Liaison statement
LS on technical measures and mechanism on countering the spoofed call in the visited network of VoLTE
Additional information about IETF liaison relationships is available on the
IETF webpage
and the
Internet Architecture Board liaison webpage.
State | Posted |
---|---|
Submitted Date | 2014-10-03 |
From Group | ITU-T-SG-17 |
From Contact | Martin Euchner |
To Group | IETF |
To Contacts | The IETF Chair <chair@ietf.org> |
Cc | The IESG <iesg@ietf.org> A Kremer <kremer@rans.ru> Koji Nakao <ko-nakao@kddi.com> Anthony Rutkowski <tony@yaanatech.com> Scott Mansfield <Scott.Mansfield@Ericsson.com> |
Response Contact | luohongwei@chinattl.com |
Purpose | For comment |
Deadline | 2015-03-31 Action Taken |
Attachments | COM17_LS149 |
Liaisons referring to this one |
STIR WG Response to LS on technical measures and mechanism on countering the spoofed call in the visited network of VoLTE
|
Body |
ITU-T Study Group 17, Security, in its Question 5/17, Countering spam by technical means, would like to inform you that we established the new work item X.ticsc on “technical measures and mechanism on countering the spoofed call in the visited network of VoLTE” based on the contributed document (see attachment 1). The work item would be a supplement to Recommendation ITU-T X.1245, Framework for countering spam in IP-based multimedia applications. We also agreed to proceed with checking other organization’s activities related to this work item. X.ticsc is to detect the (suspicious) spoofed call in the visited network of VoLTE and then block or alert the risk to mobile users. X.ticsc is to recommend the technologies and mechanism active in the application server layer of IMS and is to utilize the capabilities and the flexibilities provided by the IMS or the VoLTE service procedures. We intend to learn about the existing activities in the IETF regarding countering the spoofed /impersonated call (maybe by SIP protocol) in the IP-based area and to seek advice whether this work impacts any activities within IETF or proposes an approach that is in conflict with the IETF. We appreciate your feedback in this regard, and are looking forward to further collaboration with you on this new work item. Attachment: 1 - COM17-C 289: Proposal for a new work item: Technical measures and mechanism on countering the spoofed call in the visited network of VoLTE. |