DOI QR코드

DOI QR Code

Seamless Lawful Interception Handover for 3G IP Multimedia Subsystem (IMS)

  • In, Hoh Peter (Department of Computer Science & Engineering, Korea University) ;
  • Lee, Myoung-Rak (Department of Computer Science & Engineering, Korea University) ;
  • Kim, Do-Hoon (Department of Computer Science & Engineering, Korea University) ;
  • Kim, Nung-Hoe (Department of Computer Science & Engineering, Korea University) ;
  • Yoon, Byung-Sik (Wireless System Research Division, Electronics and Telecommunicating Research Institute (ETRI))
  • Received : 2011.02.16
  • Accepted : 2011.06.21
  • Published : 2011.07.28

Abstract

After the 9.11 terror attack, lawful Interception (LI) has emerged as an important tool for anti-terrorist activity. Law enforcement agents and administrative government bodies effectively monitor suspicious target users of permanent IP-based network devices by LI in Packet Data Networks (PDNs). However, it is difficult to perform LI in monitoring migrating users from a location to another, who change their IPs due to the proliferation of portable Internet devices enabling 3G IP Multimedia Subsystems (IMS). The existing, manual handover technique in 3G IMS makes it even more difficult to continue the LI activities due to time-lag reissuance of LI authority warrants when the target users move to a new LI jurisdiction via a roaming service. Our proposed model is a seamless LI handover mechanism in 3G IMS to support mobility detection of the target users. The LI warrants are transferred to the new LI agent automatically with the target users when they move to a new LI jurisdiction. Thus, time-lag human intervention of reissuance of the LI warrants is removed and enables the LI authorities to continue monitoring. In the simulation of our proposed mechanism, the quality of lawful interception achieves a mean score of over 97.5% out of the possible 100% maximum score, whereas the quality of the existing mechanism has a mean score of 22.725%.

Keywords

References

  1. ETSI TS 101.671: Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic, 2009.
  2. M. Gorge, "Lawful Interception Key Concepts, Actors, Trends and Best Practice Considerations," Elsevier Computer Fraud & Security, vol. 2007, no. 9, pp. 10-14, Sep. 2007. https://doi.org/10.1016/S1361-3723(07)70116-1
  3. S. Gleave, "The Mechanics of Lawful Interception," Network Security, vol. 2007, no. 5, pp 8-11, 2007. https://doi.org/10.1016/S1353-4858(07)70034-X
  4. ETSI ES 201 158: Telecommunications Security; Lawful Interception (LI); Requirements for Network Functions, 2002.
  5. M. Lee, T. Lee, B. Yoon, H. Kim and H. P. In, "A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks," Journal of Communications and Networks, vol.11, no.6, pp.626-633, 2009. https://doi.org/10.1109/JCN.2009.6388416
  6. RFC2804 "IETF Policy on Wiretapping", 2000.
  7. 3GPP TS 33.106: Technical Specification Group Servicesand System Aspects; 3G Security; Lawful Interception Requirements (Release 5), 2002.
  8. National Handover Interface Specification version 1.0, Home Office, 2002,
  9. A. Milannovic, and Ivan Matosevic, "Distributed System for Lawful Interception in VoIP Networks," in Proc. of EUROCON, 2003.
  10. Communications Assistance for Law Enforcement Act of 1994 (CALEA), Pub. L. No. 103-414, 108 Stat. 4279, Congress of the United States of America.
  11. ETSI TR 101.514: Digital cellular telecommunications System (Phase 2+) Lawful Interception Requirement for GSM, 2001.
  12. ETSI ES 201 158: Telecommunications security; Lawful Interception (LI); Requirements for Network Functions, 2002.
  13. ETSI TS 101 331: Technical Specification Lawful Interception (LI); Requirements of Law Enforcement Agencies, 2006.
  14. ETSI, ES 201 671: Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic, 2007.
  15. ETSI, TR 101 944: Telecommunications Security; Lawful Interception (LI); Issues on IP Interception, 2001.
  16. Juniper Networks FMC Security Solution.
  17. ETSI, TS 102 232-1: Lawful Interception (LI); Handover specification for IP delivery, 2008.
  18. National Handover Interface Specification version 1.0, Home Office, 2002.
  19. ETSI TR 102 053 v1.1.1 Telecommunications security; Lawful Interception (LI); Notes on ISDN Lawful Interception Functionality, 2002.
  20. ETSI TS 141 033: Digital Cellular Telecommunications System (Phase 2+); Lawful Interception Requirement for GSM (3GPP TR 41.033 version 8.0.0 Release8), 2009.
  21. S. M. Faccin, P. Lalwaney, B. Patil "IP Multimedia Services: Analysis of Mobile IP and SIP Interactions in 3G Networks," IEEE Communications Magazine, Jan. 2004.
  22. G. Camarillo, M. A Garcia-Martin, "The 3G IP Multimedia Subsystem (IMS), Merging the Internet and the Cellular Worlds," 2nd Edition, John Wiley & Sons, Ltd, 2006.
  23. R. Kalden, E. E. D. GmbH "Mobility Management in UMTS," Seminar: Datacommunication & Distributed Systems, 2003.
  24. Y.-B. Lin, Y.-R. Haung, Y.-K. Chen, I. Chlamtac, "Mobility Management: From GPRS to UMTS," Wireless Communications and Mobile Computing, vol. 1, no. 4, pp. 339-360, 2001. https://doi.org/10.1002/wcm.27
  25. R. D. Yates, D. J. Goodman, "Probability and Stochastic Processes," 2nd edition, John Willy and Sons, INC, 2005.
  26. http://as.wiley.com/WileyCDA/WileyTitle/productCd-EHEP000391.html
  27. http://www.mobilitmarketer.com/cms/news/advertising/3166.html.
  28. http://www.cellular-news.com/story/33771.php
  29. http://en.wikipedia.org/wiki/Simpson's_rule