Page 384 - 5G Basics - Core Network Aspects
P. 384

1                                                Core network aspects


            delete user data on demand by the subscriber himself or the service provider. Sensitive data are required to
            be encrypted and secured. Hence, a third party cannot easily read out the data even when the device can be
            accessed. The terminal device should also provide the capability of avoiding malicious software and virus
            attacks.

            10.1.2  Access control

            Normal subscribers should be able to set up an access control mechanism (such as using a password) to limit
            the access to his/her preferred content or services.

            For protection of children, some kinds of mechanisms for parent control are recommended to be deployed
            in order to restrict the streaming contents from being accessed. Specifically, the service provider can set
            ratings for content to limit access by children, and also can make an authorization in the terminal device for
            children viewing a particular channel or content, for example, by using a PIN challenge.

            10.2    Service security
            Service security in MC-Streaming also suffers from all the related problems in legacy networks. For example,
            authentication,  authorization  and  access  control  are  required  to  be  supported.  Before  a  service  is
            provisioned, terminal device and subscriber are typically required to be authenticated in a secure way. After
            that, the subscriber is authorized for the access of specific service and content. Service access control also
            includes encryption mechanisms for service signalling and content flow, to mutually prevent unwanted or
            unauthorized access for both service provider and subscriber.
            Specific to the multi-connection environment some specific security problems are discussed below.

            10.2.1  Attacks
            The  diverse  nature  of  the  access  networks  involved  in  MC-Streaming  requires  a  number  of  security
            procedures to prevent malicious attacks. These attacks may include:
            •       Denial of service (DoS), in which the attacks consists of flooding with service requests, creating
                    network and server(s) congestion.
            •       Intrusion, which can destroy the network infrastructure and lead to threats to the MC-Streaming
                    services.
            •       Trojans, which can steal the subscribers' private information or privacy stored in terminal devices,
                    such as subscriber information, service usage and network related information.

            The result of these attacks may violate subscribers' privacy, illegally modify policy information and ultimately
            cause abnormal behaviour of the MC-Streaming service.
            10.2.2  Authentication

            Subscribers are commonly required to fulfil authentication and authorization before they are able to access
            a service. Overpassing these steps lead to malicious threats targeting the service, such as denial of service
            (DoS),  intrusion  and  malicious  programs  like  Trojans,  which  can  steal  the  information  of  subscribers.
            However,  authentication  and  authorization  is  somehow  complicated  in  MC-Streaming,  since  different
            mechanisms may be deployed in different access networks simultaneously.

            From the service's perspective, multiple and repeated authentication procedures for every access network
            make authentication information potentially prone to be leaked. From the subscribers' perspective, they
            potentially should login repeatedly when accessing the service through several access networks. This is really
            inconvenient  for  subscribers,  and  may  not  provide  a  good  user  experience.  From  the  perspective  of
            management, large amounts of account information also makes the management complicated.

            It is further recommended that authentication and authorization be bound to a verification of the integrity
            of  MC-Streaming  ensuring  that  the  service,  private  subscription  information,  and  policies  are  not
            compromised through malicious attacks. See also [ITU-T Y.2251], clause 7.






            374
   379   380   381   382   383   384   385   386   387   388   389