Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A Seamless Lawful Interception Triggering Architecture for the Heterogeneous Wireless Networks

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Myoungrak-
dc.contributor.authorYoon, Byungsik-
dc.contributor.authorKim, Hyogon-
dc.contributor.authorIn, Hoh Peter-
dc.date.accessioned2021-09-08T04:51:52Z-
dc.date.available2021-09-08T04:51:52Z-
dc.date.created2021-06-11-
dc.date.issued2010-03-
dc.identifier.issn1745-1361-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/116908-
dc.description.abstractLawful Interception (LI) refers to a lawfully authorized process of looking into private communication under a court-issued warrant. Quite a number of countries have been drafting and enacting laws authorizing the LI procedures on packet-switched IP networks including traditional circuit-switched ones. As the IP mobility becomes more ubiquitous, propelled by wireless networks, it becomes an issue in the LI domain to keep track of a migrating target. However, with the world's focus on the current LI architectures, little consideration has been given to a seamless LI triggering, which accommodates IP mobility and vertical handover. Proposed herein are a seamless LI architecture and relevant triggering algorithms for the heterogeneous wireless networks. The simulation results demonstrate that the proposed architecture secures a seamless LI by capturing all the suspected target traffics without any time delay, which usually occurs during an LI triggering between different service providers. Furthermore, when compared with the existing LI architectures, the architecture significantly helps reduce transmission and the time consumed for analysis of the content of communication (CC) and intercept related information (IRI).-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.titleA Seamless Lawful Interception Triggering Architecture for the Heterogeneous Wireless Networks-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Hyogon-
dc.contributor.affiliatedAuthorIn, Hoh Peter-
dc.identifier.doi10.1587/transinf.E93.D.473-
dc.identifier.scopusid2-s2.0-77950284073-
dc.identifier.wosid000276759500009-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E93D, no.3, pp.473 - 483-
dc.relation.isPartOfIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.citation.titleIEICE TRANSACTIONS ON INFORMATION AND SYSTEMS-
dc.citation.volumeE93D-
dc.citation.number3-
dc.citation.startPage473-
dc.citation.endPage483-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordAuthorlawful interception-
dc.subject.keywordAuthorheterogeneous network-
dc.subject.keywordAuthormobility detection-
dc.subject.keywordAuthormultiple access-
dc.subject.keywordAuthorapplication identifier-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher IN, Hoh Peter photo

IN, Hoh Peter
컴퓨터학과
Read more

Altmetrics

Total Views & Downloads

BROWSE