tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

Top        in Index        Prev        Next

TR 33.937 (SA3)
Study of mechanisms for
Protection against Unsolicited Communication for IMS (PUCI)

|   ToC   |   3GPP‑Page   |   ETSI‑search   |   Help   |

(P) V14.0.0    2017/03    98 p.
(P) V13.0.0    2016/01    97 p.
(P) V12.0.0    2014/09    97 p.
(P) V11.0.0    2012/09    97 p.
(P) V10.0.0    2011/04    97 p.
(P) V9.2.0    2010/06    97 p.


Rapporteur:  Dr. Prasad, Anand
See also:  –


The scope of this report is to highlight alternative solutions that could be used to protect mobile subscribers from receiving unsolicited communication over IMS and to analyze these solutions in respect of their requirements and impacts on standardized interfaces.

This activity took into account the study done in TISPAN TR 187 009 on 'Feasibility study of prevention of unsolicited communications in the NGN'.


 

Here        Top        None        None        Next
part:    1     2

 

 

1   Scope   PDF-p. 8
2   References
3   Definitions, Symbols and Abbreviations   PDF-p. 9
4   System Environment for PUCI   PDF-p. 11
5   PUCI Risk Analysis   PDF-p. 25
5.1   General
5.2   UC Threats & Scenarios      Up
5.2.2   General Scenario
5.2.3   Privacy Violation   PDF-p. 26
5.2.4   Contentious Incoming Call Service Charge
5.2.5   Contentious Roaming Cost
5.2.6   Non-disclosure of Call Back Cost
5.2.7   Phishing
5.2.8   Network Equipment Hijacking
5.2.9   User Equipment Hijacking   PDF-p. 30
5.2.10   Mobile Phone Virus
5.2.11   Sender Impersonation UC      Up
5.2.12   Unavailability of Service or Degraded Service Quality
5.2.13   Negative Service Preconception Leading to Non-adoption   PDF-p. 32
5.3   Specific UC threats in non-IMS inter-connections
6   Security Requirements   PDF-p. 36
7   Supporting Mechanisms and Solution Alternatives   PDF-p. 37

Up        Top        ToC