International Telecommunication Union   ITU
عربي  |  中文  |  Espa˝ol  |  Franšais  |  Русский
 Advanced Search Advanced Search Site Map Contact us Print Version
Home : ITU-T Home : Study Groups : Study Group 17
Question 6/17 – Security aspects of ubiquitous telecommunication services
(Continuation of part of Q.9/17)


Recommendations X.1111, X.1112, X.1113 and X.1114 describe the security framework for home network including the device certificate profile, authentication mechanism, and authorization framework. Recommendations X.1121, X.1122, X.1123, X.1124, and X.1125 provide a comprehensive specification on security for mobile network. Draft Recommendations X.1171 and X.usnsec-1 specify the privacy framework for mobile NID services and the security framework for USN (ubiquitous sensor network), respectively. A continued effort to maintain and enhance these security Recommendations to satisfy the needs of emerging ubiquitous technologies and services is required.

The ubiquitous telecommunication service refers to the service that allows anyone to access to any desired information in a user-friendly way, anytime and anywhere using any devices. The telecommunications industry has been experiencing an exponential growth in area of mobile technology based ubiquitous telecommunication services. Specifically, security of domain-specific ubiquitous telecommunications between heterogeneous devices using application-level technologies such as ubiquitous web for ubiquitous sensor network, home network, mobile network, multicast network, IPTV network, etc., is crucial for the further development of the industry, network operators and service providers. Standardization of the best comprehensive security solutions is vital for the network operators and service providers that operate in a multi-vendor international ubiquitous environment. Due to some specific characteristics of the mobile telecommunications (e.g., over the air transmission, limited computing power and memory size of the small mobile devices), providing security is an especially challenging task that deserves special attentions and study.

Recommendations under responsibility of this Question as of 1 December 2008: X.1111, X.1112, X.1113, X.1114, X.1121, X.1122, X.1123, X.1124 and X.1125.


Study items to be considered include, but are not limited to:

  1. How should security aspects of ubiquitous telecommunication services be identified and defined in mobile telecommunication?
  2. How should threats behind ubiquitous telecommunication services be identified and handled?
  3. What are the security technologies for supporting ubiquitous telecommunication services?
  4. How should secure interconnectivity between ubiquitous telecommunication services be kept and maintained?
  5. What security techniques, mechanisms and protocols are needed for emerging ubiquitous telecommunication services, especially for emerging digital content protection services?
  6. What secure application protocols should be applied for ubiquitous telecommunication services?
  7. What are the global security solutions for ubiquitous telecommunication services and their applications?
  8. What are the best practices or guidelines for secure ubiquitous telecommunication services and their applications?
  9. What enhancements to existing Recommendations under review or new Recommendations under development should be adopted to reduce impact on climate changes (e.g., energy savings, reduction of green house gas emissions, implementation of monitoring systems, etc.) either directly or indirectly in telecommunication/ICT or in other industries?


Tasks include, but are not limited to:

  1. In collaboration with other ITU-T study groups and standards development organizations, especially with IETF, ISO/IEC JTC 1/SCs 6, 25, 27 and 31, produce a set of Recommendations for providing comprehensive security solutions for secure ubiquitous telecommunication services.
  2. Review existing Recommendations/Standards of ITU-T and ISO/IEC in the area of home network, mobile network, mobile NID service, and ubiquitous sensor network to identify secure ubiquitous telecommunication services.
  3. Study further to define security aspects of ubiquitous telecommunication services for a multi-vendor international ubiquitous environment, and for emerging new services.
  4. Study and develop security issues and threats in secure ubiquitous telecommunication services.
  5. Study and develop security mechanisms for secure ubiquitous telecommunication services.
  6. Study and develop interconnectivity mechanisms for secure ubiquitous telecommunication services in a single or multi-vendor ubiquitous environment.


Recommendations: X.800-series and others related to security

Questions: ITU-T Qs 1, 2, 3, 4, 5, 7, 9, 10/17, 16/13, 13/16 and 22/16

Study groups: ITU-T SGs 9, 11, 13 and 16; JCA-NID, JCA-HN, JCA-IPTV; ITU-R

Standardization bodies: ISO/IEC JTC 1/SCs 6, 25, 27 and 31; IETF; 3GPP; 3GPP2; OMA


Top - Feedback - Contact Us -  Copyright ę ITU 2009 All Rights Reserved
Contact for this page : TSB EDH
Updated : 2009-01-28