Tech-invite  3GPPspecsRELsGlossariesSIP
Info21222324252627282931323334353637384‑5x

Top   in Index   Prev   Next

TR 33.827SA3
Study on providing for Lawful Interception (LI)
in the S8 Home Routeing (S8HR) architecture
for Voice over LTE (VoLTE)

use "3GPP‑Page" to get the Word version
for a better overview, the Table of Contents (ToC) is reproduced
V14.0.0 (Wzip)  2016/09  53 p.

Rapporteur:  Mr. Schumacher, Greg

The present document studies and identifies the changes to the LI architecture, function and protocols for inbound roamers in the VPLMN when S8HR is employed which is equivalent to the LI service level for Local Breakout (LBO) in the VPLMN for VoLTE services. Covered by the present document includes:
  • Potential enhancements to the LI service architecture to accommodate the S8HR roaming architecture in the VPLMN to meet all the current LI regulatory requirements applicable to voice and other IMS service roaming are considered and compared.
  • Considerations on maximizing re-use of existing 3GPP defined capabilities such as PCC is considered.
  • Exploration of the changes that may be needed to TS 33.107 and TS 33.108. Finally, the present document provides recommendations for proceeding with implementing the selected approach.
This study item takes into account GSMA related activities.

full Table of Contents for  TR 33.827  Word version:   14.0.0

Here   Top
1  ScopeWord-p. 8
2  References
3  Definitions, symbols and abbreviationsWord-p. 9
4  Assumptions, architecture requirements and protocol requirements
5  Key issues
5.1  Key issue #1 - IMEI targeted LI
5.2  Key issue #2 -Tel-URI or SIP-URI targeted LIWord-p. 12
5.3  Key issue #3 - LI targeted S8 GTP selection criteriaUp
5.4  Key Issue #4 - Obtaining network provided location
5.5  Key issue #5 - Intra-access handover or anchor change impact
5.6  Key issue #6 - Detecting targeted signalling unknown or unrecognized by the VPLMN
5.7  Key issue #7 - Maintaining intra-PLMN and inter-PLMN LI undetectability
5.8  Key issue #8 - Detecting implicit IMS registrations
5.9  Key issue #9 - Retained data
5.10  Key issue #10 - Prevention of unwanted use of confidentiality mechanismsWord-p. 16
5.11  Key issue #11 - Non-Local Identity
5.12  Key issue #12 - Non-3GPP codec or 3GPP codec in a non-3GPP mode in CC
5.13  Key issue #13 - Start of interception with ongoing VoLTE callUp
5.14  Key issue #14 - Correlation of CC with IRI
5.15  Key issue #15 - Signalling CompressionWord-p. 19
6  Solutions
6.1  Solution #1 S-GW/BBIFF based GTP tunnel extraction
6.1.1  Description
6.1.2  S-GW/BBIFF based GTP tunnel extraction architecture reference modelWord-p. 20
6.1.3  Process Flow for Architectural Approach of Solution #1
6.1.4  Call Flow for architectural approach of Solution #1Word-p. 24
6.1.5  Solution approach to key issuesWord-p. 25
6.1.5.1  Approach to key issue #1 - IMEI targeted LI
6.1.5.2  Approach to key issue #2 - Tel-URI or SIP-URI targeted LIUp
6.1.5.3  Approach to key issue #3 - LI targeted S8 GTP selection criteriaWord-p. 27
6.1.5.4  Approach to key issue #4 - Obtaining network provided locationWord-p. 28
6.1.5.5  Approach to key issue #5 - Intra-access handover or anchor change impact
6.1.5.6  Approach to key issue #6 - Detecting targeted signalling unknown or unrecognized by the VPLMNUp
6.1.5.7  Approach to key issue #7 - Maintaining intra-PLMN and inter-PLMN LI undetectability
6.1.5.8  Approach to key issue #8 -Detecting implicit IMS registrationsWord-p. 30
6.1.5.9  Approach to key issue #9 - Retained Data
6.1.5.10  Approach to key Issue # 10 - Prevention of unwanted use of confidentiality mechanisms
6.1.5.11  Approach to key Issue # 11 - Non-Local Identity
6.1.5.12  Approach to key issue #12 - Non-3GPP codec or 3GPP codec in a non-3GPP mode in CC
6.1.5.13  Approach to key issue #13 - Start of interception with ongoing VoLTE callWord-p. 31
6.1.5.14  Approach to key issue #14 - Correlation of CC with IRI
6.1.5.15  Approach to key issue #15 - Signalling Compression
6.1.6  Impacts on existing nodes and interfacesUp
6.2  Solution #2 - Enhanced Architecture
6.3  Solution #3 - Data forwarding from HPLMNWord-p. 40
6.4  Solution #4 Retained Data Solution supporting ETSI and VPLMN control requirementsWord-p. 43
7  S8HR Deployment Considerations
8  Overall evaluationWord-p. 46
9  ConclusionsWord-p. 49
A  GATS BTS potential impact on LI for S8HR
B  Lawful Interception scenarios with S8HR
C  Change historyWord-p. 52

Up   Top