Top   in Index   Prev   Next

TR 33.978
Security aspects of early IP Multimedia Subsystem (IMS)

3GPP‑Page   ETSI‑search   ToC  
V7.0.0 (Wzip)  2007/06  29 p.
V6.6.0  2006/12  29 p.
Mr. Howard, Peter

full Table of Contents for  TR 33.978  Word version:  7.0.0

Here   Top

0  Introductionp. 4

3GPP IMS provides an IP-based session control capability based on the SIP protocol. IMS can be used to enable services such as push-to-talk, instant messaging, presence and conferencing. It is understood that "early" implementations of these services will exist that are not fully compliant with 3GPP IMS. For example, it has been recognized that although 3GPP IMS uses exclusively IPv6, as specified in clause 5.1 of TS 23.221, there will exist IMS implementations based on IPv4 (TR 23.981).
Non-compliance with IPv6 is not the only difference between early IMS implementations and fully 3GPP compliant implementations. In particular, it is expected that there will be a need to deploy some IMS-based services before products are available which fully support the 3GPP IMS security features defined in TS 33.203. Non-compliance with TS 33.203 security features is expected to be a problem mainly at the UE side, because of the potential lack of support of the USIM/ISIM interface (especially in 2G-only devices) and because of the potential inability to support IPsec on some UE platforms.
Although full support of TS 33.203 security features is preferred from a security perspective, it is acknowledged that early IMS implementations will exist which do not support these features. Therefore, there is a need to ensure that simple, yet adequately secure, mechanisms are in place to protect against the most significant security threats that will exist in early IMS implementations.

1  Scopep. 5

The present document documents an interim security solution for early IMS implementations that are not fully compliant with the IMS security architecture specified in TS 33.203. For security reasons, the provisions in this TR only apply to IMS procedures used over the 3GPP PS domain.

2  Referencesp. 5

3  Definitions, symbols and abbreviationsp. 6

4  Requirementsp. 8

5  Threat scenariosp. 8

6  Specificationp. 9

A  Comparison with an alternative approach - HTTP Digestp. 26

$  Change historyp. 27

Up   Top