Effective Model for Real Time End to End Secure Communication Over GSM Voice Channel

被引:0
|
作者
Mobeen Ur Rehman
Muhammad Adnan
Mouazma Batool
Liaqat Ali Khan
Ammar Masood
机构
[1] Air University,Avionics Department
[2] Air University,Computer Science Department
来源
关键词
Global System for mobile communication (GSM); Codec-2; Quadrature phase shift keying (QPSK); Frequency division multiples(FDM); Bits per second; Speech quality assessment;
D O I
暂无
中图分类号
学科分类号
摘要
Due to the availability, robustness and reliability; Global System for Mobile Communications (GSM) plays a vital role in our daily life. GSM security is not so strong and is susceptible to attacks. One of the most important issues is insecurity in voice communicated over the GSM. While the system provides limited voice security over air links through encryption; yet, availability of a solution, that provides end-to-end secure voice assurance, is considered important to meet user security requirements. To make the communication secure (end-to-end) one option is to encrypt the speech and then transmit it over GSM channel. In this paper, a novel approach is proposed for secure end-to-end voice communication over GSM. The biggest challenge is that the GSM channel only transmits speech like a symbol; therefore, a modulation technique is required which can effectively generate modulation signal similar to the human voice. Next problem in this regard is the requirement of associated encryption and speech compression technique. The proposed methodology uses codec2 700 bits/s as an encoder and decoder, with coherent PSK as a modulation and demodulation technique. In addition to this KASUMI based encryption algorithm is adopted which best fits in our proposed flow. The quality assessment of the speech after its reconstruction on the receiver side has shown good results. The proposed methodology has shown viable results on the computer-based system as well as an embedded system.
引用
收藏
页码:1643 / 1659
页数:16
相关论文
共 50 条
  • [41] On Secure Communication over the Z-Channel
    Fayed, Abdallah
    Khattab, Tamer
    Lai, Lifeng
    [J]. 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 606 - 610
  • [42] Secure Communication Over Parallel Relay Channel
    Awan, Zohaib Hassan
    Zaidi, Abdellatif
    Vandendorpe, Luc
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 359 - 371
  • [43] On Secure Communication over the Multiple Access Channel
    Chen, Yanling
    Koyluoglu, O. Ozan
    Vinck, A. J. Han
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 350 - 354
  • [44] End-to-End Learning of Communication System without Known Channel
    Jiang, Hao
    Dai, Linglong
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [45] Secure End-to-End Communication with Optimal Throughput and Resilience against Malicious Adversary
    Bunn, Paul
    Ostrovsky, Rafail
    [J]. DISTRIBUTED COMPUTING, 2013, 8205 : 403 - 417
  • [46] SVSNet: An End-to-End Speaker Voice Similarity Assessment Model
    Hu, Cheng-Hung
    Peng, Yu-Huai
    Yamagishi, Junichi
    Tsao, Yu
    Wang, Hsin-Min
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 767 - 771
  • [47] PVW: An Efficient Dynamic Symmetric Cipher to Enable End-to-End Secure Communication
    Panchami, V
    Paul, Varghese
    Wahi, Amitabh
    [J]. ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, 2020, 1056 : 329 - 338
  • [48] Enabling end-to-end secure communication between wireless sensor networks and the Internet
    Yu, Hong
    He, Jingsha
    Zhang, Ting
    Xiao, Peng
    Zhang, Yuqiang
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2013, 16 (04): : 515 - 540
  • [49] Enabling end-to-end secure communication between wireless sensor networks and the Internet
    Hong Yu
    Jingsha He
    Ting Zhang
    Peng Xiao
    Yuqiang Zhang
    [J]. World Wide Web, 2013, 16 : 515 - 540
  • [50] End-to-end Secure Multi-hop Communication with Untrusted Relays is Possible
    He, Xiang
    Yener, Aylin
    [J]. 2008 42ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-4, 2008, : 681 - 685