Presentation | 2015-09-04 A study on solutions against caller identity spoofing over IMS networks Kenjiro Arai, Koji Tanida, Tsuyoshi Jocha, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | The IMS networks defined in the 3rd Generation Partnership Project (3GPP) provides a reliable caller’s identity presentation service to a callees. This service is achived by the authentication during SIP registration procedure and the authorization process at a originating SIP functional entity to populate an E.164 number for the authenticated user into the SIP request as a network-provided caller’s identity, which will be transparently sent to succeeding trusted SIP functional entities and finally to a callee. Therefore, for the inter-connection between IMS network where both networks implement a given set of procedures needed for provision of a reliable caller’s identity presentation service, there is no need to take measures against caller’s identity spoofing. However, for the inter-connection between IMS network and non-IMS network, some kind of solution to prevent the spoofing is needed, as the terminating side can use only user-supplied caller’s identity like e-mail in order to identify a caller. This paper reports a study on the applicability of the solutions for verifying the user-supplied caller’s identity currently studied in IETF STIR working group to the IMS networks. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | IMS network / spoofing of caller’s identity / IETF STIR |
Paper # | NS2015-85 |
Date of Issue | 2015-08-27 (NS) |
Conference Information | |
Committee | IN / NS / CS |
---|---|
Conference Date | 2015/9/3(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | Iwate-ken Kokaido |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | Post IP networking, Next Generation Network (NGN)/New Generation Network (NWGN), Contingency Plan/BCP, Network Coding/Network Algorithms, Session Management (SIP/IMS), Internetworking/Standardization, Network configuration, etc. |
Chair | Hidetsugu Kobayashi(NTT) / Atsushi Hiramatsu(NTT-AT) / Toshinori Tsuboi(Tokyo Univ. of Tech.) |
Vice Chair | Katsunori Yamaoka(Tokyo Inst. of Tech.) / Hideki Tode(Osaka Pref. Univ.) / Tetsuya Yokotani(Kanazawa Inst. of Tech.) |
Secretary | Katsunori Yamaoka(NTT) / Hideki Tode(KDDI) / Tetsuya Yokotani(Univ. of Fukui) |
Assistant | Yuichi Sudo(NTT) / Kunitake Kaneko(Keio Univ.) / Shohei Kamamura(NTT) |
Paper Information | |
Registration To | Technical Committee on Information Networks / Technical Committee on Network Systems / Technical Committee on Communication Systems |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A study on solutions against caller identity spoofing over IMS networks |
Sub Title (in English) | |
Keyword(1) | IMS network |
Keyword(2) | spoofing of caller’s identity |
Keyword(3) | IETF STIR |
1st Author's Name | Kenjiro Arai |
1st Author's Affiliation | Nippon Telegraph and Telephone Corporation(NTT) |
2nd Author's Name | Koji Tanida |
2nd Author's Affiliation | Nippon Telegraph and Telephone Corporation(NTT) |
3rd Author's Name | Tsuyoshi Jocha |
3rd Author's Affiliation | Nippon Telegraph and Telephone Corporation(NTT) |
Date | 2015-09-04 |
Paper # | NS2015-85 |
Volume (vol) | vol.115 |
Number (no) | NS-209 |
Page | pp.pp.83-88(NS), |
#Pages | 6 |
Date of Issue | 2015-08-27 (NS) |