Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.829
Extended IMS Media Plane Security features

V12.0.0 (Wzip)  2013/03  58 p.
Rapporteur:
Mr. Howard, Peter
VODAFONE Group Plc

full Table of Contents for  TR 33.829  Word version:  12.0.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
0Introduction  p. 6
1Scope  p. 7
2References  p. 7
3Definitions, symbols and abbreviations  p. 8
3.1Definitions  p. 9
3.2Symbols  p. 9
3.3Abbreviations  p. 9
4Overview  p. 9
5IMS conferencing  p. 9
5.1Introduction  p. 9
5.1.1General  p. 9
5.1.2 Immediate security observations/requirements  p. 10
5.1.3Requirements  p. 11
5.2Use cases  p. 12
5.2.1Ad hoc conferencing  p. 12
5.2.1.1Main events  p. 12
5.2.1.2Three party conferencing  p. 12
5.2.2Planned conferences  p. 13
5.3Solution(s)  p. 13
5.3.1General  p. 13
5.3.1.1Policies for secure conferences  p. 13
5.3.1.2Group keys versus bilateral keys  p. 13
5.3.2SDES-based solution  p. 14
5.3.2.1Discussion  p. 14
5.3.2.2Recommended Solution  p. 16
5.3.3KMS-based solution  p. 17
5.3.3.1Introduction  p. 17
5.3.3.2Overview of the solution  p. 17
5.3.3.3Secure conference creation with a conference factory URI  p. 18
5.3.3.4Inviting other users to a secure conference  p. 19
5.3.3.4.1Conference creator includes an URI list at conference creation  p. 19
5.3.3.4.2Conference creator sends REFER to conference focus  p. 20
5.3.3.4.3Conference creator sends REFER to other user  p. 23
5.3.3.5User joining a secure conference  p. 24
5.3.3.6Subscription to conference event package  p. 25
6 SRVCC  p. 25
6.1Introduction  p. 25
6.2Use case description  p. 26
6.3Solution(s)  p. 26
7Services for user groups with high security requirements  p. 27
7.1General  p. 27
7.2Use cases  p. 27
7.3Solution(s)  p. 27
7.3.1MIKEY-IBAKE  p. 27
8IMS messaging  p. 28
8.1Introduction  p. 28
8.1.1General  p. 28
8.1.2Immediate security observations  p. 29
8.2Use cases  p. 29
8.2.1Immediate messaging  p. 29
8.2.1.1General  p. 29
8.2.1.2Deferred delivery  p. 30
8.2.1.3Multiple recipients  p. 31
8.2.2Session-based messaging  p. 31
8.2.2.1(One-to-one) session-based messaging  p. 31
8.2.2.2Session-based conference messaging  p. 32
8.3Solution(s)  p. 33
8.3.1KMS-based solution  p. 33
8.3.1.1Immediate messaging  p. 33
8.3.1.1.1UE sends a SIP MESSAGE  p. 33
8.3.1.1.2UE receives a SIP MESSAGE  p. 34
8.3.1.1.3List server forwards a SIP MESSAGE to multiple recipients using a PSI  p. 34
8.3.1.1.4List server forwards a SIP MESSAGE to multiple recipients using a URI-list  p. 34
8.3.1.2One-to-one session based messaging  p. 34
8.3.1.3Session based messaging conferences  p. 35
8.3.2Solutions that leverage IMS control plane security  p. 35
8.3.2.1Immediate messaging  p. 35
8.3.2.2One-to-one session based messaging  p. 35
8.3.2.2.1General  p. 35
8.3.2.2.2E2m security for one-to-one session based messaging  p. 36
8.3.2.2.2.1 Terminating security at an AS  p. 36
8.3.2.2.2.2 Terminating security at the IMS access gateway  p. 37
8.3.2.2.3Hop-by-hop security for one-to-one session based messaging  p. 37
8.3.2.3Session based messaging conferences  p. 38
8.3.2.4Preferred approach for IMS messaging security that leverages IMS control plane security  p. 38
8.3.2.4.1Security for immediate messaging using SIP MESSAGE messages leveraging IMS control plane security  p. 38
8.3.2.4.2Security for session based messaging using MSRP leveraging IMS control plane security  p. 39
9Communications diversion  p. 39
9.1Introduction  p. 39
9.2Use cases and requirements  p. 40
9.3Solution(s)  p. 41
9.3.1SDES-based solution  p. 41
9.3.1.4Recommended solution  p. 42
9.3.2KMS-based solution  p. 42
9.3.2.1General  p. 42
9.3.2.2KMS-based solution number 1  p. 42
9.3.2.3KMS-based solution number 2  p. 44
10Mid-call lawful Interception  p. 45
10.1Introduction  p. 45
10.2Use cases  p. 45
10.3Solutions  p. 45
10.3.1Carrying key recovery material in MKI field  p. 45
10.3.2Use locally stored information  p. 45
11IMS T.38 fax  p. 46
11.1Introduction  p. 46
11.2Use cases  p. 46
11.3Analysis  p. 47
11.4E2ae security for T.38 fax using DTLS  p. 47
12Conclusions  p. 47
12.1IMS messaging security  p. 47
12.2IMS conferencing security  p. 48
12.3IMS call diversion security  p. 48
12.4Mid-call start of intercept  p. 48
12.5IMS T.38 fax security  p. 48
AIANA considerations  p. 50
A.1 IANA assignments  p. 50
BPre-shared key MIME protection  p. 51
B.1 New smime-type parameter  p. 51
B.2 Creating an Auth-Enveloped message  p. 51
B.3 Using MIKEY-TICKET to transfer the protection key  p. 52
CMIKEY general extension payload for 3GPP ad-hoc conferencing  p. 53
C.1 Payload format  p. 53
DSetup of TLS-PSK using MIKEY  p. 53
D.1 The TLS Prot Type  p. 53
D.2 Establishing a TLS connection  p. 54
D.3 Usage with SDP  p. 55
EMIKEY-TICKET profile for pre-shared key MIME protection  p. 55
FMIKEY general extension payload for message proof-of-origin  p. 56
F.1 Payload format  p. 56
$Change history  p. 56

Up   Top