Skip to main content

Liaison statement
LS on technical measures and mechanism on countering the spoofed call in the visited network of VoLTE

Additional information about IETF liaison relationships is available on the IETF webpage and the Internet Architecture Board liaison webpage.
State Posted
Submitted Date 2014-10-03
From Group ITU-T-SG-17
From Contact Martin Euchner
To Group IETF
To Contacts The IETF Chair <chair@ietf.org>
Cc The IESG <iesg@ietf.org>
A Kremer <kremer@rans.ru>
Koji Nakao <ko-nakao@kddi.com>
Anthony Rutkowski <tony@yaanatech.com>
Scott Mansfield <Scott.Mansfield@Ericsson.com>
Response Contact luohongwei@chinattl.com
Purpose For comment
Deadline 2015-03-31 Action Taken
Attachments COM17_LS149
Liaisons referring to this one STIR WG Response to LS on technical measures and mechanism on countering the spoofed call in the visited network of VoLTE
Body
ITU-T Study Group 17, Security, in its Question 5/17, Countering spam by
technical means, would like to inform you that we established the new work item
X.ticsc on “technical measures and mechanism on countering the spoofed call in
the visited network of VoLTE” based on the contributed document (see attachment
1). The work item would be a supplement to Recommendation ITU-T X.1245,
Framework for countering spam in IP-based multimedia applications. We also
agreed to proceed with checking other organization’s activities related to this
work item.

X.ticsc is to detect the (suspicious) spoofed call in the visited network of
VoLTE and then block or alert the risk to mobile users. X.ticsc is to recommend
the technologies and mechanism active in the application server layer of IMS
and is to utilize the capabilities and the flexibilities provided by the IMS or
the VoLTE service procedures.

We intend to learn about the existing activities in the IETF regarding
countering the spoofed /impersonated call (maybe by SIP protocol) in the
IP-based area and to seek advice whether this work impacts any activities
within IETF or proposes an approach that is in conflict with the IETF. We
appreciate your feedback in this regard, and are looking forward to further
collaboration with you on this new work item.

Attachment: 1
- COM17-C 289: Proposal for a new work item: Technical measures and mechanism
on countering the spoofed call in the visited network of VoLTE.