Skip to main content
Erschienen in: Telecommunication Systems 3/2014

01.03.2014

Implementation and performance of VoIP interception based on SIP session border controller

verfasst von: Menghui Yang, Hua Liu

Erschienen in: Telecommunication Systems | Ausgabe 3/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In an effort to provide lawful interception for session initiation protocol (SIP) voice over Internet protocol (VoIP), an interception architecture using session border controller (SBC) is proposed. Moreover, a prototype based on the proposed architecture is implemented. A testbed is set up and tests are carried out in order to analyze the performance and the capability of function entities and interfaces in the proposed architecture. Test results show that SBC interception capability in SIP signaling is superior to that in real-time transport protocol (RTP) media stream. In order to eliminate the possible bottleneck of RTP packets interception in SBC, an analytic model is proposed to investigate the mechanism in which RTP packet’s traffics are shared among different SBC media functions. Analysis results show that multiple SBC media functions can share the RTP packets arrival and can significantly decrease RTP packets service time in SBC. Test results also show that delivery function, collect function and their interfaces in the proposed interception architecture have corresponding interception performance and capability with SBC.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat American National Standards Institute (2004). Lawfully authorized electronic surveillance (LAES) for voice over packet technologies in wireline telecommunications networks, ATIS-1000678.200X (ANS T1.678), version 2. American National Standards Institute (2004). Lawfully authorized electronic surveillance (LAES) for voice over packet technologies in wireline telecommunications networks, ATIS-1000678.200X (ANS T1.678), version 2.
2.
Zurück zum Zitat Baker, F., Foster, B., & Sharp, C. (2004). Cisco architecture for lawful Intercept in IP networks, RFC 3924 (Octorber 2004). Baker, F., Foster, B., & Sharp, C. (2004). Cisco architecture for lawful Intercept in IP networks, RFC 3924 (Octorber 2004).
3.
Zurück zum Zitat Van Caenegem, B., & Skordas, T. (2007). Community research activities in secure and trustworthy ICT infrastructures. Telecommunications Systems, 35, 89–97. CrossRef Van Caenegem, B., & Skordas, T. (2007). Community research activities in secure and trustworthy ICT infrastructures. Telecommunications Systems, 35, 89–97. CrossRef
4.
Zurück zum Zitat Cable Television Laboratories (2004). PacketCable electronic surveillance specification, PKT-SP-ESP-104-040723 (July 2004). Cable Television Laboratories (2004). PacketCable electronic surveillance specification, PKT-SP-ESP-104-040723 (July 2004).
5.
Zurück zum Zitat Calhoun, P., Loughney, J., Guttman, E., Zorn, G., & Arkko, J. (2003). Diameter base protocol, RFC 3588 (Sep. 2003). Calhoun, P., Loughney, J., Guttman, E., Zorn, G., & Arkko, J. (2003). Diameter base protocol, RFC 3588 (Sep. 2003).
6.
Zurück zum Zitat CCITT (1988). Recommendation X.208, specification of abstract syntax notation one (ASN.1), X.208. CCITT (1988). Recommendation X.208, specification of abstract syntax notation one (ASN.1), X.208.
7.
Zurück zum Zitat CCITT (1988). Recommendation X.209, specification of basic encoding rules for abstract syntax notation one (ASN.1), X.209. CCITT (1988). Recommendation X.209, specification of basic encoding rules for abstract syntax notation one (ASN.1), X.209.
8.
Zurück zum Zitat Communications assistance for law enforcement act of 1994 (1994). Pub. L. No. 103-414,108 Stat. 4279. Communications assistance for law enforcement act of 1994 (1994). Pub. L. No. 103-414,108 Stat. 4279.
9.
Zurück zum Zitat Constantinescu, M., & Gheorghica, C. (2009). Secure and flexible method for SBC/firewall management. In International symposium on signals, circuits and systems, 9–10 July 2009 (pp. 1–4). Constantinescu, M., & Gheorghica, C. (2009). Secure and flexible method for SBC/firewall management. In International symposium on signals, circuits and systems, 9–10 July 2009 (pp. 1–4).
10.
Zurück zum Zitat Constantinescu, M., & Cernaianu, C. (2007). Session border controller and bandwith resource management for SIP QoS in IEEE 802.16 networks. In Proceedings of ARA (pp. 515–518). Constantinescu, M., & Cernaianu, C. (2007). Session border controller and bandwith resource management for SIP QoS in IEEE 802.16 networks. In Proceedings of ARA (pp. 515–518).
11.
Zurück zum Zitat Zhou, D., Huang, B., & Mo, Y. (2005). Distributed architecture of VOIP for firewall/NAT Traversing. In Proceedings of international conference on wireless communications, networking and mobile computing (Vol. 23–26, pp. 1160–1163). Zhou, D., Huang, B., & Mo, Y. (2005). Distributed architecture of VOIP for firewall/NAT Traversing. In Proceedings of international conference on wireless communications, networking and mobile computing (Vol. 23–26, pp. 1160–1163).
12.
Zurück zum Zitat Dhanagopal, Venkatesan, & Nagabhyru (2008). Lawful interception on session border controller using SIP. In 2nd international symposium on advanced networks and telecommunication systems, 15–17 Dec. 2008 (pp. 1–3). Dhanagopal, Venkatesan, & Nagabhyru (2008). Lawful interception on session border controller using SIP. In 2nd international symposium on advanced networks and telecommunication systems, 15–17 Dec. 2008 (pp. 1–3).
13.
Zurück zum Zitat Geneiatakis, D., & Lambrinoudakis, C. (2007). A lightweigh protection mechanism against signaling attacks. Telecommunications Systems, 36, 153–159. CrossRef Geneiatakis, D., & Lambrinoudakis, C. (2007). A lightweigh protection mechanism against signaling attacks. Telecommunications Systems, 36, 153–159. CrossRef
14.
Zurück zum Zitat ETSI TS 101 331 (2006). Lawful interception requirements of law enforcement agencies. ETSI TS 101 331 (2006). Lawful interception requirements of law enforcement agencies.
15.
Zurück zum Zitat ETSI TS 102 528 (2006). Lawful interception (LI), interception domain architecture for IP networks, technical specification (November 2006). ETSI TS 102 528 (2006). Lawful interception (LI), interception domain architecture for IP networks, technical specification (November 2006).
16.
Zurück zum Zitat ETSI 201 158 (2004). Telecommunications security, lawful interception (LI): requirements for network functions (April 2004). ETSI 201 158 (2004). Telecommunications security, lawful interception (LI): requirements for network functions (April 2004).
17.
Zurück zum Zitat ETSI TS 33 107 (2008). 3rd generation partnership project, technical specification group services and system aspects, 3G security; lawful interception architecture and functions (release 8). ETSI TS 33 107 (2008). 3rd generation partnership project, technical specification group services and system aspects, 3G security; lawful interception architecture and functions (release 8).
18.
Zurück zum Zitat Federal Communication Commission (2006). Second report and order and memorandum option and order, Washinton, DC (May 2006). Federal Communication Commission (2006). Second report and order and memorandum option and order, Washinton, DC (May 2006).
21.
Zurück zum Zitat Hsu, H.-M., Yeali, S., & Chen, M. C. (2008). A collaborative forensics framwork for VoIP services in multi-network environments. In LNCS: Vol. 5075. ISI 2008 workshops (pp. 260–271). Hsu, H.-M., Yeali, S., & Chen, M. C. (2008). A collaborative forensics framwork for VoIP services in multi-network environments. In LNCS: Vol. 5075. ISI 2008 workshops (pp. 260–271).
22.
Zurück zum Zitat IAB and IESG (2000). IETF policy on wiretapping, RFC 2804 (May 2000). IAB and IESG (2000). IETF policy on wiretapping, RFC 2804 (May 2000).
23.
Zurück zum Zitat Seedorf, J. (2008). Lawful interception in P2P-based VoIP systems. In LNCS: Vol. 5310. IPTComm 2008 (pp. 217–235). Seedorf, J. (2008). Lawful interception in P2P-based VoIP systems. In LNCS: Vol. 5310. IPTComm 2008 (pp. 217–235).
25.
Zurück zum Zitat Kolberg, Buford, Dhara, Wu, & Krishnaswamy (2009). Managing distributed feature interactions in enterprise SIP application servers. In IEEE international conference on communications, 14–18 June 2009 (pp. 1–6). Kolberg, Buford, Dhara, Wu, & Krishnaswamy (2009). Managing distributed feature interactions in enterprise SIP application servers. In IEEE international conference on communications, 14–18 June 2009 (pp. 1–6).
26.
Zurück zum Zitat Lian, S., & Stravroulakis, P. (2010). Introduction to special issue on secure multimedia services. Telecommunications Systems, 45, 1–2. CrossRef Lian, S., & Stravroulakis, P. (2010). Introduction to special issue on secure multimedia services. Telecommunications Systems, 45, 1–2. CrossRef
28.
Zurück zum Zitat Park, S. Y., & Kang, S. G. (2007). Issue analysis of lawful interception regulatory framework for IP applications. In 18th European regional ITS conference. Park, S. Y., & Kang, S. G. (2007). Issue analysis of lawful interception regulatory framework for IP applications. In 18th European regional ITS conference.
29.
Zurück zum Zitat Chen, W.-E., Lin, Y.-B., & Pang, A.-C. (2005). An IPv4-Ipv6 translation mechanism for SIP overlay network in UMTS ALL-IP environment. IEEE Journal on Selected Areas in Communications, 23(11), 2152–2160. CrossRef Chen, W.-E., Lin, Y.-B., & Pang, A.-C. (2005). An IPv4-Ipv6 translation mechanism for SIP overlay network in UMTS ALL-IP environment. IEEE Journal on Selected Areas in Communications, 23(11), 2152–2160. CrossRef
Metadaten
Titel
Implementation and performance of VoIP interception based on SIP session border controller
verfasst von
Menghui Yang
Hua Liu
Publikationsdatum
01.03.2014
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 3/2014
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-013-9792-0

Weitere Artikel der Ausgabe 3/2014

Telecommunication Systems 3/2014 Zur Ausgabe

Neuer Inhalt