Click here to close now.


News Feed Item

Stoke Publishes LTE Security Architecture Defining the Five Key Areas of Vulnerability at EPC Interfaces

New Framework and Infographic Provides Overview of LTE Threat Surface to Help Mobile Broadband Operators Implement Effective Security Structures

SANTA CLARA, CA -- (Marketwired) -- 07/02/14 -- To assist mobile broadband operators in designing secure LTE networks, Stoke has developed the industry's first LTE security framework. This strategic tool provides an overview of the entire LTE infrastructure threat surface, providing a reference point for LTE security design teams that will assist in identifying the appropriate solutions to place at the five key points of vulnerability in LTE networks.

Security is an acknowledged priority in LTE networks, but selecting the most appropriate technology is challenging since multiple, different security and protection solutions are needed to address the specific vulnerabilities of each particular EPC interface: core to Internet security, radio access network (RAN) to core security, device and application security, IMS security and Policy and Charging Control protection. In conjunction with the framework, Stoke has also published an infographic, 'The Top 5 LTE Protection Domains', detailing the key threats and protection requirements of LTE security. The infographic can be downloaded here.

In a recent poll of LTE operators(1), 53% of respondents indicated that core-to-Internet security and RAN-to-Core Security were their biggest pain points. This supports data showing that 25% of mobile operators have already seen a distributed denial of service attack targeting their subscribers, RAN, backhaul or packet core.(2) Industry estimates of an increase in small cell deployments to 60million or more(3) by 2016 suggest that the potential for malicious attack through these less-protected network elements will rise significantly in the near future.

Currently, no all-inclusive guide exists to the points at which LTE traffic requires protection, or the protective measures appropriate for each location. The concepts for securing LTE networks have been addressed theoretically by numerous industry working groups and standards committees, but there are few comprehensive illustrations of how to implement those security requirements in practice.

"Our aim is to help network designers by bringing standards body and other industry guidelines into clearer, practical perspective and support a more consistent development of LTE security strategies," said Dilip Pillaipakam, Vice President of Product Management and Marketing at Stoke. "All security is not created equal, and expensive mistakes have already been made where EPC security measures have not been mapped to the specific traffic types, performance needs and potential risks at each point of vulnerability."

Moreover, since developing an overall network security strategy requires cross-functional overlap, our framework will also help create alignment about which elements need to be secured, where and how."

Stoke's framework builds on the foundations of the industry bodies including 3GPP, NGMN and ETSI. In its associated white paper, 'LTE Security Concepts and Design Considerations,' Stoke also details the risks and potential mitigation strategies associated with different security domains.
The company identifies the five security domains of LTE networks as:
1) Device and application security
2) RAN-Core Border (the junction of the radio access network with the EPC or S1 link)
3) Policy and Charging Control (interface of EPC with visited LTE network)
4) Internet Border
5) IMS core

Stoke's security solution protects traffic and enhances performance at the RAN-Core border. Its technology establishes and manages secure IPsec connections between the evolved packet core (EPC) and eNodeBs, including user, control plane and management plane traffic. More information about the LTE security framework is available at

About Stoke
Stoke provides solutions for the mobile border, securing LTE communications between the radio access network and the operator core, protecting subscribers while safeguarding critical mobile core infrastructure. Our products have been selected by the world's leading mobile network operators for technical excellence and quality, and we partner with leading industry equipment providers and systems integrators to ensure ongoing success and innovation. Stoke is the global market leader in deployed LTE Security Gateways with offices in the US, UK, France, Spain, Japan, Korea and Singapore. For more information, visit

(1) Heavy Reading
(2) Arbor Networks
(3) Small Cell Forum

Image Available:

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, will review the current landscape of...
SYS-CON Events announced today the Containers & Microservices Bootcamp, being held November 3-4, 2015, in conjunction with 17th Cloud Expo, @ThingsExpo, and @DevOpsSummit at the Santa Clara Convention Center in Santa Clara, CA. This is your chance to get started with the latest technology in the industry. Combined with real-world scenarios and use cases, the Containers and Microservices Bootcamp, led by Janakiram MSV, a Microsoft Regional Director, will include presentations as well as hands-on...
As more intelligent IoT applications shift into gear, they’re merging into the ever-increasing traffic flow of the Internet. It won’t be long before we experience bottlenecks, as IoT traffic peaks during rush hours. Organizations that are unprepared will find themselves by the side of the road unable to cross back into the fast lane. As billions of new devices begin to communicate and exchange data – will your infrastructure be scalable enough to handle this new interconnected world?
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Achim Weiss is Chief Executive Officer and co-founder of ProfitBricks. In 1995, he broke off his studies to co-found the web hosting company "Schlund+Partner." The company "Schlund+Partner" later became the 1&1 web hosting product line. From 1995 to 2008, he was the technical director for several important projects: the largest web hosting platform in the world, the second largest DSL platform, a video on-demand delivery network, the largest eMail backend in Europe, and a universal billing syste...
WebRTC: together these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at WebRTC Summit, Cary Bran, VP of Innovation and New Ventures at Plantronics and PLT Labs, will provide an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it may enable, complement or entirely transform.
As operational failure becomes more acceptable to discuss within the software industry, the necessity for holding constructive, actionable postmortems increases. But most of what we know about postmortems from "pop culture" isn't actually relevant for the software systems we work on and within. In his session at DevOps Summit, J. Paul Reed will look at postmortem pitfalls, techniques, and tools you'll be able to take back to your own environment so they will be able to lay the foundations for h...
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in high-performance, high-efficiency server, storage technology and green computing, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology is a premier provider of advanced server Building Block Solutions® for Data ...
Containers are all the rage among developers and web companies, but they also represent two very substantial benefits to larger organizations. First, they have the potential to dramatically accelerate the application lifecycle from software builds and testing to deployment and upgrades. Second they represent the first truly hybrid-approach to consuming infrastructure, allowing organizations to run the same workloads on any cloud, virtual machine or physical server. Together, they represent a ver...
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, will discuss the impact of technology on identity....
This week, the team assembled in NYC for @Cloud Expo 2015 and @ThingsExpo 2015. For the past four years, this has been a must-attend event for MetraTech. We were happy to once again join industry visionaries, colleagues, customers and even competitors to share and explore the ways in which the Internet of Things (IoT) will impact our industry. Over the course of the show, we discussed the types of challenges we will collectively need to solve to capitalize on the opportunity IoT presents.
SYS-CON Events announced today that Spirent Communications, the leader in testing navigation and positioning systems, will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Spirent Communications enables innovations in communications technologies that help connect people. Whether it is service provider, data centers, enterprise IT networks, mobile communications, connected vehicles or the Inte...
WebRTC converts the entire network into a ubiquitous communications cloud thereby connecting anytime, anywhere through any point. In his session at WebRTC Summit,, Mark Castleman, EIR at Bell Labs and Head of Future X Labs, will discuss how the transformational nature of communications is achieved through the democratizing force of WebRTC. WebRTC is doing for voice what HTML did for web content.