Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.937
Word version: 18.0.0
1…
4…
7…
4
System Environment for PUCI
5
PUCI Risk Analysis
6
Security Requirements
4
System Environment for PUCI
p. 10
4.1
Architectural Issues
p. 10
4.1.1
Introduction
p. 10
4.1.2
Originating/Terminating UC Identification and Scoring
p. 11
4.1.3
Central/Distributed UC Identification and Scoring
p. 12
4.1.3.1
Distributed UC Identification and Distributed UC Scoring
p. 12
4.1.3.2
Distributed UC Identification and Central UC Scoring
p. 14
4.1.4
Standardized/Vendor-Specific UC Scoring Algorithms
p. 14
4.2
Non-Technical Conditions
p. 16
4.2.1
Prevention of Unsolicited Communication in an Operator Controlled Environment
p. 16
4.2.1.1
Introduction
p. 16
4.2.1.2
Current SPIT/UC Prevention Measures
p. 16
4.3
Technical versus Legal Issues
p. 18
4.3.1
Introduction
p. 18
4.3.2
UC Legislation
p. 18
4.3.2.1
Definition of UC
p. 18
4.3.2.2
Definition of UC Communication Services
p. 19
4.3.2.3
Consent Achievement about UC Communication
p. 20
4.3.3
Liability
p. 20
4.3.4
Privacy
p. 21
4.3.5
Conclusion
p. 22
4.4
Coexistence with Single Radio-VCC, ICS, and SC
p. 22
5
PUCI Risk Analysis
p. 24
5.1
General
p. 24
5.2
UC Threats & Scenarios
p. 24
5.2.2
General Scenario
p. 24
5.2.3
Privacy Violation
p. 25
5.2.3.1
Privacy Violation Scenarios
p. 25
5.2.3.1.1
Bulk UC (Advertising)
p. 25
5.2.3.1.2
Targeted UC (Stalker)
p. 25
5.2.3.2
Privacy Violation Risks
p. 26
5.2.4
Contentious Incoming Call Service Charge
p. 26
5.2.4.1
Contentious Incoming Call Service Charge Scenarios
p. 27
5.2.4.1.1
UC While Call Forwarding is Enabled
p. 27
5.2.4.2
Contentious Incoming Call Service Charge Risks
p. 27
5.2.5
Contentious Roaming Cost
p. 27
5.2.5.1
Contentious Roaming Cost Scenarios
p. 27
5.2.5.1.1
UC While Roaming
p. 27
5.2.5.2
Contentious Roaming Cost Risks
p. 27
5.2.6
Non-disclosure of Call Back Cost
p. 27
5.2.6.1
Non-disclosure of Call Back Cost Scenarios
p. 27
5.2.6.1.1
Baiting for Premium Number Call Back
p. 27
5.2.6.2
Non-disclosure of Call Back Cost Risks
p. 28
5.2.7
Phishing
p. 28
5.2.7.1
Phishing Scenarios
p. 28
5.2.7.1.1
Messaging/Voice Phishing for Bank Account Information
p. 28
5.2.7.1.2
Voice Phishing for Identity Theft
p. 28
5.2.7.2
Phishing Risks
p. 28
5.2.8
Network Equipment Hijacking
p. 28
5.2.8.1
Network Equipment Hijacking Scenarios
p. 28
5.2.8.1.1
Compromised IMS Network Element
p. 28
5.2.8.2
Network Equipment Hijacking Risks
p. 28
5.2.9
User Equipment Hijacking
p. 29
5.2.9.1
User Equipment Hijacking Scenarios
p. 29
5.2.9.1.1
Botnets Using User Equipment
p. 29
5.2.9.1.2
Malware Distribution Through Bulk UC
p. 29
5.2.9.2
User Equipment Hijacking Risks
p. 29
5.2.10
Mobile Phone Virus
p. 29
5.2.10.1
Mobile Phone Virus Scenarios
p. 29
5.2.10.1.1
Exposure of User Privacy
p. 29
5.2.10.1.2
Destroying Mobile Phone Software and Hardware
p. 29
5.2.10.1.3
Distributing Illegal Information and Virus
p. 29
5.2.10.1.4
Junk Data Distribution through Bulk UC Resulting in User Additional Charges & Network Traffic Jam
p. 29
5.2.10.2
Mobile Phone Virus Risks
p. 30
5.2.11
Sender Impersonation UC
p. 30
5.2.11.1
Sender Impersonation UC Scenarios
p. 30
5.2.11.1.1
Forged Sender UC Received through Interworking with VoIP Operator
p. 30
5.2.11.2
Sender Impersonation UC Risks
p. 30
5.2.12
Unavailability of Service or Degraded Service Quality
p. 30
5.2.12.1
Unavailability of Service or Degraded Service Quality Scenarios
p. 30
5.2.12.1.1
UC flood leads to Degraded Service Quality
p. 30
5.2.12.2
Unavailability of Service or Degraded Service Quality Risks
p. 30
5.2.13
Negative Service Preconception Leading to Non-adoption
p. 30
5.3
Specific UC threats in non-IMS inter-connections
p. 31
5.3.1
Introduction
p. 31
5.3.2
Legal assumptions
p. 31
5.3.3
Network assumptions
p. 31
5.3.4
Security assumptions
p. 33
5.3.5
High risk specific threats
p. 33
6
Security Requirements
p. 35
6.1
Void
6.2
3GPP Security Requirements
p. 35