A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Myoungrak | - |
dc.contributor.author | Lee, Taek | - |
dc.contributor.author | Yoon, Byungsik | - |
dc.contributor.author | Kim, Hyogon | - |
dc.contributor.author | In, Hoh Peter | - |
dc.date.accessioned | 2021-09-08T10:59:46Z | - |
dc.date.available | 2021-09-08T10:59:46Z | - |
dc.date.created | 2021-06-11 | - |
dc.date.issued | 2009-12 | - |
dc.identifier.issn | 1229-2370 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/118804 | - |
dc.description.abstract | Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and enacting laws concerning the LI procedures. With the proliferation of portable Internet services such as the IEEE 802.16e wireless mobile networks, surveillance over illegal users is an emerging technical issue in LI. The ever-migrating users and their changing IP's make it harder to provide support for seamless LI procedures on 802.16e networks. Few studies, however, on seamless LI support have been conducted on the 802.16e mobile networks environments. Proposed in this paper are a seamless LI architecture and algorithms for the 802.16e networks. The simulation results demonstrate that the proposed architecture improves recall rates in intercepting mobile user, when compared to the existing LI architectures. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | KOREAN INST COMMUNICATIONS SCIENCES (K I C S) | - |
dc.title | A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | In, Hoh Peter | - |
dc.identifier.doi | 10.1109/JCN.2009.6388416 | - |
dc.identifier.scopusid | 2-s2.0-74549171016 | - |
dc.identifier.wosid | 000273441200011 | - |
dc.identifier.bibliographicCitation | JOURNAL OF COMMUNICATIONS AND NETWORKS, v.11, no.6, pp.626 - 633 | - |
dc.relation.isPartOf | JOURNAL OF COMMUNICATIONS AND NETWORKS | - |
dc.citation.title | JOURNAL OF COMMUNICATIONS AND NETWORKS | - |
dc.citation.volume | 11 | - |
dc.citation.number | 6 | - |
dc.citation.startPage | 626 | - |
dc.citation.endPage | 633 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.identifier.kciid | ART001414219 | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.description.journalRegisteredClass | kci | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | 802.16e networks | - |
dc.subject.keywordAuthor | lawful interception (LI) | - |
dc.subject.keywordAuthor | mobile WiMAX | - |
dc.subject.keywordAuthor | mobility detection | - |
dc.subject.keywordAuthor | seamless tracking | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.