Lawful Interception in P2P-Based VoIP Systems

Lawful Interception of Voice-over-IP communications is technically more challenging than Lawful Interception in the PSTN. Currently, Lawful Interception for Voice-over-IP traffic is being standardised with respect to VoIP service architectures where central entities are on the signalling path, as this is the way VoIP is being deployed today. However, future types of VoIP service architectures may be characterised by a higher degree of decentralisation. In the extreme case, there is no central entity in the network through which signalling will pass. As an example for such a highly decentralised VoIP system, several proposals have suggested to use a P2P-network for VoIP signalling in conjunction with the Session Initiation Protocol (SIP), commonly referred to as P2PSIP. This paradigm change to P2P-based signalling has significant implications for authorised interception of communications. In this paper, we analyse the problem of applying Lawful Interception to P2P-based Voice-over-IP systems technically, highlighting the characteristic properties of such an approach and the corresponding implications that complicate Lawful Interception. Further, we inspect potential solutions for implementing Lawful Interception in a P2PSIP system in general and discuss advantages and drawbacks of such solutions.

[1]  E. Brickell,et al.  Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP , 2006 .

[2]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[3]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[4]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM 2001.

[5]  Fred Baker,et al.  Cisco Architecture for Lawful Intercept in IP Networks , 2004, RFC.

[6]  Ingmar Baumgart P2PNS: A Secure Distributed Name Service for P2PSIP , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[7]  Miguel Castro,et al.  Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.

[8]  Cullen Jennings,et al.  SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System , 2005, First International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications (AAA-IDEA'05).

[9]  Henning Schulzrinne,et al.  Peer-to-peer internet telephony using SIP , 2005, NOSSDAV '05.

[10]  Patel,et al.  Information Security: Theory and Practice , 2008 .

[11]  Jan Seedorf,et al.  Availability for DHT-Based Overlay Networks with Unidirectional Routing , 2008, WISTP.

[12]  Jan Seedorf Security challenges for peer-to-peer SIP , 2006, IEEE Network.

[13]  Ben Y. Zhao,et al.  Tapestry: a resilient global-scale overlay for service deployment , 2004, IEEE Journal on Selected Areas in Communications.

[14]  Jan Seedorf,et al.  Using Cryptographically Generated SIP-URIs to Protect the Integrity of Content in P2P-SIP , 2006 .

[15]  Miguel Castro,et al.  Defending against eclipse attacks on overlay networks , 2004, EW 11.