Internet Protocol-based Emergency Services by Schulzrinne Henning Tschofenig Hannes & Henning Schulzrinne

Internet Protocol-based Emergency Services by Schulzrinne Henning Tschofenig Hannes & Henning Schulzrinne

Author:Schulzrinne, Henning, Tschofenig, Hannes & Henning Schulzrinne
Language: eng
Format: epub, mobi
ISBN: 9781119993841
Publisher: Wiley
Published: 2013-05-22T16:00:00+00:00


When any of the capabilities required for an IMS emergency call are missing, then the CS domain must be used instead. When both domains are possible based on the registration state, the known UE capabilities and the received indications of network support come into play. For this case it is possible for the operator and the user to pre-configure preferences to influence the decision between the CS and the PS domain.

Limited Service Case

Basically the same limited service cases as in CS domain exist, namely one with a valid (U)SIM and one without a valid (U)SIM. The latter case cannot be authenticated. If there is no roaming agreement between the VPLMN and HPLMN, then even the former case cannot be authenticated.

Additionally to these alternatives, E-UTRAN creates another exceptional case, since the 3GPP Rel-8 and later specifications for EPS specify that E-UTRAN access is only allowed with valid USIM. Thus, a valid subscription with a SIM that allows access to other access technologies of the selected PLMN is not sufficient for normal services in EPS. Emergency calls without a valid subscription are allowed in some countries, and so the system design must also consider this case.

Allowing emergency calls in limited service forces bypassing of security mechanisms. To prevent fraud, usage is restricted to valid emergency cases only.

In GERAN and UTRAN the solution for emergency calls from ME without sufficient credentials was simply to omit authentication and ciphering. In UTRAN, integrity protection is skipped. In E-UTRAN there can be no authentication either, but the handling of this case differs from the GERAN and the UTRAN procedures. After skipping the authentication, the security procedures continue as normal but a null algorithm is used.

If the UE has no security credentials and authentication has been omitted, the algorithms and keys are not available for security mode control. However, security mode control is not skipped; rather, a null algorithm with keys that are generated locally by the EMM entities of both the UE and network is employed. A null algorithm is used for both ciphering and integrity protection. Integrity protection is not specified for GERAN and even ciphering is optional, even though usually supported and activated in live networks when possible. After the establishment of a security context, ciphering and integrity protection are normally mandatory in UTRAN and E-UTRAN. The UE will then require both ciphering and integrity protection, but for the emergency case the UE must accept the null algorithm in SECURITY MODE COMMAND.

If an authentication failure occurs during an emergency attach, then the MME is allowed to make an exception to processing of the failure and allow the emergency attach procedure to continue. Similarly, the EMM entity on the UE side must be prepared for the attach procedure to continue even after the UE has detected an authentication failure. If the network is configured to skip the authentication, then it can respond with a SECURITY MODE COMMAND, which the UE must consider as implicit acceptance of authentication. The command will indicate a null algorithm, since in this case USIM-based security is not available.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.