A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks

Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and enacting laws concerning the LI procedures. With the proliferation of portable Internet services such as the IEEE 802.16e wireless mobile net...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of communications and networks 2009, Vol.11 (6), p.626-633
Hauptverfasser: Lee, Myoung-Rak, Lee, Taek, Yoon, Byung-Sik, Kim, Hyo-Gon, In, Hoh Peter
Format: Artikel
Sprache:kor
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 633
container_issue 6
container_start_page 626
container_title Journal of communications and networks
container_volume 11
creator Lee, Myoung-Rak
Lee, Taek
Yoon, Byung-Sik
Kim, Hyo-Gon
In, Hoh Peter
description Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and enacting laws concerning the LI procedures. With the proliferation of portable Internet services such as the IEEE 802.16e wireless mobile networks, surveillance over illegal users is an emerging technical issue in LI. The evermigrating users and their changing IP's make it harder to provide support for seamless LI procedures on 802.16e networks. Few studies, however, on seamless LI support have been conducted on the 802.16e mobile networks environments. Proposed in this paper are a seamless LI architecture and algorithms for the 802.16e networks. The simulation results demonstrate that the proposed architecture improves recall rates in intercepting mobile user, when compared to the existing LI architectures.
format Article
fullrecord <record><control><sourceid>kisti</sourceid><recordid>TN_cdi_kisti_ndsl_JAKO200911764891962</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>JAKO200911764891962</sourcerecordid><originalsourceid>FETCH-kisti_ndsl_JAKO2009117648919623</originalsourceid><addsrcrecordid>eNqNyrsKwjAUgOEgCor2Hc7iWMnFXjIWqXh3UOfS1lMMxlZyIr6-Dj6A0_8Nf4-NhE7iMIrmov-1lDqUKuFDFhCZikdKpWki1YhdMjhh-bBIBLvy3bwsrFuPrsanN10LmatvxmPtXw6h6Rzsu8pYhAuhIzAtrPM8h5TLmYgRDujfnbvThA2a0hIGv47ZdJmfF6vwbsibor2SLTbZ9ig510Ik8TzVQsdS_ft9ADeKPx4</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks</title><source>IEEE Electronic Library (IEL)</source><creator>Lee, Myoung-Rak ; Lee, Taek ; Yoon, Byung-Sik ; Kim, Hyo-Gon ; In, Hoh Peter</creator><creatorcontrib>Lee, Myoung-Rak ; Lee, Taek ; Yoon, Byung-Sik ; Kim, Hyo-Gon ; In, Hoh Peter</creatorcontrib><description>Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and enacting laws concerning the LI procedures. With the proliferation of portable Internet services such as the IEEE 802.16e wireless mobile networks, surveillance over illegal users is an emerging technical issue in LI. The evermigrating users and their changing IP's make it harder to provide support for seamless LI procedures on 802.16e networks. Few studies, however, on seamless LI support have been conducted on the 802.16e mobile networks environments. Proposed in this paper are a seamless LI architecture and algorithms for the 802.16e networks. The simulation results demonstrate that the proposed architecture improves recall rates in intercepting mobile user, when compared to the existing LI architectures.</description><identifier>ISSN: 1229-2370</identifier><identifier>EISSN: 1976-5541</identifier><language>kor</language><ispartof>Journal of communications and networks, 2009, Vol.11 (6), p.626-633</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,314,780,784,885,4014</link.rule.ids></links><search><creatorcontrib>Lee, Myoung-Rak</creatorcontrib><creatorcontrib>Lee, Taek</creatorcontrib><creatorcontrib>Yoon, Byung-Sik</creatorcontrib><creatorcontrib>Kim, Hyo-Gon</creatorcontrib><creatorcontrib>In, Hoh Peter</creatorcontrib><title>A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks</title><title>Journal of communications and networks</title><addtitle>Journal of communications and networks</addtitle><description>Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and enacting laws concerning the LI procedures. With the proliferation of portable Internet services such as the IEEE 802.16e wireless mobile networks, surveillance over illegal users is an emerging technical issue in LI. The evermigrating users and their changing IP's make it harder to provide support for seamless LI procedures on 802.16e networks. Few studies, however, on seamless LI support have been conducted on the 802.16e mobile networks environments. Proposed in this paper are a seamless LI architecture and algorithms for the 802.16e networks. The simulation results demonstrate that the proposed architecture improves recall rates in intercepting mobile user, when compared to the existing LI architectures.</description><issn>1229-2370</issn><issn>1976-5541</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><sourceid>JDI</sourceid><recordid>eNqNyrsKwjAUgOEgCor2Hc7iWMnFXjIWqXh3UOfS1lMMxlZyIr6-Dj6A0_8Nf4-NhE7iMIrmov-1lDqUKuFDFhCZikdKpWki1YhdMjhh-bBIBLvy3bwsrFuPrsanN10LmatvxmPtXw6h6Rzsu8pYhAuhIzAtrPM8h5TLmYgRDujfnbvThA2a0hIGv47ZdJmfF6vwbsibor2SLTbZ9ig510Ik8TzVQsdS_ft9ADeKPx4</recordid><startdate>2009</startdate><enddate>2009</enddate><creator>Lee, Myoung-Rak</creator><creator>Lee, Taek</creator><creator>Yoon, Byung-Sik</creator><creator>Kim, Hyo-Gon</creator><creator>In, Hoh Peter</creator><scope>JDI</scope></search><sort><creationdate>2009</creationdate><title>A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks</title><author>Lee, Myoung-Rak ; Lee, Taek ; Yoon, Byung-Sik ; Kim, Hyo-Gon ; In, Hoh Peter</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-kisti_ndsl_JAKO2009117648919623</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>kor</language><creationdate>2009</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Lee, Myoung-Rak</creatorcontrib><creatorcontrib>Lee, Taek</creatorcontrib><creatorcontrib>Yoon, Byung-Sik</creatorcontrib><creatorcontrib>Kim, Hyo-Gon</creatorcontrib><creatorcontrib>In, Hoh Peter</creatorcontrib><collection>KoreaScience</collection><jtitle>Journal of communications and networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lee, Myoung-Rak</au><au>Lee, Taek</au><au>Yoon, Byung-Sik</au><au>Kim, Hyo-Gon</au><au>In, Hoh Peter</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks</atitle><jtitle>Journal of communications and networks</jtitle><addtitle>Journal of communications and networks</addtitle><date>2009</date><risdate>2009</risdate><volume>11</volume><issue>6</issue><spage>626</spage><epage>633</epage><pages>626-633</pages><issn>1229-2370</issn><eissn>1976-5541</eissn><abstract>Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and enacting laws concerning the LI procedures. With the proliferation of portable Internet services such as the IEEE 802.16e wireless mobile networks, surveillance over illegal users is an emerging technical issue in LI. The evermigrating users and their changing IP's make it harder to provide support for seamless LI procedures on 802.16e networks. Few studies, however, on seamless LI support have been conducted on the 802.16e mobile networks environments. Proposed in this paper are a seamless LI architecture and algorithms for the 802.16e networks. The simulation results demonstrate that the proposed architecture improves recall rates in intercepting mobile user, when compared to the existing LI architectures.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1229-2370
ispartof Journal of communications and networks, 2009, Vol.11 (6), p.626-633
issn 1229-2370
1976-5541
language kor
recordid cdi_kisti_ndsl_JAKO200911764891962
source IEEE Electronic Library (IEL)
title A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T03%3A37%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-kisti&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Seamless%20Lawful%20Interception%20Architecture%20for%20Mobile%20Users%20in%20IEEE%20802.16e%20Networks&rft.jtitle=Journal%20of%20communications%20and%20networks&rft.au=Lee,%20Myoung-Rak&rft.date=2009&rft.volume=11&rft.issue=6&rft.spage=626&rft.epage=633&rft.pages=626-633&rft.issn=1229-2370&rft.eissn=1976-5541&rft_id=info:doi/&rft_dat=%3Ckisti%3EJAKO200911764891962%3C/kisti%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true