The 4G Security Threat for Mobile Developers

We are accustomed to thinking that smartphone safety depends on the habits of the user, but that’s likely to change with the transition to Long-Term Evolution (LTE) architecture, popularly known as 4G. Even the most careful user who never loses a phone, installs security software, and never uses suspicious apps might be more vulnerable than you think. And it’s not just consumers who are at risk—there are potential threats for any entrepreneur building a business around mobile applications or devices.

Here’s the problem for developers. Any cellular network core is a virtual treasure trove of sensitive information about your customers and their daily interactions via mobile—interactions made possible by the innovative apps and platforms that mobile entrepreneurs are creating every day.

Think of the operator’s core network as a kind of vast control center that processes and manages all the information that is sent to and from your customer’s smartphone and millions of other users’ devices. Now imagine how, in the wrong hands, even the most limited glimpses into that information could be put to use, and the scale of consumer backlash that such breaches could unleash, with the potential to undermine the vitality of the entire mobile ecosystem.

In the days of 3G, a closed and protected end-to-end environment allowed operators to apply rigorous safeguards to protect communications from tampering and theft. But the mobile security environment is changing in a big way as operators address overwhelming traffic volumes by moving to faster, more distributed, and more heterogeneous LTE networks. Because LTE is all-IP, it is subject to the same security vulnerabilities as any PC or business network, which puts a question mark on the security of the smartphone or mobile device.

While this doesn’t apply to operators with their own fixed and mobile network assets, most mobile providers don’t have that advantage, and must stitch together their LTE coverage from a diverse array of technology, network sharing relationships and backhaul strategies. One such instance is the explosive growth in the use of small cell radio base stations from multiple vendors, in locations varying from lampposts to the roofs of convenience stores, which are inherently vulnerable to physical as well as digital threats. Another is Wi-Fi offload, where the user is connected to an enterprise network at one moment and is hooked in to free public Wi-Fi at an airport or coffee shop the next. Security is part of the collateral challenge with which operators struggle to deal.

The Innovation Dilemma

The threat profile that LTE networks present suddenly appears very different from what we have seen in previous generations of mobile networks. And yet operators trying to solve these new security challenges are not being well served by some of their traditional infrastructure vendors, the mega-corporations whose routers and servers were designed for the telecoms environment of the ’90s. Security places a huge burden on typical core network equipment, slowing performance and requiring operators to continue making costly purchases without ever catching up with traffic needs. Incumbent equipment vendors are highly protective of their installed base, and so slow to move that operators are looking to startups and innovators who can remove this barrier. Surely, when the mobile industry is sparking an unprecedented level of creativity and opportunity for entrepreneurs from arts to artificial intelligence, it makes sense to bring innovation into the heart of the telecoms operator network. The only question is why the turn to new solutions is taking so long.

For the app developer, the battle between legacy vendors and innovators should be of key interest. With more network sharing arrangements between mobile telecom carriers, and growing use of Wi-Fi offload, mobile consumers will become increasingly “nomadic”—more and more unaware of the precise network on which they are currently receiving service, and increasingly frequently being served by an all-IP network.

This means that your mobile banking or advertising app is only as secure as the least secure network to which your consumer’s device is

Author: Vikash Varma

Vikash Varma brings 18 years of multi-disciplined experience to Stoke, with a successful track record of building businesses from the early stages to market leadership. He was most recently the President - Worldwide Sales, Marketing & Field Operations at CloudShield Technologies. Vikash helped establish CloudShield as a leader in the multi-function service control and security market, operating in over 35 countries. Before CloudShield, Vikash was the President - Worldwide Sales and Field Operations at P-Cube Inc. where he successfully grew the business with top tier carriers around the world and established P-Cube as the market leader in IP Service Control solutions. P-Cube was acquired in 2004 by Cisco Systems for $200M. Prior to P-Cube, Vikash was the General Manager at Hewlett-Packard Co. for the Internet Usage Manager (IP Mediation) Software business.