Skip to main content
Log in

3G IP Multimedia Subsystem based framework for lawful interception

  • Published:
annals of telecommunications - annales des télécommunications Aims and scope Submit manuscript

Abstract

Issues related to lawful interception, such as invasion of privacy and efficient investigation, are presently at the forefront of social consciousness. Interception technology has to consistently evolve in order to keep pace with new and varied network structures. Thus, standard lawful interception documents that are appropriate for the existing PSTN, 2G and 3G, and packet-based communication are being proposed. In particular, newly arising services based on IP Multimedia Subsystems (IMSs) that support multimedia streaming, data transmission, and voice over IP, make lawful interception even more imperative. In this paper, we propose an architecture for IMS/Session Initiation Protocol based Lawful Interception (LI) in wireless 3G networks. We also propose LI techniques that are differentiated according to the IMS characteristics where content service providers are separated from network providers. Using the standards of dynamic triggering technologies for commissioning the authority to intercept among multiple network providers as a basis, we analyze IMS architecture and service operation methods. We then propose an LI architecture that is appropriate for IMS services. In addition, we present the results of a quality of service performance analysis conducted on our proposed interception architecture for various numbers of IMS users.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. 3GPP TS 21.202: technical specifications and technical reports relating to the common IP Multimedia Subsystem (IMS), Release-11, 6 Mar 2013

  2. 3GPP TS 23.101: General Universal Mobile Telecommunications System (UMTS) architecture, Release-11, 12 Sept 2012

  3. 3GPP TS 23.228: IP Multimedia Subsystem (IMS), Release-11, 12 Sept 2012

  4. 3GPP TS 24.228: signalling flows for the IP multimedia call control based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); Stage 3, 2006

  5. ETSI TS 101.671: Lawful Interception (LI); handover interface for the lawful interception of telecommunications traffic Ver. 3.11.1, 30 Nov 2012

  6. Gorge M (2007) Lawful interception key concepts, actors, trends and best practice considerations. Elsevier Comput Fraud Security 2007(9):10–14

    Article  Google Scholar 

  7. Gleave S (2007) The mechanics of lawful interception. Netw Secur 2007(5):8–11

    Article  Google Scholar 

  8. Camarillo G, Garcia-Martin MA (2011) The 3G IP Multimedia Subsystem (IMS), merging the Internet and the cellular worlds, 3rd edn. Wiley, London

  9. Lee M, Lee T, Yoon B, Kim H, In HP (2009) A seamless lawful interception architecture for mobile users in IEEE 802.16e Networks. J Commun Networks 11(6):626–633

    Article  Google Scholar 

  10. ETSI DTS 102 677: Lawful Interception (LI); dynamic triggering; dynamic triggering of content of communication interception, Mar 2010

  11. 3GPP TS 21.101: technical specifications and technical reports for a UTRAN-based 3GPP system, Release-11, 6 Mar 2013

  12. 3GPP TS 22.228: service requirements for the Internet Protocol (IP) multimedia core network subsystem (IMS); Release-11, 12 Sept 2012

  13. Handley M (2002–2007) SIP: Session Initiation Protocol, http://www.ietf.org/rfc/rfc3261.txt

  14. Communications Assistance for Law Enforcement Act of 1994 (CALEA), Pub. L. no. 103–414, 108 Stat. 4279, Congress of the United States of America

  15. RFC2804—“IETF Policy on Wiretapping” (2000)

  16. 3GPP TS 33.106: technical specification group services and system aspects; 3G security; lawful interception requirements, Release 11, 12 Sept 2012

  17. National Handover Interface Specification version 1.0, Home Office (2002)

  18. ETSI, ES 201 671: telecommunications security; Lawful Interception (LI); handover interface for the lawful interception of telecommunications traffic Ver. 3.1.1, 29 May 2007

  19. Pang AC et al. (2004) Mobility and session management: UMTS vs. cdma2000, Wireless Communications, IEEE, 11(4), pp 30–43, Aug. 2004

  20. ETSI TR 101.514: digital cellular telecommunications dystem (Phase 2+) Lawful Interception Requirement for GSM Ver. 8.0.0, 31 May 2001

  21. ETSI ES 201 158: telecommunications security; Lawful Interception (LI); requirements for network functions Ver. 1.2.1, 30 April 2002

  22. ETSI TS 101 331: technical specification; Lawful Interception (LI); requirements of law enforcement agencies Ver. 1.3.1, 12 Oct 2009

  23. ETSI, TR 101 944: telecommunications security; Lawful Interception (LI); issues on IP interception Ver. 1.1.2, 19 Dec 2001

  24. Juniper Networks, Inc. (2008) Juniper Networks FMC Security Solution, Feb 2008

  25. ETSI, TS 102 232-1: Lawful Interception (LI); handover specification for IP delivery Ver. 3.4.1, 18 July 2013

  26. ETSI TS 141 033: digital cellular telecommunications system (Phase 2+); lawful interception requirement for GSM (3GPP TR 41.033 version 11.0.0 Release 11), Nov 2012

  27. Faccin SM, Lalwaney P, Patil B (2004) IP multimedia services: analysis of mobile IP and SIP interactions in 3G networks. IEEE Communications Magazine, Jan. 2004

  28. Mvere T, Ventura N (2008) A mobility management framework for the IP multimedia subsystem, SATNAC

  29. Network simulator. http://www.opnet.com/

  30. Codec summary table. http://www.en.voipforo.com/codec/codecs.php

  31. Milanovic A, Srbljic S, Raznjevic I, Sladden D, Skrobo D, Matosevic I (2003) Distributed system for lawful interception in VoIP networks. EUROCON 2003. Computer as a Tool. The IEEE Region 8, vol1, pp 203–207

    Google Scholar 

  32. Rojas A, Branch P, Armitage G (2007) Predictive lawful interception in mobile IPv6 networks. 15th IEEE International Conference on Networks (ICON 2007), pp 501–506

  33. Karpagavinayagam B, State R, Festor O (2007) Monitoring architecture for lawful interception in VoIP networks, Second International Conference on Internet Monitoring and Protection (ICIMP 2007), p 5

  34. Aljaža T, Imperla B, Švigeljb A (2008) Border gateway function performance requirements for the lawful intercept of voice at IMS architecture. Int J Electron Commun 62(8):610–621

    Article  Google Scholar 

  35. Seedorf J (2008) Lawful interception in P2Pbased VoIP systems, IPTCOMM 2008, LNCS 5310, pp 217–235

  36. Yang M, Liu H, Li T (2010) Implementation and performance for lawful intercept of VoIP calls based on SIP session border controller, 2010 I.E. 10th International Conference on Computer and Information Technology (CIT), pp 2635–2642

  37. Lee M, Yoon B, Kim H, In HP (2010) A seamless lawful interception triggering architecture for the heterogeneous wireless networks. IEICE Trans E93-D(3):473–483

    Google Scholar 

  38. In HP, Lee M, Kim D, Kim N, Yoon B (2011) Seamless lawful interception handover for 3G IP Multimedia Subsystem (IMS). KSII Trans Internet Inf Syst (TIIS) 5(7):1329–1345

    Google Scholar 

  39. Sayyad MB, Nalbalwar SL (2013) Lawful interception monitoring using distributed architecture for NGN. Int J Electron Commun Eng Technol (IJECET) 4(2):129–136

    Google Scholar 

Download references

Acknowledgments

This research was supported by the Next-Generation Information Computing Development and Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planing(2012M3C4A7033345), and the Ministry of Education, Science and Technology (2012R1A1A2009021). This research has been done in Korea University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hoh Peter In.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kim, D., Lee, J., Kim, YG. et al. 3G IP Multimedia Subsystem based framework for lawful interception. Ann. Telecommun. 69, 347–361 (2014). https://doi.org/10.1007/s12243-013-0399-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-013-0399-y

Keyword

Navigation