<?xml-model href='http://www.tei-c.org/release/xml/tei/custom/schema/relaxng/tei_all.rng' schematypens='http://relaxng.org/ns/structure/1.0'?><TEI xmlns="http://www.tei-c.org/ns/1.0">
	<teiHeader>
		<fileDesc>
			<titleStmt><title level='a'>Nascent: Tackling Caller-ID Spoofing in 4G Networks via Efficient Network-Assisted Validation</title></titleStmt>
			<publicationStmt>
				<publisher></publisher>
				<date>04/01/2019</date>
			</publicationStmt>
			<sourceDesc>
				<bibl> 
					<idno type="par_id">10097802</idno>
					<idno type="doi">10.1109/INFOCOM.2019.8737567</idno>
					<title level='j'>IEEE INFOCOM 2019 - IEEE Conference on Computer Communications</title>
<idno></idno>
<biblScope unit="volume"></biblScope>
<biblScope unit="issue"></biblScope>					

					<author>Amit Sheoran</author><author>Sonia Fahmy</author><author>Chunyi Peng</author><author>Navin Modi</author>
				</bibl>
			</sourceDesc>
		</fileDesc>
		<profileDesc>
			<abstract><ab><![CDATA[Caller-ID spoofing deceives the callee into believing a call is originating from another user. Spoofing has been strategically used in the now-pervasive telephone fraud, causing substantial monetary loss and sensitive data leakage. Unfortunately, caller-ID spoofing is feasible even when user authentication is in place. State-of-the-art solutions either exhibit high overhead or require extensive upgrades, and thus are unlikely to be deployed in the near future. In this paper, we seek an effective and efficient solution for 4G (and conceptually 5G) carrier networks to detect (and block) caller-ID spoofing. Specifically, we propose Nascent, Network-assisted caller ID authentication, to validate the caller-ID used during call setup which may not match the previously-authenticated ID. Nascent functionality is split between data-plane gateways and call control session functions. By leveraging existing communication interfaces between the two and authentication data already available at the gateways, Nascent only requires small, standard-compatible patches to the existing 4G infrastructure. We prototype and experimentally evaluate three variants of Nascent in traditional and Network Functions Virtualization (NFV) deployments. We demonstrate that Nascent significantly reduces overhead compared to the state-of-the-art, without sacrificing effectiveness.]]></ab></abstract>
		</profileDesc>
	</teiHeader>
	<text><body xmlns="http://www.tei-c.org/ns/1.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>I. INTRODUCTION</head><p>Vulnerabilities in widely-deployed packet-based telecommunications services have raised serious concerns about the security of current infrastructure <ref type="bibr">[1]</ref>. A simple (and now pervasive) type of attack that exploits 4G Voice over LTE (VoLTE) vulnerabilities is the caller-ID spoofing attack <ref type="bibr">[2]</ref>, where an attacker impersonates another user by spoofing their telephone number or user name. An unsuspecting user may be deceived by the spoofed caller-ID displayed by their user equipment (UE) since this ID can correspond to a trusted organization such as a government agency <ref type="bibr">[3]</ref>. Telemarketers also often use caller-ID spoofing to avoid detection by caller identification systems (e.g., Truecaller <ref type="bibr">[4]</ref>), and trick users into receiving marketing calls. A recent phenomenon, neighbor spoofing <ref type="bibr">[5]</ref>, <ref type="bibr">[2]</ref>, uses a caller-ID that closely matches the receiver telephone number.</p><p>While caller-ID spoofing attacks were difficult to mount on traditional circuit-switched networks, the proliferation of SIP-based VoLTE services and easy access to caller-ID spoofing applications (e.g., SpoofCard <ref type="bibr">[6]</ref> and SpoofTel <ref type="bibr">[7]</ref>) have enabled an average telephony subscriber to mount such attacks, leading to losses in the billions of dollars <ref type="bibr">[5]</ref>.</p><p>Fundamentally, the caller-ID spoofing attack stems from a well-known vulnerability in the IP Multimedia Subsystem (IMS). Traditional IMS servers designed for Voice over IP (VoIP) do not validate the subscriber identifier in incoming call setup requests, which allows an attacker to impersonate other subscribers. Even if IMS servers can validate the caller-ID of incoming calls, the IMS network alone does not have sufficient information to validate the caller-ID <ref type="bibr">[8]</ref>. In the case of VoLTE, a user is initially authenticated, but the identity indicated in the call setup requests arriving later is not validated by the IMS.</p><p>Several solutions have been proposed to tackle caller-ID spoofing. These include network-assisted authentication using shared secrets and cryptographic encryption <ref type="bibr">[9]</ref>, end-toend certificate authentication <ref type="bibr">[10]</ref>, <ref type="bibr">[11]</ref>, <ref type="bibr">[12]</ref>, <ref type="bibr">[13]</ref>, challengeresponse authentication (between caller and callee) <ref type="bibr">[14]</ref>, and call-back validation <ref type="bibr">[15]</ref>, <ref type="bibr">[16]</ref>. Unfortunately, these solutions suffer from several drawbacks. Encryption-based solutions require additional message exchange with endpoints and expensive encryption. Certificate-based authentication requires additional infrastructure to manage and validate certificates. Call-back systems generate a validation call towards the caller-ID of an incoming call, effectively doubling the signaling workload. All endpoint-only approaches suffer from the problems that endpoints cannot always be trusted, and that a massive number of endpoints would need upgrade. These drawbacks ultimately make current solutions ineffective or infeasible to deploy. This leads us to focus our attention on designing network-assisted solutions that are efficient and easy-to-deploy.</p><p>We design a network-assisted approach to detect caller-ID spoofing, NASCENT (Network-assisted caller ID authentication). By sharing intelligence between the Evolved Packet Core (EPC) and IMS networks, carriers can efficiently and effectively detect caller-ID spoofing at runtime, without requiring major infrastructure deployment or endpoint upgrades. We leverage subscriber data already available to EPC control-plane functions, but cross validate the caller-ID of an incoming voice call at the IMS to reduce the overhead on the EPC data-plane. We make the following contributions:</p><p>1) We propose NASCENT, a new lightweight spoofing detection approach that is easy-to-deploy in 4G and beyond. 2) We develop prototypes of three variants of NASCENT.</p><p>3) We experimentally evaluate the performance of NASCENT variants, and compare them to the RFCdefined proxy-to-user authentication <ref type="bibr">[9]</ref> in both traditional and Network Functions Virtualization (NFV) de-ployments. We demonstrate that NASCENT is effective and exhibits low overhead. The remainder of this paper is organized as follows. In &#167;II, we describe VoLTE, caller-ID spoofing, and related work. In &#167;III, we compare prior network-assisted approaches to counter caller-ID spoofing. In &#167;IV, we discuss the design of our new approach, NASCENT, and in &#167;V, we experimentally evaluate NASCENT. In &#167;VI, we discuss deployment of NASCENT, and &#167;VII concludes the paper. II. BACKGROUND AND RELATED WORK 4G LTE (and beyond) advance cellular networks to a packet-switched only infrastructure, migrating traditional circuited-switched voice support to VoLTE <ref type="bibr">[17]</ref>. VoLTE carries voice traffic and its signaling in IP packets, akin to VoIP. In this section, we introduce necessary VoLTE background and explain why caller-ID spoofing is possible even with authentication in cellular networks. Finally, we summarize related work on countering caller-ID spoofing. VoLTE architecture and call setup. Figure <ref type="figure">1</ref> depicts a simplified LTE network architecture and the VoLTE call setup flow. LTE provides voice service to user equipment (UEs, i.e., phones) in its core network, which consists of two main subsystems: Evolved Packet Core (EPC) and IP Multimedia Subsystem (IMS). EPC is responsible for dataplane packet delivery and its associated control functions such as the Policy and Charging Rules Function (PCRF), user authentication, and security. The Packet Data Network Gateway (PGW) is the EPC's critical network function which forwards packets and acts as the interface to other packet data networks like the Internet and IMS. The PGW typically includes the control function commonly known as the Policy and Charging Enforcement Function (PCEF), which communicates with the PCRF for quality and billing policy enforcement. The IMS offers voice and multimedia services over IP via Call Session Control Functions (CSCFs). IMS uses the Session Initiation Protocol (SIP) <ref type="bibr">[9]</ref> for call setup signaling, which is the standard for VoIP.</p><p>A caller's UE must authenticate itself before making a call (step 1). User authentication is performed when the UE initially attaches to the network (e.g., powers on). Each UE's SIM card is associated with an International Mobile Subscriber Identity (IMSI) and a Mobile Station International Subscriber Directory Number (MSISDN) (telephone number), which are globally unique. A UE secret key is stored at the Home Subscriber Server (HSS), a user database. The Mobility Management Entity (MME) enforces user authentication towards the HSS, and updates authenticated UE information at the PGW. After that, the UE is authorized to make a call (step 2). To initiate a call, the UE sends a call setup request in a SIP INVITE message to the IMS which forwards the request to the callee. IMS later performs authentication and authorization (AA) with the PCRF (2d) and finally with the PGW (2e) using the Diameter protocol <ref type="bibr">[18]</ref>. This is needed for charging and QoS policy control. We show the signaling flow as a space-time diagram in Figure <ref type="figure">3a</ref>. Caller-ID spoofing. Caller-ID spoofing is feasible in VoLTE despite user authentication <ref type="bibr">[1]</ref>, <ref type="bibr">[19]</ref>, <ref type="bibr">[20]</ref>, <ref type="bibr">[21]</ref>. The IMS and EPC use different addressing mechanisms to identify a UE. In IMS, the caller-ID is carried in the From header in the INVITE message. This header denotes the authentic caller's telephone number in the case of no spoofing. However, there is no guarantee that the forwarded caller-ID in the (INVITE) is exactly the same as the one which was authenticated in advance (IMSI and its true phone number) or associated with the derived one (e.g., temporary ID or the IP address allocated). In fact, real-world experiments have already validated that the current practice does not enforce any binding between SIP IDs and authenticated IDs, making users vulnerable to caller-ID spoofing <ref type="bibr">[1]</ref>, <ref type="bibr">[19]</ref>, <ref type="bibr">[20]</ref>, <ref type="bibr">[21]</ref>.</p><p>The root cause of caller-ID spoofing lies in the separation between user authentication and call setup signaling. Although authentication is initially executed (to authorize making a call), no mechanism prevents the caller from later altering the forwarded ID, thus hiding its authenticated ID during call setup. Related work. Several solutions have been recently proposed in the literature. These can be categorized as endpoint-only or network-assisted. Some endpoint-only solutions <ref type="bibr">[15]</ref>, <ref type="bibr">[14]</ref> use challenge-and-response between the caller and callee, which requires the caller to respond to an SMS <ref type="bibr">[14]</ref> or a call <ref type="bibr">[15]</ref>. This requires the caller's cooperation, and mandates updates on all phones (i.e., all possible callers), which is unlikely in the foreseen future. Most network-assisted solutions either deploy an additional global authority (e.g., a public certification service <ref type="bibr">[10]</ref>, <ref type="bibr">[22]</ref>, <ref type="bibr">[23]</ref>, <ref type="bibr">[24]</ref>) or a Public Key Infrastructure (PKI) <ref type="bibr">[25]</ref> to authenticate each party before call setup. An easier-to-deploy approach is to authenticate callers at the gateway during call setup <ref type="bibr">[8]</ref>, <ref type="bibr">[26]</ref> by cross validating the forwarded ID with the authenticated one. This approach is effective in principle but has not been deployed in practice, partly because all existing solutions would incur an unacceptable performance penalty. Our work adopts this general approach but designs a practical solution compatible with current infrastructure at a much lower overhead.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>III. DESIGN GOALS AND LESSONS LEARNED</head><p>In this work, we aim to develop practical spoofing detection in carrier networks. We believe that detecting caller-ID spoofing with network-assistance is more effective and easier-to-deploy. This is because carrier networks are under the control of a few trustworthy service providers, which wish to protect users from ill-intended spoofing abuse, and enforce authentication and authorization, as commonly expected. In this section, we present our design goals and compare existing network-assisted approaches. Our objective is to understand the pros and cons of current solutions and gain insights for the design of NASCENT in &#167;IV.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. Goals</head><p>An ideal network-assisted solution should be effective, easy-to-deploy and efficient-to-run.</p><p>(1) Effectiveness. An effective solution should detect both simplistic and sophisticated attacks. In the simplest case, the caller-ID in the INVITE From header is forged. An effective solution must work when the attacker spoofs other caller-IDs carried in the From, To, or P-Asserted-Identity fields, as well as the IP address. Note that when SIP messages are tunneled using other protocols, the source/destination IP address can be easily spoofed without impacting end-to-end packet delivery.</p><p>(2) Ease of deployment. An easy-to-deploy solution requires minimal hardware and software upgrades to the existing infrastructure. Solutions should not require (i) additional infrastructure such as PKI, or (ii) non-standard protocols or interfaces. A desirable solution should leverage existing, standard-compatible components and only require software upgrades.</p><p>(3) Efficiency. An efficient solution should exhibit low overhead in three aspects. (i) Network overhead refers to additional message exchanges required to support caller-ID spoofing detection. This includes: (a) Messages exchanged between network functions (NFs) within IMS or EPC, and (b) Messages exchanged between the UE and the EPC and IMS NFs. Since the EPC and IMS networks are often colocated or connected via high-speed links, message exchange between these NFs traverses fewer hops than message exchange between the UE and core network (IMS and EPC). Traversal of more hops, coupled with the latency introduced by last-mile radio links, makes message exchange with a UE more expensive. In the core, we count the logical number of messages exchanged between NFs. In practice, NFs may be connected via multiple hops, or the functionality of an NF may be collectively implemented by multiple nodes. (ii) Computation overhead refers to overhead of message processing, e.g., cryptographic calculations have higher overhead compared to trivial comparisons. (iii) Stor-age overhead refers to memory and disk usage. Since the precise computation and storage overhead depends on the implementation and deployment model, we only classify these overheads as high or low in Table <ref type="table">I</ref>, but they highly affect our results for both the PGW and IMS in &#167;V.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. Comparison of Existing Proposals and Lessons Learned</head><p>We compare existing network-assisted solutions in Table <ref type="table">I</ref>. The standard (RFC 3261) <ref type="bibr">[9]</ref> proposes two runtime caller-ID validation approaches: a challenge-response procedure (proxy-to-user authentication) and an encrypted channel in Transport Layer Security (TLS). Both are deemed effective but not efficient or easy-to-deploy because they require additional infrastructure, exchange additional messages with the endpoints, or involve expensive computations for decryption.</p><p>Passive validation <ref type="bibr">[21]</ref> checks the caller-ID in the INVITE request only and thus is ineffective when the attacker spoofs both the IP address and the SIP header. For this reason, we do not consider it further. Some proposals utilize controlplane information available at network gateways to validate the caller-ID. iVisher <ref type="bibr">[8]</ref> validates the caller-ID by tracing the call back to the originating gateway. While effective, iVisher requires several new messages which are not standard-compatible and thus require substantial upgrades at the gateways. An alternative solution <ref type="bibr">[26]</ref> detects caller-ID spoofing by inspecting every SIP message received at the EPC gateway (e.g., PGW). This incurs high computation and storage overhead due to deep packet inspection, as the PGW is responsible for forwarding all IP packets, not just SIP INVITE. It is also expensive for the PGW to encode SIP protocol messages and terminate data-plane connections -operations typically performed by the CSCF -since the PGW is not SIP-aware.</p><p>Lessons learned. The above discussion sheds light on designing an effective, standard-compatible, low-overhead solution. First, the solution should leverage existing infrastructure and should purely be a software solution. Second, limiting the entire solution to a single data-path network function induces unacceptable overhead. The EPC gateway has the user authentication information needed for networkassisted validation but it lacks the context of VoLTE call setup. A gateway-only solution has a high computation cost (deep packet inspection) and resource waste (most packets are not VoLTE relevant). An IMS-only solution is infeasible since the IMS does not have authentication data to validate a caller-ID. Third, overhead of network communication with the endpoints is much higher communication within the core network, since messages to endpoints traverse lossy last-mile radio links and experience higher latency and more failures. Fourth, communication between network functions should exploit existing protocols and interfaces; otherwise, it is not standard-compatible and is more difficult to deploy (patch existing infrastructure).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>IV. NASCENT DESIGN</head><p>Based on the goals in &#167;III-A, we need to design an effective, low-overhead and easy-to-deploy caller-ID spoofing detection solution that does not suffer from the drawbacks of the state-of-the-art network-assisted approaches discussed in &#167;III-B.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. NASCENT Overview</head><p>Our solution, NASCENT, uses a cross validation approach. Unlike passive identifier validation solutions <ref type="bibr">[21]</ref> that only utilize information available to the IMS servers, cross validation compares UE identifiers from multiple networks: the EPC and IMS networks in our case. The idea of cross validation stems from the availability of at least one authenticated network identifier that can be reliably used to identify a network endpoint.</p><p>We make the following key decision in designing NASCENT: We split the caller-ID cross validation functionality among the IMS control plane and the PGW. We minimize expensive operations at the PGW, in order to reduce latency and overhead. Since IMS servers already manage and terminate SIP sessions, they require minimal changes to implement caller-ID validation. As shown in Figure <ref type="figure">3a</ref>, the EPC network already supports communication between the IMS servers and EPC packet gateways <ref type="bibr">[11]</ref>, <ref type="bibr">[27]</ref>, <ref type="bibr">[28]</ref>. Figure <ref type="figure">2</ref> depicts the basic idea of NASCENT. The PGW creates a of the EPC identifiers (e.g., MSISDN) and IMS identifiers (e.g., SIP Call-ID <ref type="bibr">[9]</ref>, From) when it receives an INVITE message (step 1a). Before forwarding the INVITE request to the called UE, the IMS fetches the EPC identifier associated with the INVITE message (step 3 and 3a) and cross validates the caller-ID being forwarded against the MSISDN received from the EPC. Figure <ref type="figure">2</ref> depicts a simplified view of a traditional deployment. In practice, however, the EPC and IMS functions can be decomposed and deployed as multiple Virtualized Network Functions (VNFs) or can be aggregated and deployed as a single VNF, which does not impact our design.</p><p>NASCENT consists of following three components (new steps highlighted in blue in Figure <ref type="figure">2</ref>):</p><p>(1) Mapping creation. The PGW monitors SIP messages generated by a UE and stores a mapping between the IMS and EPC identifiers when a SIP INVITE message is observed. The PGW already extracts the SIP payload from each tunneled packet and forwards this payload to the IMS servers. The PGW typically allocates a dedicated network interface (Access Point Name (APN)) for IMS signaling messages  The PGW will extract the SIP headers (Call-ID, From, To) and IP address, and save a mapping between these headers and the EPC identifiers (MSISDN, IMSI) associated with the tunnel. This is effective because the EPC network uses data tunnels to transport VoLTE signaling messages between the IMS and UE. We utilize the knowledge of tunnel identifiers associated with a UE to validate the UE identity in SIP signaling messages. The tunnel identifiers in EPC are used to transfer encrypted traffic between the PGW and UEs, and are unchanged for the duration a user session. This property of tunnel identifiers allows us to reliably associate each SIP request with a trusted identifier (MSISDN), using which runtime validation of caller-ID can be performed.</p><p>(2) Caller-ID validation. The IMS server CSCF queries the PGW for the EPC identifiers associated with a SIP INVITE message and validates the SIP headers (e.g., From, To) against the EPC identifiers. Since the PGW is configured to store the mapping of SIP headers and EPC identifiers, the CSCF uses the value extracted from the INVITE message to generate a validation request towards the PGW. The EPC network already provides well-defined, standard-compatible interfaces to communicate with IMS, and hence these interfaces can be leveraged for this operation.</p><p>(3) Mapping deletion. After replying to the CSCF, the PGW deletes the EPC and IMS identifier map for this caller-ID. Implicit deletion reduces memory requirements at the PGW since each mapping is only stored for a few milliseconds.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. NASCENT Variants</head><p>The current VoLTE architecture presents two main challenges to the design of NASCENT:</p><p>(1) The IMS AA procedure is performed after the callee is notified. As shown in Figure <ref type="figure">3a</ref>, the IMS server only triggers rule generation after receiving media information from both caller and callee (from step 1a and step 2). Without additional signaling messages, the network can only detect a spoofed call after the user is notified of an incoming voice call (post-notification). Even if a spoofed call is detected and terminated by the network, the network has no means of conveying this information to the callee, and the user would still receive a "missed call." The network can convey the spoofed call notification to the user via a SIP CANCEL message used to terminate a spoofed call, and the UEs can be upgraded to support this spoofed call notification mechanism. Optionally, the operators can employ an external notification mechanism (such as SMS) to convey the spoofed call alert. If the percentage of spoofed calls in the network is relatively low, this may be acceptable.</p><p>(2) There is no direct communication between the IMS and PGW. If the network can validate the caller identity before the voice call is forwarded to the callee (pre-notification), spurious notifications can be avoided. In this case, the IMS network must query the PGW. IMS-to-PGW communication is mediated by the PCRF (Figure <ref type="figure">3a</ref>). The IMS network uses the Diameter Rx interface <ref type="bibr">[28]</ref> to exchange messages with the PCRF. The PCRF forwards messages to the PGW using the Diameter Gx <ref type="bibr">[27]</ref> interface. A more efficient way to exchange EPC identifier information is to allow the IMS network to directly query the PGW by adding a new interface.</p><p>We therefore explore three alternative designs based on (a) whether the caller is validated before forwarding the voice call to the callee, and (b) if the EPC identifier information is queried using the existing Rx-Gx interface, or a new interface is added between the IMS and the PGW. These NASCENT variants are summarized as follows.</p><p>(1) Post-Notification. No explicit messages are exchanged between the PGW and IMS to detect a spoofed call. The PGW provides the EPC identifiers to the IMS during the normal procedure after the user receives the voice call (Figure <ref type="figure">3b</ref>). Rx and Gx messages can be modified to tunnel the additional parameters required to detect spoofing. The callee may receive a missed call notification when this variant is deployed.</p><p>(2) Pre-Notification-Rx-Gx. Caller-ID validation uses new signaling messages exchanged between the PGW and IMS prior to the INVITE message being forwarded to the callee. The PGW and IMS communicate using existing Rx and Gx interface messages and no new interfaces are required. Additional messages (Figure <ref type="figure">3c</ref>) relayed via the PCRF incur networking overhead but avoid maintaining additional configurations and connections at the PGW and IMS.</p><p>(3) Pre-Notification-Rx+. Caller-ID validation uses a new REST interface between the IMS and PGW. As shown in Figure <ref type="figure">3d</ref>, the IMS uses this new interface to validate the caller identity before forwarding the message to the callee. This incurs configuration overhead as it requires the IMS to directly communicate with the PGW that is currently serving a user, and the IMS must therefore maintain a list of currently active PGW instances in the network.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>C. Meeting Design Goals</head><p>NASCENT meets the goals of effectiveness, ease-ofdeployment, and low overhead discussed in &#167;III-A as follows (see last row in Table <ref type="table">I</ref>): (a) NASCENT is effective with sophisticated spoofing attacks through its use of tunnel identifiers, (b) NASCENT does not use PKI, does not define new protocol messages and is compatible with the standards, (c) All NASCENT variants only require few additional messages, all between NFs in the core, thus exhibiting low network overhead, (d) NASCENT does not communicate with endpoints, reducing latency and overhead, (e) NASCENT only requires the PGW to provide the EPC identifiers associated with an INVITE message, and does not require the PGW to handle SIP request/response messages or terminate transportlayer connections initiated by the UE, thus incurring low computation overhead, and (f) NASCENT only requires the PGW to maintain each EPC and IMS identifier mapping for a brief period of time (until the call is accepted/rejected) and therefore does not require significant storage at the PGW.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>V. EXPERIMENTAL EVALUATION</head><p>In this section, we quantify the throughput, resource utilization, and latency incurred in VoLTE call setup.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. Implementation and Experimental Setup</head><p>We have developed a prototype of the IMS CSCF, PCRF and PGW to emulate VoLTE calls in our test environment as shown in Figure <ref type="figure">4</ref>. The IMS consists of a SIP server that is used for handling SIP messages from the endpoints, and a policy module. We use Kamailio [29] version 5.0.4 subscriber identifiers, e.g., preferring to show a 1-800 number <ref type="bibr">[2]</ref>. NASCENT may flag these legitimate cases as caller-ID spoofing. We leave freedom to the carriers to determine what action to take once caller-ID spoofing is detected.</p><p>For instance, only spoofed calls from subscribers who use multiple or private caller-IDs, or subscribe to a legitimate spoofing service, can be allowed through. Blocking caller-ID spoofing can also be an add-on service. In NASCENT, caller-ID validation is performed at the IMS and therefore its design can be easily extended to support additional functionality. Unlike the PGW, IMS servers have access to network databases (such as HSS), which store IMS subscription information and can be used to allow legitimate caller-ID spoofing. NASCENT's mapping tables can be exposed to more services, such as SMS, to enable them to validate users.</p><p>Effective and gradual deployment. NASCENT is effective when it is deployed in the caller's network, and does not need universal deployment. NASCENT may not be helpful if only deployed in the callee's network when the forwarded ID has been spoofed. In this case, other solutions may be necessary, such as endpoint-only caller-ID spoofing detection or additional infrastructure for end-to-end authentication (e.g., via PKI or global certification infrastructure). These solutions are orthogonal and can be simultaneously used.</p><p>Extension to non-VoLTE calling. While our work focuses on VoLTE, it is conceptually applicable to other voice services such as circuit-switched calls, WiFi calling, and Internet telephony. The key idea is to enforce cross validation between the caller-ID used in the call setup and the one authenticated by the carrier networks.</p><p>Applicability to 5G. NASCENT can be naturally extended to 5G, which still uses a VoLTE-like technique to support VoIP. The use of NFV in 5G makes it even easier to detect caller-ID spoofing, as long as the proposed changes are integrated into the VNFs at the IMS and PGW. During early stages of 5G deployment, it is easier to develop built-in defense against caller-ID than to patch 4G.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>VII. CONCLUSION</head><p>In this paper, we have proposed an effective, efficient, and easy-to-deploy solution, NASCENT, for detecting caller-ID spoofing. NASCENT performs the main cross validation operations at the IMS, hence reducing the load on the EPC dataplane gateways, but leverages authentic identifier information supplied by the EPC network. We have implemented and experimented with three variants of NASCENT, and compared them to proxy-to-user authentication. We find that NASCENT achieves its goals of effectiveness and efficiency, and the three variants offer service providers flexibility to prioritize user experience, performance overhead, or deployment effort.</p></div></body>
		</text>
</TEI>
