A seamless Lawful interception architecture for mobile users in IEEE 802.16e networks

Myoungrak Lee, Taek Lee, Byungsik Yoon, Hyogon Kim, Hoh In

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and enacting laws concerning the LI procedures. With the proliferation of portable Internet services such as the IEEE 802.16e wireless mobile networks, surveillance over illegal users is an emerging technical issue in LI. The evermigrating users and their changing IP's make it harder to provide support for seamless LI procedures on 802.16e networks. Few studies, however, on seamless LI support have been conducted on the 802.16e mobile networks environments. Proposed in this paper are a seamless LI architecture and algorithms for the 802.16e networks. The simulation results demonstrate that the proposed architecture improves recall rates in intercepting mobile user, when compared to the existing LI architectures.

Original languageEnglish
Pages (from-to)626-633
Number of pages8
JournalJournal of Communications and Networks
Volume11
Issue number6
Publication statusPublished - 2009 Dec 1

Fingerprint

Wireless networks
Electronic mail
Telephone
Internet
Communication

Keywords

  • 802.16e networks
  • Lawful interception (LI)
  • Mobile wimax
  • Mobility detection
  • Seamless tracking

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

Cite this

A seamless Lawful interception architecture for mobile users in IEEE 802.16e networks. / Lee, Myoungrak; Lee, Taek; Yoon, Byungsik; Kim, Hyogon; In, Hoh.

In: Journal of Communications and Networks, Vol. 11, No. 6, 01.12.2009, p. 626-633.

Research output: Contribution to journalArticle

@article{d48df89f79034928935316b9724ec3e2,
title = "A seamless Lawful interception architecture for mobile users in IEEE 802.16e networks",
abstract = "Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and enacting laws concerning the LI procedures. With the proliferation of portable Internet services such as the IEEE 802.16e wireless mobile networks, surveillance over illegal users is an emerging technical issue in LI. The evermigrating users and their changing IP's make it harder to provide support for seamless LI procedures on 802.16e networks. Few studies, however, on seamless LI support have been conducted on the 802.16e mobile networks environments. Proposed in this paper are a seamless LI architecture and algorithms for the 802.16e networks. The simulation results demonstrate that the proposed architecture improves recall rates in intercepting mobile user, when compared to the existing LI architectures.",
keywords = "802.16e networks, Lawful interception (LI), Mobile wimax, Mobility detection, Seamless tracking",
author = "Myoungrak Lee and Taek Lee and Byungsik Yoon and Hyogon Kim and Hoh In",
year = "2009",
month = "12",
day = "1",
language = "English",
volume = "11",
pages = "626--633",
journal = "Journal of Communications and Networks",
issn = "1229-2370",
publisher = "Korean Institute of Communication Sciences",
number = "6",

}

TY - JOUR

T1 - A seamless Lawful interception architecture for mobile users in IEEE 802.16e networks

AU - Lee, Myoungrak

AU - Lee, Taek

AU - Yoon, Byungsik

AU - Kim, Hyogon

AU - In, Hoh

PY - 2009/12/1

Y1 - 2009/12/1

N2 - Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and enacting laws concerning the LI procedures. With the proliferation of portable Internet services such as the IEEE 802.16e wireless mobile networks, surveillance over illegal users is an emerging technical issue in LI. The evermigrating users and their changing IP's make it harder to provide support for seamless LI procedures on 802.16e networks. Few studies, however, on seamless LI support have been conducted on the 802.16e mobile networks environments. Proposed in this paper are a seamless LI architecture and algorithms for the 802.16e networks. The simulation results demonstrate that the proposed architecture improves recall rates in intercepting mobile user, when compared to the existing LI architectures.

AB - Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and enacting laws concerning the LI procedures. With the proliferation of portable Internet services such as the IEEE 802.16e wireless mobile networks, surveillance over illegal users is an emerging technical issue in LI. The evermigrating users and their changing IP's make it harder to provide support for seamless LI procedures on 802.16e networks. Few studies, however, on seamless LI support have been conducted on the 802.16e mobile networks environments. Proposed in this paper are a seamless LI architecture and algorithms for the 802.16e networks. The simulation results demonstrate that the proposed architecture improves recall rates in intercepting mobile user, when compared to the existing LI architectures.

KW - 802.16e networks

KW - Lawful interception (LI)

KW - Mobile wimax

KW - Mobility detection

KW - Seamless tracking

UR - http://www.scopus.com/inward/record.url?scp=74549171016&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=74549171016&partnerID=8YFLogxK

M3 - Article

VL - 11

SP - 626

EP - 633

JO - Journal of Communications and Networks

JF - Journal of Communications and Networks

SN - 1229-2370

IS - 6

ER -