Data Transmission via GSM Voice Channel for End to End Security

被引:0
|
作者
Ozkan, Mehmet Akif [1 ]
Ors, S. Berna [2 ]
机构
[1] Istanbul Medeniyet Univ, Kadikoy, Turkey
[2] Istanbul Tech Univ, Sariyer, Turkey
关键词
Data over GSM voice; Secure GSM communication; GSM Full Rate; Speech like signal;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Global System for Mobile Communications (GSM) technology still plays a key role because of its availability, reliability and robustness. Recently, additional consumer applications are proposed in which GSM is used as a backup or data transmission service. Unfortunately sending data via GSM channel is a challenging task since it is speech sensitive and suppresses other forms of signals. In this paper, a systematic method is proposed to develop a modem that transmits data over GSM voice channel (DoGSMV) using speech like (SL) symbols. Unlike the previous approaches an artificial search space is produced to find best SL symbols and analyses by synthesis (AbyS) method is introduced for parameter decoding. As a result 1.6 kbps simulation data rate is achieved when wireless communication errors are ignored.
引用
收藏
页码:378 / 382
页数:5
相关论文
共 50 条
  • [31] Improved End-to-End Data Security Approach for Cloud Computing
    Ghosh, Soumalya
    Verma, Shiv Kumar
    Ghosh, Uttam
    Al-Numay, Mohammed
    SUSTAINABILITY, 2023, 15 (22)
  • [32] End-to-End Latency Analysis for Data Transmission via Optimum Path Allocation in Industrial Sensor Networks
    Jatothu, Rajaram
    Lal, Jaya Dipti
    Bhavani, N. P. G.
    Sharada, K. A.
    Balraj, E.
    Vaigandla, Karthik Kumar
    Shukla, Arvind Kumar
    Ishrat, Mohammad
    Sahile, Kibebe
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [33] End-to-End Latency Analysis for Data Transmission via Optimum Path Allocation in Industrial Sensor Networks
    Jatothu, Rajaram
    Lal, Jaya Dipti
    Bhavani, N.P.G.
    Sharada, K.A.
    Balraj, E.
    Vaigandla, Karthik Kumar
    Shukla, Arvind Kumar
    Ishrat, Mohammad
    Sahile, Kibebe
    Wireless Communications and Mobile Computing, 2022, 2022
  • [34] Towards Security of GSM Voice Communication
    Abro, Fauzia I.
    Rauf, Farzana
    Mobeen-ur-Rehman
    Chowdhry, B. S.
    Rajarajan, Muttukrishnan
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (03) : 1933 - 1955
  • [35] A Study of End-to-End Video Robust Transmission Via WMN
    Fan, Tanghuai
    Xu, Lizhong
    Zhang, Xuewu
    Wang, Huibin
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4767 - +
  • [36] An End-to-End Security Aware WSN Approach with Localization & Authentication and Data Exchange Security
    Priyanka, R.
    Reddy, K. Satyanarayan
    INTERNATIONAL TRANSACTION JOURNAL OF ENGINEERING MANAGEMENT & APPLIED SCIENCES & TECHNOLOGIES, 2022, 13 (07):
  • [37] Implementation of a Modem Which Transmits Digital Data on GSM Voice Channel
    Postalh, Hasan Salih
    Tuncay, Sercan
    Ors, Berna
    2015 23RD SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2015, : 2537 - 2540
  • [38] Supporting end-to-end security across proxies with Multiple-Channel SSL
    Song, Y
    Leung, VCM
    Beznosov, K
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 323 - 337
  • [39] End to End Security is Not Enough
    Clarke, Dylan
    Ali, Syed Taha
    SECURITY PROTOCOLS XXV, 2017, 10476 : 260 - 267
  • [40] Impact of CPU reservation on end-to-end media data transmission
    Viswanathan, A
    Nahrstedt, K
    Xu, DY
    Wichadakul, D
    CONFERENCE PROCEEDINGS OF THE 2001 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2001, : 354 - 361