Abstract
Issues related to lawful interception, such as invasion of privacy and efficient investigation, are presently at the forefront of social consciousness. Interception technology has to consistently evolve in order to keep pace with new and varied network structures. Thus, standard lawful interception documents that are appropriate for the existing PSTN, 2G and 3G, and packet-based communication are being proposed. In particular, newly arising services based on IP Multimedia Subsystems (IMSs) that support multimedia streaming, data transmission, and voice over IP, make lawful interception even more imperative. In this paper, we propose an architecture for IMS/Session Initiation Protocol based Lawful Interception (LI) in wireless 3G networks. We also propose LI techniques that are differentiated according to the IMS characteristics where content service providers are separated from network providers. Using the standards of dynamic triggering technologies for commissioning the authority to intercept among multiple network providers as a basis, we analyze IMS architecture and service operation methods. We then propose an LI architecture that is appropriate for IMS services. In addition, we present the results of a quality of service performance analysis conducted on our proposed interception architecture for various numbers of IMS users.
Similar content being viewed by others
References
3GPP TS 21.202: technical specifications and technical reports relating to the common IP Multimedia Subsystem (IMS), Release-11, 6 Mar 2013
3GPP TS 23.101: General Universal Mobile Telecommunications System (UMTS) architecture, Release-11, 12 Sept 2012
3GPP TS 23.228: IP Multimedia Subsystem (IMS), Release-11, 12 Sept 2012
3GPP TS 24.228: signalling flows for the IP multimedia call control based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); Stage 3, 2006
ETSI TS 101.671: Lawful Interception (LI); handover interface for the lawful interception of telecommunications traffic Ver. 3.11.1, 30 Nov 2012
Gorge M (2007) Lawful interception key concepts, actors, trends and best practice considerations. Elsevier Comput Fraud Security 2007(9):10–14
Gleave S (2007) The mechanics of lawful interception. Netw Secur 2007(5):8–11
Camarillo G, Garcia-Martin MA (2011) The 3G IP Multimedia Subsystem (IMS), merging the Internet and the cellular worlds, 3rd edn. Wiley, London
Lee M, Lee T, Yoon B, Kim H, In HP (2009) A seamless lawful interception architecture for mobile users in IEEE 802.16e Networks. J Commun Networks 11(6):626–633
ETSI DTS 102 677: Lawful Interception (LI); dynamic triggering; dynamic triggering of content of communication interception, Mar 2010
3GPP TS 21.101: technical specifications and technical reports for a UTRAN-based 3GPP system, Release-11, 6 Mar 2013
3GPP TS 22.228: service requirements for the Internet Protocol (IP) multimedia core network subsystem (IMS); Release-11, 12 Sept 2012
Handley M (2002–2007) SIP: Session Initiation Protocol, http://www.ietf.org/rfc/rfc3261.txt
Communications Assistance for Law Enforcement Act of 1994 (CALEA), Pub. L. no. 103–414, 108 Stat. 4279, Congress of the United States of America
RFC2804—“IETF Policy on Wiretapping” (2000)
3GPP TS 33.106: technical specification group services and system aspects; 3G security; lawful interception requirements, Release 11, 12 Sept 2012
National Handover Interface Specification version 1.0, Home Office (2002)
ETSI, ES 201 671: telecommunications security; Lawful Interception (LI); handover interface for the lawful interception of telecommunications traffic Ver. 3.1.1, 29 May 2007
Pang AC et al. (2004) Mobility and session management: UMTS vs. cdma2000, Wireless Communications, IEEE, 11(4), pp 30–43, Aug. 2004
ETSI TR 101.514: digital cellular telecommunications dystem (Phase 2+) Lawful Interception Requirement for GSM Ver. 8.0.0, 31 May 2001
ETSI ES 201 158: telecommunications security; Lawful Interception (LI); requirements for network functions Ver. 1.2.1, 30 April 2002
ETSI TS 101 331: technical specification; Lawful Interception (LI); requirements of law enforcement agencies Ver. 1.3.1, 12 Oct 2009
ETSI, TR 101 944: telecommunications security; Lawful Interception (LI); issues on IP interception Ver. 1.1.2, 19 Dec 2001
Juniper Networks, Inc. (2008) Juniper Networks FMC Security Solution, Feb 2008
ETSI, TS 102 232-1: Lawful Interception (LI); handover specification for IP delivery Ver. 3.4.1, 18 July 2013
ETSI TS 141 033: digital cellular telecommunications system (Phase 2+); lawful interception requirement for GSM (3GPP TR 41.033 version 11.0.0 Release 11), Nov 2012
Faccin SM, Lalwaney P, Patil B (2004) IP multimedia services: analysis of mobile IP and SIP interactions in 3G networks. IEEE Communications Magazine, Jan. 2004
Mvere T, Ventura N (2008) A mobility management framework for the IP multimedia subsystem, SATNAC
Network simulator. http://www.opnet.com/
Codec summary table. http://www.en.voipforo.com/codec/codecs.php
Milanovic A, Srbljic S, Raznjevic I, Sladden D, Skrobo D, Matosevic I (2003) Distributed system for lawful interception in VoIP networks. EUROCON 2003. Computer as a Tool. The IEEE Region 8, vol1, pp 203–207
Rojas A, Branch P, Armitage G (2007) Predictive lawful interception in mobile IPv6 networks. 15th IEEE International Conference on Networks (ICON 2007), pp 501–506
Karpagavinayagam B, State R, Festor O (2007) Monitoring architecture for lawful interception in VoIP networks, Second International Conference on Internet Monitoring and Protection (ICIMP 2007), p 5
Aljaža T, Imperla B, Švigeljb A (2008) Border gateway function performance requirements for the lawful intercept of voice at IMS architecture. Int J Electron Commun 62(8):610–621
Seedorf J (2008) Lawful interception in P2Pbased VoIP systems, IPTCOMM 2008, LNCS 5310, pp 217–235
Yang M, Liu H, Li T (2010) Implementation and performance for lawful intercept of VoIP calls based on SIP session border controller, 2010 I.E. 10th International Conference on Computer and Information Technology (CIT), pp 2635–2642
Lee M, Yoon B, Kim H, In HP (2010) A seamless lawful interception triggering architecture for the heterogeneous wireless networks. IEICE Trans E93-D(3):473–483
In HP, Lee M, Kim D, Kim N, Yoon B (2011) Seamless lawful interception handover for 3G IP Multimedia Subsystem (IMS). KSII Trans Internet Inf Syst (TIIS) 5(7):1329–1345
Sayyad MB, Nalbalwar SL (2013) Lawful interception monitoring using distributed architecture for NGN. Int J Electron Commun Eng Technol (IJECET) 4(2):129–136
Acknowledgments
This research was supported by the Next-Generation Information Computing Development and Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planing(2012M3C4A7033345), and the Ministry of Education, Science and Technology (2012R1A1A2009021). This research has been done in Korea University.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, D., Lee, J., Kim, YG. et al. 3G IP Multimedia Subsystem based framework for lawful interception. Ann. Telecommun. 69, 347–361 (2014). https://doi.org/10.1007/s12243-013-0399-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12243-013-0399-y