Welcome!

News Feed Item

Stoke Publishes LTE Security Architecture Defining the Five Key Areas of Vulnerability at EPC Interfaces

New Framework and Infographic Provides Overview of LTE Threat Surface to Help Mobile Broadband Operators Implement Effective Security Structures

SANTA CLARA, CA -- (Marketwired) -- 07/02/14 -- To assist mobile broadband operators in designing secure LTE networks, Stoke has developed the industry's first LTE security framework. This strategic tool provides an overview of the entire LTE infrastructure threat surface, providing a reference point for LTE security design teams that will assist in identifying the appropriate solutions to place at the five key points of vulnerability in LTE networks.

Security is an acknowledged priority in LTE networks, but selecting the most appropriate technology is challenging since multiple, different security and protection solutions are needed to address the specific vulnerabilities of each particular EPC interface: core to Internet security, radio access network (RAN) to core security, device and application security, IMS security and Policy and Charging Control protection. In conjunction with the framework, Stoke has also published an infographic, 'The Top 5 LTE Protection Domains', detailing the key threats and protection requirements of LTE security. The infographic can be downloaded here.

In a recent poll of LTE operators(1), 53% of respondents indicated that core-to-Internet security and RAN-to-Core Security were their biggest pain points. This supports data showing that 25% of mobile operators have already seen a distributed denial of service attack targeting their subscribers, RAN, backhaul or packet core.(2) Industry estimates of an increase in small cell deployments to 60million or more(3) by 2016 suggest that the potential for malicious attack through these less-protected network elements will rise significantly in the near future.

Currently, no all-inclusive guide exists to the points at which LTE traffic requires protection, or the protective measures appropriate for each location. The concepts for securing LTE networks have been addressed theoretically by numerous industry working groups and standards committees, but there are few comprehensive illustrations of how to implement those security requirements in practice.

"Our aim is to help network designers by bringing standards body and other industry guidelines into clearer, practical perspective and support a more consistent development of LTE security strategies," said Dilip Pillaipakam, Vice President of Product Management and Marketing at Stoke. "All security is not created equal, and expensive mistakes have already been made where EPC security measures have not been mapped to the specific traffic types, performance needs and potential risks at each point of vulnerability."

Moreover, since developing an overall network security strategy requires cross-functional overlap, our framework will also help create alignment about which elements need to be secured, where and how."

Stoke's framework builds on the foundations of the industry bodies including 3GPP, NGMN and ETSI. In its associated white paper, 'LTE Security Concepts and Design Considerations,' Stoke also details the risks and potential mitigation strategies associated with different security domains.
The company identifies the five security domains of LTE networks as:
1) Device and application security
2) RAN-Core Border (the junction of the radio access network with the EPC or S1 link)
3) Policy and Charging Control (interface of EPC with visited LTE network)
4) Internet Border
5) IMS core

Stoke's security solution protects traffic and enhances performance at the RAN-Core border. Its technology establishes and manages secure IPsec connections between the evolved packet core (EPC) and eNodeBs, including user, control plane and management plane traffic. More information about the LTE security framework is available at www.stoke.com.

About Stoke
Stoke provides solutions for the mobile border, securing LTE communications between the radio access network and the operator core, protecting subscribers while safeguarding critical mobile core infrastructure. Our products have been selected by the world's leading mobile network operators for technical excellence and quality, and we partner with leading industry equipment providers and systems integrators to ensure ongoing success and innovation. Stoke is the global market leader in deployed LTE Security Gateways with offices in the US, UK, France, Spain, Japan, Korea and Singapore. For more information, visit www.stoke.com.

(1) Heavy Reading
(2) Arbor Networks
(3) Small Cell Forum

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2630550

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...
Every successful software product evolves from an idea to an enterprise system. Notably, the same way is passed by the product owner's company. In his session at 20th Cloud Expo, Oleg Lola, CEO of MobiDev, will provide a generalized overview of the evolution of a software product, the product owner, the needs that arise at various stages of this process, and the value brought by a software development partner to the product owner as a response to these needs.
SYS-CON Events announced today that Cloudistics, an on-premises cloud computing company, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Cloudistics delivers a complete public cloud experience with composable on-premises infrastructures to medium and large enterprises. Its software-defined technology natively converges network, storage, compute, virtualization, and management into a ...
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @ThingsExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
SYS-CON Events announced today that Technologic Systems Inc., an embedded systems solutions company, will exhibit at SYS-CON's @ThingsExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Technologic Systems is an embedded systems company with headquarters in Fountain Hills, Arizona. They have been in business for 32 years, helping more than 8,000 OEM customers and building over a hundred COTS products that have never been discontinued. Technologic Systems’ pr...
While some vendors scramble to create and sell you a fancy solution for monitoring your spanking new Amazon Lambdas, hear how you can do it on the cheap using just built-in Java APIs yourself. By exploiting a little-known fact that Lambdas aren’t exactly single threaded, you can effectively identify hot spots in your serverless code. In his session at 20th Cloud Expo, David Martin, Principal Product Owner at CA Technologies, will give a live demonstration and code walkthrough, showing how to ov...
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend @CloudExpo | @ThingsExpo, June 6-8, 2017, at the Javits Center in New York City, NY and October 31 - November 2, 2017, Santa Clara Convention Center, CA. Learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
Most DevOps journeys involve several phases of maturity. Research shows that the inflection point where organizations begin to see maximum value is when they implement tight integration deploying their code to their infrastructure. Success at this level is the last barrier to at-will deployment. Storage, for instance, is more capable than where we read and write data. In his session at @DevOpsSummit at 20th Cloud Expo, Josh Atwell, a Developer Advocate for NetApp, will discuss the role and value...
SYS-CON Events announced today that Tappest will exhibit MooseFS at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. MooseFS is a breakthrough concept in the storage industry. It allows you to secure stored data with either duplication or erasure coding using any server. The newest – 4.0 version of the software enables users to maintain the redundancy level with even 50% less hard drive space required. The software func...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists will examine how DevOps helps to meet th...
SYS-CON Events announced today that EARP will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. "We are a software house, so we perfectly understand challenges that other software houses face in their projects. We can augment a team, that will work with the same standards and processes as our partners' internal teams. Our teams will deliver the same quality within the required time and budget just as our partn...
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory?
SYS-CON Events announced today that Outscale will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Outscale's technology makes an automated and adaptable Cloud available to businesses, supporting them in the most complex IT projects while controlling their operational aspects. You boost your IT infrastructure's reactivity, with request responses that only take a few seconds.
Most technology leaders, contemporary and from the hardware era, are reshaping their businesses to do software in the hope of capturing value in IoT. Although IoT is relatively new in the market, it has already gone through many promotional terms such as IoE, IoX, SDX, Edge/Fog, Mist Compute, etc. Ultimately, irrespective of the name, it is about deriving value from independent software assets participating in an ecosystem as one comprehensive solution.
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).