Conference paper

POLČÁK Libor, GRÉGR Matěj, KAJAN Michal, MATOUŠEK Petr and VESELÝ Vladimír. Designing Lawful Interception in IPv6 Networks. In: Security and Protection of Information. Brno: Brno University of Defence, 2011, pp. 114-126. ISBN 978-80-7231-777-6.
Publication language:english
Original title:Designing Lawful Interception in IPv6 Networks
Title (cs):Návrh systému pro zákonné odposlechy pro sítě IPv6
Pages:114-126
Proceedings:Security and Protection of Information
Conference:Security and Protection of Information 2011
Place:Brno, CZ
Year:2011
ISBN:978-80-7231-777-6
Publisher:Brno University of Defence
Files: 
+Type Name Title Size Modified
iconCLANEKv2.pdfDesigning Lawful Interception in IPv6 Networks714 KB2011-05-11 07:40:59
^ Select all
With selected:
Keywords
Lawful interception, IPv6, networking user identity, communication tracking.
Annotation
The aim of this paper is to enumerate major issues in designing a lawful interception system for IPv6 networks. Today, network and content providers are required to cooperate with Law Enforcement Agencies (LEAs) in order to provide a lawful interception (LI) similarly as it is required from telecommunication operators. LI in IP networks is not as easy as in telecommunications. One major challenge is the identification of a tracked person. IPv6 brings new challenges, e.g. a support of temporary IP addresses, privacy extension or default IPv6 tunnels. There are LI implementation recommendations given by US law (Communications Assistance for Law Enforcement Act - CALEA) or EU standards (defined by European Telecommunications Standards Institute - ETSI). Nevertheless, these documents do not cover IPv6 networks. This paper overviews related documents and current state-of-the-art. Then, it identifies issues of IPv6 LI and proposes possible approach to user's identity detection, and other issues related to IPv6 LI deployment - enhancement of privacy of users in small networks, issues of multicast traffic and IPv6 transition mechanisms. Finally, this paper shows an architectural design of the system based on ETSI standard and describes how ETSI functions blocks are designed. It also describes some basic considerations and issues when implementing proposed architecture. Proposed architecture is mapped onto network devices. Suggested deployment of the system allows for the scalability of eavesdropping with respect to identified issues.
BibTeX:
@INPROCEEDINGS{
   author = {Libor Polčák and Matěj Grégr and Michal Kajan and Petr
	Matoušek and Vladimír Veselý},
   title = {Designing Lawful Interception in IPv6 Networks},
   pages = {114--126},
   booktitle = {Security and Protection of Information},
   year = {2011},
   location = {Brno, CZ},
   publisher = {Brno University of Defence},
   ISBN = {978-80-7231-777-6},
   language = {english},
   url = {http://www.fit.vutbr.cz/research/view_pub.php?id=9620}
}

Your IPv4 address: 54.82.122.194
Switch to IPv6 connection

DNSSEC [dnssec]