Femtocell and Small Cell Security Image

Femtocell and Small Cell Security

Purchase

The report provides a summary of the small cell system security architecture. Driven by the need for cost effective coverage and capacity solution for the evolving data demand, reliance on small cell solution is increasing both indoors and outdoors. The expected mass deployment of small cells largely relies on the providing secure and lawful operation for the user and the core network.

Small cell system has a distinct set of security requirements due to its locations, openness and backhaul implementation. This report outlines the main vulnerability points in the system. It discusses the various possible threats to users, devices and operator’s core network that arise from jeopardizing small cell system security.

Security measures to counteract such threats are explained as well as different roles of network nodes. The report includes a market overview of the current small cell security solution and concludes with an outlook into small cell technologies development and related security aspects.

Table of Contents

Table of Contents

  • 1. EXECUTIVE SUMMARY
  • 2. INTRODUCTION
    • 2.1. Small Cell Definitions
  • 3. SMALL CELL SYSTEM OVERVIEW
    • 3.1. System Architecture
      • 3.1.1. Small Cell
      • 3.1.2. Security Gateway (SeGW)
      • 3.1.3. Small Cell Gateway
      • 3.1.4. The Small Cell Management System
      • 3.1.5. HLR/HSS and AAA
    • 3.2. Network Vulnerabilities
  • 4. SMALL CELL SECURITY THREATS
    • 4.1. Types of Security Threats
      • 4.1.1. Small Cell Authentication Compromise
      • 4.1.2. Physical Attacks/Tampering with the Device
      • 4.1.3. User Data and Privacy Attacks
      • 4.1.4. Attacks on the Core Network
      • 4.1.5. Denial of Service (DoS)
      • 4.1.6. Protocols and Configuration Attacks
    • 4.2. Real-life Attack Examples
      • 4.2.1. Attack on a Vodafone Femtocell
      • 4.2.2. Attack on SFR Femtocell
      • 4.2.3. Attack on Verizon Femtocell
  • 5. SECURITY THREAT COUNTERMEASURES
    • 5.1. Small Cell System Security Requirements
      • 5.1.1. Small Cell Requirements
      • 5.1.2. Security Gateway Requirements
      • 5.1.3. Backhaul Requirements
      • 5.1.4. Management System Requirements
    • 5.2. Security Architecture
      • 5.2.1. Secure Storage
      • 5.2.2. Device Integrity Check
      • 5.2.3. Mutual Authentication
      • 5.2.4. Location Verification
      • 5.2.5. Access Control
      • 5.2.6. Clock Signaling Protection
  • 6. SOLUTION PROVIDERS OVERVIEW
    • 6.1. Stoke Security eXchange
    • 6.2. Clavister Small Cell Site Security Gateway
    • 6.3. Genband QUANTiX Wireless Access Gateway
    • 6.4. Oracle/Acme Packet Communication Security Gateway
    • 6.5. Cisco ASR 5000 Series Small Cell Gateway
    • 6.6. NEC Single-platform EPC for Outdoor Small Cells
  • 7. CONCLUSION
  • 8. APPENDIX: ACRONYMS

Tables

  1. Global Outdoor Small Cell and Basestation Shipments by Segment, World Market, Forecast: 2013 to 2019
  2. Types of Small Cells, Characteristics
  3. Small Cell Attacks Summary, Threats
  4. ICT CI Security Spending by Sector, World Market, Forecast: 2013 to 2019
  5. Security Gateway Solutions, Detailed Information
  6. Appendix, Acronyms

Charts

  1. Small Cell versus Macrocell Shipments, World Market, Forecast: 2013 to 2019
  2. ICT Security Spending by Sector, World Market, Forecast: 2013 to 2019

Figures

  1. Small Cell Architecture, Block Diagram