Lawful Interception in 3G IP Multimedia Subsystem Author: Toni Mäki, Nokia Networks, toni.maki@nokia.com Supervisor: Prof. Raimo Kantola Agenda • • • • • • Network Architectures Lawful interception Goals of the thesis Capturing the signalling Capturing the user data Correlating the signalling and user data 3G Architecture CS Domain PSTN IMS Internet Access Network PS Domain IP Multimedia Subsystem (IMS) •Offers mechanisms for multimedia services like VoIP, gaming, Push-over-Cellular •Based on Session Initiation Protocol (SIP) •IMS handles only signalling, GPRS used as a bearer technology. •Users identified by their SIP URI (e.g. sip://john.doe@company.com) or TEL URI (e.g. tel:+358-555-1234567 ) IP Multimedia Subsystem IMS Signalling Layer to other 3G to PSTN/GSM CSCF MGCF to Internet / other GGSN Signalling Path to PSTN/GSM MRCF Data Path GGSN MGW MRFP SGS N GPRS Core RAN IMS Transport Layer Lawful Interception • Authorities capture the communications of certain users in order to tackle criminal activity • Ability to perform lawful interception may be a precondition for a licence to operate telecommunications network • Lawful interception is a very delicate issue. • IRI (Interception Related Information) contains signalling, interception activation statuses, etc… • CC (Content of Communications) contains the actual communications transmitted or received Lawful Interception in GPRS • The packet traffic of a user is tunnelled over the GPRS network to the Internet. • These tunnels are recognised and captured in lawful interception for GPRS. All the tunnels of targeted user are delivered to authorities. • All the GPRS signalling related to monitored user is captured (e.g. network attach, tunnel creation etc…) • Lawful interception in GPRS is based on traditional GSM user identifiers (IMSI, MSISDN, IMEI) Lawful Interception in GPRS LIE GGSN LIE SGS N LIC LIB USER ATTACHED RAN GPRS Core • Lawful Interception Controller (LIC) controls the interceptions and provides management interface • Lawful Interception Browser (LIB) buffers, refines and delivers the captured data and signalling Goals of Thesis • Design/refine the interception of IMS related IRI • Design the interception of IMS related CC • Very wide problem definition – One task was to find out the problems Methodology • The messaging was analysed using signalling flows • Standards were thoroughly studied LI in IMS (IRI) • All the SIP messages transmitted, received or executed on behalf of the user must be delivered to the authorities • Interception is activated based on SIP URI or TEL URI • CSCF recognises the SIP messages to be captured by looking into the ’To’ and ’From’ fields in the SIP message header. • CSCF also checks for the implicit registrations LI in IMS (IRI) IMS LIE Signalling Path CSCF Data Path LIC LIP Path LIE GGSN SIP messages LIE SGS N GPRS Core LIB Problems of CC LI in IMS • IMS handles only signalling traffic – CC interception has to be executed in GPRS • User identifiers used in IMS and GPRS differ – SIP URI cannot be used in GPRS interception activation – A mapping functionality must be provided – SIP URI – GPRS user identity mapping is not one to one • Current lawful interception mechanism uses user level of precision, which causes an illegal scenario Problems of CC LI in IMS IMS Gi Gi SGS N GPRS Core LI in IMS (CC) • CPS notifies the LIC about the created sessions – LIC creates GPRS interceptions for CC collection • CPS notifies the LIC about released sessions – LIC releases the GPRS interception resources LI in IMS (CC) Solution 1 • GPRS interception is activated using IMSI • Existing network elements may co-exist • The out-of-call packets need to be filtered out, before the data is forwarded to the authority LI in IMS (CC) Solution 1 UE CPS LIC LIB SGSN GGSN INVITE 200 OK SessionStarted Get IMSI IMSI Activate Interception Activate Interception Activation Response Activation Response data CC data FILTERING To LEA LI in IMS (CC) Solution 2 • GPRS interception is activate using the IP flow identifiers as target identifier • Quicker activation and less burden to the network • The CC interception is done only at the IMS entry point, GGSN LI in IMS (CC) Solution 2 UE CPS LIC LIB SGSN GGSN INVITE 200 OK SessionStarted Activate Interception data Activate Interception Activation Response Activation Response data CC data To LEA Correlation numbering • The authority needs to correlate different kinds of IRI and CC. (e.g. the GPRS resources used by an IMS session • The authority needs to be able to easily group the IRI belonging to the same session together Correlation Numbering • IMS IRI carries Session Correlation Number, List of GPRS Correlation Numbers • GPRS IRI carries only GPRS Correlation Number • IMS CC carries GPRS Correlation Number, Session Correlation Number, and Media component identifier Correlation numbering SIP IRI Event 1 GPRS CN 1 Session CN CC Data 1 GPRS CN 1 GPRS IRI Event 1 GPRS CN 1 Session CN MC CN 1 SIP IRI Event 2 CC Data 2 GPRS CN 1 GPRS CN 2 Session CN GPRS CN 2 Session CN MC CN 2 GPRS IRI Event 2 GPRS CN 2 Conclusions • IRI monitoring including the implicit registration • Capturing of content of communications in GPRS • Correlation numbering scheme QUESTIONS? Thank you for listening!