An SSI-Based Solution to Support Lawful Interception
<p>Sequence diagram of the Setup in the LI procedure.</p> "> Figure 2
<p>Sequence diagram of the EA integration in the LI procedure.</p> "> Figure 3
<p>Comparison between the general SSI stack (<b>a</b>) and its instantiated version (<b>b</b>).</p> "> Figure 4
<p>Registration of LEA, LEMF, and NA Agency.</p> "> Figure 5
<p>Fields of NA Agency registration.</p> "> Figure 6
<p>Overview of the Employee Credential (<b>a</b>) and X Credential Verification (<b>b</b>).</p> "> Figure 7
<p>Overview of QR Code (<b>a</b>) and Verifiable Presentation (<b>b</b>).</p> "> Figure 8
<p>Overview of the X Credential issuance process (<b>a</b>) and its storage in Bob’s wallet (<b>b</b>).</p> "> Figure 9
<p>Overview of the policy for the Y Credential (<b>a</b>) and the Y Credential itself (<b>b</b>).</p> "> Figure 10
<p>Indy Scan.</p> ">
Abstract
:1. Introduction
2. Background
2.1. Lawful Interception
- The LEA is the Law Enforcement Agency that is involved in a certain investigation about one or more individuals;
- The LEMF (Law Enforcement Monitoring Facility) is the transmission destination for the results of interception;
- The NO is the telecommunication operator offering the network platform to the individuals under investigation.
2.2. Self-Sovereign Identity
2.2.1. Verifiable Credentials
- Identifier of the VC;
- VC metadata (e.g., issue date, expiration date, state of the credential);
- VC’s claims about the subject;
- Proof, which is the digital signature of the issuer of the credential. It can be verified through the blockchain.
2.2.2. Issuers, Holders, and Verifiers
- VC’s state verification: the verifier must check that the VC is still valid so that it has not been revoked.
- VC’s claims verification: the verifier must check that the information contained in the VC satisfies the access control policy.
- VC’s issuer verification: the verifier must check the authenticity of the VC’s issuer. The VC includes the issuer’s Decentralized Identifier (DID), allowing the verifier to retrieve the issuer’s public key from the blockchain to validate the VC’s digital signature.
2.2.3. Digital Wallet
- Verifiable Credentials (VCs) issued to the holder of the digital wallet
- Peer Decentralized Identifiers (Peer DIDs) used to establish the peer-to-peer connections
2.2.4. Digital Agents
2.2.5. Decentralized Identifies
- Ledger-based DIDs: this type of DID involves a blockchain or a generic distributed ledger. It is typically the blockchain address. It is created, updated, and deactivated by performing a transaction.
- Peer-DID: this type of DID does not involve a blockchain. Each endpoint of a peer-to-peer connection generates a Peer DID that is securely shared with the other peer entity using a specific communication protocol.
2.2.6. Verifiable Data Registry
2.2.7. Governance Framework
3. Motivations and Goals
- Interoperability issues: The absence of interoperability standards led each country to adopt and implement its own national procedure to manage the interaction regarding how LEA should retrieve data from LEMF [12]. These methods are often incompatible with each other. This limitation becomes particularly critical in cross-border investigations, where an LEA may need to delegate interception access to an external agency. For example, consider a scenario where an EU member state is investigating a transnational criminal group. The national LEA may require assistance in accessing intercepted communications related to the group’s activities. In this case, the LEA can request support from an external agency, such as the NSA, which is the U.S. government agency responsible for foreign and domestic intelligence and counterintelligence purposes. This agency can facilitate access to the necessary data from LEMFs in other states. In this case, proper authorizations should be granted by the LEA to the external agency ensuring that the data are handled in accordance with legal requirements.
- Procedural inefficiencies: Many lawful interception processes continue to rely on manual and insecure procedures, such as paper-based approvals and email exchanges. These mechanisms could result in operational inefficiencies and human errors and may introduce delays in investigations in which rapid access to the intercepted information is crucial.
- Security risks: Security risks may arise due to the absence of standardized access control mechanisms. Without a protocol for managing and verifying access to intercepted data, there is no robust way to ensure that only authorized entities retrieve sensitive information. This exposes LI systems to several vulnerabilities, including unauthorized data retention, insider threats, and data leaks. Additionally, the lack of real-time access revocation mechanisms means that once an external agency is granted access to LI data, it may retain that access indefinitely, even after the investigation has concluded, increasing the risk of unauthorized disclosures and violations.
- Fine-tuning: The agency obtains a credential for access to data specific to a certain request, including a validity period to verify whether the authorization has expired;
- Minimality: Data accessed by the agency is selectively disclosed, supporting the principle of minimal information disclosure;
- Revocation: Authorizations can be revoked by the issuer at any time, a significant advantage over standard signature-based solutions where only certificates can be revoked, not specific signatures;
- Automation: Authorizations are machine-readable, enabling fully automated authorization processes;
- Effectiveness: We provide a proof of concept based on established SSI standards, such as the Sovrin framework.
- To allow the LEA to start a new LI procedure by commissioning an entity for the role of LEMF. In this phase, the LEA also interacts with the NO according to the standard [10].
- To allow an employee of an external agency to obtain from the LEA the credentials to access an interception procedure already started on the LEMF.
- To allow the LEA to revoke the credentials released to the employee and the LEMF.
4. Proposed Approach
4.1. Setup
- First, the LEA contacts the LEMF to establish a secure peer-to-peer channel according to the DIDComm protocol (see Section 2.2).
- In this connection, the LEMF provides the LEA with all the technical information needed for the interception procedure (for example, the phone number and the IMEI of the SIM of the intercepted subject).
- The LEA releases the credential to the LEMF certifying that the latter is in charge of this LI procedure. This credential will be presented by the LEMF in all the next interactions with LEA.
- Finally, an interaction according to the standard [10] is performed between LEA and the NO, so that the latter can define the interfaces to be used in the interception process.
4.2. External Agency Integration
- Through a secure peer-to-peer channel, E sends the credential to the EA.
- The EA verifies (as described in Section 2.2) and sends to E a new credential certifying E is authorized by EA to interview in the LI procedure.
- Through a secure peer-to-peer channel, E sends to the LEA.
- The LEA verifies and grants a new credential to E. This new credential is used by E to obtain access to the LEMF.
- Now, through a secure peer-to-peer channel, E sends the credential to the LEMF.
- The LEMF verifies this credential (Check ) to ensure that it is valid (not expired or revoked), issued by the LEA (checking the digital signature of the credential), and its claims satisfy the access control policy. Whether all these checks are successful, the LEMF grants E access to the interception data by a procedure they agree on (typically, data are sent via a secure channel or a storage device).
4.3. Credential Revocation
- Membership Proofs: It can be demonstrated that a specific element belongs to the set without revealing other elements of the set.
- Dynamic Updates: Elements can be efficiently added to or removed from the set.
5. Design of the SSI Stack
5.1. Layer 1
- Public DIDs of LEA, LEMF, and EA: They are the DIDs of the entities playing the role of issuers and verifiers in our approach. They are used by the employee E to establish an off-chain connection with them. Moreover, the public DIDs allow the parties acting as verifiers (i.e., the LEA, the EA, and the LEMF) to obtain the public keys to check a cryptographic proof of ownership of a credential.
- Schema: It defines the format (in terms of allowed attributes) of the credentials released by the issuers. Observe that it does not contain any personal data about the employee E.
- Credential Definition: It is an instance of the Schema including the public keys allowing the verification of the credentials. Similar to the Schema, the Credential Definition does not include any personal data about E. The inclusion of the Schema and the Credential Definition at the blockchain level makes the credential exchanges fully decentralized enabling a fast release and verification of the credentials from anywhere.
- Revocation Registry: We include two revocation registers, one managed by the LEA and one managed by the EA. Only the issuer (LEA or EA) can update each register, which links to a Credential Definition. The registers are stored on-chain, but, again, they do not contain any personal data about E. As the name suggests, they allow the LEA and the EA to revoke the credentials released to the employee E and the LEMF. They are based on the cryptographic accumulator described in Section 4.3. The advantage of this approach is that the LEA and EA do not have to maintain a public API for the revocation, but the entities playing the role of verifiers can check the revocation of the credentials in a decentralized way by accessing the blockchain.
- Agent Authorization Policies: This component implements a mechanism of protection in the case the device of E is stolen or lost. In the device used by E, an agent is installed to exchange proofs of the credentials owned by E. In the case this device is stolen or lost, a revocation mechanism is enabled. In particular, when E authorizes a new agent (device), an authorization key is stored in an on-chain registry. This key is used to sign messages exchanged peer-to-peer between E and the other entities. To remove the authorization for an agent, E can delete its key from the register.
- Private DIDs: They are the DIDs of the actors used in the peer-to-peer connection.
- Private Data: They are personal data about the employee E. These data have not been stored even in encrypted form. Indeed, since the data stored on the blockchain are immutable, they could be compromised in the long term.
5.2. Layer 2
5.3. Layer 3
5.4. Layer 4
5.5. Stack Overview
6. Proof of Concept
6.1. Technologies
6.2. Case Study
Listing 1. Python function to check the validity of a credential. |
- Tx 262048 and 262052 (SCHEMA): These transactions define the structure of two credentials: Employee Credential and X Credential, both set to version 1.0.
- Tx 262049 and 262053 (CLAIM_DEF): Claim definitions associate the schemas (Employee Credential and X Credential) with the issuer’s DID.
- Tx 262054 (REVOC_REG_DEF): This transaction creates a revocation registry for a credential definition, specifying ISSUANCE_BY_DEFAULT as the issuance type and a registry capacity of 1024 entries.
- Tx 262055 (REVOC_REG_ENTRY): This transaction logs an entry in the revocation registry, enabling tracking and management of the revocation status for issued credentials.
- Schemas define the data structure of credentials.
- Credential definitions connect schemas to issuers, facilitating the issuance of verifiable credentials.
- Revocation registries manage the status of issued credentials, promoting transparency and trust in the decentralized identity ecosystem.
7. Related Work
8. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Doronin, V. “Lawful interception–A market access barrier in the European Union”? Comput. Law Secur. Rev. 2023, 51, 105867. [Google Scholar] [CrossRef]
- Walters, R. Illegal Interception of Data. In Cybersecurity and Data Laws of the Commonwealth: International Trade, Investment and Arbitration; Springer: Berlin/Heidelberg, Germany, 2023; pp. 267–274. [Google Scholar]
- Omand, D. Examining the Ethics of Spying: A Practitioner’s View. Crim. Law Philos. 2024, 18, 805–818. [Google Scholar] [CrossRef]
- Li, G.; Ren, L.; Fu, Y.; Yang, Z.; Adetola, V.; Wen, J.; Zhu, Q.; Wu, T.; Candan, K.S.; O’Neill, Z. A critical review of cyber-physical security for building automation systems. Annu. Rev. Control 2023, 55, 237–254. [Google Scholar] [CrossRef]
- Bultel, X.; Onete, C. Pairing-free secure-channel establishment in mobile networks with fine-grained lawful interception. In Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, Brno, Czech Republic, 25–29 April 2022; pp. 968–970. [Google Scholar]
- Spiekermann, D.; Keller, J.; Eggendorfer, T. Improving Lawful Interception in Virtual Datacenters. In Proceedings of the Central European Cybersecurity Conference 2018, Ljubljana, Slovenia, 15–16 November 2018. [Google Scholar] [CrossRef]
- Guhl, S.D.; Pendse, R. The Communications Assistance for Law Enforcement Act (CALEA). Inf. Secur. Journal: Glob. Perspect. 2008, 17, 110–113. [Google Scholar] [CrossRef]
- 3GPP TS Working Group 33. Security architecture for Core Network and Terminals (Release 16). Technical Report 3GPP TS 33.108, 3rd Generation Partnership Project (3GPP). 2020. Available online: https://www.3gpp.org/ftp//Specs/archive/33_series/33.108/33108-f10.zip (accessed on 30 January 2025).
- ITU-T Working Group Y.2770. Requirements for Deep Packet Inspection in Next Generation Networks. Technical Report ITU-T Y.2770, ITU-T (International Telecommunication Union—Telecommunication Standardization Sector), 2015. Available online: https://www.itu.int/rec/T-REC-Y.2770-201211-I (accessed on 30 January 2025).
- ETSI (European Telecommunications Standards Institute.) Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic. Technical Report ETSI TS 101 671 V3.15.1, ETSI, 2018. Available online: https://www.etsi.org/deliver/etsi_ts/101600_101699/101671/03.15.01_60/ts_101671v031501p.pdf (accessed on 30 January 2025).
- Turanjanin, V. When does bulk interception of communications violate the right to privacy? The limits of the state’s power and the European Court of Human Rights Approach. Int. Cybersecur. Law Rev. 2023, 4, 115–136. [Google Scholar] [CrossRef]
- Gorge, M. Lawful interception – key concepts, actors, trends and best practice considerations. Comput. Fraud. Secur. 2007, 2007, 10–14. [Google Scholar] [CrossRef]
- Tobin, A.; Reed, D. The inevitable rise of self-sovereign identity. Sovrin Found. 2016, 29, 18. [Google Scholar]
- Mühle, A.; Grüner, A.; Gayvoronskaya, T.; Meinel, C. A survey on essential components of a self-sovereign identity. Comput. Sci. Rev. 2018, 30, 80–86. [Google Scholar] [CrossRef]
- Pöhn, D.; Grabatin, M.; Hommel, W. Analyzing the Threats to Blockchain-Based Self-Sovereign Identities by Conducting a Literature Survey. Appl. Sci. 2023, 14, 139. [Google Scholar] [CrossRef]
- Buccafurri, F.; De Angelis, V.; Lazzaro, S.; Pugliese, A. Enforcing security policies on interacting authentication systems. Comput. Secur. 2024, 140, 103771. [Google Scholar] [CrossRef]
- Naghmouchi, M.; Laurent, M.; Levallois-Barth, C.; Kaaniche, N. Comparative Analysis of Technical and Legal Frameworks of Various National Digial Identity Solutions. arXiv 2023, arXiv:2310.01006. [Google Scholar]
- Khovratovich, D.; Law, J. Sovrin: Digital identities in the blockchain era. Github Commit Jasonalaw Oct. 2017, 17, 38–99. [Google Scholar]
- Ferraiolo, D.; Cugini, J.; Kuhn, D.R. Role-based access control (RBAC): Features and motivations. In Proceedings of the 11th Annual Computer Security Application Conference, New Orleans, LA, USA, 11–15 December 1995; pp. 241–248. [Google Scholar]
- Wijnen, B.; Presuhn, R.; McCloghrie, K. RFC3415: View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP), 2002. Available online: https://datatracker.ietf.org/doc/html/rfc3415 (accessed on 30 January 2025).
- Sovrin Governance Framework Working Group. Sovrin Glossary Appendix D. Available online: https://sovrin.org/wp-content/uploads/Sovrin-Glossary-V2.pdf (accessed on 30 January 2025).
- Satybaldy, A.; Ferdous, M.S.; Nowostawski, M. A taxonomy of challenges for self-sovereign identity systems. IEEE Access 2024, 12, 16151–16177. [Google Scholar] [CrossRef]
- Davie, M.; Gisolfi, D.; Hardman, D.; Jordan, J.; O’Donnell, D.; Reed, D. The trust over ip stack. IEEE Commun. Stand. Mag. 2019, 3, 46–51. [Google Scholar] [CrossRef]
- Preukschat, A.; Reed, D. Self-Sovereign Identity; Manning Publications: Shelter Island, NY, USA, 2021. [Google Scholar]
- Buccafurri, F.; De Angelis, V.; Lazzaro, S. A Blockchain-Based Framework to Enhance Anonymous Services with Accountability Guarantees. Future Internet 2022, 14, 243. [Google Scholar] [CrossRef]
- Ren, Y.; Liu, X.; Wu, Q.; Wang, L.; Zhang, W. Cryptographic accumulator and its application: A survey. Secur. Commun. Netw. 2022, 2022, 5429195. [Google Scholar] [CrossRef]
- Helliar, C.V.; Crawford, L.; Rocca, L.; Teodori, C.; Veneziani, M. Permissionless and permissioned blockchain diffusion. Int. J. Inf. Manag. 2020, 54, 102136. [Google Scholar] [CrossRef]
- Hardman, D. Aries RFC 0005: DID Communication. Available online: https://github.com/hyperledger/aries-rfcs/blob/main/concepts/0005-didcomm/README.md (accessed on 30 January 2025).
- World Wide Web Consortium. Verifiable Credentials Data Model 1.0: Expressing Verifiable Information on the Web. 2019. Available online: https://www.w3.org/TR/vc-data-model/?#core-data-model (accessed on 30 January 2025).
- Sovrin Governance Framework Working Group. Sovrin Governance Framework. Available online: https://sovrin.org/library/sovrin-governance-framework/ (accessed on 30 January 2025).
- Bhattacharya, M.P.; Zavarsky, P.; Butakov, S. Enhancing the security and privacy of self-sovereign identities on hyperledger indy blockchain. In Proceedings of the 2020 International Symposium on Networks, Computers and Communications (ISNCC), Montreal, QC, Canada, 20–22 October 2020; pp. 1–7. [Google Scholar]
- Trinsic. Welcome to Trinsic. Available online: https://github.com/trinsic-id (accessed on 30 January 2025).
- Grinberg, M. Flask Web Development: Developing Web Applications with Python; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2018. [Google Scholar]
- Glöckler, J.; Sedlmeir, J.; Frank, M.; Fridgen, G. A systematic review of identity and access management requirements in enterprises and potential contributions of self-sovereign identity. Bus. Inf. Syst. Eng. 2024, 66, 421–440. [Google Scholar] [CrossRef]
- Soltani, R.; Nguyen, U.T.; An, A. A Survey of Self-Sovereign Identity Ecosystem. Secur. Commun. Netw. 2021, 2021, 8873429. [Google Scholar] [CrossRef]
- Shehu, A.S. On the Compliance of Self-Sovereign Identity with GDPR Principles: A Critical Review. arXiv 2024, arXiv:2409.03624. [Google Scholar]
- Voigt, P.; Von dem Bussche, A. The eu general data protection regulation (gdpr). In A Practical Guide, 1st ed.; Springer International Publishing: Cham, Switzerland, 2017; Volume 10, pp. 10–5555. [Google Scholar]
- Naik, N.; Jenkins, P. Your identity is yours: Take back control of your identity using GDPR compatible self-sovereign identity. In Proceedings of the 2020 7th International Conference on Behavioural and Social Computing (BESC), Bournemouth, UK, 5–7 November 2020; pp. 1–6. [Google Scholar]
- Kondova, G.; Erbguth, J. Self-sovereign identity on public blockchains and the GDPR. In Proceedings of the 35th Annual ACM Symposium on Applied Computing, Brno, Czech Republic, 30 March 30–3 April 2020; pp. 342–345. [Google Scholar]
- Naik, N.; Jenkins, P. uPort open-source identity management system: An assessment of self-sovereign identity and user-centric data platform built on blockchain. In Proceedings of the 2020 IEEE International Symposium on Systems Engineering (ISSE), Vienna, Austria, 12 October–12 November 2020; pp. 1–7. [Google Scholar]
- Stokkink, Q.; Ishmaev, G.; Epema, D.; Pouwelse, J. A truly self-sovereign identity system. In Proceedings of the 2021 IEEE 46th Conference on Local Computer Networks (LCN), Edmonton, AB, Canada, 4–7 October 2021; pp. 1–8. [Google Scholar]
- Grüner, A.; Mühle, A.; Meinel, C. An integration architecture to enable service providers for self-sovereign identity. In Proceedings of the 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, 26–28 September 2019; pp. 1–5. [Google Scholar]
- Pava-Díaz, R.A.; Gil-Ruiz, J.; López-Sarmiento, D.A. Self-sovereign identity on the blockchain: Contextual analysis and quantification of SSI principles implementation. Front. Blockchain 2024, 7, 1443362. [Google Scholar] [CrossRef]
- Windley, P.J. Sovrin: An identity metasystem for self-sovereign identity. Front. Blockchain 2021, 4, 626726. [Google Scholar] [CrossRef]
- Reed, D.; Law, J.; Hardman, D. The Technical Foundations of Sovrin. 2016. Available online: https://sovrin.org/wp-content/uploads/2017/04/The-Technical-Foundations-of-Sovrin.pdf (accessed on 30 January 2025).
- López, D.; Farooq, B. A multi-layered blockchain framework for smart mobility data-markets. Transp. Res. Part C Emerg. Technol. 2020, 111, 588–615. [Google Scholar] [CrossRef]
- Bartolomeu, P.C.; Vieira, E.; Ferreira, J. Pay as You Go: A Generic Crypto Tolling Architecture. IEEE Access 2020, 8, 196212–196222. [Google Scholar] [CrossRef]
- Barros, M.d.V.; Schardong, F.; Custódio, R.F. Leveraging Self-Sovereign Identity, Blockchain, and Zero-Knowledge Proof to Build a Privacy-Preserving Vaccination Pass. arXiv 2022, arXiv:2202.09207. [Google Scholar]
- Ahmed, F.; Hussain, S.A. A Privacy-Preserving Cross-domain Network access Services Using Sovrin Identifier. In Proceedings of the 2021 International Conference on Cyber Warfare and Security (ICCWS), Islamabad, Pakistan, 23–25 November 2021; pp. 30–37. [Google Scholar] [CrossRef]
- Helminger, L.; Kales, D.; Ramacher, S.; Walch, R. Multi-party revocation in sovrin: Performance through distributed trust. In Proceedings of the Cryptographers’ Track at the RSA Conference, Virtual Event, 17–20 May 2021; pp. 527–551. [Google Scholar]
- Abraham, A.; Theuermann, K.; Kirchengast, E. Qualified eID Derivation Into a Distributed Ledger Based IdM System. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 1406–1412. [Google Scholar] [CrossRef]
- Grabatin, M.; Hommel, W. Self-sovereign Identity Management in Wireless Ad Hoc Mesh Networks. In Proceedings of the 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM), Virtual Conference, 17–21 May 2021; pp. 480–486. [Google Scholar]
- Sovrin Foundation. Use Case Archives. Available online: https://sovrin.org/category/use-cases/ (accessed on 30 January 2025).
- Ling, A.; Butakov, S. Trust Framework for Self-Sovereign ID in Metaverse Health Care Applications. Data Sci. Manag. 2024, 7, 304–313. [Google Scholar] [CrossRef]
- Shuaib, M.; Alam, S.; Alam, M.S.; Nasir, M.S. Self-sovereign identity for healthcare using blockchain. Mater. Today Proc. 2023, 81, 203–207. [Google Scholar] [CrossRef]
- Bai, P.; Kumar, S.; Aggarwal, G.; Mahmud, M.; Kaiwartya, O.; Lloret, J. Self-sovereignty identity management model for smart healthcare system. Sensors 2022, 22, 4714. [Google Scholar] [CrossRef] [PubMed]
- De Diego, S.; Regueiro, C.; Macia-Fernandez, G. Enabling identity for the IoT-as-a-service business model. IEEE Access 2021, 9, 159965–159975. [Google Scholar] [CrossRef]
- Bartolomeu, P.C.; Vieira, E.; Hosseini, S.M.; Ferreira, J. Self-sovereign identity: Use-cases, technologies, and challenges for industrial iot. In Proceedings of the 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Zaragoza, Spain, 10–13 September 2019; pp. 1173–1180. [Google Scholar]
- Cocco, L.; Tonelli, R.; Marchesi, M. Blockchain and Self Sovereign Identity to Support Quality in the Food Supply Chain. Future Internet 2021, 13, 301. [Google Scholar] [CrossRef]
- Bronitt, S.; Stellios, J. Telecommunications interception in Australia: Recent trends and regulatory prospects. Telecommun. Policy 2005, 29, 875–888. [Google Scholar] [CrossRef]
- Abelson, H.; Anderson, R.; Bellovin, S.M.; Benaloh, J.; Blaze, M.; Diffie, W.; Gilmore, J.; Green, M.; Landau, S.; Neumann, P.G.; et al. Keys under doormats: Mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 2015, 1, 69–79. [Google Scholar] [CrossRef]
- Brown, I. Lawful interception capability requirements. Comput. Law. 2013. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2309413 (accessed on 30 January 2025).
- Christen, M.; Gordijn, B.; Loi, M. The Ethics of Cybersecurity; Springer Nature: Berlin/Heidelberg, Germany, 2020; Available online: https://library.oapen.org/handle/20.500.12657/47324 (accessed on 30 January 2025).
- Cajani, F. “All along the watchtower”: Matters not yet solved regarding communication interception systems and electronic data retained on foreign servers. In Handling and Exchanging Electronic Evidence Across Europe; Springer: Cham, Switzerland, 2018; pp. 59–71. [Google Scholar]
- Pleva, M.; Cizmar, A.; Dobos, L. Voice Quality Measuring Setup with Automatic Voice over IP Call Generator and Lawful Interception Packet Analyzer. J. Electr. Electron. Eng. 2012, 5, 191. [Google Scholar]
- Buccafurri, F.; Consoli, A.; Labrini, C.; Nesurini, A.M. A Solution to Support Integrity in the Lawful Interception Ecosystem. In International Conference on Electronic Government and the Information Systems Perspective; Springer: Berlin/Heidelberg, Germany, 2021; pp. 21–33. [Google Scholar]
- Xu, X.; Jia, W.K.; Wu, Y.; Wang, X. On the Optimal Lawful Intercept Access Points Placement Problem in Hybrid Software-Defined Networks. Sensors 2021, 21, 428. [Google Scholar] [CrossRef] [PubMed]
- Branch, P.; Pavlicic, A.; Armitage, G. Using MAC addresses in the lawful interception of IP traffic. In Proceedings of the Australian Telecommunications Networks & Applications Conference (ATNAC), Sydney, Australia, 8–10 December 2004; pp. 9–11. [Google Scholar]
- Karpagavinayagam, B.; State, R.; Festor, O. Monitoring architecture for lawful interception in VoIP networks. In Proceedings of the Second International Conference on Internet Monitoring and Protection (ICIMP 2007), San Jose, CA, USA, 1–5 July 2007; p. 5. [Google Scholar]
- Aljaž, T.; Imperl, B.; Švigelj, A. Border gateway function performance requirements for the lawful intercept of voice at IMS architecture. AEU-Int. J. Electron. Commun. 2008, 62, 610–621. [Google Scholar] [CrossRef]
- Muñoz, A.; Urueña, M.; Aparicio, R.; Rodríguez de los Santos, G. Digital Wiretap Warrant: Improving the security of ETSI Lawful Interception. Digit. Investig. 2015, 14, 1–16. [Google Scholar] [CrossRef]
- Alamillo, D.I.; Schwalm, S. Self-Sovereign-Identity & eIDAS: A Contradiction? Challenges and Chances of [eIDAS2]. Eur. Rev. Digit. Adm. Law 2021, 2, 89–108. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Buccafurri, F.; Canino, A.L.; De Angelis, V.; Laurenda, A.; Lax, G. An SSI-Based Solution to Support Lawful Interception. Appl. Sci. 2025, 15, 2206. https://doi.org/10.3390/app15042206
Buccafurri F, Canino AL, De Angelis V, Laurenda A, Lax G. An SSI-Based Solution to Support Lawful Interception. Applied Sciences. 2025; 15(4):2206. https://doi.org/10.3390/app15042206
Chicago/Turabian StyleBuccafurri, Francesco, Aurelio Loris Canino, Vincenzo De Angelis, Annunziata Laurenda, and Gianluca Lax. 2025. "An SSI-Based Solution to Support Lawful Interception" Applied Sciences 15, no. 4: 2206. https://doi.org/10.3390/app15042206
APA StyleBuccafurri, F., Canino, A. L., De Angelis, V., Laurenda, A., & Lax, G. (2025). An SSI-Based Solution to Support Lawful Interception. Applied Sciences, 15(4), 2206. https://doi.org/10.3390/app15042206