A seamless Lawful interception architecture for mobile users in IEEE 802.16e networks

Myoungrak Lee, Taek Lee, Byungsik Yoon, Hyogon Kim, Hoh Peter In

    Research output: Contribution to journalArticlepeer-review

    2 Citations (Scopus)

    Abstract

    Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and enacting laws concerning the LI procedures. With the proliferation of portable Internet services such as the IEEE 802.16e wireless mobile networks, surveillance over illegal users is an emerging technical issue in LI. The evermigrating users and their changing IP's make it harder to provide support for seamless LI procedures on 802.16e networks. Few studies, however, on seamless LI support have been conducted on the 802.16e mobile networks environments. Proposed in this paper are a seamless LI architecture and algorithms for the 802.16e networks. The simulation results demonstrate that the proposed architecture improves recall rates in intercepting mobile user, when compared to the existing LI architectures.

    Original languageEnglish
    Pages (from-to)626-633
    Number of pages8
    JournalJournal of Communications and Networks
    Volume11
    Issue number6
    DOIs
    Publication statusPublished - 2009 Dec

    Keywords

    • 802.16e networks
    • Lawful interception (LI)
    • Mobile wimax
    • Mobility detection
    • Seamless tracking

    ASJC Scopus subject areas

    • Information Systems
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'A seamless Lawful interception architecture for mobile users in IEEE 802.16e networks'. Together they form a unique fingerprint.

    Cite this