Skip to main content
Log in

Implementation and performance of VoIP interception based on SIP session border controller

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

In an effort to provide lawful interception for session initiation protocol (SIP) voice over Internet protocol (VoIP), an interception architecture using session border controller (SBC) is proposed. Moreover, a prototype based on the proposed architecture is implemented. A testbed is set up and tests are carried out in order to analyze the performance and the capability of function entities and interfaces in the proposed architecture. Test results show that SBC interception capability in SIP signaling is superior to that in real-time transport protocol (RTP) media stream. In order to eliminate the possible bottleneck of RTP packets interception in SBC, an analytic model is proposed to investigate the mechanism in which RTP packet’s traffics are shared among different SBC media functions. Analysis results show that multiple SBC media functions can share the RTP packets arrival and can significantly decrease RTP packets service time in SBC. Test results also show that delivery function, collect function and their interfaces in the proposed interception architecture have corresponding interception performance and capability with SBC.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. American National Standards Institute (2004). Lawfully authorized electronic surveillance (LAES) for voice over packet technologies in wireline telecommunications networks, ATIS-1000678.200X (ANS T1.678), version 2.

  2. Baker, F., Foster, B., & Sharp, C. (2004). Cisco architecture for lawful Intercept in IP networks, RFC 3924 (Octorber 2004).

  3. Van Caenegem, B., & Skordas, T. (2007). Community research activities in secure and trustworthy ICT infrastructures. Telecommunications Systems, 35, 89–97.

    Article  Google Scholar 

  4. Cable Television Laboratories (2004). PacketCable electronic surveillance specification, PKT-SP-ESP-104-040723 (July 2004).

  5. Calhoun, P., Loughney, J., Guttman, E., Zorn, G., & Arkko, J. (2003). Diameter base protocol, RFC 3588 (Sep. 2003).

  6. CCITT (1988). Recommendation X.208, specification of abstract syntax notation one (ASN.1), X.208.

  7. CCITT (1988). Recommendation X.209, specification of basic encoding rules for abstract syntax notation one (ASN.1), X.209.

  8. Communications assistance for law enforcement act of 1994 (1994). Pub. L. No. 103-414,108 Stat. 4279.

  9. Constantinescu, M., & Gheorghica, C. (2009). Secure and flexible method for SBC/firewall management. In International symposium on signals, circuits and systems, 9–10 July 2009 (pp. 1–4).

    Google Scholar 

  10. Constantinescu, M., & Cernaianu, C. (2007). Session border controller and bandwith resource management for SIP QoS in IEEE 802.16 networks. In Proceedings of ARA (pp. 515–518).

    Google Scholar 

  11. Zhou, D., Huang, B., & Mo, Y. (2005). Distributed architecture of VOIP for firewall/NAT Traversing. In Proceedings of international conference on wireless communications, networking and mobile computing (Vol. 23–26, pp. 1160–1163).

    Google Scholar 

  12. Dhanagopal, Venkatesan, & Nagabhyru (2008). Lawful interception on session border controller using SIP. In 2nd international symposium on advanced networks and telecommunication systems, 15–17 Dec. 2008 (pp. 1–3).

    Google Scholar 

  13. Geneiatakis, D., & Lambrinoudakis, C. (2007). A lightweigh protection mechanism against signaling attacks. Telecommunications Systems, 36, 153–159.

    Article  Google Scholar 

  14. ETSI TS 101 331 (2006). Lawful interception requirements of law enforcement agencies.

  15. ETSI TS 102 528 (2006). Lawful interception (LI), interception domain architecture for IP networks, technical specification (November 2006).

  16. ETSI 201 158 (2004). Telecommunications security, lawful interception (LI): requirements for network functions (April 2004).

  17. ETSI TS 33 107 (2008). 3rd generation partnership project, technical specification group services and system aspects, 3G security; lawful interception architecture and functions (release 8).

  18. Federal Communication Commission (2006). Second report and order and memorandum option and order, Washinton, DC (May 2006).

  19. Hardwick, J. (2008). Session border controller, enabling the voip revolution. http://www.dataconnection.com/network/download/whitepapers/sessionbordercontroller.pdf.

  20. HP (2008). Mercury LoadRunner 9.5 evaluation. http://www.loadrunner.com.

  21. Hsu, H.-M., Yeali, S., & Chen, M. C. (2008). A collaborative forensics framwork for VoIP services in multi-network environments. In LNCS: Vol. 5075. ISI 2008 workshops (pp. 260–271).

    Google Scholar 

  22. IAB and IESG (2000). IETF policy on wiretapping, RFC 2804 (May 2000).

  23. Seedorf, J. (2008). Lawful interception in P2P-based VoIP systems. In LNCS: Vol. 5310. IPTComm 2008 (pp. 217–235).

    Google Scholar 

  24. Baclor, J. (2010). OpenSBC, http://sourceforge.net/users/joegenbaclor.

  25. Kolberg, Buford, Dhara, Wu, & Krishnaswamy (2009). Managing distributed feature interactions in enterprise SIP application servers. In IEEE international conference on communications, 14–18 June 2009 (pp. 1–6).

    Google Scholar 

  26. Lian, S., & Stravroulakis, P. (2010). Introduction to special issue on secure multimedia services. Telecommunications Systems, 45, 1–2.

    Article  Google Scholar 

  27. SIPP (2010). http://sipp.sourceforge.net/.

  28. Park, S. Y., & Kang, S. G. (2007). Issue analysis of lawful interception regulatory framework for IP applications. In 18th European regional ITS conference.

    Google Scholar 

  29. Chen, W.-E., Lin, Y.-B., & Pang, A.-C. (2005). An IPv4-Ipv6 translation mechanism for SIP overlay network in UMTS ALL-IP environment. IEEE Journal on Selected Areas in Communications, 23(11), 2152–2160.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Menghui Yang.

Additional information

This paper is supported by National Natural Science Foundation of China under the grant No. 60872044, and Fundamental Research Funds for the Central Universities, and the Research Funds of Renmin University of China under the grant No. 10XNJ036.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yang, M., Liu, H. Implementation and performance of VoIP interception based on SIP session border controller. Telecommun Syst 55, 345–361 (2014). https://doi.org/10.1007/s11235-013-9792-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-013-9792-0

Keywords