Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.978
Security aspects of early IP Multimedia Subsystem (IMS)

V7.0.0 (Wzip)  2007/06  29 p.
V6.6.0  2006/12  29 p.
Rapporteur:
Mr. Howard, Peter

full Table of Contents for  TR 33.978  Word version:  7.0.0

0Introduction  p. 4
1Scope  p. 5
2References  p. 5
3Definitions, symbols and abbreviations  p. 6
3.1Definitions  p. 6
3.2Symbols  p. 6
3.3Abbreviations  p. 6
4Requirements  p. 8
5Threat scenarios  p. 8
5.1Impersonation on IMS level using the identity of an innocent user  p. 8
5.2IP spoofing  p. 9
5.3Combined threat scenario  p. 9
6Specification  p. 9
6.1Overview  p. 9
6.1.1Security mechanism  p. 9
6.1.2Restrictions imposed by early IMS security  p. 10
6.1.3Early IMS security and logical entities  p. 11
6.2Detailed specification  p. 11
6.2.1GGSN-HSS interaction  p. 11
6.2.2Protection against IP address spoofing in GGSN  p. 12
6.2.3Impact on IMS registration and authentication procedures  p. 12
6.2.3.1Procedures at the UE  p. 12
6.2.3.2Procedures at the P-CSCF  p. 12
6.2.3.2.1Registration  p. 13
6.2.3.2.2General treatment for all dialogs and standalone transactions excluding REGISTER requests  p. 13
6.2.3.3Procedures at the I-CSCF  p. 13
6.2.3.4Procedures at the S-CSCF  p. 13
6.2.3.4.1Registration  p. 13
6.2.3.4.2General treatment for all dialogs and standalone transactions excluding REGISTER requests  p. 14
6.2.4Identities and subscriptions  p. 14
6.2.5Impact on Cx Interface  p. 15
6.2.5.1User registration status query  p. 15
6.2.5.2S-CSCF registration/deregistration notification  p. 15
6.2.5.3Authentication procedure  p. 15
6.2.6Interworking cases  p. 16
6.2.7Message flows  p. 18
6.2.7.1Successful registration  p. 18
6.2.7.2Unsuccessful registration  p. 20
6.2.7.3Successful registration for a selected interworking case  p. 21
6.3Security mechanism for HTTP services  p. 22
AComparison with an alternative approach - HTTP Digest  p. 26
$Change history  p. 27

Top