Skip to main content

Lawful Interception in WebRTC Peer-To-Peer Communication

  • Conference paper
  • First Online:
Cyber Security Cryptography and Machine Learning (CSCML 2021)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12716))

Abstract

Lawful interception is the act of giving law enforcement officials access to communication between private individuals or organizations. According to the European Telecommunications Standards Institute (ETSI), service providers are expected to ensure that the entire contents of communication associated with the target identity being intercepted can be intercepted during the entire period of the lawful authorization, and that the delivery of the interception related information is reliable.

In traditional telephone networks, authorized surveillance takes place by duplicating the conversation data at the service provider premises and forwarding it to law enforcement agencies (LEA). The same approach is suitable for VoIP communication, as long as the data is transferred via a mediator located on the service provider’s premises. Today, direct VoIP communication between clients is the preferred approach due to better call quality and reduced network footprint. Although, VoIP service providers are obliged to provide lawful interception according to ETSI, the traditional model for lawful interception is no longer applicable for direct VoIP communication.

In this article, we present a technique to intercept direct VoIP communication between two clients using the state of the art WebRTC technology. This paper addresses an important unmet need of service providers to enable lawful interception in P2P VoIP calls. The new approach maintains high performance without degrading the user experience.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://lists.w3.org/Archives/Public/public-webrtc/2011May/0022.html.

  2. 2.

    https://webrtc.org.

  3. 3.

    https://tools.ietf.org/html/rfc4566.

  4. 4.

    https://apprtc.appspot.com.

  5. 5.

    https://github.com/webRTC-io/webRTC.io.

  6. 6.

    https://github.com/priologic/easyrtc.

  7. 7.

    http://www.asterisk.org.

  8. 8.

    https://nodejs.org.

  9. 9.

    https://github.com/peers/peerjs-server.

  10. 10.

    The detailed tutorial can be found in https://wiki.asterisk.org/wiki/display/AST/Asterisk+WebRTC+Support.

  11. 11.

    http://jssip.net.

  12. 12.

    http://sipjs.com.

  13. 13.

    https://www.doubango.org/sipml5.

  14. 14.

    https://github.com/onsip/sip.js.

  15. 15.

    https://bitbucket.org/chromiumembedded/cef.

  16. 16.

    https://www.w3.org/community/ortc.

References

  1. ETSI TC-STAG: Security techniques advisory group (stag); definition of user requirements for lawful interception of telecommunications: requirements of the law enforcement agencies (1996)

    Google Scholar 

  2. The Council of the European Union: Council resolution of 17 January 1995 on the lawful interception of telecommunications. Off. J. C 329, 0001–0006 (1996)

    Google Scholar 

  3. Rescorla, E.: WebRTC security architecture draft-ietf-rtcweb-securityarch-07. Technical report, Internet-Draft, Internet Engineering Task Force, July 2013. http://tools.ietf.org/id/draft-ietf-rtcweb-security-arch-07.txt. Accessed Jan 2014

  4. Rescorla, E.: WebRTC security architecture (2016)

    Google Scholar 

  5. Network Working Group et al.: IETF policy on wiretapping. Technical report, RFC 2804, May 2000

    Google Scholar 

  6. TR ETSI: 101 943 v2. 1.1 (10/2004) lawful interception (li). Concepts of Interception in a Generic Network Architecture

    Google Scholar 

  7. TS ETSI: 102 232-1: Lawful Interception (LI). Handover Interface and Service-Specific Details (SSD) for IP delivery, pp. 2016–03 (2008)

    Google Scholar 

  8. Lawful Interception: Handover interface and service-specific details (SSD) for IP delivery; part 5: service-specific details for IP multimedia services; ETSI TS 102 232-5 ETSI standards, Lis, Sophia Antipolis Cedex, France, vol. 2008 (2008)

    Google Scholar 

  9. Interception, L.: Handover interface for the lawful interception of telecommunications traffic. ETSI ES 201, 671 (2004)

    Google Scholar 

  10. Milanovic, A., Srbljic, S., Ražnjević, I., Sladden, D., Matošević, I., Skrobo, D.: Methods for lawful interception in IP telephony networks based on h. 323. In: EUROCON 2003. Computer as a Tool. The IEEE Region 8, vol. 1, pp. 198–202. IEEE (2003)

    Google Scholar 

  11. Milanović, A., Srbljić, S., Ražnjević, I., Sladden, D., Skrobo, D., Matošević, I.: Distributed system for lawful interception in VoUnetworks. In EUROCON: 2003. Computer as a Tool. The IEEE Region 8, vol. 1, pp. 203–207. IEEE (2003)

    Google Scholar 

  12. Baker, F., Foster, B., Sharp, C.: Cisco architecture for lawful intercept in IP networks. Technical report (2004)

    Google Scholar 

  13. Karpagavinayagam, B., State, R., Festor, O.: Monitoring architecture for lawful interception in VoIP networks. In: Second International Conference on Internet Monitoring and Protection, ICIMP 2007, pp. 5–5. IEEE (2007)

    Google Scholar 

  14. Jennings, C., Uberti, J., Rescorla, E.: Javascript session establishment protocol (2016)

    Google Scholar 

  15. Werner, M.J., Vogt, C., Schmidt, T.C.: Let our browsers socialize: building user-centric content communities on WebRTC. In: 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 37–44. IEEE (2014)

    Google Scholar 

  16. Rosenberg, J., Mahy, R., Huitema, C., Weinberger, J.: Stun-simple traversal of UDP through network address translators (2003)

    Google Scholar 

  17. Matthews, P., Mahy, R., Rosenberg, J.: Traversal using relays around nat (turn): relay extensions to session traversal utilities for nat (stun) (2010)

    Google Scholar 

  18. RTP Topologies: Internet engineering task force (IETF) M. Westerlund request for comments: 7667 Ericsson obsoletes: 5117 S. Wenger category: Informational vidyo (2015)

    Google Scholar 

  19. Singh, K., Nair, G., Schulzrinne, H.: Centralized conferencing using sip. In: Internet Telephony Workshop, vol. 7, pp. 57–63 (2001)

    Google Scholar 

  20. Johnston, A., Levin, O.: Session initiation protocol (SIP) call control-conferencing for user agents (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rami Puzis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wagner, A., Puzis, R. (2021). Lawful Interception in WebRTC Peer-To-Peer Communication. In: Dolev, S., Margalit, O., Pinkas, B., Schwarzmann, A. (eds) Cyber Security Cryptography and Machine Learning. CSCML 2021. Lecture Notes in Computer Science(), vol 12716. Springer, Cham. https://doi.org/10.1007/978-3-030-78086-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78086-9_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78085-2

  • Online ISBN: 978-3-030-78086-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics