All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Designing Lawful Interception in IPv6 Networks

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F11%3APU96055" target="_blank" >RIV/00216305:26230/11:PU96055 - isvavai.cz</a>

  • Result on the web

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    Designing Lawful Interception in IPv6 Networks

  • Original language description

    The aim of this paper is to enumerate major issues in designing a lawful interception system for IPv6 networks. Today, network and content providers are required to cooperate with Law Enforcement Agencies (LEAs) in order to provide a lawful interception(LI) similarly as it is required from telecommunication operators. LI in IP networks is not as easy as in telecommunications. One major challenge is the identification of a tracked person. IPv6 brings new challenges, e.g. a support of temporary IP addresses, privacy extension or default IPv6 tunnels. There are LI implementation recommendations given by US law (Communications Assistance for Law Enforcement Act - CALEA) or EU standards (defined by European Telecommunications Standards Institute - ETSI). Nevertheless, these documents do not cover IPv6 networks. This paper overviews related documents and current state-of-the-art. Then, it identifies issues of IPv6 LI and proposes possible approach to user&#8217;s identity detection, and oth

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/VG20102015022" target="_blank" >VG20102015022: Modern tools for detection and mitigation of cyber criminality on the New Generation Internet</a><br>

  • Continuities

    Z - Vyzkumny zamer (s odkazem do CEZ)

Others

  • Publication year

    2011

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Security and Protection of Information

  • ISBN

    978-80-7231-777-6

  • ISSN

  • e-ISSN

  • Number of pages

    13

  • Pages from-to

    114-126

  • Publisher name

    Brno University of Defence

  • Place of publication

    Brno

  • Event location

    Brno

  • Event date

    May 11, 2011

  • Type of event by nationality

    CST - Celostátní akce

  • UT code for WoS article