The current rapid expansion of wireless network technologies and the emergence of novel applications such as tablet, Smartphone, mobile TV, web 2.0 and streaming contents such as videos, games and more have led to the demand of a faster network and standardization of next generation technology the fourth Generation (4G).
4G stands for (Fourth Generation) is the new technology or generation of mobile communication standards in telecommunication emerging from future wireless networks. 4G provides five times faster mobile broadband internet access for devices such as Smartphone, tablet and laptop.   
To accomplish the fourth generation (4G) performance objectives two major technologies such as LTE (Long Term Evolution) and WiMAX (Worldwide Interoperability for Microwave Access) are considered for the time being to deliver the services.
Security has been considered the most important aspect in the fourth generation (4G) and upcoming wireless networks .
During the development of both technologies LTE and WiMAX standards a significant amount of attention has been given to the security design architecture. 
Some studies of security threats in the fourth generation (4G) has shown that both of the technologies WiMAX and LTE security architecture are at their advanced stage of specification.
The fourth Generation (4G) have numerous major differences in comparison to 3G and prior generations, one of the major differences or a crucial aspect is the fact that 4G operation is entirely based on the TCP/IP architecture and suite of protocols. One of the consequences of the fourth Generation (4G) moving to an open set of (TCP/IP) communication protocols is the expected increase in the security issues in comparison to 2G and 3G standards "which is the main focus point of this project. 
Recently emerged mobile communication standard the fourth generation (4G) because of its open nature it will not only suffer from inherited security threats but it will also suffer from some new security threats as well.
Several studies and researches have been conducted prior and post emergence of the fourth generation (4G) and it has been demonstrated that the security requirements of the fourth generation (4G) are much greater than those in previous generations such as 3G. That is due to the fact that the fourth generation (4G) systems will require a more open architecture alongside with it inherent security issues in comparison to the closed network such as 3G systems.
Those requirements apparently designates that there is a need for an integrated security model to protect data across different networks as well as the need to target the security models to protect different entities such as network infrastructures, servers and users . So far majority of research works have focused on studies or preliminary simulations But researchers suggests that there is a vital need to expand researches with emulation and test-bed related studies to reveal further issues and challenges that needs to be addressed. Apparently there is still work to be completed; researchers believe that there is a strong need for continuing studies on the fourth generation (4G) security threats and development of appropriate counter measures. 
Title: 4G Security Threats and Solutions
This (4G Security Threats and Solutions) is a novel literature analysis project based on a systematic examination of security threats on the fourth Generation (4G) focused mainly on security threats sourced because one of the heterogeneous aspects of 4G which is IP based and open nature by resources of an analysis of published sources, undertaken with the specific purpose in mind of discovering solutions to prevent those security threats in advance. By taking a further step which analyses the literature sources more closely and uses much more research to make an argumentative claim .
The main aim and objective of this entire project is to identify the existing and potential security threats caused by the open architecture of the fourth generation (4G) and propose the best possible solutions to overcome and prevent those threats by using the approach of case study and analyse of the collected data.
This sort of study can be beneficial not only for future researchers but also for the fourth generation (4G) service providers whom are possibly work hard to provide efficient service to their consumers and at the end from a secure network users can be also benefited. This study can be counted as an update just prior and post emergence of the fourth generation for future researchers.
It has been in consideration that there are studies conducted post emergence of the fourth generation (4G) in order to tackle the different issues but may be in a slow progression because the fourth generation (4G) could not have the expected elevate in term of sale because of high prices tariffs but
It is compulsory to study the security threats caused of the open architecture of the fourth generation because the fourth generation (4G) has already emerged and millions of people are using it. Those security threats seems to very dangerous and possibly can curb the services provided by the fourth generation (4G).
Because of the novelty of the fourth generation (4G) and for the lack of availability of printed materials, the literature survey for this literature analysis has been only conducted thought online materials especially from the IEEE database.
END / END
The main body of this paper is structured as follows there are five major sections/chapters including some with sub-sections in a sequence such as section one provides an insight into the open nature of the fourth generation (4G).
In Section/chapter two the existing and potential major security threats caused by the open nature of the fourth generation (4G) are identified and described along with two sub-sections such as the (cause of threats) that briefly describes the cause of each identified threats and (effect of threats) that explains the consequence of each identified threats.
Section three demonstrates the analysis of the data collected related to the identified threats and Section/chapter four presents in details the solutions to overcome or prevent the identified threats proposed from the analysis results of collected data. Finally section five (Evaluation) concludes only the above mentioned sections.
Beside content page, abstract, introduction, conclusion, appendices and references there is one other major section in this paper (Project execution) that enlightens about how from the initial stages of selecting the topic and problem through all the decisions made regarding the what to do and how to execute the project including the execution of all the tasks performed in learning more about the topic up to the point of archiving the results and lastly confer the views about the archived results in manner how accurate, reliable and valid the results are and finally concludes as a whole the project achievements. There are two sub-sections in the above major section such as (Methods) that describes the methods and techniques used in the execution of the entire project and (Conclusion) that concludes the entire process of the project.
 Anastasios N. Bikos and Nicolas Sklavos, 2012, LTE/SAE Security Issues on 4G Wireless Networks,
 Mahdi Aiash, Glenford Mapp and Aboubaker Lasebae, 2010, Providing Security in 4G Systems: Unveiling the Challenges
 Syed Shabih Hasan, Mohammed Abdul Qadeer, 2009, Security Concerns in WiMAX
 Hiten Choudhury, Basav Roychoudhury, Dilip kr. Saikia, 2012, Enhancing User Identity Privacy in LTE
 Ghassan A. Abed, Mahamod Ismail, Kasmiran Jumari, 2012, Integrated Approaches to Enhance TCP Performance over 4G Wireless Networks
 Muhammad Al-Humaigani, Dr. Derrek B. Dunn, and Dr. DeWayne Brown, 2009, Security Transition Roadmap to 4G and Future Generations Wireless Networks
 W. Fernández, F. Jara and O. Hormazabal, 2011, Security, Reliability in the Networks 4G, Using Elliptic Curve, Irregular LDPC Code and Inter-leavers of Block
 Paul K. Harmer, McKay D. Williams and Michael A. Temple, 2011, Using DE Optimized LFS Processing to Enhance 4G Communication Security
 N. Seddigh, B. Nandy, R. Makkar, J.F. Beaumont, 2010, Security Advances and Challenges in 4G Wireless Networks
 Lili Gu, Mark A Gregory, 2011, A Green and Secure Authentication for the 4Th
Generation Mobile Network
 Dr Paula Bernaschina, 2012, Project Preparation
 www.pcadvisor.co.uk, http://www.pcadvisor.co.uk/features/mobile-phone/3403880/what-is-4g-complete-guide/, accessed on 28/12/2012
 Wikipedia, http://en.wikipedia.org/wiki/4G, accessed on 28/12/2012