Page 185 - ITU Kaleidoscope 2016
P. 185

ICTs for a Sustainable World




          obligation to ensure that the caller ID number is genuine
          before it is transmitted. Even in jurisdictions that forbid
          telephone service providers from providing falsely declared
          caller ID information, with Internet access to an untrust-  Figure 4: An example of proposed caller ID security indicator for
          worthy telephone service provider, it is easy for a malicious        an incoming SMS
          caller to start the call request from a different origin, and
          transmit the false caller ID to the destination exchange of the
          called party.                                      cue of the functionality of the indication. By examining the
                                                             authenticity of certificates that underpin the security indica-
                                                             tor, users are able to protect themselves from phishing and
              4. WHY SECURITY INDICATORS MATTER
                                                             impersonation scams.
                                                             This is why having a security indicator can be an effective so-
          In the internet ecosystem, the HTTP and email are arguably
                                                             lution against caller ID spoofing. Examples of possible caller
          the most popular types of communication used today. In
                                                             ID security indicators for incoming call and SMS are shown
          HTTP communication, the universally recognized pad-
                                                             in Fig. 3 and 4. By having assurance in the security indica-
          lock indicator displayed in the address bar of modern web
                                                             tor, users can quickly determine if the sender is authentic by
          browsers (such as the one shown in Fig. 1) provides users
                                                             recognizing an icon. Furthermore, the prevalence of security
          with immediate trust in the web site’s domain name identity.
                                                             indicators promotes awareness that the user should only trust
                                                             senders that are verified, which may inspire them to be more
                                                             vigilant of calls and messages from unverified sources.
            Figure 1: An example of HTTPS security indicator in Google
                      Chrome with extended verification
                                                                      5. DESIGNING THE CALLER ID
          In email communication, the key-shaped security indicator of  AUTHENTICATION SCHEME
          the email sender (such as the one shown in Fig. 2) in email
          clients provides the users with immediate trust in the identity  Before we discuss the technical detail of designing the un-
          of the email sender.                               derlying caller ID authentication scheme behind the security
                                                             indicator, we first present an overview of the parties involved
                                                             in the transmission of a call request.
             Figure 2: An example of email security indicator in Gmail

                                                                          Originating  Transit   Destination
                                                                Calling Party                          Called Party
                                                                           Exchange  Exchange  Exchange
                                                              Local Exchange Network  SS7 PSTN       Local Exchange Network
                                                              Figure 5: An overview of the parties involved in the transmission
                                                                                of a call request


                                                             Calling Party is the party initiating the call request with an
                                                             user equipment (UE) or software client that connects with the
                                                             originating exchange.
                                                             Originating Exchange is a switch in the PSTN that gener-
                                                             ates and transmits the IAM to the destination exchange per-
                                                             taining to the call request from the calling party.
                                                             Transit Exchange is an interconnecting switch in the PSTN
                                                             that helps to route the messages from the originating ex-
                                                             change to the destination exchange.
                                                             Destination Exchange is the terminating switch in the PSTN
                                                             that receives the IAM and sets up the call with the called
                                                             party.
           Figure 3: An example of proposed caller ID security indicator for  Called Party is the party with an user equipment or software
                             an incoming call                client of the intended called party for the call request.
                                                             In general, the sequences within a local exchange network
          These security indicators are crucial to informing the user  define how user equipment interacts with the local exchange
          that the information is from a verified source. The distinctive  carrier during a call setup, and the sequences within the
          appearance of the security indicator provides an immediate  PSTN define how SS7 switches interact with each other
          cue of the authenticity of the sender’s identity. The univer-  during a call setup. More details of basic call control and
          sality of the security indicator symbol provides an immediate  signaling procedures can be found in Q.764.2 [19].



                                                          – 167 –
   180   181   182   183   184   185   186   187   188   189   190