(Continuation of part of Q.9/17)
Recommendations X.1111, X.1112, X.1113 and X.1114 describe the security
framework for home network including the device certificate profile,
authentication mechanism, and authorization framework. Recommendations X.1121,
X.1122, X.1123, X.1124, and X.1125 provide a comprehensive specification on
security for mobile network. Draft Recommendations X.1171 and X.usnsec-1 specify
the privacy framework for mobile NID services and the security framework for USN
(ubiquitous sensor network), respectively. A continued effort to maintain and
enhance these security Recommendations to satisfy the needs of emerging
ubiquitous technologies and services is required.
The ubiquitous telecommunication service refers to the service that allows
anyone to access to any desired information in a user-friendly way, anytime and
anywhere using any devices. The telecommunications industry has been
experiencing an exponential growth in area of mobile technology based ubiquitous
telecommunication services. Specifically, security of domain-specific ubiquitous
telecommunications between heterogeneous devices using application-level
technologies such as ubiquitous web for ubiquitous sensor network, home network,
mobile network, multicast network, IPTV network, etc., is crucial for the
further development of the industry, network operators and service providers.
Standardization of the best comprehensive security solutions is vital for the
network operators and service providers that operate in a multi-vendor
international ubiquitous environment. Due to some specific characteristics of
the mobile telecommunications (e.g., over the air transmission, limited
computing power and memory size of the small mobile devices), providing security
is an especially challenging task that deserves special attentions and study.
Recommendations under responsibility of this Question as of 1 December 2008:
X.1111, X.1112, X.1113, X.1114, X.1121, X.1122, X.1123, X.1124 and X.1125.
Study items to be considered include, but are not limited to:
- How should security aspects of ubiquitous telecommunication services be
identified and defined in mobile telecommunication?
- How should threats behind ubiquitous telecommunication services be identified
- What are the security technologies for supporting ubiquitous
- How should secure interconnectivity between ubiquitous telecommunication
services be kept and maintained?
- What security techniques, mechanisms and protocols are needed for emerging
ubiquitous telecommunication services, especially for emerging digital content
- What secure application protocols should be applied for ubiquitous
- What are the global security solutions for ubiquitous telecommunication
services and their applications?
- What are the best practices or guidelines for secure ubiquitous
telecommunication services and their applications?
- What enhancements to existing Recommendations under review or new
Recommendations under development should be adopted to reduce impact on climate
changes (e.g., energy savings, reduction of green house gas emissions,
implementation of monitoring systems, etc.) either directly or indirectly in
telecommunication/ICT or in other industries?
Tasks include, but are not limited to:
- In collaboration with other ITU-T study groups and standards development
organizations, especially with IETF, ISO/IEC JTC 1/SCs 6, 25, 27 and 31, produce
a set of Recommendations for providing comprehensive security solutions for
secure ubiquitous telecommunication services.
- Review existing Recommendations/Standards of ITU-T and ISO/IEC in the area of
home network, mobile network, mobile NID service, and ubiquitous sensor network
to identify secure ubiquitous telecommunication services.
- Study further to define security aspects of ubiquitous telecommunication
services for a multi-vendor international ubiquitous environment, and for
emerging new services.
- Study and develop security issues and threats in secure ubiquitous
- Study and develop security mechanisms for secure ubiquitous telecommunication
- Study and develop interconnectivity mechanisms for secure ubiquitous
telecommunication services in a single or multi-vendor ubiquitous environment.
Recommendations: X.800-series and others related to security
Questions: ITU-T Qs 1, 2, 3, 4, 5, 7, 9, 10/17, 16/13, 13/16 and 22/16
Study groups: ITU-T SGs 9, 11, 13 and 16; JCA-NID, JCA-HN, JCA-IPTV; ITU-R
Standardization bodies: ISO/IEC JTC 1/SCs 6, 25, 27 and 31; IETF; 3GPP; 3GPP2; OMA