Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security and Lawful Intercept

Similar presentations


Presentation on theme: "Security and Lawful Intercept"— Presentation transcript:

1 Security and Lawful Intercept
Document No: GSC16-PLEN-39r1 Source: TIA Contact: Jane Brownley GSC Session: PLENARY Agenda Item: 6.3 Security and Lawful Intercept Jane Brownley Chair, TIA TR-45

2 Security

3 Current Activities - Security
TIA Committee TR-45 supports security standards development for US TDMA (TIA-136) and CDMA (TIA-2000 and TIA-856) Most of TR-45’s work involves transposition of specifications developed by 3GPP2 TSG-S WG4 Current efforts: New Revision of Security framework for Femto-cells Advanced Security Framework for HRPD, eHRPD and xHRPD Security for cdma2000® 1x

4 Current Activities - Security
Equipment Numbering Identifier security continues as an agenda item during Global Numbering Joint Expert Meetings moderated by TR-45 EUMAG and hosted by TIA as MEID -Global Hexadecimal Administrator (GHA) and GSMA as IMEI -Global Decimal Administrator (GDA) Air-Interface Application Layer Security

5 Strategic Direction TIA expects its TR-45 security work to continue to be driven by 3GPP2, with input from IETF and 3GPP Security for Machine-to-machine communications will be addressed in TR-45 EUMAG Chair moderates Global Numbering Administrators i.e., IMEI (GSMA) & MEID (TIA) sessions to co-ordinate Administration of multimode equipment identifier assignments.

6 Challenges ESN and UIMID resources are exhausted, therefore Global implementation of MEID and EUIMID for cdma2000® continues to be imperative Inconsistent implementation of security in the networks Security is perceived as preventing fraud adequately, therefore may lead to complacency in some systems Cost and complexity are usually cited as reasons for not using authentication

7 Next Steps / Actions TIA plans to continue to monitor the security environment faced by operators and users Any issues identified that are not addressed by 3GPP or 3GPP2 will be studied by TR-45 TR-8, TR-34, and other TIA Engineering Committees will continue to work on Security requirements in their respective standards scope

8 Next Steps / Actions TR-45 EUMAG continues to support ESN/UIM migration to MEID/EUIMID while maintaining updates to Numbering Administration guidelines. TR-45 continues active participation during 3GPP2 SC M2M numbering Ad-Hoc activities.

9 Lawful Intercept (LI)

10 Current Activities – Lawful Intercept
TR-45.8 Lawful Intercept Group (LIG) working on a draft strawman document for a possible cdma2000® Femtocell Lawful Interception Implementation Guide based on the TR-45.8 internal report on LAES support for cdma2000® with Femtocells TR-45.8 Lawful Intercept Group (LIG) continues to address contributions received regarding cdma2000® LI. TR-45 and ATIS reaffirmed ANS J-STD-025B LAES joint standard.

11 Strategic Direction TR-45 continues collaboration and coordination with LI development in groups such as ATIS WTSC and PTSC and 3GPP SA3 LI. TR-45 maintains the J-STD-025 LAES series of joint standards as the lead SDO. TR-45 co-ordinates LAES Object IDentifier (OID) administration under the “TIA” OID tree branch for ASN.1 modules.

12 Challenges Keeping pace with the ongoing introduction of new features and services to support LI capabilities while maintaining LI standards already implemented Consideration of the unique issues presented with access to the Internet e.g., Local Breakout Communications protocols involved in technology areas such as “Smart Grid” or “Cloud Computing”

13 Next Steps/Actions TR-45 (jointly with ATIS) activity on a third Addendum to ANS J-STD-025B is underway Potential TR45.8 LIG work in support of LI for Femtocells based on the study Potential TR45.8 LIG work in support of new CDMA features and services


Download ppt "Security and Lawful Intercept"

Similar presentations


Ads by Google