Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.827
Word version: 14.0.0
0…
4…
4
Assumptions, architecture requirements and protocol requirements
5
Key issues
6
Solutions
7
S8HR Deployment Considerations
8
Overall evaluation
9
Conclusions
A
GATS BTS potential impact on LI for S8HR
B
Lawful Interception scenarios with S8HR
$
Change History
4
Assumptions, architecture requirements and protocol requirements
p. 9
4.1
Assumptions
p. 9
4.2
Architecture and architecture requirements
p. 9
4.2.1
Architecture
p. 9
4.2.2
S8HR impact on the 3GPP LI service
p. 11
4.3
Functionality comparison
p. 11
5
Key issues
p. 11
5.1
Key issue #1 - IMEI targeted LI
p. 11
5.1.1
Description
p. 11
5.1.2
Architectural requirements
p. 11
5.1.3
Stage 3 requirements
p. 11
5.2
Key issue #2 -Tel-URI or SIP-URI targeted LI
p. 12
5.2.1
Description
p. 12
5.2.2
Architectural requirements
p. 12
5.2.3
Stage 3 requirements
p. 12
5.3
Key issue #3 - LI targeted S8 GTP selection criteria
p. 12
5.3.1
Description
p. 12
5.3.2
Architectural requirements
p. 12
5.3.3
Stage 3 requirements
p. 12
5.4
Key Issue #4 - Obtaining network provided location
p. 12
5.4.1
Description
p. 12
5.4.2
Architectural requirements
p. 13
5.4.3
Stage 3 requirements
p. 13
5.5
Key issue #5 - Intra-access handover or anchor change impact
p. 13
5.5.1
Description
p. 13
5.5.2
Architectural requirements
p. 13
5.5.3
Stage 3 requirements
p. 13
5.6
Key issue #6 - Detecting targeted signalling unknown or unrecognized by the VPLMN
p. 13
5.6.1
Description
p. 13
5.6.2
Architectural requirements
p. 14
5.6.3
Stage 3 requirements
p. 14
5.7
Key issue #7 - Maintaining intra-PLMN and inter-PLMN LI undetectability
p. 14
5.7.1
Description
p. 14
5.7.2
Architectural requirements
p. 14
5.8
Key issue #8 - Detecting implicit IMS registrations
p. 14
5.8.1
Description
p. 14
5.8.2
Architectural requirements
p. 15
5.8.3
Stage 3 requirements
p. 15
5.8.4
Solution approaches
p. 15
5.9
Key issue #9 - Retained data
p. 15
5.9.1
Description
p. 15
5.9.2
Architectural requirements
p. 15
5.9.3
Stage 3 requirements
p. 15
5.9.4
Solution approaches
p. 15
5.10
Key issue #10 - Prevention of unwanted use of confidentiality mechanisms
p. 16
5.10.1
Description
p. 16
5.10.2
Architectural requirements
p. 16
5.10.3
Stage 3 requirements
p. 16
5.11
Key issue #11 - Non-Local Identity
p. 16
5.11.1
Description
p. 16
5.11.2
Architectural requirements
p. 16
5.11.3
Stage 3 requirements
p. 16
5.12
Key issue #12 - Non-3GPP codec or 3GPP codec in a non-3GPP mode in CC
p. 16
5.12.1
Description
p. 16
5.12.2
Architecture requirements
p. 17
5.13
Key issue #13 - Start of interception with ongoing VoLTE call
p. 17
5.13.1
Description
p. 17
5.13.2
Architectural requirements
p. 17
5.13.3
Stage 3 requirements
p. 17
5.14
Key issue #14 - Correlation of CC with IRI
p. 17
5.14.1
Description
p. 17
5.14.2
Architectural requirements
p. 18
5.14.3
Stage 3 requirements
p. 18
5.14.4
Solution approaches
p. 18
5.15
Key issue #15 - Signalling Compression
p. 19
5.15.1
Description
p. 19
5.15.2
Architectural requirements
p. 19
5.15.3
Stage 3 requirements
p. 19
6
Solutions
p. 19
6.1
Solution #1 S-GW/BBIFF based GTP tunnel extraction
p. 19
6.1.1
Description
p. 19
6.1.2
S-GW/BBIFF based GTP tunnel extraction architecture reference model
p. 20
6.1.2.1
S-GW/BBIFF based GTP tunnel extraction architecture diagram
p. 20
6.1.2.2
Reference points
p. 20
6.1.2.3
Network elements
p. 20
6.1.2.3.1
LMISF
p. 20
6.1.2.3.2
LPCF
p. 21
6.1.2.3.3
S-GW/BBIFF
p. 21
6.1.3
Process Flow for Architectural Approach of Solution #1
p. 21
6.1.4
Call Flow for architectural approach of Solution #1
p. 24
6.1.5
Solution approach to key issues
p. 25
6.1.5.1
Approach to key issue #1 - IMEI targeted LI
p. 25
6.1.5.1.1
General
p. 25
6.1.5.1.2
Option 1: Detection of Target IMEI communication in LMISF
p. 25
6.1.5.1.3
Option 2: Detection of IMEI at S-GW/BBIFF
p. 26
6.1.5.2
Approach to key issue #2 - Tel-URI or SIP-URI targeted LI
p. 26
6.1.5.3
Approach to key issue #3 - LI targeted S8 GTP selection criteria
p. 27
6.1.5.4
Approach to key issue #4 - Obtaining network provided location
p. 28
6.1.5.4.1
Obtaining location
p. 28
6.1.5.4.2
MME provided location
p. 28
6.1.5.4.3
LCS provided location
p. 28
6.1.5.5
Approach to key issue #5 - Intra-access handover or anchor change impact
p. 28
6.1.5.5.1
General
p. 28
6.1.5.5.2
Scenario 1: Multiple LMISFs
p. 29
6.1.5.5.3
Scenario 2: Centralized LMISF
p. 29
6.1.5.6
Approach to key issue #6 - Detecting targeted signalling unknown or unrecognized by the VPLMN
p. 29
6.1.5.7
Approach to key issue #7 - Maintaining intra-PLMN and inter-PLMN LI undetectability
p. 29
6.1.5.8
Approach to key issue #8 -Detecting implicit IMS registrations
p. 30
6.1.5.9
Approach to key issue #9 - Retained Data
p. 30
6.1.5.10
Approach to key Issue # 10 - Prevention of unwanted use of confidentiality mechanisms
p. 30
6.1.5.11
Approach to key Issue # 11 - Non-Local Identity
p. 30
6.1.5.12
Approach to key issue #12 - Non-3GPP codec or 3GPP codec in a non-3GPP mode in CC
p. 30
6.1.5.13
Approach to key issue #13 - Start of interception with ongoing VoLTE call
p. 31
6.1.5.14
Approach to key issue #14 - Correlation of CC with IRI
p. 31
6.1.5.15
Approach to key issue #15 - Signalling Compression
p. 31
6.1.6
Impacts on existing nodes and interfaces
p. 31
6.2
Solution #2 - Enhanced Architecture
p. 31
6.2.1
Enhanced Architecture Reference Model
p. 31
6.2.2
Reference points
p. 32
6.2.3
Network elements
p. 32
6.2.3.1
LMISF
p. 32
6.2.3.2
LPCF
p. 33
6.2.3.3
S-GW/BBIFF
p. 33
6.2.4
Process Flow for Enhanced Architectural Approach
p. 33
6.2.5
Call Flow for enhanced architectural approach
p. 36
6.2.6
Solution approach to key issues
p. 37
6.2.6.1
Approach to key issue #14 - Correlation of CC with IRI
p. 37
6.2.6.1.1
Description
p. 37
6.2.6.1.2
Impacts on existing nodes, interfaces and functionality
p. 38
6.2.6.1.3
Solution evaluation
p. 39
6.2.6.2
Approach to key issue #1 through key issue #13 and key issue #15
p. 39
6.2.7
Impacts on existing nodes and interfaces
p. 39
6.3
Solution #3 - Data forwarding from HPLMN
p. 40
6.3.1
Description
p. 40
6.3.2
Impacts on Existing Nodes, Interfaces and Functionality
p. 42
6.4
Solution #4 Retained Data Solution supporting ETSI and VPLMN control requirements
p. 43
6.4.1
Description
p. 43
6.4.1.1
Networks supporting VPLMN S8HR LI
p. 43
6.4.1.2
Networks not supporting VPLMN S8HR LI
p. 43
6.4.2
Impacts on existing nodes, interfaces and functionality
p. 44
6.4.3
Solution evaluation
p. 44
7
S8HR Deployment Considerations
p. 44
7.1
General
p. 44
7.2
HPLMN aspects
p. 44
7.2.1
P-CSCF Confidentiality Disabling
p. 44
7.2.2
Integrity Protection
p. 44
7.2.3
S8 Interface Security
p. 44
7.3
VPLMN aspects
p. 45
7.3.1
S-GW and LMISF simplification
p. 45
7.3.2
RAN and Core Network Security
p. 45
7.3.3
Deployment Design: network delays and performance of implemented solution
p. 45
8
Overall evaluation
p. 46
8.1
Evaluation of S8HR LI Solutions
p. 46
8.1.1
LI solution evaluation overview
p. 46
8.1.2
Evaluation of Key Issues
p. 46
8.1.2.1
Key Issue #1: IMEI targeted LI
p. 46
8.1.2.2
Key Issue #2: Tel-URI or SIP-URI targeted LI
p. 46
8.1.2.3
Key Issue #3: LI targeted S8 GTP selection criteria
p. 46
8.1.2.4
Key Issue #4: Obtaining network provided location
p. 46
8.1.2.5
Key Issue #5: Intra-access handover or anchor change impact
p. 46
8.1.2.6
Key Issue #6: Detecting targeted signalling unknown or unrecognized by the VPLMN
p. 46
8.1.2.7
Key Issue #7: Maintaining intra-PLMN and inter-PLMN LI undetectability
p. 47
8.1.2.8
Key Issue #8: Detecting implicit IMS registrations
p. 47
8.1.2.9
Key Issue #9: Retained Data
p. 47
8.1.2.10
Key Issue #10: Prevention of unwanted use of confidentiality mechanisms
p. 47
8.1.2.11
Key Issue #11: Non-local Identity
p. 47
8.1.2.12
Key Issue #12: Non-3GPP codec or 3GPP codec in a non-3GPP mode in CC
p. 47
8.1.2.13
Key Issue #13: Start of interception with ongoing VoLTE call
p. 47
8.1.2.14
Key Issue #14: Correlation of CC with IRI
p. 47
8.1.2.15
Key Issue #15: Signalling Compression
p. 47
8.2
Evaluation of Retained Data Solutions
p. 47
8.2.1
Solution #4
p. 47
8.2.2
Solution #3
p. 48
8.3
Evaluation Summary
p. 48
9
Conclusions
p. 49
9.1
Overall Conclusion
p. 49
9.2
LI Solution Conclusion
p. 49
9.3
Retained Data Conclusions
p. 50
A
GATS BTS potential impact on LI for S8HR
p. 50
A.1
Introduction
p. 50
A.2
Background
p. 50
B
Lawful Interception scenarios with S8HR
p. 50
B.1
Originating calls
p. 50
B.2
Terminating calls
p. 51
$
Change History
p. 52