Light Reading
The technical and strategic considerations for securing today's mobile networks are legion.

Security in a 4G, M2M World

Ray Le Maistre
5/23/2014
100%
0%

One of the main takeaways from the Mobile Network Security Strategies event that Light Reading just hosted in London was the dizzying array of issues that communications network security managers now have to consider.

With Heavy Reading senior analyst and mobile network security specialist Patrick Donegan to guide them, speaker after speaker provided insights into the various challenges now facing wireless network operators as they build out their all-IP 4G LTE networks, and also advised how to identify and mitigate the various threats.

New ways of thinking are also required. In a recorded video keynote presentation, AT&T Inc. (NYSE: T) Chief Security Officer Ed Amoroso noted that the world has moved on from the construction of "perimeter" security defenses designed to stop external threats entering through a defined network edge.

Those perimeters no longer exist: there is no outside and inside -- every connected device is a de facto extension of the network. In addition, every smartphone app is capable of damaging network integrity. And just wait until machine-to-machine (M2M) really takes off and the Internet of Things (IoT) becomes a reality…

Check out the various insights into this increasingly important topic, including a video interview with EE 's director of technical security Peter Erceg, at our special Industry Show News site.

— Ray Le Maistre, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profile, Editor-in-Chief, Light Reading

(7)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
FakeMitchWagner
50%
50%
FakeMitchWagner,
User Rank: Lightning
5/29/2014 | 1:56:36 PM
Re: M2M Security
I don't see how a smart refrigerator could poison a person. It could switch itself off to make food go bad, but that's a relatively minor concern.

Self-driving cars are a huge security threat. Load one up with explosives and it's a land-based drone. 

Security needs to be built into the design of M2M systems. Too often digital security is reactive. Vendors put out products and then start thinking about security after they've been attacked. 
SachinEE
50%
50%
SachinEE,
User Rank: Light Sabre
5/28/2014 | 12:04:38 PM
Re: M2M Security
This is an interesting but again a frightening idea. To imagine that living in a 4g M2M world where your enemies could hack into your car to cause an accident or even into your refrigerator to poison you at any time through the Machine to machine technology is an obscenity. I think software developers working on this technology should work on measures to ensure that once this M2M technology sets foot in the market; complaints to do with the integrity and safety of people's private information are completely nailed down.
FakeMitchWagner
50%
50%
FakeMitchWagner,
User Rank: Lightning
5/27/2014 | 1:56:44 PM
Re: M2M Security
Kq4ym - It seems we worry about security only after technology has been deployed. Example #1: The Internet.
FakeMitchWagner
50%
50%
FakeMitchWagner,
User Rank: Lightning
5/27/2014 | 1:55:27 PM
Re: M2M Security
I'm imaging an attacker taking control of a flock of drones and setting a swarm of them on a target. A physical kind of denial of service attack.
kq4ym
50%
50%
kq4ym,
User Rank: Light Sabre
5/26/2014 | 6:07:08 PM
Re: M2M Security
The security issue may not be a current worry now, but as M2M is more widely employed the threat issue is certainly going to be a big one. And we though we were in trouble with viruses on our laptop, wait til our refrigerator gets attacked!
DanJones
50%
50%
DanJones,
User Rank: Blogger
5/23/2014 | 4:45:45 PM
Re: M2M Security
Yes, it is apparently possible to utilize these tiny devices for DDOS attacks too. Lot more thought needs to go into M2M security.
FakeMitchWagner
50%
50%
FakeMitchWagner,
User Rank: Lightning
5/23/2014 | 1:58:06 PM
M2M Security
Security threats are heightened dramatically in an M2M world. Imagine the havoc an attacker could wreak by gaining control of a driverless car or somebody's artificial kidney. 
More Blogs from Shades of Ray
The 'Ice Bucket Challenge' has been sweeping the world -- so who in the telecom sector has done it?
Not taking Iliad's bid for T-Mobile US seriously? Think again.
Experienced telecom editor Jason Meyers has joined the Light Reading team to focus on some of the hottest emerging sectors in the industry.
Can service providers afford to neglect small businesses in a FTTx, 4G world?
The open source NFV platform meeting in the Valley this week highlights some of the key shifts ongoing in telecom.
Flash Poll
LRTV Huawei Video Resource Center
The Inaugural Optical Innovation Forum in Nice

9|2|14   |     |   (0) comments


More than 170 attendees from network operators, service providers, analyst firms, and component companies from around the world convened in Nice in June for the inaugural Optical Innovation Forum, co-produced by Huawei and Light Reading.
Wagner’s Ring
Data Centers Drive Telcos Into the Future

8|28|14   |   2:20   |   (2) comments


Data centers are at the heart of key trends driving telecom -- network virtualization, the drive for increased agility, and the need to compete with OTT providers.
LRTV Custom TV
Why SPs Should Consider Cisco's EPN

8|27|14   |   5:40   |   (0) comments


Sultan Dawood from Cisco discusses Cisco's EPN, which enables SPs to build agile and programmable networks delivering new network virtualized services using Cisco's Evolved Services Platform (ESP).
LRTV Huawei Video Resource Center
Huawei’s Showcase @ Big Telecom Event 2014

8|26|14   |   2.56   |   (0) comments


SoftCOM is Huawei's framework for telecom business and network transformation. Haofei Liu, Solution Marketing Manager, Carrier Business Group, Huawei, showcases Huawei's SoftCOM architecture in this video.
LRTV Huawei Video Resource Center
Huawei @ BTE 2014: Director of Integrated Solutions on SoftCOM & NFV Monetization

8|26|14   |   4.43   |   (0) comments


Libin Dai, Director of Integrated Solutions, Carrier Business Group, discusses Huawei's SoftCOM and NFV monetization. Huawei believes that NFV monetization should be service-driven rather than network-driven, and that operators should have network transformation, service transformation and a compatible and collaborative ecosystem in place in order to deploy NFV.
LRTV Huawei Video Resource Center
Huawei @ BTE 2014: Director of US NFV Lab on CloudEdge & the Future of NFV

8|26|14   |   4.06   |   (0) comments


Sean Chen, Director of US NFV Lab at Huawei, discusses Huawei's new approach to NFV in open collaboration. Huawei believes that through Proof of Concept tests, it could help operators learn and communicate with the industry more effectively. Sean believes that successful implementation of NFV should have its values reaching to end users and discusses how Huawei's ...
LRTV Huawei Video Resource Center
Huawei's Highlights @ Big Telecom Event 2014

8|26|14   |   3.34   |   (0) comments


At the Big Telecom Event in Chicago Huawei showcases its high-level strategy, the SoftCOM architecture, which helps operators reduce the cost of ownership of their network infrastructure and generate additional revenue in the ICT service environment. Huawei showcases over 30 pilot programs from across the globe, focusing on the industry-leading commercial ...
LRTV Custom TV
VeEX – Live from the Show

8|21|14   |   5:58   |   (0) comments


An overview of VeEX Test and Measurement solutions including TX300S multi-service test set with VeExpress cloud-based management system, UX400 universal modular platform supporting 100G testing, and the redesigned RXT modular platform.
LRTV Custom TV
Transitioning CE 2.0 Networks Into the SDN & NFV Era With Telco Systems

8|19|14   |   5:19   |   (0) comments


Telco Systems' Ariel Efrati (CEO) and Moshe Shimon (VP of Product Management) discuss virtualization and how the company's new Open Metro Edge solution utilizes the SDN and NFV concepts to accelerate and orchestrate service delivery through its innovative product portfolio and software applications.
LRTV Custom TV
NFV Myths: Is NFV Still Several Years Away?

8|11|14   |   1:13   |   (0) comments


Some say that NFV (network functions virtualization) is still several years away from being implemented on mobile operator networks. This isn't the case. Operators can get started on their paths to NFV now, as this short video from Skyfire shows.
LRTV Custom TV
A New Security Paradigm in SDN/NFV

7|28|14   |   02:54   |   (0) comments


Paul Shaneck, Global Director Network Solutions for Symantec, discusses the evolving virtualized network, explaining how Symantec is leading the security discussion as it relates to SDN and NFV, and helping to ensure the network is protected and compliant.
LRTV Documentaries
Sprint's Network Evolution

7|24|14   |   14:59   |   (0) comments


Sprint's Jay Bluhm gives a keynote speech at the Big Telecom Event (BTE) about Sprint's network and services evolution strategy, including Spark.
Upcoming Live Events!!
September 16, 2014, Santa Clara, CA
September 16, 2014, Santa Clara, CA
September 23, 2014, Denver, CO
October 29, 2014, New York City
November 6, 2014, Santa Clara
November 11, 2014, Atlanta, GA
December 2, 2014, New York City
December 9-10, 2014, Reykjavik, Iceland
June 9-10, 2015, Chicago, IL
Infographics
A survey conducted by Vasona Networks suggests that 72% of mobile users expect good performance all the time, and they'll blame the network operator when it's not up to par.
Today's Cartoon
Hot Topics
Nokia's Maps Land on Samsung Devices
Sarah Reedy, Senior Editor, 8/29/2014
Now Google Planning Drones-to-Go
Dan Jones, Mobile Editor, 8/29/2014
Music to My Mobile
Sarah Reedy, Senior Editor, 8/28/2014
Be Open to the Freedom of Openness
Kelly Herrell, 8/29/2014
Netflix to FCC: Kill Comcast-TWC Deal
Alan Breznick, Cable/Video Practice Leader, 8/28/2014
Like Us on Facebook
Twitter Feed