A seamless lawful interception triggering architecture for the heterogeneous wireless networks

Myoungrak Lee, Byungsik Yoon, Hyogon Kim, Hoh In

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

Lawful Interception (LI) refers to a lawfully authorized process of looking into private communication under a court-issued warrant. Quite a number of countries have been drafting and enacting laws authorizing the LI procedures on packet-switched IP networks including traditional circuit-switched ones. As the IP mobility becomes more ubiquitous, propelled by wireless networks, it becomes an issue in the LI domain to keep track of a migrating target. However, with the world's focus on the current LI architectures, little consideration has been given to a seamless LI triggering, which accommodates IP mobility and vertical handover. Proposed herein are a seamless LI architecture and relevant triggering algorithms for the heterogeneous wireless networks. The simulation results demonstrate that the proposed architecture secures a seamless LI by capturing all the suspected target traffics without any time delay, which usually occurs during an LI triggering between different service providers. Furthermore, when compared with the existing LI architectures, the architecture significantly helps reduce transmission and the time consumed for analysis of the content of communication (CC) and intercept related information (IRI).

Original languageEnglish
Pages (from-to)473-483
Number of pages11
JournalIEICE Transactions on Information and Systems
VolumeE93-D
Issue number3
DOIs
Publication statusPublished - 2010 Apr 6

Fingerprint

Heterogeneous networks
Wireless networks
Communication
Time delay
Networks (circuits)

Keywords

  • Application identifier
  • Heterogeneous network
  • Lawful interception
  • Mobility detection
  • Multiple access

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Software
  • Artificial Intelligence
  • Hardware and Architecture
  • Computer Vision and Pattern Recognition

Cite this

A seamless lawful interception triggering architecture for the heterogeneous wireless networks. / Lee, Myoungrak; Yoon, Byungsik; Kim, Hyogon; In, Hoh.

In: IEICE Transactions on Information and Systems, Vol. E93-D, No. 3, 06.04.2010, p. 473-483.

Research output: Contribution to journalArticle

@article{b2533aee5f044b618b400b0c9150d4bf,
title = "A seamless lawful interception triggering architecture for the heterogeneous wireless networks",
abstract = "Lawful Interception (LI) refers to a lawfully authorized process of looking into private communication under a court-issued warrant. Quite a number of countries have been drafting and enacting laws authorizing the LI procedures on packet-switched IP networks including traditional circuit-switched ones. As the IP mobility becomes more ubiquitous, propelled by wireless networks, it becomes an issue in the LI domain to keep track of a migrating target. However, with the world's focus on the current LI architectures, little consideration has been given to a seamless LI triggering, which accommodates IP mobility and vertical handover. Proposed herein are a seamless LI architecture and relevant triggering algorithms for the heterogeneous wireless networks. The simulation results demonstrate that the proposed architecture secures a seamless LI by capturing all the suspected target traffics without any time delay, which usually occurs during an LI triggering between different service providers. Furthermore, when compared with the existing LI architectures, the architecture significantly helps reduce transmission and the time consumed for analysis of the content of communication (CC) and intercept related information (IRI).",
keywords = "Application identifier, Heterogeneous network, Lawful interception, Mobility detection, Multiple access",
author = "Myoungrak Lee and Byungsik Yoon and Hyogon Kim and Hoh In",
year = "2010",
month = "4",
day = "6",
doi = "10.1587/transinf.E93.D.473",
language = "English",
volume = "E93-D",
pages = "473--483",
journal = "IEICE Transactions on Information and Systems",
issn = "0916-8532",
publisher = "Maruzen Co., Ltd/Maruzen Kabushikikaisha",
number = "3",

}

TY - JOUR

T1 - A seamless lawful interception triggering architecture for the heterogeneous wireless networks

AU - Lee, Myoungrak

AU - Yoon, Byungsik

AU - Kim, Hyogon

AU - In, Hoh

PY - 2010/4/6

Y1 - 2010/4/6

N2 - Lawful Interception (LI) refers to a lawfully authorized process of looking into private communication under a court-issued warrant. Quite a number of countries have been drafting and enacting laws authorizing the LI procedures on packet-switched IP networks including traditional circuit-switched ones. As the IP mobility becomes more ubiquitous, propelled by wireless networks, it becomes an issue in the LI domain to keep track of a migrating target. However, with the world's focus on the current LI architectures, little consideration has been given to a seamless LI triggering, which accommodates IP mobility and vertical handover. Proposed herein are a seamless LI architecture and relevant triggering algorithms for the heterogeneous wireless networks. The simulation results demonstrate that the proposed architecture secures a seamless LI by capturing all the suspected target traffics without any time delay, which usually occurs during an LI triggering between different service providers. Furthermore, when compared with the existing LI architectures, the architecture significantly helps reduce transmission and the time consumed for analysis of the content of communication (CC) and intercept related information (IRI).

AB - Lawful Interception (LI) refers to a lawfully authorized process of looking into private communication under a court-issued warrant. Quite a number of countries have been drafting and enacting laws authorizing the LI procedures on packet-switched IP networks including traditional circuit-switched ones. As the IP mobility becomes more ubiquitous, propelled by wireless networks, it becomes an issue in the LI domain to keep track of a migrating target. However, with the world's focus on the current LI architectures, little consideration has been given to a seamless LI triggering, which accommodates IP mobility and vertical handover. Proposed herein are a seamless LI architecture and relevant triggering algorithms for the heterogeneous wireless networks. The simulation results demonstrate that the proposed architecture secures a seamless LI by capturing all the suspected target traffics without any time delay, which usually occurs during an LI triggering between different service providers. Furthermore, when compared with the existing LI architectures, the architecture significantly helps reduce transmission and the time consumed for analysis of the content of communication (CC) and intercept related information (IRI).

KW - Application identifier

KW - Heterogeneous network

KW - Lawful interception

KW - Mobility detection

KW - Multiple access

UR - http://www.scopus.com/inward/record.url?scp=77950284073&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77950284073&partnerID=8YFLogxK

U2 - 10.1587/transinf.E93.D.473

DO - 10.1587/transinf.E93.D.473

M3 - Article

AN - SCOPUS:77950284073

VL - E93-D

SP - 473

EP - 483

JO - IEICE Transactions on Information and Systems

JF - IEICE Transactions on Information and Systems

SN - 0916-8532

IS - 3

ER -