tech-invite   World Map
3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search     Home
Top        in Index        Prev        Next

draft-TR 33.832 (SA3)
Study on IMS Enhanced Spoofed Call Prevention and Detection

|   ToC   |   3GPP‑Page   |   Help   |

(W-zip) V0.3.0    2015/09    15 p.

Rapporteur:  Mr. Schumacher, Greg
See also:  –

Caller identity spoofing or malicious modification of caller information such as Calling Line Identification and Caller Name (Caller ID) has become a significant problem in many countries. The complaints regarding these calls range from nuisance calls, violations of various phone solicitation rules (such as the US Federal Trade Commission's Telemarketing Sales Rules) to being used as a platform for significant fraud, identity theft and social engineering. Various malicious uses of caller information spoofing include these categories: swatting, vishing, and TDOS.

Both IETF and 3GPP SA3 have dealt with aspects of this issue a number of times in the past. 3GPP SA3 has completed the study of spoofed call detection in TR 33.831, addressing spoofed calls in a CS environment, without recommending any specific approach. However the problem of spoofed calls is continuing to increase and growing attention is coming from consumers, journalists, and regulatory/legislative bodies demanding a solution.

The latest IETF effort supporting the detection of spoofed calls is taking place in the IETF STIR working group, and has progressed to a a point where evaluation of the use of STIR's active drafts to address the spoofed call problem can take place.


Here        Top



1   Scope   Word-p. 4
2   References   Word-p. 5
3   Definitions, symbols and abbreviations
4   History of past solutions
5   Spoofed call scenarios in IMS
6   Potential security requirements   Word-p. 9
7   Potential solutions
8   Considerations   Word-p. 13
9   Conclusions and recommendations   Word-p. 14
X   Change history   Word-p. 15

Up        Top