Tech-
invite
3GPP
space
IETF
space
◀
▶
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
TR 33.844
Security Study on
IMS-based Peer-to-Peer Content Distribution Services
3GPP‑Page
fToC
↓
Partial Content
→
V11.0.0 (Wzip)
2012/12 16 p.
Rapporteur:
Dr. Qing, Yu
China Mobile Com. Corporation
full Table of Contents for
TR 33.844
Word version: 11.0.0
each clause number in
'red'
refers to the equivalent title in the Partial Content
1
Scope
p. 5
2
References
p. 5
3
Definitions and abbreviations
p. 5
3.1
Definitions
p. 5
3.2
Abbreviations
p. 5
4
System Architecture
p. 5
4.1
Alternative Architecture 1
p. 5
4.2
Alternative Architecture 2
p. 6
4.3
Alternative Architecture 3
p. 6
4.4
Alternative Architecture 4
p. 7
4.5
Alternative Architecture 5
p. 7
4.6
Security Architecture
p. 8
5
Security threats
p. 9
5.1
User Identity Privacy
p. 9
5.2
Eavesdropping
p. 9
5.3
Adversarial content announcement
p. 9
5.4
Content Tampering and Replacement (Trojan Horse)
p. 9
6
Security Requirements
p. 9
6.1
Security requirement for User Identity Privacy
p. 9
6.2
Security requirement for eavesdropping
p. 9
6.3
Security requirement for adversarial content announcement
p. 10
6.4
Security requirement for Content Tampering and Replacement (Trojan Horse)
p. 10
7
Security Solutions
p. 10
7.1
Security protection to prevent eavesdropping
p. 10
7.2
Security solution against adversarial content announcement
p. 12
7.3
Security protection on user identity privacy
p. 12
7.4
Security protection against content tampering and replacement
p. 13
8
Conclusions
p. 15
$
Change history
p. 16