Next Generation Network Security ( Jiashun Tu

advertisement
International Telecommunication Union
Next Generation Network
Security
(Direction and Status of FG NGN Work)
Jiashun Tu
ZTE
ITU-T/IETF Workshop on NGN
1-2 May 2005, Geneva
Outline
ITU-T
o
o
o
o
Security in the context of the overall goals of
the ITU-T Focus Group on Next Generation
Networks (FGNGN)
Relation to work of other SDOs
Key Tasks
Goals
ITU- T/IETF Workshop on NGN, 1-2 May 2005, Geneva
2
ITU-T NGN Focus Group
ITU-T
o ITU-T created NGN Focus Group to address
Telecommunication industry’s urgent need for
specifications for NGN in May, 2004. First results of
NGN FG (NGN Release 1) are expected in May, 2005
o "Through this initiative ITU-T is bringing all players
together in an environment where they can create
truly global specifications for the service-aware
network of the future, to deliver dynamic,
customized services on a massive scale." Herb
Bertine, ITU-T SG 17 Chairman
o Security is among the most essential NGN enablers
and differentiators
ITU- T/IETF Workshop on NGN, 1-2 May 2005, Geneva
3
NGN Subsystem Architecture
Overview
ITU-T
Applications
Based on
3GPP IMS R6
Other Multimedia
Subsystems …
IP Connectivity
Access Network
And related subsystems
( R T S P-b a s e d )
Streaming services
Network
Attachment
Subsystem
(SIP -b a s e d )
IP Multimedia Subsystem
(Core IMS)
PSTN
(SIP -I b a s e d )
PSTN/ISDN Emulation
Subsystem
Resource and
Admission Control
Subsystem
GW
GW
GW
GW
Access Transport
Network
IP
Core Transport Network
ITU- T/IETF Workshop on NGN, 1-2 May 2005, Geneva
4
Highlights of the working document
Guidelines for NGN security
ITU-T
o Overview of relevant global
security standards
o Security in NGN
• NGN threat model (based on
ITU-T X.800 and X.805
Recommendations)
• Security risks in NGN
• Selection of OSI layers for
security provisions
• Granularity of protection
o Security Dimensions and
Mechanisms (based on ITUT X.805)
• Access control
• Authentication
•
•
•
•
•
•
Non-repudiation
Data confidentiality
Communication security
Data integrity
Availability
Privacy
o Elements of security
framework for NGN
• Access security:
Authentication,
Authorization, and
Accounting framework for
NGN
• Security framework for
Mobility in NGN
• Link-layer security for NGN
ITU- T/IETF Workshop on NGN, 1-2 May 2005, Geneva
5
Highlights of the working document
Guidelines for NGN security (cont.)
ITU-T
• Security framework for
home networks
• Security framework for
end-to-end data
communication
• Security framework for
intrusion-tolerant NGN
• Reference Security
Model for NGN
o Components of the NGN
security
•
•
•
•
•
IP-CAN security
Network domain security
IMS access security
Application security
Security of Open
Service/application
Framework in NGN
o IMS security mechanisms
based on the use of
Universal Integrated Circuit
Card (UICC)
ITU- T/IETF Workshop on NGN, 1-2 May 2005, Geneva
6
Highlights of the working document NGN
security requirements for Release 1
ITU-T
o Security requirements
(general considerations
based on the concepts of
X.805)
o Security requirements for
Transport Stratum
• Home Network domain
• Home Network to IP-CAN
domain interface
• The IP-CAN
• IP-CAN to Core Network
interface
• Core Network
o Security requirements for
Service Stratum
• IMS domain
• Transport stratum to IMS
domain
• IMS to Application domain
security
• Application domain security
• Home Network to Application
domain security
• Home Network-to-IMS domain
security
• Open service platform to
valued-added service provider
security
ITU- T/IETF Workshop on NGN, 1-2 May 2005, Geneva
7
ITU-T Recommendation X.805
Security Architecture—the foundation of NGN
Security studies
ITU-T
End-user plane
Control plane
THREATS
Privacy
Destruction
Availability
Data integrity
Communication security
Data confidentiality
Infrastructure security
Non-repudiation
VULNERABILITIES
Authentication
Services security
Access control
Security layers
Applications security
Corruption
Removal
Disclosure
Interruption
ATTACKS
8 Security dimensions
Management plane
ITU- T/IETF Workshop on NGN, 1-2 May 2005, Geneva
X.805_F3
8
Key Tasks
ITU-T
Key Work Items:
• Resolve how IMS is to handle 3GPP vs. 3GPP2
Differences
• Key distribution (for end-users and network
elements)
• AAA for DSL access and QoS authorization
• Hop-by-hop SIP security vs. end-to-end
• VoIP NAT/Firewall traversal
• Identity management
• SPAM control (voice messaging)
• Convergence with IT security
ITU- T/IETF Workshop on NGN, 1-2 May 2005, Geneva
9
Relation to work of other SDOs
ITU-T
ITU-T
SG 13
ITU-T
SG 17
ISO/JTC
SC 27
IETF
ITU-T
FGNGN
ETSI
TISPAN
ITU- T/IETF Workshop on NGN, 1-2 May 2005, Geneva
ATIS
10
Download