Welcome!

News Feed Item

Stoke Publishes LTE Security Architecture Defining the Five Key Areas of Vulnerability at EPC Interfaces

New Framework and Infographic Provides Overview of LTE Threat Surface to Help Mobile Broadband Operators Implement Effective Security Structures

SANTA CLARA, CA -- (Marketwired) -- 07/02/14 -- To assist mobile broadband operators in designing secure LTE networks, Stoke has developed the industry's first LTE security framework. This strategic tool provides an overview of the entire LTE infrastructure threat surface, providing a reference point for LTE security design teams that will assist in identifying the appropriate solutions to place at the five key points of vulnerability in LTE networks.

Security is an acknowledged priority in LTE networks, but selecting the most appropriate technology is challenging since multiple, different security and protection solutions are needed to address the specific vulnerabilities of each particular EPC interface: core to Internet security, radio access network (RAN) to core security, device and application security, IMS security and Policy and Charging Control protection. In conjunction with the framework, Stoke has also published an infographic, 'The Top 5 LTE Protection Domains', detailing the key threats and protection requirements of LTE security. The infographic can be downloaded here.

In a recent poll of LTE operators(1), 53% of respondents indicated that core-to-Internet security and RAN-to-Core Security were their biggest pain points. This supports data showing that 25% of mobile operators have already seen a distributed denial of service attack targeting their subscribers, RAN, backhaul or packet core.(2) Industry estimates of an increase in small cell deployments to 60million or more(3) by 2016 suggest that the potential for malicious attack through these less-protected network elements will rise significantly in the near future.

Currently, no all-inclusive guide exists to the points at which LTE traffic requires protection, or the protective measures appropriate for each location. The concepts for securing LTE networks have been addressed theoretically by numerous industry working groups and standards committees, but there are few comprehensive illustrations of how to implement those security requirements in practice.

"Our aim is to help network designers by bringing standards body and other industry guidelines into clearer, practical perspective and support a more consistent development of LTE security strategies," said Dilip Pillaipakam, Vice President of Product Management and Marketing at Stoke. "All security is not created equal, and expensive mistakes have already been made where EPC security measures have not been mapped to the specific traffic types, performance needs and potential risks at each point of vulnerability."

Moreover, since developing an overall network security strategy requires cross-functional overlap, our framework will also help create alignment about which elements need to be secured, where and how."

Stoke's framework builds on the foundations of the industry bodies including 3GPP, NGMN and ETSI. In its associated white paper, 'LTE Security Concepts and Design Considerations,' Stoke also details the risks and potential mitigation strategies associated with different security domains.
The company identifies the five security domains of LTE networks as:
1) Device and application security
2) RAN-Core Border (the junction of the radio access network with the EPC or S1 link)
3) Policy and Charging Control (interface of EPC with visited LTE network)
4) Internet Border
5) IMS core

Stoke's security solution protects traffic and enhances performance at the RAN-Core border. Its technology establishes and manages secure IPsec connections between the evolved packet core (EPC) and eNodeBs, including user, control plane and management plane traffic. More information about the LTE security framework is available at www.stoke.com.

About Stoke
Stoke provides solutions for the mobile border, securing LTE communications between the radio access network and the operator core, protecting subscribers while safeguarding critical mobile core infrastructure. Our products have been selected by the world's leading mobile network operators for technical excellence and quality, and we partner with leading industry equipment providers and systems integrators to ensure ongoing success and innovation. Stoke is the global market leader in deployed LTE Security Gateways with offices in the US, UK, France, Spain, Japan, Korea and Singapore. For more information, visit www.stoke.com.

(1) Heavy Reading
(2) Arbor Networks
(3) Small Cell Forum

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2630550

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
SaaS companies can greatly expand revenue potential by pushing beyond their own borders. The challenge is how to do this without degrading service quality. In his session at 18th Cloud Expo, Adam Rogers, Managing Director at Anexia, discussed how IaaS providers with a global presence and both virtual and dedicated infrastructure can help companies expand their service footprint with low “go-to-market” costs.
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, discussed using predictive analytics to mon...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...