Abstract
Lawful Interception of Voice-over-IP communications is technically more challenging than Lawful Interception in the PSTN. Currently, Lawful Interception for Voice-over-IP traffic is being standardised with respect to VoIP service architectures where central entities are on the signalling path, as this is the way VoIP is being deployed today. However, future types of VoIP service architectures may be characterised by a higher degree of decentralisation. In the extreme case, there is no central entity in the network through which signalling will pass.
As an example for such a highly decentralised VoIP system, several proposals have suggested to use a P2P-network for VoIP signalling in conjunction with the Session Initiation Protocol (SIP), commonly referred to as P2PSIP. This paradigm change to P2P-based signalling has significant implications for authorised interception of communications. In this paper, we analyse the problem of applying Lawful Interception to P2P-based Voice-over-IP systems technically, highlighting the characteristic properties of such an approach and the corresponding implications that complicate Lawful Interception. Further, we inspect potential solutions for implementing Lawful Interception in a P2PSIP system in general and discuss advantages and drawbacks of such solutions.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
American National Standards Institute: Lawfully Authorized Electronic Surveillance (LAES) for Voice over Packet Technologies in Wireline Telecommunications networks, ATIS-1000678.200X (ANS T1.678), Version 2. Draft (proposed)
Baset, S.: P2PP prototype implementation, http://www1.cs.columbia.edu/~salman/peer/
Baumgart, I.: P2PNS: A Secure Distributed Name Service for P2PSIP. In: Proceedings of the 5th IEEE International Workshop on Mobile Peer-to-Peer Computing (MP2P 2008) in conjunction with IEEE PerCom 2008, Hong Kong, China, pp. 480–485 (March 2008)
Bellovin, S., Blaze, M., Brickell, E., Brooks, C., Cerf, V., Diffie, W., Landau, S., Peterson, J., Treichler, J.: Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP, http://www.itaa.org/news/docs/CALEAVOIPreport.pdf
Bryan, D.A., Lowekamp, B.B., Jennings, C.: SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System. In: Proceedings of the International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications, Orlando, USA (June 2005)
Cable Television Laboratories: PacketCable Electronic Surveillance Specification, PKT-SP-ESP-104-040723 (July 2004)
Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. In: Proc. of the 5th Symposium on Operating Systems Design and Implementation, Boston, MA. ACM Press, New York (December 2002)
ETSI: ETSI Lawful Interception Architecture, ETSI TS 102 528 v1.1.1 Lawful Interception (LI), Interception domain Architecture for IP networks, technical specification (November 2006)
International Herald Tribune Europe: German minister defends ’Trojan horse’ spy tactic as needed to fight terror, http://www.iht.com/articles/ap/2007/08/31/europe/EU-GEN-Germany-Trojan-Horses.php
Jennings, C., Lowekamp, B., Rescorla, E., Rosenberg, J., Baset, S., Schulzrinne, H.: REsource LOcation And Discovery (RELOAD), internet draft (draft-bryan-p2psip-reload-03) (work in progress) (February 2008)
P2PSIP Status Pages:Peer-to-Peer Session Initiation Protocol (Active WG), http://tools.ietf.org/wg/p2psip/
Rappu, I.: Lawful Interception of VoIP in SIP-based Networks, Project Work, Technical-University Hamburg-Harburg (TUHH) (May 2007)
Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content-Addressable Network. In: Proc. of SIGCOMM 2001, San Diego, USA, August 27-31 (2001)
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol, RFC 3261 (June 2002), http://www.ietf.org/rfc/rfc3261.txt
Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001, vol. 2218, pp. 329–350. Springer, Heidelberg (2001)
Seedorf, J.: Security Challenges for P2P-SIP. IEEE Network Special Issue on Securing Voice over IP 20(5), 38–45 (2006)
Seedorf, J.: Using Cryptographically Generated SIP-URIs to Protect the Integrity of Content in P2P-SIP. In: 3rd Annual VoIP Security Workshop, Berlin, Germany (June 2006)
Seedorf, J., Muus, C.: Availability for DHT-based Overlay Networks with Unidirectional Routing. In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds.) WISTP 2008. LNCS, vol. 5019. Springer, Heidelberg (2008)
Singh, A., Castro, M., Druschel, P., Rowstron, A.: Defending against eclipse attacks on overlay networks. In: Proc. of the ACM SIGOPS European Workshop (September 2004)
Singh, K., Schulzrinne, H.: Peer-to-Peer Internet Telephony using SIP. In: Proc. of the international workshop on Network and operating systems support for digital audio and video, Stevenson, Washington, USA, pp. 63–68 (2005)
SIPDHT, http://sipdht.sourceforge.net
Sharp, C., Baker, F., Foster, B.: Cisco Architecture for Lawful Intercept in IP Networks, RFC 3924 (October 2004)
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications. IEEE/ACM Transactions on Networking 11(1) (February 2003)
Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D., Kubiatowicz, J.: Tapestry: A Resilient Global-Scale Overlay for Service Deployment. IEEE Journal on Selected Areas in Communications 22(1) (January 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Seedorf, J. (2008). Lawful Interception in P2P-Based VoIP Systems. In: Schulzrinne, H., State, R., Niccolini, S. (eds) Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks. IPTComm 2008. Lecture Notes in Computer Science, vol 5310. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89054-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-540-89054-6_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89053-9
Online ISBN: 978-3-540-89054-6
eBook Packages: Computer ScienceComputer Science (R0)