12 14 the s cscf sends 200 ok message to the ue 3gpp

Info icon This preview shows pages 99–103. Sign up to view the full content.

View Full Document Right Arrow Icon
12-14) The S-CSCF sends 200 OK message to the UE. 3GPP 3GPP TS 33.203 V12.67.0 (2014-0609) 99 Release 12
Image of page 99

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Figure R.1: Flow Diagram for successful NASS Bundled Authentication during Registration The detailed procedures of NASS-IMS-bundled authentication for the CSCF's are described in TS 24.229 [8]. The details of the extended interface towards the HSS are covered in TS 29.228 [39]. 3GPP 3GPP TS 33.203 V12.67.0 (2014-0609) 100 Release 12
Image of page 100
Annex S (Normative): Application to 3GPP2 Access S.1 Introduction This annex specifies how the material in the main body and other normative annexes of the present document apply to 3GPP2 Access. In case there is a conflict with another annex of the present document, then the requirements in this annex shall override. The IP Connectivity Access Network (IP-CAN) for 3GPP2 networks, called Packet Data Subsystem (PDS), is defined in 3GPP2 X.S0011 [40]. S.2 Application of clause 4 In 3GPP2 networks, the IMS is essentially an overlay to the PDS and has a low dependency on the PDS. PDS can be deployed without the multimedia session capability. The IMS Security Framework is shown in Figure S.1. For the purposes of this Annex, the UE is not mandated to contain a UICC. The security data at the UE for access using IMS AKA are stored according to the requirements in clause S.4. It shall be possible for the IMS authentication keys and functions to be logically independent to the keys and functions used for PDS authentication. However, this does not preclude common authentication keys and functions from being used for IMS and PDS authentication. The IMS Security Framework also addresses the security of interfaces between the IMS and external network domains, for example, Multimedia IP-Networks as shown in Figure S.1. This is important since the service capability subsystem of the IMS includes application servers that reside on untrusted third-party networks, and which can access network functionality. Figure S.1: The IMS security architecture 3GPP 3GPP TS 33.203 V12.67.0 (2014-0609) 101 Release 12
Image of page 101

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
There are seven different security associations and different needs for security protection for IMS (including SIP AS nodes) and they are numbered 1 through 7 in Figure S.1. 1. Provides mutual authentication between the UE and the S-CSCF. The HSS delegates the performance of subscriber authentication to the S-CSCF. The long-term key in the UE and the HSS is associated with the user private identity (IMPI). The UE will have one (network internal) user private identity (IMPI) and at least one external user public identity (IMPU). The security associations 2 through 5 are as defined in clause 4 except that requirements in clause S.5 of this specification shall apply for security protection. 6. Provides security between a SIP-capable node residing in an external IP network, and the HSS. This security association is covered in clause S.5 of this specification The SIP-capable node is a SIP Application Server and may also reside within the HN. However, this security association is only applicable when the SIP AS resides in an external IP network. If the SIP AS resides in the Home Network, then the security association 3 applies.
Image of page 102
Image of page 103
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern