Light Reading
The technical and strategic considerations for securing today's mobile networks are legion.

Security in a 4G, M2M World

Ray Le Maistre
5/23/2014
100%
0%

One of the main takeaways from the Mobile Network Security Strategies event that Light Reading just hosted in London was the dizzying array of issues that communications network security managers now have to consider.

With Heavy Reading senior analyst and mobile network security specialist Patrick Donegan to guide them, speaker after speaker provided insights into the various challenges now facing wireless network operators as they build out their all-IP 4G LTE networks, and also advised how to identify and mitigate the various threats.

New ways of thinking are also required. In a recorded video keynote presentation, AT&T Inc. (NYSE: T) Chief Security Officer Ed Amoroso noted that the world has moved on from the construction of "perimeter" security defenses designed to stop external threats entering through a defined network edge.

Those perimeters no longer exist: there is no outside and inside -- every connected device is a de facto extension of the network. In addition, every smartphone app is capable of damaging network integrity. And just wait until machine-to-machine (M2M) really takes off and the Internet of Things (IoT) becomes a reality…

Check out the various insights into this increasingly important topic, including a video interview with EE 's director of technical security Peter Erceg, at our special Industry Show News site.

— Ray Le Maistre, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profile, Editor-in-Chief, Light Reading

(7)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
FakeMitchWagner
50%
50%
FakeMitchWagner,
User Rank: Lightning
5/29/2014 | 1:56:36 PM
Re: M2M Security
I don't see how a smart refrigerator could poison a person. It could switch itself off to make food go bad, but that's a relatively minor concern.

Self-driving cars are a huge security threat. Load one up with explosives and it's a land-based drone. 

Security needs to be built into the design of M2M systems. Too often digital security is reactive. Vendors put out products and then start thinking about security after they've been attacked. 
SachinEE
50%
50%
SachinEE,
User Rank: Light Sabre
5/28/2014 | 12:04:38 PM
Re: M2M Security
This is an interesting but again a frightening idea. To imagine that living in a 4g M2M world where your enemies could hack into your car to cause an accident or even into your refrigerator to poison you at any time through the Machine to machine technology is an obscenity. I think software developers working on this technology should work on measures to ensure that once this M2M technology sets foot in the market; complaints to do with the integrity and safety of people's private information are completely nailed down.
FakeMitchWagner
50%
50%
FakeMitchWagner,
User Rank: Lightning
5/27/2014 | 1:56:44 PM
Re: M2M Security
Kq4ym - It seems we worry about security only after technology has been deployed. Example #1: The Internet.
FakeMitchWagner
50%
50%
FakeMitchWagner,
User Rank: Lightning
5/27/2014 | 1:55:27 PM
Re: M2M Security
I'm imaging an attacker taking control of a flock of drones and setting a swarm of them on a target. A physical kind of denial of service attack.
kq4ym
50%
50%
kq4ym,
User Rank: Light Sabre
5/26/2014 | 6:07:08 PM
Re: M2M Security
The security issue may not be a current worry now, but as M2M is more widely employed the threat issue is certainly going to be a big one. And we though we were in trouble with viruses on our laptop, wait til our refrigerator gets attacked!
DanJones
50%
50%
DanJones,
User Rank: Blogger
5/23/2014 | 4:45:45 PM
Re: M2M Security
Yes, it is apparently possible to utilize these tiny devices for DDOS attacks too. Lot more thought needs to go into M2M security.
FakeMitchWagner
50%
50%
FakeMitchWagner,
User Rank: Lightning
5/23/2014 | 1:58:06 PM
M2M Security
Security threats are heightened dramatically in an M2M world. Imagine the havoc an attacker could wreak by gaining control of a driverless car or somebody's artificial kidney. 
More Blogs from Shades of Ray
Experienced telecom editor Jason Meyers has joined the Light Reading team to focus on some of the hottest emerging sectors in the industry.
Can service providers afford to neglect small businesses in a FTTx, 4G world?
The open source NFV platform meeting in the Valley this week highlights some of the key shifts ongoing in telecom.
Did you see what happened when we mixed booze + balls at this year's Leading Lights awards party?
With 4G just getting into its stride, 5G is already a hot topic. But is it too early? I don't think so.
Flash Poll
LRTV Custom TV
A New Security Paradigm in SDN/NFV

7|28|14   |   02:54   |   (0) comments


Paul Shaneck, Global Director Network Solutions for Symantec, discusses the evolving virtualized network, explaining how Symantec is leading the security discussion as it relates to SDN and NFV, and helping to ensure the network is protected and compliant.
LRTV Documentaries
Sprint's Network Evolution

7|24|14   |   14:59   |   (0) comments


Sprint's Jay Bluhm gives a keynote speech at the Big Telecom Event (BTE) about Sprint's network and services evolution strategy, including Spark.
LRTV Documentaries
BTE Keynote: The Software-Defined Operator

7|24|14   |   18:43   |   (1) comment


Deutsche Telekom's Axel Clauberg explains the concept of the software-defined operator to the Big Telecom Event (BTE) crowd.
Light Reedy
Numbers Are In: LR's 2014 Salary Survey

7|24|14   |   1:25   |   (7) comments


Our fourth annual Salary Survey paints a picture of who's hiring, firing, earning, and yearning for a change in the telecom industry.
LRTV Custom TV
Driving the Network Transformation

7|23|14   |   4:29   |   (0) comments


Intel's Sandra Rivera discusses network transformation and how Intel technologies, programs, and standards body efforts have helped the industry migration to SDN and NFV.
LRTV Custom TV
Distributed NFV-Based Business Services by RAD

7|18|14   |   5:38   |   (0) comments


With the ETSI-approved Distributed NFV PoC running in the background, RAD's CEO, Dror Bin, talks about why D-NFV makes compelling sense for service providers, and about the dollars and cents RAD is putting behind D-NFV.
LRTV Custom TV
MRV – Accelerating Packet Optical Convergence

7|15|14   |   6:06   |   (0) comments


Giving you network insight to make your network smarter.
LRTV Custom TV
NFV-Enabled Ethernet for Generating New Revenues

7|15|14   |   5:49   |   (0) comments


Cyan's Planet Orchestrate allows service providers and their end-customers to activate software-based capabilities such as firewalls and encryption on top of existing Ethernet services in just minutes.
LRTV Custom TV
Symkloud NVF-Ready Video Transcoding, Big Data

7|9|14   |   3:41   |   (0) comments


Kontron and ISV partner Vantrix demonstrate high-performance video transcoding and data analytic solutions on same 2U standard platform that is ready for SDN and NFV deployments made by mobile, cable and cloud operators.
LRTV Huawei Video Resource Center
The Evolving Role of Hybrid Video for Competitive Success

7|4|14   |   4:09   |   (0) comments


At Huawei's Global Analysts Summit in Shenzhen, China, Steven C. Hawley from TV Strategies speaks to us about the evolving role of hybrid video for competitive success.
LRTV Huawei Video Resource Center
How CSPs Leverage Big Data in the Digital Economy

7|4|14   |   4:48   |   (2) comments


Justin van der Lande from Analysys Mason shares with us his views on how telecom operators can leverage customer asset monetization with big data. His discusses the current status of big data applications and the challenges and opportunities for telecom operators in the digital economy era.
LRTV Huawei Video Resource Center
Accelerator for Digital Business – Future Oriented BSS

7|4|14   |   3:08   |   (0) comments


Mobile and internet are becoming intertwined; IT and CT are integrating; and leading CSPs have begun to transform to information service and entertainment providers. How should the BSS system evolve to enable this transformation? Karl Whitelock, an analyst at Frost & Sullivan, shares his views.
Upcoming Live Events!!
September 16, 2014, Santa Clara, CA
September 16, 2014, Santa Clara, CA
October 29, 2014, New York City
November 6, 2014, Santa Clara
November 11, 2014, Atlanta, GA
December 9-10, 2014, Reykjavik, Iceland
June 9-10, 2015, Chicago, IL
Infographics
Packet Design asks network professionals how they handle the cloud, SDN, and network management.
Today's Cartoon
Vacation Special Caption Competition Click Here
Latest Comment
Hot Topics
Is Windstream Boldly Setting a New Trend?
Carol Wilson, Editor-at-large, 7/29/2014
Sprint, T-Mobile: The Price War's On
Sarah Reedy, Senior Editor, 7/30/2014
Pics From Comic-Con -- Honest!
Mitch Wagner, West Coast Bureau Chief, Light Reading, 7/30/2014
If Not Muni Networks, Then What?
Carol Wilson, Editor-at-large, 7/28/2014
Verizon Applies 3G Throttling Policy to LTE
Sarah Reedy, Senior Editor, 7/25/2014
Like Us on Facebook
Twitter Feed