ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article Seamless Lawful Interception Handover for 3G IP Multimedia Subsystem (IMS)
Cited 1 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Hoh Peter In, Myoungrak Lee, Dohoon Kim, Nunghoe Kim, Byungsik Yoon
Issue Date
2011-07
Citation
KSII Transactions on Internet and Information Systems, v.5, no.7, pp.1329-1345
ISSN
1976-7277
Publisher
한국인터넷정보학회
Language
English
Type
Journal Article
DOI
https://dx.doi.org/10.3837/tiis.2011.07.007
Abstract
After the 9.11 terror attack, lawful Interception (LI) has emerged as an important tool for anti-terrorist activity. Law enforcement agents and administrative government bodies effectively monitor suspicious target users of permanent IP-based network devices by LI in Packet Data Networks (PDNs). However, it is difficult to perform LI in monitoring migrating users from a location to another, who change their IPs due to the proliferation of portable Internet devices enabling 3G IP Multimedia Subsystems (IMS). The existing, manual handover technique in 3G IMS makes it even more difficult to continue the LI activities due to time-lag reissuance of LI authority warrants when the target users move to a new LI jurisdiction via a roaming service. Our proposed model is a seamless LI handover mechanism in 3G IMS to support mobility detection of the target users. The LI warrants are transferred to the new LI agent automatically with the target users when they move to a new LI jurisdiction. Thus, time-lag human intervention of reissuance of the LI warrants is removed and enables the LI authorities to continue monitoring. In the simulation of our proposed mechanism, the quality of lawful interception achieves a mean score of over 97.5% out of the possible 100% maximum score, whereas the quality of the existing mechanism has a mean score of 22.725%. © 2011 KSII.
KSP Keywords
Handover mechanism, IP multimedia subsystem(IMS), IP-based networks, Lawful interception, Maximum score, Mobility Detection, Network devices, Proposed model, Target Users, Time-lag, human intervention