Out of Jurisdiction Emergency Routing draft-winterbottom-ecrit-priv-loc-01.txt James Winterbottom, Hannes Tschofenig, Laura Liess.

Slides:



Advertisements
Similar presentations
1 TELCORDIA PROPRIETARY – INTERNAL USE ONLY See proprietary restrictions on title page. Lets Move E911 Indoors! Mike Loushine & Clifford Behrens Telcordia.
Advertisements

Building Information Services and Control System (BISACS), a Framework For a Safer Tomorrow Alan Vinh Building Environment Division Building and Fire Research.
HTTP Dereference (draft-winterbottom-geopriv-deref-protocol-00) IETF-71 Philadelphia, March 2008 James Winterbottom Hannes Tschofenig Henning Schulzrinne.
ECRIT Direct Calling draft-winterbottom-ecrit-direct-01 James Winterbottom, Martin Thomson, Hannes Tschofenig, Henning Schulzrinne 1draft-winterbottom-ecrit-direct-01.
Internet Standards- Emergency Services Hannes Tschofenig Mail comments to and/or
Emergency Services Chitra S VOIP Security Fall 2008.
Location Based Services and Privacy Issues
Additional Data related to an Emergency Call draft-ietf-ecrit-additional-data-00.txt Hannes Tschofenig Brian Rosen.
BRIAN ROSEN HANNES TSCHOFENIG draft-ietf-ecrit-data-only-ea-02.
Call Server LIS VPC ESGW SR Manhattan PSAP LO=Wall St Route=Manhattan PSAP The Location Object (LO) is provided in the call setup information to the Call.
Emergency Services Workshop UK VoIP 999/112s John Medland – BT 999/112 Policy Manager.
What Makes It Work? A Panel Discussion on Next Generation 9-1-1
NENA Development Conference | October 2014 | Orlando, Florida NG9-1-1 PSAP Requirements and Standards Michael Smith, DSS Mike Vislocky, Network Orange.
Risks with IP-based Emergency Services draft-ietf-ecrit-trustworthy-location.
NENA’s 11 th Annual Technical Development Conference A proposal to support E911 calls on Voice over IP Networks Martin Dawson – Nortel Networks.
Draft-ietf-ecrit-location-hiding-req Location Hiding: Problem Statement and Requirements Henning Schulzrinne, Laura Liess, Hannes Tschofenig, Barbara Stark,
Trustworthy Location Information draft-tschofenig-ecrit-trustworthy- location draft-tschofenig-ecrit-trustworthy- location Hannes Tschofenig, Henning Schulzrinne.
MNO Cloud Use Case 2 Source: Rogers Wireless Contact: Ed O’Leary George Babut 3GPP/SA3-LI#43Tdoc SA3LI11_115.
An SAIC Company Telcordia View of NENA Progress on VoIP Migration Plan Telcordia Contacts: Nadine Abbott (732) An SAIC Company.
Location Hiding: Problem Statement, Requirements, (and Solutions?) Richard Barnes IETF 71, Philadelphia, PA, USA.
ECRIT interim meeting - May Security Threats and Requirements for Emergency Calling draft-tschofenig-ecrit-security-threats Hannes Tschofenig Henning.
Ernst Langmantel Technical Director, Austrian Regulatory Authority for Broadcasting and Telecommunication (RTR GmbH) The opinions expressed in this presentation.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Emergency calls related work done in IETF Gabor Bajko May 22, 2006.
© 2008 AT&T Knowledge Ventures. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Knowledge Ventures. 1 Video Relay Service and Assignment.
ESW – May 2010 UK Architecture for VoIP 999/112s John Medland – BT 999/112 Policy Manager.
Voice over Internet Services and Privacy. Agenda Problem Description Scope Recommendations.
NENA Next Generation Architecture
© British Telecommunications plc Network Filtering.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
Status and Development of VoIP based emergency calls Alexander Mayrhofer, nic.at GmbH The 1st European Security and Safety Summit Brussels, June 2007.
Building Information Exchange with First Responders (BIEFR) David Holmberg, NIST June 11, 2009 Slides credit to Alan Vinh.
Draft-rosen-ecrit-emergency- framework-00 Brian Rosen NeuStar CPa
1 Location Hiding Henning Schulzrinne Laura Liess Hannes Tschofenig.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-tschofenig-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning.
Draft-polk-ecrit-mapping-events-00 James Polk March 21 st, 2006.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
A Routing Extension for HELD draft-winterbottom-ecrit-priv-loc-04 James Winterbottom Hannes Tschofenig Laura Liess.
Response to Call Back questions IETF 77 – Anaheim Stephen McCann, RIM.
(Cisco Emergency Responder) Paul Dial and Teresa Shibao
PSAP Callback draft-ietf-ecrit-psap-callback Phone BCP Status Usage Scenarios.
7/6/20061 Speermint Use Case for Cable IETF 66 Yiu L. Lee JULY 2006.
1 SPEERMINT Use Cases for Cable IETF 66 Montreal 11 JULY 2006 Presented by Yiu L. Lee.
A Routing Extension for HELD draft-ietf-ecrit-held-routing-01 James Winterbottom Hannes Tschofenig Laura Liess.
Mar 20, 2005IETF65 PANA WG Requirements for PANA support of location based services draft-anjum-pana-location-requirements-00.txt F. Anjum D. Famolari.
Emergency call assurance. Highest-level goals Protect PSAP resources –network resources –call takers Protect first-responder resources –unnecessary dispatch.
Network Reliability and Interoperability Council VII NRIC Council Meeting Focus Group 1B Network Architectures for Emergency Communications in 2010 September.
ECRIT Basic Reqs draft-stastny-ecrit-requirements Richard Stastny Brian Rosen IETF62 Minneapolis.
ECRIT - Getting Certain URIs, and Alternatives to Getting Emergency Dialstring(s) draft-polk-ecrit-lost-server-uri-00 draft-polk-dhc-ecrit-uri-psap-esrp-00.
Protecting First-Level Responder Resources in an IP-based Emergency Services Architecture 13 th April 2007, THE FIRST INTERNATIONAL WORKSHOP ON RESEARCH.
Diameter Parameter Query draft-winterbottom-dime-param-query-01.txt J. Winterbottom, H. Tschofenig, R. Bellis.
Emergency Text Messaging using SIP MESSAGE draft-kim-ecrit-text-00
Extensions to the Emergency Services Architecture for dealing with Unauthenticated and Unauthorized Devices draft-ietf-ecrit-unauthenticated-access-03.txt.
Shibboleth for Middle Schools James Burger -
7/11/2005ECRIT Security Considerations1 ECRIT Security Considerations draft-taylor-ecrit-security-threats-00.txt Henning Schulzrinne, Raj Shanmugam, Hannes.
© 2015 Airbus DS Communications, Inc. All rights reserved. Lights, Camera, NG9-1-1 Diana Gijselaers/ Solutions Engineer – NG9-1-1 GIS and Core Services.
Emergency Context Resolution with Internet Technologies (ecrit) Hannes Tschofenig, Marc Linsner IETF 66, Montreal, June 2006.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
ECRIT WG IETF-75 Trustworthy Location Bernard Aboba
12th April 2007, SDO Emergency Services Workshop 2007
Understanding & Defining Additional Data Interfaces in NG9-1-1
Location Configuration at Layer 7
Hannes Tschofenig, Henning Schulzrinne, Bernard Aboba
Henning Schulzrinne Stephen McCann Gabor Bajko Hannes Tschofenig
draft-ietf-ecrit-rough-loc
HTTP Enabled Location Delivery (HELD)
Open Forum th November 2016.
Hannes Tschofenig Henning Schulzrinne M. Shanmugam
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
COMPUTER NETWORKS PRESENTATION
Presentation transcript:

Out of Jurisdiction Emergency Routing draft-winterbottom-ecrit-priv-loc-01.txt James Winterbottom, Hannes Tschofenig, Laura Liess

Device-Centric Emergency Services Model +---Location Request---+ | (1) | V---+ | |<--Location--| LIS | | Caller | (2) | | | ESRP/ | | |----Find Service | PSAP | ^-+ (3) | | | V----+ ^ | Service----| LoST Server | | | (4) Call Initiation >| VSP | (5) Challenges with the approach have been described in

Softswitch-Centric Calling Model +---Location Request---+ | (2) | +---V---+ | | LIS | | | | | +----Location--->| Soft | (3) | Switch | | Caller |------Call Initiation > | | (1) +-+-^ | | | | LoST Server |<-Find Service--+ | | (4) | | | | | Service | (5) | | | ESRP/PSAP |<------Call (6) Approach had been explored in various countries, such as UK, Canada, etc. Various challenges exist, such as lack of LoST infrastructure.

Problem Description Security: One concern is about the possibility of the software of the end device being able to tamper with location. Privacy: There is the desire to allow location information to be provided to emergency organizations rather than any other party, including the end device or a VSP.

Observations Rough location information is required to route emergency calls. The VSP needs the ability to determine the correct LIS to retrieve location information. The VSP needs the ability to contact a LoST server to acquire routing information from. The end host does not acquire or convey location to the emergency network. Access network provider aim to provide location only to emergency service authorities. Precise location information is required to dispatch first responders.

Our Approach The VSP queries the LIS using HELD and the IP address of the calling device as an identity extension. The LIS determines the location and uses it request routing information for the local LoST server. The LIS return a location URI and the local Emergency Service Routing Proxy (ESRP) URI to the VSP.