail environment?
 
A guided tour to the internet of things in the sim connected world
A guided tour to the internet of things in the sim connected worldA guided tour to the internet of things in the sim connected world
A guided tour to the internet of things in the sim connected world
 
Connectem VCM powered by VMware - partner brief
Connectem VCM powered by VMware - partner briefConnectem VCM powered by VMware - partner brief
Connectem VCM powered by VMware - partner brief
 
Latency considerations in_lte
Latency considerations in_lteLatency considerations in_lte
Latency considerations in_lte
 
Securing the shared network
Securing the shared networkSecuring the shared network
Securing the shared network
 
Top5 protectiondomains infographic_final
Top5 protectiondomains infographic_finalTop5 protectiondomains infographic_final
Top5 protectiondomains infographic_final
 
Sec conf london_v07
Sec conf london_v07Sec conf london_v07
Sec conf london_v07
 
Securing the LTE Core: the Road to NFV
Securing the LTE Core:  the Road to NFVSecuring the LTE Core:  the Road to NFV
Securing the LTE Core: the Road to NFV
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerations
 
Secure from GO: Design considerations for the integration of security into L...
Secure from GO:  Design considerations for the integration of security into L...Secure from GO:  Design considerations for the integration of security into L...
Secure from GO: Design considerations for the integration of security into L...
 
Secure from go: Stoke Guide to Securing LTE Networks from Day 1
Secure from go:  Stoke Guide to Securing LTE Networks from Day 1Secure from go:  Stoke Guide to Securing LTE Networks from Day 1
Secure from go: Stoke Guide to Securing LTE Networks from Day 1
 
Lte transport requirements
Lte transport requirementsLte transport requirements
Lte transport requirements
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Infonetics and Stoke webinar: Security at the speed of VoLTE

  • 1. Security at the Speed of VoLTE An Infonetics Research Webinar Co-produced with Stoke #VoLTE The Webinar Will Begin Shortly
  • 2. #VoLTE Security at the Speed of VoLTE An Infonetics Research Webinar Co-produced with Stoke
  • 3. Today’s  Speakers 3 JoAnne Emery Event Director Infonetics Research (Moderator) Dilip Pillaipakam VP Product Management and Marketing Stoke Stéphane Téral Principal Analyst, Mobile Infrastructure and Carrier Economics Infonetics Research #VoLTE
  • 4. Audience Q&A LTE Use Cases Agenda 4 LTE Market Trends 4 LTE Pain Points LTE Security Framework Sponsor Approach Conclusions 1 2 3 4 5 6 4 #VoLTE 7
  • 5. The Mobile World Is Steadily Moving to LTE So far so good: 6.6 billion people have been enjoying mobile communications with no major hacking of core networks! 5 © Infonetics: 2G, 3G, LTE Mobile Infrastructure & Subscribers Market Share & Forecasts, February 2014 0.0 0.5 1.0 2012 2013 2014 2015 2016 2017 2018 Billions LTE Subscribers Worldwide
  • 6. Voice over LTE Subscribers Are Following Suit ‣ Despite its decline, voice remains a half-trillion-dollar business that is undeniably moving to IP • But remember: No one can be trusted on the Internet 6 © Infonetics: Mobile VoIP & Subscribers Worldwide & Regional Market Size & Forecasts, June 2013 0 160 0.0 1.5 3.0 2012 2013 2014 2015 2016 2017 SubscribersinMillions RevenueinUS$Billions Global VoLTE Subscribers and Revenue VoLTE Revenue VoLTE Subscribers
  • 7. Flat IP Architecture Is Vulnerable ‣ The direct route from eNodeBs (eNBs) to the evolved packet core (EPC) opens the door for denial of service (DoS) attacks and interception of user communications ‣ Accidental or deliberate DoS attacks against customers remain the most common security threat 7 Source: Arbor Networks, Inc.; Worldwide Infrastructure Security Report Volume IX (3Q2013)
  • 8. The LTE Security Framework 8 S9 S1-C Internet S1-U S5/S8 S6A SGi Gx Gz/Gy Other LTE Network S11 RAN-Core Border IMS Core SEG Webinar Focus: RAN-Core (S1) Protection CSCF Internet Border Policy/ Charging Control Device and Application MME SGW
  • 9. LTE Security at the S1 Link – Emerging Trends 9 Challenge Requirements Stronger Security • 2048 bit key length • PKI Signaling Protection • Protect core from exponential rise in transactions VoLTE Rollout • Low latency transport • Sub-1 second recovery New Threat Vectors • S1 protocol/state validation • SCTP filtering
  • 10. Audience Q&A LTE Use Cases Agenda 10 LTE Market Trends 4 LTE Pain Points LTE Security Framework Sponsor Approach Conclusions 1 2 3 4 5 6 10 #VoLTE 7
  • 11. How Secure Is Your Network? 1111 “They  had reason to think, insiders said, that their private, internal networks were safe from prying eyes.” “Simply  having a ‘private’  line doesn't mean that you're not actually on a party line with the NSA.”
  • 12. Caught in the Storm 121212 Common themes “Unforeseen…” “Widespread”… “Costly  to  repair…”… …
  • 13. Unique RAN – Core Challenges 131313 ‣ Unsecured backhaul ‣ Rapidly increasing throughput ‣ High tunnel density ‣ Ultra-low latency ‣ Directly impacts subscriber QoE MME SGW Office Home Outdoor Metrocell Small Cells 4G LTE EPC MME SGW EPC E2E Latency Budget = 100 ms VoLTE: Low Latency Small Packets
  • 14. Impact of IPsec and Smaller Packets 141414 0% 20% 40% 60% 80% 100% 1518 1460 1280 1024 768 512 384 256 128 96 Throughput:%ofLineRate Packet Size (Bytes) 512 Bytes Loss of Capacity %ofTotalPackets %EncryptedThroughput IPsec Small Packets Increased Latency Source: Stoke analysis of cumulative packet size distribution
  • 15. Audience Q&A LTE Use Cases Agenda 15 LTE Market Trends 4 LTE Pain Points LTE Security Framework Sponsor Approach Conclusions 1 2 3 4 5 6 15 #VoLTE 7
  • 16. The LTE Security Framework 16 S9 S1-C Internet S1-U S5/S8 S6A Gx Gz/Gy Other LTE Network S11 RAN-Core Border SEG The border between RAN and Core (S1) requires protection against specific risks to critical infrastructure at that interface New Protection Functions - Control + user plane visibility - RAN awareness - Deeper EPC protection DRA SBC IMS Core SGW MME CSCF Internet Border Policy / Charging Control SGi
  • 17. Audience Q&A LTE Use Cases Agenda 17 LTE Market Trends 4 LTE Pain Points LTE Security Framework Sponsor Approach Conclusions 1 2 3 4 5 6 17 #VoLTE 7
  • 18. Use Case: Security During Rapid Growth and Unpredictability 181818 1.1 19.0 41.0 1Q11 2Q11 3Q11 4Q11 1Q12 3Q12 4Q12 2Q13 3Q13 4Q13 2014 2015 ‣ Rapid 9-month expansion • 0–5k base stations • 1 million subscribers ‣ Keep up with demand • 20x subscriber increase • Increased usage ‣ Maintain competitive edge • Add VoLTE • Increase speed New Devices New Apps Operator Objective: Security + High Throughput + Low Latency New Services Subscribers (M) Source: Asian operator network fact book, press releases, and annual reports
  • 19. Office Home Outdoor Metrocell Small Cells Use Case: Signaling Overload ‣ Signaling Overload Threats • Application initiated • Compromised eNodeBs • Natural disasters ‣ Prioritized Traffic • Already connected subscribers • Specific eNodeBs SGW 4G LTE EPCMillions of Service Requests MME Application Update Server QoE: Prioritize 19
  • 20. Use Case: Small Cell Security ‣ Unsophisticated home owners ‣ Unsecured locations ‣ Much higher tunnel density ‣ Higher throughput per tunnel MME SGW Office Home Small Cells 4G LTE EPC 100,000s Tunnels Millions of Tunnels 20
  • 21. Audience Q&A LTE Use Cases Agenda 21 LTE Market Trends 4 LTE Pain Points LTE Security Framework Sponsor Approach Conclusions 1 2 3 4 5 6 21 #VoLTE 7
  • 22. Stoke Security eXchange™ 222222 MME SGW Office Home Outdoor Metrocell Small Cells 4G LTE EPC Stoke Security eXchange • 30 Micro seconds or less • 0.03% of latency budget E2E VoLTE Latency Budget = 100 ms Stoke Industry Insight: Charting the Signaling Storms
  • 23. Stoke Security eXchange™ 232323 VoLTE: Small Packets Stoke maintains encrypted performance with the smallest packet sizes Stoke Industry Insight: Charting the Signaling Storms
  • 24. Calming the Storm 24 MME SGW Office Home Outdoor Metrocell Small Cells 4G LTE EPC MBA Stoke Mobile Border Agent S1 Policing and Metering MME MBA MME SGW EPC MBA
  • 25. Audience Q&A LTE Use Cases Agenda 25 LTE Market Trends 4 LTE Pain Points LTE Security Framework Sponsor Approach Conclusions 1 2 3 4 5 6 25 #VoLTE 7
  • 26. In Summary ‣ Network security is of increasing importance and even so-called  “private”  networks  are  at  risk ‣ VoLTE offers new, unique challenges to operators ‣ Signaling storms have already caused costly outages ‣ Carriers need a dedicated security element to secure the RAN and protect the EPC 26
  • 27. Audience Q&A LTE Use Cases Agenda 27 LTE Market Trends 4 LTE Pain Points LTE Security Framework Sponsor Approach Conclusions 1 2 3 4 5 6 27 #VoLTE 7
  • 28. Audience Q&A 28 JoAnne Emery Event Director joanne@infonetics.com Infonetics Research (Moderator) Dilip Pillaipakam VP Product Management and Marketing dpillaipakam@stoke.com Stoke Stéphane Téral Principal Analyst, Mobile Infrastructure and Carrier Economics stephane@infonetics.com Infonetics Research #VoLTE
  • 29. Thank You This webcast will be available on-demand for 90 days For additional Infonetics events, visit https://www.infonetics.com/infonetics-events/ #VoLTE