• About Parag Kar
  • Contact Us
Saturday, June 14, 2025
  • Login
  • Register
ParagKar.
  • Home
  • Telecom & IT
    • 5G Network
    • 6G Innovation
    • App Market Dynamics
    • Artificial Intelligence
    • Broadcast Regulation
    • Broadcasting Technology
    • Cybersecurity
    • Data Protection
    • Digital Market Reform
    • Digital Regulation
    • India Manufacturing
    • Intellectual Property
    • Mobile Business Strategy
    • Mobile Technology
    • Net Neutrality
    • Network Monetization
    • OTT Regulation
    • Policy Development
    • Privacy & Security
    • Satellite Communication
    • Satellite Spectrum Policy
    • Spectrum Auctions
    • Spectrum Policy
    • Telecom Business Challenges
    • Telecom Judgements
  • Economics & Finance
    • Banking & Personal Finance
    • Budget Analysis
    • Consumer Economics
    • Fiscal Strategy
    • GDP Analysis
    • Global Economic Trends
    • Goods & Service Tax
    • Indian Fiscal Policy
    • Inflation Analysis
    • Investment Dynamics
    • Make in India
    • Monetary Policy
  • Data Stories
    Economics & Finance Data Stories
    • Bank Credit
    • Central Bank Policies
    • Domestic Markets
    • Economic Indicators
    • External Sector
    • Indian Trade
    • State Finance & Budget
    • National Finance & Budget
    • RBI Surveys
    • Taxation & Fiscal Policy
    Telecom & IT Data Stories
    • Budget Analysis
    • India Broadband
    • India Manufacturing
    • Operator Fees
    • Operator Metric
    • Telecom KPI
    • Spectrum Auctions
  • Learn & Build
    • Python Skills
  • Videos
    Telecom & IT Videos
    • India's AGR Debacle
    • IT Rules Litigation
    • Operator Financials
    • Satellite Spectrum
    • Telecom Security
    Economics & Finance Videos
    • Inflation Analysis
    • National Income
    Learn & Build Videos
    • Python Skills
No Result
View All Result
Subscribe
ParagKar.
  • Home
  • Telecom & IT
    • 5G Network
    • 6G Innovation
    • App Market Dynamics
    • Artificial Intelligence
    • Broadcast Regulation
    • Broadcasting Technology
    • Cybersecurity
    • Data Protection
    • Digital Market Reform
    • Digital Regulation
    • India Manufacturing
    • Intellectual Property
    • Mobile Business Strategy
    • Mobile Technology
    • Net Neutrality
    • Network Monetization
    • OTT Regulation
    • Policy Development
    • Privacy & Security
    • Satellite Communication
    • Satellite Spectrum Policy
    • Spectrum Auctions
    • Spectrum Policy
    • Telecom Business Challenges
    • Telecom Judgements
  • Economics & Finance
    • Banking & Personal Finance
    • Budget Analysis
    • Consumer Economics
    • Fiscal Strategy
    • GDP Analysis
    • Global Economic Trends
    • Goods & Service Tax
    • Indian Fiscal Policy
    • Inflation Analysis
    • Investment Dynamics
    • Make in India
    • Monetary Policy
  • Data Stories
    Economics & Finance Data Stories
    • Bank Credit
    • Central Bank Policies
    • Domestic Markets
    • Economic Indicators
    • External Sector
    • Indian Trade
    • State Finance & Budget
    • National Finance & Budget
    • RBI Surveys
    • Taxation & Fiscal Policy
    Telecom & IT Data Stories
    • Budget Analysis
    • India Broadband
    • India Manufacturing
    • Operator Fees
    • Operator Metric
    • Telecom KPI
    • Spectrum Auctions
  • Learn & Build
    • Python Skills
  • Videos
    Telecom & IT Videos
    • India's AGR Debacle
    • IT Rules Litigation
    • Operator Financials
    • Satellite Spectrum
    • Telecom Security
    Economics & Finance Videos
    • Inflation Analysis
    • National Income
    Learn & Build Videos
    • Python Skills
No Result
View All Result
ParagKar.
No Result
View All Result

CNAP Without Caller Authentication: A Misguided Solution to Telecom Fraud

Without a trusted authentication framework, CNAP will not stop fraud—it will only create a false sense of security while degrading service quality.

Parag Kar by Parag Kar
8 Feb, 2025
in Telecom Security
Reading Time: 8 mins read
0
Share on Twitter

Recently, TRAI released its recommendations on the “Revision of the National Numbering Plan“, highlighting a critical security issue in India’s telecom infrastructure which is reproduced below (clause 2.38, Page 27).

Currently, the Network-Network Interface (NNI) between telecom service providers (TSPs) is built on an assumption of trust, relying on commercial agreements rather than robust technology-based security measures. This outdated trust model, combined with the expansion of interfaces such as SIP trunks for non-TSP entities, third-party SMS gateways, and open 5G architecture, has created major security vulnerabilities. These gaps enable malicious activities like CLI spoofing, IMSI theft, and unauthorized surveillance, which threaten both network integrity and user data security. The risks are further amplified by AI-driven threats, such as voice cloning combined with CLI manipulation, making it easier for fraudsters to deceive users. Recognizing this, TRAI has recommended a transition to a more secure and trusted framework, modeled after successful internet security architectures like the X.509-based Public Key Infrastructure (PKI) framework or ITU-T standards (Q.3057 and Q.3062). These frameworks introduce certificate-based authentication, potentially through a National Certification Authority (CA) or multiple CAs, to enhance signaling security across telecom networks.

You might also like

The Unstoppable Ring: Inside India’s Battle Against Spam and Fraudulent Calls

The Unstoppable Ring: Inside India’s Battle Against Spam and Fraudulent Calls

20 Dec, 2024 - Updated On 27 Dec, 2024
How SS7 Flaws Threaten Our Modern Communication Systems (

Exposing the Insecurity: How SS7 Flaws Threaten Our Modern Communication Systems

22 Sep, 2024 - Updated On 7 Nov, 2024

For a long time, I have emphasized in my writings and videos that the absence of such a trusted security framework is undermining initiatives like CNAP (Calling Name Presentation Service). Without verified caller authentication, CNAP risks displaying misleading or spoofed caller names, creating a false sense of trust rather than solving the problem of spam and call fraud. Instead of curbing scams and spoofing, it may end up being counterproductive, leading to reduced service quality, increased call setup times, and a worse user experience—without delivering any real value.

In this article, I will explain why this is the case in the simplest way possible, avoiding technical jargon, so that even a layperson can understand why a trusted framework is essential before implementing CNAP and similar services.

Purpose of CNAP (Calling Name Presentation Service)

The primary objective of CNAP is to enhance user awareness and call transparency by displaying the caller’s name, exactly as registered in the KYC (Know Your Customer) database, on the recipient’s phone screen.

By providing this additional context beyond just the phone number, CNAP empowers users to make informed decisions about whether to answer or reject a call, thereby:
✅ Reducing the risk of spam and fraudulent calls
✅ Saving time and resources by avoiding unnecessary interruptions
✅ Ensuring important calls are not missed
✅ Contributing to a safer and more secure telecom network

In essence, CNAP aims to strengthen trust in voice communication by helping users distinguish between genuine and potentially harmful calls, ultimately improving the overall security and reliability of the telecom ecosystem.

Why CNAP Without a Robust Trusted Framework is Ineffective

The Indian telecom network suffers from two critical trust issues. First, the KYC system is porous, with many SIMs issued under stolen or morphed identities. Once CNAP is implemented, it will display these fraudulent names, making the system ineffective. Just as fraudsters use rented or proxy bank accounts to launder stolen funds, they will exploit fake mobile identities, rendering CNAP useless.

Second, CNAP does not detect or block spoofed calls. Once a manipulated CLI enters the system, there is no way to verify its legitimacy, allowing fraudsters to exploit it freely. Without a real-time authentication mechanism, CNAP will display whatever name is linked to the number, whether real or spoofed.

Beyond security, CNAP relies on multiple databases for name retrieval, slowing down call setup and degrading user experience. Instead of solving fraud, a weakly implemented CNAP could introduce delays and create a false sense of trust, making the system worse rather than better.

How to Implement a Trusted Framework and Its Purpose

TRAI, in its latest recommendation (Feb 6, 2025), has proposed a secure caller authentication system that verifies both the caller and the entity initiating the call. The reason is simple—once a spoofed or morphed call enters the system, there is no way to verify its authenticity.

To prevent this, both the caller’s identity and the service provider feeding the call into the network must be verified. The originating entity must be a trusted, regulated provider, ensuring accountability in case of misuse. Once verified, this entity will cryptographically sign the caller’s identity, embedding it into the call setup. This signature remains intact throughout the call transit, preventing tampering.

At the receiving end, the terminating provider will decrypt the caller’s identity using its private key and verify it before displaying the name to the recipient. Additionally, it can cross-check the CLI with the Aadhaar database or a trusted identity source. If the caller fails verification, the call can be blocked before reaching the user—making the system truly effective rather than just displaying a potentially spoofed identity.

This approach aligns with systems already being implemented in the US and other advanced telecom markets. It not only secures calls within domestic networks but also enables trusted global interoperability. When international carriers adopt this system, they can hand over calls that are not just verified at the source but also authenticated by trusted entities, eliminating spoofing at its root.

Key Requirements for Implementing a Trusted System

The fundamental requirements for implementing a trusted call authentication system are the same as those needed for CNAP—a fully IP-based 4G and above network. It cannot be deployed on legacy 2G and 3G systems.

Since India is already testing and preparing for CNAP deployment, the groundwork for network readiness and integration modalities is likely underway. Extending this to include cryptographic verification of calls should not be a major challenge. However, without this trusted framework, CNAP will fail to deliver its intended results, as it will still display unverified and potentially spoofed caller identities.

Therefore, CNAP should only be implemented once the foundational security system is in place. Deploying it prematurely—without caller authentication—would achieve little and leave the telecom network vulnerable to the same frauds it aims to prevent.

How a Trusted System Helps in Dealing with Spoofed International Calls

India has implemented a system to combat spoofed calls originating from foreign countries, on 22nd Oct 2024, particularly from Southeast Asia. While the exact technical details are not public, it is unlikely that the system relies on a roamer database, as this would introduce high latency and risk false positives, leading to the blocking of genuine calls. Instead, it appears to be based on digit analysis and calling pattern detection, particularly identifying spoofed calls with a +91 CLI, which fraudulently appear as domestic calls.

This approach is relatively straightforward, as +91 should only be used for outgoing calls from India, not incoming ones. However, it does not fully prevent fraud, as spoofed roamers (with forged CLIs) can still bypass detection, allowing scammers to deceive Indian users.

This limitation is why countries like the U.S. do not rely on database-based systems—they are not real-time, can misidentify genuine calls, and lack scalability. The better solution is to implement a trusted authentication framework that verifies calls at the source. If verification is not possible, such calls should be marked as unverified, even if they carry an Indian CLI.

Simply tagging a call as “International” is not foolproof, as it also applies to genuine calls, creating unnecessary suspicion for legitimate communications. A trusted framework ensures real-time authentication, providing greater confidence in call validity rather than relying on assumptions based on numbering patterns.

Conclusion

The effectiveness of CNAP and other telecom security measures depends entirely on the presence of a trusted authentication framework. Without it, CNAP will merely display potentially spoofed or fraudulent caller names, creating a false sense of security rather than solving the problem. The absence of real-time caller authentication means that fraudsters can continue exploiting weaknesses in the system, whether through KYC loopholes, spoofed CLIs, or manipulated international routes.

TRAI’s proposal for cryptographic call authentication is the only scalable and effective solution to secure India’s telecom network. By verifying both the caller and the entity handling the call, this framework ensures that only legitimate, verifiable calls reach users, while unverified or fraudulent calls are flagged or blocked. Without this foundation, CNAP will not only fail to achieve its intended purpose but may also degrade service quality by introducing call setup delays and misleading users with incorrect caller identities.

The path forward is clear—India must prioritize the implementation of a trusted framework before deploying CNAP. A half-measured approach will do more harm than good, while a properly secured system will not only protect users from scams but also establish India as a global leader in telecom security.

Tags: Call Fraud PreventionCaller AuthenticationCLI SpoofingCNAPDigital AuthenticationKYC VerificationPublic Key InfrastructureSecure TelephonySpoofed CallsSTIR/SHAKENTelecom Fraud MitigationTelecom InfrastructureTelecom SecurityTRAI RecommendationsTrusted Framework
Parag Kar

Parag Kar

Related Stories

The Unstoppable Ring: Inside India’s Battle Against Spam and Fraudulent Calls

The Unstoppable Ring: Inside India’s Battle Against Spam and Fraudulent Calls

by Parag Kar
20 Dec, 2024 - Updated On 27 Dec, 2024
3

Are you fed up with calls claiming to be from the telecom regulatory authority, customs officials, or courier services like...

How SS7 Flaws Threaten Our Modern Communication Systems (

Exposing the Insecurity: How SS7 Flaws Threaten Our Modern Communication Systems

by Parag Kar
22 Sep, 2024 - Updated On 7 Nov, 2024
0

I was inspired to write this article after watching a video on the Veritasium channel titled “I Hacked My Friend's...

Evaluating the CPA's Proposed Guidelines on Unsolicited Commercial Calls

Navigating the Grey Area: Evaluating the CPA’s Proposed Guidelines on Unsolicited Commercial Calls

by Parag Kar
16 May, 2024 - Updated On 12 Nov, 2024
0

On February 15, 2024, the Ministry of Consumer Affairs, via a Press Information Bureau release, announced the formation of a committee...

CNAM-thumbnail

Navigating the Efficacy and Challenges of CNAP in India: A Comprehensive Analysis

by Parag Kar
25 Feb, 2024 - Updated On 6 Oct, 2024
0

On February 23, 2024, the Telecom Regulatory Authority of India (TRAI) announced its recommendations for deploying Calling Name Presentation (CNAP) services across...

Next Post
Quarterly U.S. GDP and Growth Trends : Adjustable Timeframe Analysis

Quarterly U.S. GDP and Growth Trends : Adjustable Timeframe Analysis

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • About Parag Kar
  • Contact Us
  • Terms & Conditions
  • Privacy Policy
  • Cancellation and Refund

© 2024 Parag Kar - All rights reserved. Designed & developed by Qgraphy.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Telecom & IT
    • 5G Network
    • 6G Innovation
    • App Market Dynamics
    • Artificial Intelligence
    • Broadcast Regulation
    • Broadcasting Technology
    • Cybersecurity
    • Data Protection
    • Digital Market Reform
    • Digital Regulation
    • India Manufacturing
    • Intellectual Property
    • Mobile Business Strategy
    • Mobile Technology
    • Net Neutrality
    • Network Monetization
    • OTT Regulation
    • Policy Development
    • Privacy and Security
    • Satellite Communication
    • Satellite Spectrum Policy
    • Spectrum Auctions
    • Spectrum Policy
    • Telecom Business Challenges
    • Telecom Judgements
    • Telecom Partnerships
    • Telecom Regulation
    • Telecom Security
    • Wireless Technology
  • Economics & Finance
    • Banking & Personal Finance
    • Budget Analysis
    • Consumer Economics
    • Fiscal Strategy
    • GDP Analysis
    • Global Economic Trends
    • Goods & Service Tax
    • Indian Fiscal Policy
    • Inflation Analysis
    • Investment Dynamics
    • Make in India
    • Monetary Policy
  • Data Stories
    • Economics & Finance Data Stories
      • Bank Credit
      • Central Bank Policies
      • Domestic Markets
      • Economic Indicators
      • External Sector
      • Global Economic Trends
      • Global Gold Trading
      • Government Debt
      • Indian Trade
      • International Finance
      • State Finance & Budget
      • National Finance & Budget
      • RBI Surveys
      • Taxation & Fiscal Policy
    • Telecom & IT Data Stories
      • Budget Analysis
      • India Broadband
      • India Manufacturing
      • Operator Fees
      • Operator Metric
      • Spectrum Auctions
      • Telecom KPI
  • Learn & Build
    • Python Skills
  • Videos
    • Telecom & IT Videos
      • India Broadband
      • India’s AGR Debacle
      • IT Rules Litigation
      • Operator Financials
      • Satellite Spectrum
      • Tech Strategy
      • Telecom Licensing
      • Telecom Security
    • Economics & Finance Videos
      • Inflation Analysis
      • State Finance & Budget
    • Learn & Build Videos
      • Python Skills
Subscribe
  • Login
  • Sign Up
  • Cart

© 2024 Parag Kar - All rights reserved. Designed & developed by Qgraphy.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?