Page 383 - 5G Basics - Core Network Aspects
P. 383

Core network aspects                                            1


            5)      MAS-F obtains MUE and streaming flow related information from MUP-FE and MSUP-FE.

            6)      MAS-F makes the decision which connection can be used to transport the streaming flow to be
                    transferred, according to the information already obtained.
            7)      MAS-F  sends  a  streaming  transfer  request,  which  contains  the  updated  information  of  the
                    connections, to the destination SCF, i.e., SCF(2).
            8)      SCF(2) forwards this request message to MPC-FE.
            9)      MPC-FE constructs new QoS rules for the destination connection based on the operator's policies
                    and originating connection information, then returns a streaming transfer response to SCF(2).
            10)     SCF(2) forwards this response message to MAS-F.

            11)     MAS-F returns a transport resource modification response message to MPC-FE.
            12)     MPC-FE forwards this response message to MC-FE.
            13)     MC-FE makes QoS rules according the response message, and installs the rules on MMF.
            14)     MMF forwards the QoS rules to AC-FE(2).
            15)     AC-FE(2) updates the QoS policy rules of the connection. After, it returns an ACK message to MMF.
                    Hence, the streaming flow on AC-FE(1) has been transferred to AC-FE(2).


            10      Security considerations

            10.1    Subscriber security
            Subscriber security of MC-Streaming contains all the relevant problems in a legacy network environment,
            including privacy protection and access control. In  a legacy network environment, a subscriber's privacy
            mainly deals with a specific service, for example, channel number before and after the channel change, time
            of change, time of play and so on. For privacy protection, a great effort has been made to prevent subscribers'
            personal information from being abused.
            In the multi-connection environment, in addition to the above information, a subscriber's privacy includes
            authentication information for multiple access networks, network selection related information and other
            important privacy information. Once the information is leaked or tampered with, the security risk increases
            with multiple accesses instantiations.
            For MC-Streaming, subscriber security mainly focuses on a subscriber's privacy protection and access control
            of the service.
            10.1.1  Privacy protection

            When providing MC-Streaming service, privacy protection is necessary and should seriously be considered,
            in order to prevent information from being leaked or abused. Subscribers' privacy information includes:
            service usage, network selection information, authentication information, etc.
            For MC-Streaming, subscribers' private information may be leaked out in at least three forms, i.e., from the
            service  provider(s),  network  operator  and  terminal  device.  According  to  the  different  disclosure  forms,
            different protection mechanisms should be deployed.
            From the service providers' perspective, many sensitive data are stored at their side. Illegal intrusion and
            unauthorized access may steal the data, bringing threats to the subscribers. Hence, subscribers' personal
            data  is  recommended  to  be  classified  and  managed  accordingly.  Important  data  should  be  controlled
            securely, e.g., it can be stored after encryption. Access to personal data should also be controlled.

            From the network's perspective, personal data can be leaked during transmission. So, encryption algorithms
            and  mechanisms  such  as  DES,  RSA,  SSL,  and  others  are  recommended  to  be  deployed.  Communication
            channels are recommended to be encrypted before data transmission.

            From the terminal device's perspective, certain personal data are stored in the terminal device itself, which
            can be read out if the device is lost. Therefore, it is recommended to deploy a mechanism to completely



                                                                                                         373
   378   379   380   381   382   383   384   385   386   387   388