Novel end-to-end voice encryption method in GSM system

被引:0
|
作者
Qi, H. F. [1 ]
Yang, X. H. [1 ]
Jiang, R. [1 ]
Liang, B. [1 ]
Zhou, S. J. [1 ]
机构
[1] SE Univ, Sch Informat Sci & Engn, Nanjing 210096, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For the GSM security mechanism cannot assure end-to-end secure communications, this paper presents a novel voice encryption method based on current voice channel, which overcomes data channel's shortages and solves the problem of voice encryption penetrating the RPE-LTP vocoder. The proposed method realizes the end-to-end secure communications in the GSM system with short time delay, good compatibility to all GSM networks, and easy implementation without any modification in current GSM signaling system.
引用
收藏
页码:217 / 220
页数:4
相关论文
共 50 条
  • [1] EEE-GSM: End-to-End Encryption Scheme over GSM System
    Ramadan, Mohammed
    Du, Guohong
    Li, Fagen
    Xu, Chun Xiang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (06): : 229 - 239
  • [2] System of end-to-end symmetric database encryption
    Galushka, V. V.
    Aydinyan, A. R.
    Tsvetkova, O. L.
    Fathi, V. A.
    Fathi, D. V.
    INTERNATIONAL CONFERENCE INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY 2018, PTS 1-4, 2018, 1015
  • [3] End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
    Hayati, Nur
    Suryanto, Yohan
    Ramli, Kalamullah
    Suryanegara, Muhammad
    PROCEEDINGS OF 2019 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND TECHNOLOGY (ICCET 2019), 2019, : 101 - 106
  • [4] End-to-End Encryption for GSM Cellular Standard Using CL-PKC
    Ramadan, Mohammed
    Li, Fa-Gen
    Xu, Chun-Xiang
    Wahaballa, Abubaker
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 270 - 278
  • [5] Voice End-to-End Encrypted for TETRA Radiocommunication System
    Buric, Marian
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 419 - 422
  • [6] End-to-end security for GSM users
    Rekha, AB
    Umadevi, B
    Solanke, Y
    Kolli, SR
    2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 434 - 437
  • [7] Research on end-to-end encryption of TETRA
    Beijing FORICH Software Technology Co. Ltd., Network Security Division, Beijing 100083, China
    不详
    J. China Univ. Post Telecom., 2006, 2 (70-73):
  • [8] Research on End-to-End Encryption of TETRA
    ZHANG Zhi-hui 1
    2.Information Security Center
    The Journal of China Universities of Posts and Telecommunications, 2006, (02) : 70 - 73
  • [9] SDNS ARCHITECTURE AND END-TO-END ENCRYPTION
    NELSON, R
    HEIMANN, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 356 - 366
  • [10] A European right to end-to-end encryption?
    Shurson, Jessica
    COMPUTER LAW & SECURITY REVIEW, 2024, 55