Abstract
Lawful interception is the act of giving law enforcement officials access to communication between private individuals or organizations. According to the European Telecommunications Standards Institute (ETSI), service providers are expected to ensure that the entire contents of communication associated with the target identity being intercepted can be intercepted during the entire period of the lawful authorization, and that the delivery of the interception related information is reliable.
In traditional telephone networks, authorized surveillance takes place by duplicating the conversation data at the service provider premises and forwarding it to law enforcement agencies (LEA). The same approach is suitable for VoIP communication, as long as the data is transferred via a mediator located on the service provider’s premises. Today, direct VoIP communication between clients is the preferred approach due to better call quality and reduced network footprint. Although, VoIP service providers are obliged to provide lawful interception according to ETSI, the traditional model for lawful interception is no longer applicable for direct VoIP communication.
In this article, we present a technique to intercept direct VoIP communication between two clients using the state of the art WebRTC technology. This paper addresses an important unmet need of service providers to enable lawful interception in P2P VoIP calls. The new approach maintains high performance without degrading the user experience.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
- 10.
The detailed tutorial can be found in https://wiki.asterisk.org/wiki/display/AST/Asterisk+WebRTC+Support.
- 11.
- 12.
- 13.
- 14.
- 15.
- 16.
References
ETSI TC-STAG: Security techniques advisory group (stag); definition of user requirements for lawful interception of telecommunications: requirements of the law enforcement agencies (1996)
The Council of the European Union: Council resolution of 17 January 1995 on the lawful interception of telecommunications. Off. J. C 329, 0001–0006 (1996)
Rescorla, E.: WebRTC security architecture draft-ietf-rtcweb-securityarch-07. Technical report, Internet-Draft, Internet Engineering Task Force, July 2013. http://tools.ietf.org/id/draft-ietf-rtcweb-security-arch-07.txt. Accessed Jan 2014
Rescorla, E.: WebRTC security architecture (2016)
Network Working Group et al.: IETF policy on wiretapping. Technical report, RFC 2804, May 2000
TR ETSI: 101 943 v2. 1.1 (10/2004) lawful interception (li). Concepts of Interception in a Generic Network Architecture
TS ETSI: 102 232-1: Lawful Interception (LI). Handover Interface and Service-Specific Details (SSD) for IP delivery, pp. 2016–03 (2008)
Lawful Interception: Handover interface and service-specific details (SSD) for IP delivery; part 5: service-specific details for IP multimedia services; ETSI TS 102 232-5 ETSI standards, Lis, Sophia Antipolis Cedex, France, vol. 2008 (2008)
Interception, L.: Handover interface for the lawful interception of telecommunications traffic. ETSI ES 201, 671 (2004)
Milanovic, A., Srbljic, S., Ražnjević, I., Sladden, D., Matošević, I., Skrobo, D.: Methods for lawful interception in IP telephony networks based on h. 323. In: EUROCON 2003. Computer as a Tool. The IEEE Region 8, vol. 1, pp. 198–202. IEEE (2003)
Milanović, A., Srbljić, S., Ražnjević, I., Sladden, D., Skrobo, D., Matošević, I.: Distributed system for lawful interception in VoUnetworks. In EUROCON: 2003. Computer as a Tool. The IEEE Region 8, vol. 1, pp. 203–207. IEEE (2003)
Baker, F., Foster, B., Sharp, C.: Cisco architecture for lawful intercept in IP networks. Technical report (2004)
Karpagavinayagam, B., State, R., Festor, O.: Monitoring architecture for lawful interception in VoIP networks. In: Second International Conference on Internet Monitoring and Protection, ICIMP 2007, pp. 5–5. IEEE (2007)
Jennings, C., Uberti, J., Rescorla, E.: Javascript session establishment protocol (2016)
Werner, M.J., Vogt, C., Schmidt, T.C.: Let our browsers socialize: building user-centric content communities on WebRTC. In: 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 37–44. IEEE (2014)
Rosenberg, J., Mahy, R., Huitema, C., Weinberger, J.: Stun-simple traversal of UDP through network address translators (2003)
Matthews, P., Mahy, R., Rosenberg, J.: Traversal using relays around nat (turn): relay extensions to session traversal utilities for nat (stun) (2010)
RTP Topologies: Internet engineering task force (IETF) M. Westerlund request for comments: 7667 Ericsson obsoletes: 5117 S. Wenger category: Informational vidyo (2015)
Singh, K., Nair, G., Schulzrinne, H.: Centralized conferencing using sip. In: Internet Telephony Workshop, vol. 7, pp. 57–63 (2001)
Johnston, A., Levin, O.: Session initiation protocol (SIP) call control-conferencing for user agents (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Wagner, A., Puzis, R. (2021). Lawful Interception in WebRTC Peer-To-Peer Communication. In: Dolev, S., Margalit, O., Pinkas, B., Schwarzmann, A. (eds) Cyber Security Cryptography and Machine Learning. CSCML 2021. Lecture Notes in Computer Science(), vol 12716. Springer, Cham. https://doi.org/10.1007/978-3-030-78086-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-78086-9_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78085-2
Online ISBN: 978-3-030-78086-9
eBook Packages: Computer ScienceComputer Science (R0)