ImageVerifierCode 换一换
格式:PDF , 页数:32 ,大小:402.60KB ,
资源ID:798975      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-798975.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T J 366 7-2010 IPCablecom2 IP Multimedia Subsystem (IMS) Access security for IP-based services (Study Group 9)《有线互联网标准2(IPCablecom2)IP多媒体子系(IMS) 基于IP服务的访问安全 9号研究组》.pdf)为本站会员(dealItalian200)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T J 366 7-2010 IPCablecom2 IP Multimedia Subsystem (IMS) Access security for IP-based services (Study Group 9)《有线互联网标准2(IPCablecom2)IP多媒体子系(IMS) 基于IP服务的访问安全 9号研究组》.pdf

1、 International Telecommunication Union ITU-T J.366.7TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (08/2010) SERIES J: CABLE NETWORKS AND TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS IPCablecom IPCablecom2 IP Multimedia Subsystem (IMS): Access security for IP-based servi

2、ces Recommendation ITU-T J.366.7 Rec. ITU-T J.366.7 (08/2010) i Recommendation ITU-T J.366.7 IPCablecom2 IP Multimedia Subsystem (IMS): Access security for IP-based services Summary Recommendation ITU-T J.366.7 specifies the security features and mechanisms for secure access to the IM subsystem (IMS

3、) for the 3G mobile telecommunication system as modified for use in cable networks. The Third Generation Partnership Project (3GPP) has developed the specification in a form optimized for the wireless environment. This Recommendation references the ETSI version of the 3GPP specification and specifie

4、s only the modifications necessary to optimize it for the cable environment. History Edition Recommendation Approval Study Group 1.0 ITU-T J.366.7 2010-08-29 9 ii Rec. ITU-T J.366.7 (08/2010) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the fie

5、ld of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardiz

6、ing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered

7、 by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate

8、 both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved w

9、hen all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPE

10、RTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserte

11、d by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned tha

12、t this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2011 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec.

13、 ITU-T J.366.7 (08/2010) iii CONTENTS Page 1 Scope 1 2 References. 1 3 Definitions 1 3.1 Terms defined elsewhere 1 3.2 Terms defined in this Recommendation . 1 4 Abbreviations and acronyms 1 5 Conventions 1 6 Modifications to ETSI TS 133.203 2 Rec. ITU-T J.366.7 (08/2010) 1 Recommendation ITU-T J.36

14、6.7 IPCablecom2 IP Multimedia Subsystem (IMS): Access security for IP-based services 1 Scope This Recommendation specifies the security features and mechanisms for secure access to the IM subsystem (IMS) for the 3G mobile telecommunication system as modified for use in cable networks. The Third Gene

15、ration Partnership Project (3GPP) has developed the specification in a form optimized for the wireless environment. This Recommendation references the ETSI version of the 3GPP specification and specifies only the modifications necessary to optimize it for the cable environment. It is an important ob

16、jective of this work that interoperability between IPCablecom 2.0 and 3GPP IMS is provided. IPCablecom 2.0 is based upon 3GPP IMS, but includes additional functionality necessary to meet the requirements of cable operators. Recognizing developing converged solutions for wireless, wireline, and cable

17、, it is expected that further development of IPCablecom 2.0 will continue to monitor and contribute to IMS developments in 3GPP, with the aim of alignment of 3GPP IMS and IPCablecom 2.0. Because this Recommendation indicates modifications from the ETSI specification ETSI TS 133.203, the structure of

18、 the Recommendation does not follow normal ITU-T practice, so as to ease the task of the reader to correlate the two documents. The modifications to the access security for IP-based services specification ETSI TS 133.203 are shown in clause 6. 2 References ETSI TS 133.203 ETSI TS 133.203 V6.9.0 (200

19、5), Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); 3G security; Access security for IP-based services. 3 Definitions 3.1 Terms defined elsewhere This Recommendation uses the terms defined in ETSI TS 133.203. 3.2 Terms defined in this Recomme

20、ndation None. 4 Abbreviations and acronyms This Recommendation uses the abbreviations provided in ETSI TS 133.203. 5 Conventions This Recommendation uses the conventions provided in ETSI TS 133.203. 2 Rec. ITU-T J.366.7 (08/2010) 6 Modifications to ETSI TS 133.203 Modifications introduced by this Re

21、commendation are shown in revision marks. Unchanged text is replaced by ellipsis (). Some parts of unchanged text (section numbers, etc.) may be kept to indicate the correct insertion points. 2 References 25 3GPP TR 33.978: “3rd Generation Partnership Project; Technical Specification Group Services

22、and System Aspects; 3G Security; Security Aspects Of Early IMS“. 26 IETF RFC 5626 (2009), Managing Client-Initiated Connections in the Session Initiation Protocol (SIP). 27 OMA WAP-211-WAPCert, 22.5.2001, http:/www.openmobilealliance.org/tech/affiliates/wap/wap-211-wapcert-20010522-a.pdf. 28 IETF RF

23、C 1750 (1994), Randomness Recommendations for Security. 29 IETF RFC 3268 (2002), Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS). 30 OMA WAP-219-TLS, 4.11.2001, http:/www.openmobilealliance.org/tech/affiliates/wap/wap-219-tls-20010411-a.pdf. 31 IETF RFC 2246 (1999)

24、, The TLS Protocol Version 1.0. 3.3 Abbreviations SIP Session Initiation Protocol TLS Transport Layer Security 4 Overview of the security architecture The mechanisms specified in this technical specification are independent of the mechanisms defined for the CS- and PS-domain. An independent IMS secu

25、rity mechanism provides additional protection against security breaches. For example, if the PS-Domain security is breached the IMS would continue to be protected by its own security mechanism. As indicated in figure 1 the P-CSCF may be located either in the Visited or the Home Network. The P-CSCF s

26、hall be co-located within the same network as the GGSN, which may reside in the VPLMN or HPLMN according to the APN and GGSN selection criteria, cf. TS 23.060 10. NOTE The text in this specification applies to both IPsec and TLS-based access security unless otherwise noted. P-CSCF in the Visited Net

27、work. Rec. ITU-T J.366.7 (08/2010) 3 5.1 Secure access to IMS 5.1.1 Authentication of the subscriber and the network The AKA-protocol is a secure protocol developed for UMTS and the same concept/principles will be reused for the IP Multimedia Core Network Subsystem, where it is called IMS AKA. NOTE

28、Although the method of calculating the parameters in UTMS AKA and IMS AKA are identical, the parameters are transported in slightly different ways. In UMTS, the UEs response RES is sent in the clear, while in IMS RES is not sent in the clear but combined with other parameters to form an authenticati

29、on response and the authentication response is sent to the network (as described in RFC 3310 17). An optional mechanism for authentication is SIP Digest. It is also a challenge response protocol, and operates in a similar manner to IMS AKA. An authentication vector containing authentication informat

30、ion is sent from the Home Stratum to the Serving Network. The serving network uses the authentication information in an authentication vector to authenticate the UE. The Home Network authenticates the subscriber at anytime via the registration or re-registration procedures. 5.1.3 Confidentiality pro

31、tection Possibility for IMS specific confidentiality protection shall be provided to SIP signalling messages between the UE and the P-CSCF. Mobile Operators shall take care that the deployed confidentiality protection solution and roaming agreements fulfils the confidentiality requirements presented

32、 in the local privacy legislation. The following mechanisms are provided at SIP layer: for IPsec-based access security: 1) The UE shall always offer encryption algorithms for P-CSCF to be used for the session, as specified in clause 7. 2) The P-CSCF shall decide whether the IMS specific encryption m

33、echanism is used. If used, the UE and the P-CSCF shall agree on security associations, which include the encryption key that shall be used for the confidentiality protection. The mechanism is based on IMS AKA and specified in clause 6.1. The following mechanisms are provided for TLS-based access sec

34、urity: 1) Negotiation of TLS related confidentiality protection features shall take place at the TLS layer as specified in clause 7.1.2. 2) The UE shall always offer TLS cipher suites for P-CSCF to be used for the session, as specified in RFC 2246 31. 3) The P-CSCF shall decide whether the TLS ciphe

35、r suites are used. If used, the UE and the P-CSCF shall agree on TLS cipher suites at the TLS layer as specified in RFC 2246 31. Confidentiality between CSCFs, and between CSCFs and the HSS shall rely on mechanisms specified by Network Domain Security in TS 33.210 5. 5.1.4 Integrity protection Integ

36、rity protection shall be applied between the UE and the P-CSCF for protecting the SIP signalling, as specified in clause 6.3. 4 Rec. ITU-T J.366.7 (08/2010) The following mechanisms are provided for IPsec-based access security.: 1) The UE and the P-CSCF shall negotiate the integrity algorithm that s

37、hall be used for the session, as specified in clause 7. 2) The UE and the P-CSCF shall agree on security associations, which include the integrity keys, that shall be used for the integrity protection. The mechanism is based on IMS AKA and specified in clause 6.1. 3) The UE and the P-CSCF shall both

38、 verify that the data received originates from a node, which has the agreed integrity key. This verification is also used to detect if the data has been tampered with. 4) Replay attacks and reflection attacks shall be mitigated. The following mechanisms are provided for TLS-based access security: 1)

39、 Negotiation of TLS-related integrity protection features shall take place at the TLS layer. 2) The use of TLS cipher suites with NULL integrity protection (or HASH) shall not be allowed. 3) The UE and the P-CSCF shall both verify that the data received originates from each other according to RFC 22

40、46 31. This verification is also used to detect if the received data has been tampered with. 4) Replay attacks and reflection attacks shall be mitigated. Integrity protection between CSCFs and between CSCFs and the HSS shall rely on mechanisms specified by Network Domain Security in TS 33.210 5. NOT

41、E 1 TLS is mandatorily supported by SIP proxies according to RFC 3261 6, and operators may use it to provide confidentiality and integrity inside their networks instead of or on top of IPsec, as the intra-domain Za interface is optional, and TLS may also be used between IMS networks on top of IPsec.

42、 It should be pointed out, that the 3GPP specifications do not provide support for TLS certificate management in a fashion similar to TS 33.310 (NDS/AF) 24 nor do they ensure backward compatibility with Release 5 CSCFs nor interoperability with other networks which do not use TLS, in case TLS is use

43、d by Release 6 CSCFs. These management and capability issues need then to be solved by manual configuration of the involved operators. 6.1 Authentication and key agreement The One scheme for authentication and key agreement in the IMS is called IMS AKA. The IMS AKA achieves mutual authentication bet

44、ween the ISIM and the HN, cf. figure 1. The identity used for authenticating a subscriber is the private identity, IMPI, which has the form of a NAI, cf. TS 23.228 3. The HSS and the ISIM share a long-term key associated with the IMPI. The HN shall choose the IMS AKA scheme for authenticating an IM

45、subscriber accessing through UMTS. The security parameters e.g., keys generated by the IMS AKA scheme are transported by SIP. The generation of the authentication vector AV that includes RAND, XRES, CK, IK and AUTN shall be done in the same way as specified in TS 33.102 1. The ISIM and the HSS keep

46、track of counters SQNISIMand SQNHSSrespectively. The requirements on the handling of the counters and mechanisms for sequence number management are specified in TS 33.102 1. The AMF field can be used in the same way as in TS 33.102 1. An additional scheme for authentication is SIP Digest as specifie

47、d in RFC 3261 6. SIP Digest achieves mutual authentication between the UE and the HN. The identity used for authenticating a subscriber is the private identity, IMPI, which has the form of a NAI. The HSS and the UE share a Rec. ITU-T J.366.7 (08/2010) 5 preset secret associated by the IMPI. The gene

48、ration of the authentication challenge shall be done in the same way as specified in RFC 3261 6 and this document. The HN shall choose the appropriate scheme for authenticating an IM subscriber based on the authentication algorithm parameter received from the UE in the initial register request. To m

49、itigate bid down attacks, the HN may specify the lowest acceptable authentication algorithm to be used for authenticating an IM subscriber. FurthermoreIf IPsec based access security is used, two pairs of (unilateral) security associations (SAs) are established between the UE and the P-CSCF. The subscriber may have several IMPUs associated with one IMPI. These may belong to the same or different service profiles. Only two pairs of SAs shall be active between the UE and the P-CSCF. These two pairs

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1