Secure Voice Communication via GSM Network (original) (raw)

Hardware based realtime, fast and highly secured speech communication using FPGA

2010

This paper presents a FPGA (Field Programmable Gate Array) based secured speech signal communication system. The system consists of compression, encryption and water-marking. Watermark provides authentication and ownership verification. Encryption is used for security of watermark and voice signal. As random numbers are used as a key for the encryption process, the signal is secured for both wired and wireless media. FPGA is an efficient device for encryption. Conventional processors contain small number of registers and perform large operations in multiple cycles. FPGA can perform a large number of operations at a time. All the steps described in the algorithm is verified in Matlab and implemented in FPGA. Security level is also analyzed in this paper.

Data transmission via GSM voice channel for end to end security

2015 IEEE 5th International Conference on Consumer Electronics - Berlin (ICCE-Berlin), 2015

Global System for Mobile Communications (GSM) technology still plays a key role because of its availability, reliability and robustness. Recently, additional consumer applications are proposed in which GSM is used as a backup or data transmission service. Unfortunately sending data via GSM channel is a challenging task since it is speech sensitive and suppresses other forms of signals. In this paper, a systematic method is proposed to develop a modem that transmits data over GSM voice channel (DoGSMV) using speech like (SL) symbols. Unlike the previous approaches an artificial search space is produced to find best SL symbols and analyses by synthesis (AbyS) method is introduced for parameter decoding. As a result 1.6 kbps simulation data rate is achieved when wireless communication errors are ignored.

Secure Data and Voice Transmission over GSM Voice Channel: Applications for Secure Communications

The GSM voice channel is the world's most widely used mobile communication network. Unfortunately these networks are affected by serious vulnerability from hardware-based attacks and communications can be easy to intercept. This paper describes a prototype implementation of a device which enables secure data and voice transmission over GSM voice channel network. The proposed system is supposed to interact with every cell phone or mobile device connected to the GSM network, differentiating itself from the best-known crypto-phone category. In the following, we will highlight the particular modulation strategy used to generate a specific wave-form that allows the receiver to correctly decipher data with a very low BER. In conclusion, this work aims to define the principles to model a secure infrastructure over a GSM network

Development of a Cryptographic Dongle for Secure Voice Encryption over GSM Voice Channel

J. Inform. and Commun. Convergence Engineering, 2009

A cryptographic dongle, which is capable of transmitting encrypted voice signals over the CDMA/GSM voice channel, was designed and implemented. The dongle used PIC microcontroller for signals processing including analog to digital conversion and digital to analog conversion, encryption and communicating with the smart phone. A smart phone was used to provide power to the dongle as well as passing the encrypted speech to the smart phone which then transmits the signal to the network. A number of tests were conducted to check the efficiency of the dongle, the firmware programming, the encryption algorithms, and the secret key management system, the interface between the smart phone and the dongle and the noise level.

Design of two blocks of a speech coding system to be implemented on an FPGA based card

Data Management and Security, 2013

The main aim of this paper is concerned with modern telecommunications systems which involve modern methods of coding, encryption and decryption of speech signals. For a long time, for the transmission of a speech signal analog telecommunications systems have been used. Because of unexpected and unavoidable interference, wave fading perturbations and different kinds of noise occurring in the channel, it was not possible to detect and receive the same transmitted speech signal. Consequently, digital systems have steadily replaced the former. Here, we have simulated two blocks of such systems, namely the source coding block and the encryption/decryption block. We tested them by listening to the synthesized signals via headphones and using a simulation operated using Simulink of the source software Matlab. Although metallic in their tonalities, results were found to be acceptable.

FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Algorithm with Speech Recognition

With increasing technology development in field of communication and Electronic devices, there is a need for better security service for information transfer in Medical Sectors, Banking, Financial and in other IoT applications etc. Fight against security attacks is of prime importance. Through Cryptographic techniques we can provide Authenticity as well as Confidentiality for the user data. In this paper, hardware implementation has been described for a real-time application of speech data encryption and decryption using AES algorithm along with the speech recognition using cross correlation technique. Verilog programming environment is used for AES cryptography whereas MATLAB is used for Speech recognition. ASIC design on AES core is implemented using Cadence tools. Number of gates, area and power used by AES core design has been drastically reduced by specifying wide range of constraints during front end designing. In Backend designing, layout of AES design, which is the physical geometric representation is also developed.

A Secure Speech Communication Framework for the Embedded System Powered by the High-Frequency Technique – a Study

Cryptography is the art of information protection so that only those for whom the information is meant can able to read and process. It is the science or technique of transforming a message (Encryption) and then retransform the message back to its original form (Decryption). Cryptography is of two types, namely Symmetric Key or Private Key and Asymmetric key or Public-key Cryptography. For the development of this paper, we have used private key cryptography with eight sound signals. The signals are recognized using Python script and then the matched wave is encrypted using the ElGamal algorithm, a type of Public Key encryption algorithm. The encrypted message is digitized and sent through a channel towards the receiver end after FSK modulation is performed. At the receiver end, the signal is recovered and decrypted to obtain the resultant signal. This signal aimed to match with the original voice signal that was encrypted and sent. The equality ratio turns out to be around 70%. Thus...

Real-Time End-To-End Secure Voice Communications Over GSM Voice Channel

13th European Signal …, 2005

GSM is the most wide spread mobile communications system in the world. However the security of the GSM voice traffic is not guaranteed especially over the core network. It is highly desirable to have end-to-end secure communications over the GSM voice channel. In order to achieve endto-end security, speech must be encrypted before it enters the GSM network. A modulation scheme that enables the transmission of encrypted voice and data over the GSM voice channel was designed 1. A real-time prototype is implemented demonstrating the end-to-end secure voice communications over the GSM voice channel. The modem technology presented facilitates the transmission of encrypted data and an encryption algorithm is not specified. The users may choose an algorithm and a hardware platform as necessary.

Design and Hardware Implementation of a Speech Cipher System

Al-Nahrain Journal for Engineering Sciences, 2007

Digital ciphering of speech signals based on one of modern cryptography algorithms, called the Rijndael algorithm, is studied and presented in this paper. The algorithm meets most of the requirements of security level in recent applications. A system to encrypt speech files recorded with Sound Blaster Card of a personal computer was proposed and simulated successfully using MATLAB® language. Subjective measure and objective measure using segmental spectral signal-to-noise ratio, were used to test the proposed system performance. In these tests residual intelligibility of the encrypted speech and quality of the recovered speech were calculated and assessed. Finally, a hardware implementation of the above cipher system has been proposed using the TMS320-C30. The real time requirements from the speech cipher system have been computed in terms of execution time together with factors affecting such implementation. The results show the capability of the cipher system to be implemented usi...