Detail publikace

Designing Lawful Interception in IPv6 Networks

Originální název

Designing Lawful Interception in IPv6 Networks

Anglický název

Designing Lawful Interception in IPv6 Networks

Jazyk

en

Originální abstrakt

The aim of this paper is to enumerate major issues in designing a lawful interception system for IPv6 networks. Today, network and content providers are required to cooperate with Law Enforcement Agencies (LEAs) in order to provide a lawful interception (LI) similarly as it is required from telecommunication operators. LI in IP networks is not as easy as in telecommunications. One major challenge is the identification of a tracked person. IPv6 brings new challenges, e.g. a support of temporary IP addresses, privacy extension or default IPv6 tunnels. There are LI implementation recommendations given by US law (Communications Assistance for Law Enforcement Act - CALEA) or EU standards (defined by European Telecommunications Standards Institute - ETSI). Nevertheless, these documents do not cover IPv6 networks. This paper overviews related documents and current state-of-the-art. Then, it identifies issues of IPv6 LI and proposes possible approach to user's identity detection, and other issues related to IPv6 LI deployment - enhancement of privacy of users in small networks, issues of multicast traffic and IPv6 transition mechanisms. Finally, this paper shows an architectural design of the system based on ETSI standard and describes how ETSI functions blocks are designed. It also describes some basic considerations and issues when implementing proposed architecture. Proposed architecture is mapped onto network devices. Suggested deployment of the system allows for the scalability of eavesdropping with respect to identified issues.

Anglický abstrakt

The aim of this paper is to enumerate major issues in designing a lawful interception system for IPv6 networks. Today, network and content providers are required to cooperate with Law Enforcement Agencies (LEAs) in order to provide a lawful interception (LI) similarly as it is required from telecommunication operators. LI in IP networks is not as easy as in telecommunications. One major challenge is the identification of a tracked person. IPv6 brings new challenges, e.g. a support of temporary IP addresses, privacy extension or default IPv6 tunnels. There are LI implementation recommendations given by US law (Communications Assistance for Law Enforcement Act - CALEA) or EU standards (defined by European Telecommunications Standards Institute - ETSI). Nevertheless, these documents do not cover IPv6 networks. This paper overviews related documents and current state-of-the-art. Then, it identifies issues of IPv6 LI and proposes possible approach to user's identity detection, and other issues related to IPv6 LI deployment - enhancement of privacy of users in small networks, issues of multicast traffic and IPv6 transition mechanisms. Finally, this paper shows an architectural design of the system based on ETSI standard and describes how ETSI functions blocks are designed. It also describes some basic considerations and issues when implementing proposed architecture. Proposed architecture is mapped onto network devices. Suggested deployment of the system allows for the scalability of eavesdropping with respect to identified issues.

BibTex


@inproceedings{BUT76356,
  author="Libor {Polčák} and Matěj {Grégr} and Michal {Kajan} and Petr {Matoušek} and Vladimír {Veselý}",
  title="Designing Lawful Interception in IPv6 Networks",
  annote="The aim of this paper is to enumerate major issues in designing a lawful
interception system for IPv6 networks. Today, network and content providers are
required to cooperate with Law Enforcement Agencies (LEAs) in order to provide
a lawful interception (LI) similarly as it is required from telecommunication
operators. LI in IP networks is not as easy as in telecommunications. One major
challenge is the identification of a tracked person. IPv6 brings new challenges,
e.g. a support of temporary IP addresses, privacy extension or default IPv6
tunnels. There are LI implementation recommendations given by US law
(Communications Assistance for Law Enforcement Act - CALEA) or EU standards
(defined by European Telecommunications Standards Institute - ETSI).
Nevertheless, these documents do not cover IPv6 networks. This paper overviews
related documents and current state-of-the-art. Then, it identifies issues of
IPv6 LI and proposes possible approach to user's identity detection, and other
issues related to IPv6 LI deployment - enhancement of privacy of users in small
networks, issues of multicast traffic and IPv6 transition mechanisms. Finally,
this paper shows an architectural design of the system based on ETSI standard and
describes how ETSI functions blocks are designed. It also describes some basic
considerations and issues when implementing proposed architecture. Proposed
architecture is mapped onto network devices. Suggested deployment of the system
allows for the scalability of eavesdropping with respect to identified issues.",
  address="University of Defence in Brno",
  booktitle="Security and Protection of Information",
  chapter="76356",
  edition="NEUVEDEN",
  howpublished="print",
  institution="University of Defence in Brno",
  year="2011",
  month="may",
  pages="114--126",
  publisher="University of Defence in Brno",
  type="conference paper"
}