Committed to connecting the world

  •  
wtisd

ITU-T Recommendations

Search by number:
Others:
Skip Navigation Links
Content search
Advanced search
Provisional name
Equivalent number
Formal description
Study Groups tree viewExpand Study Groups tree view

ITU-T Q.3062 (09/2022)

عربي | 中文 | English | Español | Français | Русский
Signalling procedures and protocols for enabling interconnection between trustable network entities in support of existing and emerging networks
Signalling system No. 7 (SS7) is a stack of signalling protocols, which was initially developed by ITU (CCITT) in the 1980s. Since then, SS7 standards have become a generic stack which is widely applied in public switched telephone networks (PSTNs) all over the world. With the growth of mobile telecommunications and the appearance of the mobile application part (MAP) and Camel application part (CAP) protocols, SS7 stack became suitable for public land mobile networks (PLMNs), e.g., 2G, 3G networks. Later, SS7 migrated to the signalling transport or SIGTRAN stack developed by the Internet Engineering Task Force (IETF) which allows operators to set up interconnection of SS7-based networks over Internet protocol (IP) networks. Furthermore, the SS7 logic migrated to Diameter signalling protocol which is currently widely used for interconnection of IP multimedia subsystem (IMS)-based networks, including 4G (VoLTE/ViLTE).
At the development stage, SS7 was designed to be managed by operators with the understanding that anyone connected to the SS7 network was considered trustworthy. With the current network environment, including interconnection over the Internet, SS7-based networks have become vulnerable and can be easily attacked. Moreover, the latest move to Diameter protocol has not solved any of the basic vulnerabilities found in SS7.
Presently, there have been multiple cases where SS7 vulnerabilities have been used for different hackers' attacks. Amongst well-known attacks on SS7 networks include telephone spam, spoofing numbers, location tracking, subscriber fraud, intercept calls and messages, denial of service (DoS), infiltration attacks, routing attacks, etc.
The goal of Recommendation ITU-T Q.3062 is to define the signalling requirements for authentication of signalling messages, in order for operators to be able to verify the authenticity of signalling exchanges based on an accepted trust anchor. This Recommendation includes codes and signalling procedures based on Recommendation ITU-T Q.3057.
Citation: https://handle.itu.int/11.1002/1000/15042
Series title: Q series: Switching and signalling, and associated measurements and tests
  Q.3000-Q.3709: Signalling requirements and protocols for the NGN
  Q.3030-Q.3099: Network signalling and control functional architecture
Approval date: 2022-09-29
Provisional name:Q.Pro-Trust
Approval process:AAP
Status: In force
Maintenance responsibility: ITU-T Study Group 11
Further details: Patent statement(s)
Development history
[8 related work items in progress]