ITU-T X.1245 - Supplement on technical measures and mechanisms on countering spoofed calls in the terminating network of voice over long term evolution (VoLTE) |
|
Since the rapid development of the fourth generation (4G) based on the Internet protocol (IP) multimedia subsystem (IMS) network generated the renovation on the network architecture and the service mode, spoofed calls could cause security and financial threats as well as creating new difficulties to terminal users and operators alike. The difficulties and threats can be labelled as fraud issues generated by callers who use highly impersonated telephony numbers, which are faked by certain legal or illegal measures, to allure the callee. However, in spite of the new threats and difficulties, some new opportunities have also arisen to counter spoofed calls, since particular technical measures can be implemented in the IMS network.
The objective of this Supplement to Recommendation ITU-T X.1245 is to analyse the threats and to recommend technical measures and mechanisms to counter spoofed calls in the terminating network of voice over long term evolution (VoLTE) if the identity of the incoming calls cannot be trusted securely by the terminating network. This Supplement focuses mainly on the protection of the VoLTE users, to prevent them from the risk of receiving spoofed calls or to warn them in advance of suspicious spoofed calls by deploying procedures both on the network side and the user side (smartphone), after having conducted a threat analysis of spoofed calls.
|
|
|
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|