Paper Abstract and Keywords |
Presentation |
2015-09-04 17:30
A study on solutions against caller identity spoofing over IMS networks Kenjiro Arai, Koji Tanida, Tsuyoshi Jocha (NTT) NS2015-85 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
The IMS networks defined in the 3rd Generation Partnership Project (3GPP) provides a reliable caller’s identity presentation service to a callees. This service is achived by the authentication during SIP registration procedure and the authorization process at a originating SIP functional entity to populate an E.164 number for the authenticated user into the SIP request as a network-provided caller’s identity, which will be transparently sent to succeeding trusted SIP functional entities and finally to a callee. Therefore, for the inter-connection between IMS network where both networks implement a given set of procedures needed for provision of a reliable caller’s identity presentation service, there is no need to take measures against caller’s identity spoofing. However, for the inter-connection between IMS network and non-IMS network, some kind of solution to prevent the spoofing is needed, as the terminating side can use only user-supplied caller’s identity like e-mail in order to identify a caller. This paper reports a study on the applicability of the solutions for verifying the user-supplied caller’s identity currently studied in IETF STIR working group to the IMS networks. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
IMS network / spoofing of caller’s identity / IETF STIR / / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 115, no. 209, NS2015-85, pp. 83-88, Sept. 2015. |
Paper # |
NS2015-85 |
Date of Issue |
2015-08-27 (NS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
NS2015-85 |
Conference Information |
Committee |
IN NS CS NV |
Conference Date |
2015-09-03 - 2015-09-04 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Iwate-ken Kokaido |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Post IP networking, Next Generation Network (NGN)/New Generation Network (NWGN), Contingency Plan/BCP, Network Coding/Network Algorithms, Session Management (SIP/IMS), Internetworking/Standardization, Network configuration, etc. |
Paper Information |
Registration To |
NS |
Conference Code |
2015-09-IN-NS-CS-NV |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
A study on solutions against caller identity spoofing over IMS networks |
Sub Title (in English) |
|
Keyword(1) |
IMS network |
Keyword(2) |
spoofing of caller’s identity |
Keyword(3) |
IETF STIR |
Keyword(4) |
|
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Kenjiro Arai |
1st Author's Affiliation |
Nippon Telegraph and Telephone Corporation (NTT) |
2nd Author's Name |
Koji Tanida |
2nd Author's Affiliation |
Nippon Telegraph and Telephone Corporation (NTT) |
3rd Author's Name |
Tsuyoshi Jocha |
3rd Author's Affiliation |
Nippon Telegraph and Telephone Corporation (NTT) |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2015-09-04 17:30:00 |
Presentation Time |
25 minutes |
Registration for |
NS |
Paper # |
NS2015-85 |
Volume (vol) |
vol.115 |
Number (no) |
no.209 |
Page |
pp.83-88 |
#Pages |
6 |
Date of Issue |
2015-08-27 (NS) |
|