ANSI ATIS 0100024-2009 User-Network Interface (UNI) Media Plane Security Standard for Evolving VoIP Multimedia Networks.pdf
《ANSI ATIS 0100024-2009 User-Network Interface (UNI) Media Plane Security Standard for Evolving VoIP Multimedia Networks.pdf》由会员分享,可在线阅读,更多相关《ANSI ATIS 0100024-2009 User-Network Interface (UNI) Media Plane Security Standard for Evolving VoIP Multimedia Networks.pdf(31页珍藏版)》请在麦多课文档分享上搜索。
1、 AMERICAN NATIONAL STANDARD FOR TELECOMMUNICATIONS ATIS-0100024.2009(R2014) User-Network Interface (UNI) Media Plane Security Standard for Evolving VoIP/Multimedia Networks As a leading technology and solutions development organization, ATIS brings together the top global ICT companies to advance th
2、e industrys most-pressing business priorities. Through ATIS committees and forums, nearly 200 companies address cloud services, device solutions, emergency services, M2M communications, cyber security, ehealth, network evolution, quality of service, billing support, operations, and more. These prior
3、ities follow a fast-track development lifecycle from design and innovation through solutions that include standards, specifications, requirements, business use cases, software toolkits, and interoperability testing. ATIS is accredited by the American National Standards Institute (ANSI). ATIS is the
4、North American Organizational Partner for the 3rd Generation Partnership Project (3GPP), a founding Partner of oneM2M, a member and major U.S. contributor to the International Telecommunication Union (ITU) Radio and Telecommunications sectors, and a member of the Inter-American Telecommunication Com
5、mission (CITEL). For more information, visit. AMERICAN NATIONAL STANDARD Approval of an American National Standard requires review by ANSI that the requirements for due process, consensus, and other criteria for approval have been met by the standards developer. Consensus is established when, in the
6、 judgment of the ANSI Board of Standards Review, substantial agreement has been reached by directly and materially affected interests. Substantial agreement means much more than a simple majority, but not necessarily unanimity. Consensus requires that all views and objections be considered, and that
7、 a concerted effort be made towards their resolution. The use of American National Standards is completely voluntary; their existence does not in any respect preclude anyone, whether he has approved the standards or not, from manufacturing, marketing, purchasing, or using products, processes, or pro
8、cedures not conforming to the standards. The American National Standards Institute does not develop standards and will in no circumstances give an interpretation of any American National Standard. Moreover, no person shall have the right or authority to issue an interpretation of an American Nationa
9、l Standard in the name of the American National Standards Institute. Requests for interpretations should be addressed to the secretariat or sponsor whose name appears on the title page of this standard. CAUTION NOTICE: This American National Standard may be revised or withdrawn at any time. The proc
10、edures of the American National Standards Institute require that action be taken periodically to reaffirm, revise, or withdraw this standard. Purchasers of American National Standards may receive current information on all standards by calling or writing the American National Standards Institute. No
11、tice of Disclaimer or, in authentication, an authentication that with high assurance can be asserted to be genuine, and that can not subsequently be refuted. Non-repudiation is a signaling/control or management plane issue and does not apply to the media plane. 6.4 Audit Logging Security Dimension T
12、he creation of an audit log is critical for the incident post-mortem and resulting investigation. This section will address the unique audit logging requirements of the user plane in the UNI. Audit logging was not originally included as a security dimension in X.805 however this concept is included
13、here for completeness. Reference ITU-T X.805. Any unauthorized media plane traffic arriving at the UNI shall be logged locally or remotely Note: This objective will be considered to be met if the occurrences of “unauthorized packets” are logged. The content of the “unauthorized packet” may be captur
14、ed, however if it is, the system may be subject to DoS attacks and mechanisms to mitigate such events should be provided. Occurrences of unauthorized media plane traffic arriving at the UNI shall be tabulated. Whenever the tabulation of unauthorized media plane traffic arriving at the UNI is updated
15、, the tabulation shall be compared to a system configurable threshold. When the tabulation of unauthorized media plane traffic arriving at the UNI exceeds the threshold, an alarm shall be generated and sent to a management system. When the tabulation of unauthorized media plane traffic exceeds the t
16、hreshold, the generated alarm shall be logged locally or remotely. The IPsec ESP transform should support Null integrity RFC 4303. ATIS-0100024.2009 8The threshold for unauthorized media plane traffic arriving at the UNI shall be configurable only by authorized entities either locally or remotely. N
17、ote: Media plane traffic arriving at the UNI that is not associated with an authorized UA (as per section 6.1) is to be considered as unauthorized media plane traffic. 6.5 Data Confidentiality Security Dimension Data confidentiality of media plane traffic on an end-to-end basis between communicating
18、 UAs can be accomplished via the application of the following encryption mechanisms: - Secure Real Time Protocol (SRTP) RFC 3711, - IP Security (IPsec) RFC 4301, or - Datagram Transport Layer Security (DTLS) protocol RFC 4347. However service/access providers should be sensitive to other obligations
19、 (e.g., lawful intercept) that may conflict with end-to-end data confidentiality of medial plane traffic. End-to-end data confidentiality for media plane traffic traversing the UNI may be provided by the use of SRTP to protect media traffic such as phone conversations, video, and multimedia from una
20、uthorized access or observation. End-to-end data confidentiality for media plane traffic traversing the UNI may be provided by the use of IPsec ESP-3DES RFC 4303 or IPsec ESP-AES RFC 4303 to protect media traffic such as phone conversations, video, and multimedia from unauthorized access or observat
21、ion. End-to-end data confidentiality for media plane traffic traversing the UNI may be provided by the use of DTLS to protect media traffic such as phone conversations, video, and multimedia from unauthorized access or observation. Different access technologies used to connect the end user device to
22、 the network may have different inherent security capabilities. For example, a DSL line from a service provider connecting a single residential SIP user to the service providers domain may have a similar level of security for the user to network connection as a traditional phone connection. However
23、a service provider connecting a SIP user via a wireless access technology without air interface security enabled may be less secure than a traditional phone connection. As such, it is recommended that all end user terminals connecting to networks via wireless access technology employ some form of co
24、nfidentiality mechanism ATIS-0100024.2009 9Wireless access data confidentiality for media plane traffic arriving at the UNI should be provided by the use of 802.11i IEEE 802.11i to protect media traffic such as phone conversations, video, and multimedia from unauthorized access or observation. Wirel
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIATIS01000242009USERNETWORKINTERFACEUNIMEDIAPLANESECURITYSTANDARDFOREVOLVINGVOIPMULTIMEDIANETWORKSPDF

链接地址:http://www.mydoc123.com/p-433355.html