3G IP Multimedia Subsystem based framework for lawful interception

Issues related to lawful interception, such as invasion of privacy and efficient investigation, are presently at the forefront of social consciousness. Interception technology has to consistently evolve in order to keep pace with new and varied network structures. Thus, standard lawful interception documents that are appropriate for the existing PSTN, 2G and 3G, and packet-based communication are being proposed. In particular, newly arising services based on IP Multimedia Subsystems (IMSs) that support multimedia streaming, data transmission, and voice over IP, make lawful interception even more imperative. In this paper, we propose an architecture for IMS/Session Initiation Protocol based Lawful Interception (LI) in wireless 3G networks. We also propose LI techniques that are differentiated according to the IMS characteristics where content service providers are separated from network providers. Using the standards of dynamic triggering technologies for commissioning the authority to intercept among multiple network providers as a basis, we analyze IMS architecture and service operation methods. We then propose an LI architecture that is appropriate for IMS services. In addition, we present the results of a quality of service performance analysis conducted on our proposed interception architecture for various numbers of IMS users.

[1]  Mathieu Gorge Lawful interception – key concepts, actors, trends and best practice considerations , 2007 .

[2]  Jyh-Cheng Chen,et al.  Mobility and session management: UMTS vs. cdma2000 , 2004, IEEE Wirel. Commun..

[3]  Tonghong Li,et al.  Implementation and Performance for Lawful Intercept of VoIP Calls based on SIP Session Border Controller , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[4]  Grenville J. Armitage,et al.  Predictive Lawful Interception in Mobile IPv6 Networks , 2007, 2007 15th IEEE International Conference on Networks.

[5]  Iesg IETF Policy on Wiretapping , 2000 .

[6]  S. Srbljic,et al.  Distributed system for lawful interception in VoIP networks , 2003, The IEEE Region 8 EUROCON 2003. Computer as a Tool..

[7]  Neco Ventura,et al.  Mobility in the IP multimedia subsystem: Network centric mobility vs. device centric mobility , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.

[8]  Hyogon Kim,et al.  A Seamless Lawful Interception Triggering Architecture for the Heterogeneous Wireless Networks , 2010, IEICE Trans. Inf. Syst..

[9]  Hyogon Kim,et al.  A seamless lawful interception architecture for mobile users in IEEE 802.16e networks , 2009, Journal of Communications and Networks.

[10]  Gonzalo Camarillo,et al.  The 3G IP Multimedia Subsystem : Merging the Internet and the Cellular Worlds , 2004 .

[11]  Stephen Gleave Lawful Interception: The mechanics of lawful interception , 2007 .

[12]  Do-Hoon Kim,et al.  Seamless Lawful Interception Handover for 3G IP Multimedia Subsystem (IMS) , 2011, KSII Trans. Internet Inf. Syst..

[13]  Gonzalo Camarillo,et al.  The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular Worlds, Second Edition , 2006 .

[14]  Ales Svigelj,et al.  Border gateway function performance requirements for the lawful intercept of voice at IMS architecture , 2008 .

[15]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[16]  B. Karpagavinayagam,et al.  Monitoring Architecture for Lawful Interception in VoIP Networks , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).

[17]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[18]  Miguel A. Garcia-Martin,et al.  The 3G IP multimedia subsystem IMS - merging the internet and the cellular worlds (2. ed.) , 2006 .

[19]  Basavaraj Patil,et al.  IP multimedia services: analysis of mobile IP and SIP interactions in 3G networks , 2004, IEEE Communications Magazine.

[20]  Jan Seedorf,et al.  Lawful Interception in P2P-Based VoIP Systems , 2008, IPTComm.