Skip to main content
Erschienen in: Wireless Personal Communications 3/2019

08.05.2019

Towards Security of GSM Voice Communication

verfasst von: Fauzia I. Abro, Farzana Rauf, Mobeen-ur-Rehman, B. S. Chowdhry, Muttukrishnan Rajarajan

Erschienen in: Wireless Personal Communications | Ausgabe 3/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Global system for mobile communication (GSM) is widely used digital mobile service around the world. Although GSM was designed as a secure wireless system, it is now vulnerable to different targeted attacks. There is a need to address security domains especially the confidentiality of communication. This paper presents a novel framework for end to end secure voice communication over the GSM networks using encryption algorithm AES-256. A special Modem and speech coding technique are designed to enable the transmission of encrypted speech using GSM voice channel. To the best of our knowledge, this is first solution that uses single codebook for transmission of secure voice. An efficient low bit-rate (1.9 kbps) speech coder is also designed for use with the proposed modulation scheme for optimal results. Different speech characteristics such as pitch, energy and line spectral frequencies are extracted and preserved before compression and encryption of speech. Previously, the best achieved data rate was 1.6 kbps with three codebooks, whilst the proposed approach achieves 2 kbps with 0% bit error rate. The empirical results show that the methodology can be used for real time applications to transmit encrypted voice using GSM network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Xu, Z., (2017). Data transmission method based on single carrier over GSM voice channel. Revista de la Facultad de Ingeniera, 32(9), 23–29. Xu, Z., (2017). Data transmission method based on single carrier over GSM voice channel. Revista de la Facultad de Ingeniera, 32(9), 23–29.
2.
Zurück zum Zitat Giuseppe, C., Giancarlo, D. M., & Ferraro, P. U. (2013). Security issues and attacks on the GSM standard: a review. Journal of Universal Computer Science, 19(16), 2437–2452. Giuseppe, C., Giancarlo, D. M., & Ferraro, P. U. (2013). Security issues and attacks on the GSM standard: a review. Journal of Universal Computer Science, 19(16), 2437–2452.
3.
Zurück zum Zitat Chouhan, A., & Singh, S. (2015). Real time secure end to end communication over GSM network. International Conference on Energy Systems and Applications. Chouhan, A., & Singh, S. (2015). Real time secure end to end communication over GSM network. International Conference on Energy Systems and Applications.
4.
Zurück zum Zitat Biancucci, G., Claudi, A., & Dragoni, A.F., (2013) Secure data and voice transmission over GSM voice channel: Applications for secure communications. 4th International Conference on Intelligent Systems Modelling & Simulation, pp. 230–233. Biancucci, G., Claudi, A., & Dragoni, A.F., (2013) Secure data and voice transmission over GSM voice channel: Applications for secure communications. 4th International Conference on Intelligent Systems Modelling & Simulation, pp. 230–233.
5.
Zurück zum Zitat Katugampala, N., Al-Naimi, K.T., Villete, S., Kondoz, A.M. (2005). Real time end to end secure voice communication over GSM voice channel. 13th European Signal Processing Conference. Katugampala, N., Al-Naimi, K.T., Villete, S., Kondoz, A.M. (2005). Real time end to end secure voice communication over GSM voice channel. 13th European Signal Processing Conference.
6.
Zurück zum Zitat Katugampala, N., Villeile, S., & Kondoz, A.M. (2003). Secure voice over GSM and other low bit rate systems. IET. Katugampala, N., Villeile, S., & Kondoz, A.M. (2003). Secure voice over GSM and other low bit rate systems. IET.
7.
Zurück zum Zitat LaDue, C. K., Sapozhnykov Vitaliy, V., & Fienberg, K. S. (2008). A data modem for GSM voice channel. IEEE Transactions on Vehicular Technology, 57(4), 2205–2218.CrossRef LaDue, C. K., Sapozhnykov Vitaliy, V., & Fienberg, K. S. (2008). A data modem for GSM voice channel. IEEE Transactions on Vehicular Technology, 57(4), 2205–2218.CrossRef
8.
Zurück zum Zitat Kondoz, A. (1994). Digital speech: Coding for low bit rate communication systems. New York: John Wiley. Kondoz, A. (1994). Digital speech: Coding for low bit rate communication systems. New York: John Wiley.
9.
Zurück zum Zitat Yucun, Yang, Suili, Feng, Wu, Ye, & Xinsheng, Ji (2008). A transmission scheme for encrypted speech over GSM network. International Symposium on Computer Science and Computational Technology, pp. 805–808. Yucun, Yang, Suili, Feng, Wu, Ye, & Xinsheng, Ji (2008). A transmission scheme for encrypted speech over GSM network. International Symposium on Computer Science and Computational Technology, pp. 805–808.
10.
Zurück zum Zitat Abro, F.I., Rauf, F., Batool, M., Chowdhry, B. S., & Aslam, S. (2018) An efficient speech coding technique for secure mobile communications. In 8th IEEE Information Technology, Electronics and Mobile Communication Conference (IEMCON). Abro, F.I., Rauf, F., Batool, M., Chowdhry, B. S., & Aslam, S. (2018) An efficient speech coding technique for secure mobile communications. In 8th IEEE Information Technology, Electronics and Mobile Communication Conference (IEMCON).
11.
Zurück zum Zitat Qi, H.F., Yang, X.H. et al, (2008). Novel end-to-end voice encryption method in GSM system. IEEE International Conference on Networking, Sensing and Control. Qi, H.F., Yang, X.H. et al, (2008). Novel end-to-end voice encryption method in GSM system. IEEE International Conference on Networking, Sensing and Control.
12.
Zurück zum Zitat Rekha, A. B., Umadevi, B., Solanke, Y., & Kolli, S. R. (2005). End to end security for GSM users. IEEE International Conference on Personal Wireless Communications. Rekha, A. B., Umadevi, B., Solanke, Y., & Kolli, S. R. (2005). End to end security for GSM users. IEEE International Conference on Personal Wireless Communications.
13.
Zurück zum Zitat Biancucci, G., Claudi, A., & Dragoni, A. F. (2013). Secure data and voice transmission over GSM voice channel: Applications for secure communications. 4th International IEEE Conference on Intelligent Systems Modelling & Simulation (ISMS), pp. 230–233. Biancucci, G., Claudi, A., & Dragoni, A. F. (2013). Secure data and voice transmission over GSM voice channel: Applications for secure communications. 4th International IEEE Conference on Intelligent Systems Modelling & Simulation (ISMS), pp. 230–233.
14.
Zurück zum Zitat Islam, S., Ajmal, F., Ali, S., Zahid, J., & Rashdi, A. (2009). Secure end-to-end communication over GSM and PSTN networks. IEEE International Conference on Electro/Information Technology, pp. 323–326. Islam, S., Ajmal, F., Ali, S., Zahid, J., & Rashdi, A. (2009). Secure end-to-end communication over GSM and PSTN networks. IEEE International Conference on Electro/Information Technology, pp. 323–326.
15.
Zurück zum Zitat Duta, C.-L., Gheorghe, L., & Tapus, N. (2017). Real-time DSP implementations of voice encryption algorithms. ICISSP, pp. 439–446. Duta, C.-L., Gheorghe, L., & Tapus, N. (2017). Real-time DSP implementations of voice encryption algorithms. ICISSP, pp. 439–446.
16.
Zurück zum Zitat Lo, C.-C., & Chen, Y.-J. (1999). Secure communication mechanisms for GSM networks. IEEE Transactions on Consumer Electronics, 45(4), 1074–1080.MathSciNetCrossRef Lo, C.-C., & Chen, Y.-J. (1999). Secure communication mechanisms for GSM networks. IEEE Transactions on Consumer Electronics, 45(4), 1074–1080.MathSciNetCrossRef
17.
Zurück zum Zitat Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES-the advanced encryption standard. Berlin: Springer Science & Business Media.MATH Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES-the advanced encryption standard. Berlin: Springer Science & Business Media.MATH
18.
Zurück zum Zitat Singh, G., (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Computer Applications, 67(19). Singh, G., (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Computer Applications, 67(19).
19.
Zurück zum Zitat Hankerson, D., Menezes, A. J., & Vanstone, S. (2006). Guide to elliptic curve cryptography. Berlin: Springer Science & Business Media.MATH Hankerson, D., Menezes, A. J., & Vanstone, S. (2006). Guide to elliptic curve cryptography. Berlin: Springer Science & Business Media.MATH
20.
Zurück zum Zitat Akif, O. M., & Berna, O. (2015). Data transmission via GSM voice channel for end to end security. IEEE 5th International Conference on Consumer Electronics-Berlin (ICCE-Berlin), pp. 378–382. Akif, O. M., & Berna, O. (2015). Data transmission via GSM voice channel for end to end security. IEEE 5th International Conference on Consumer Electronics-Berlin (ICCE-Berlin), pp. 378–382.
21.
Zurück zum Zitat Kim, M. Y., Ha, N. K., & Kim, S. R. (1996). Linked split-vector quantizer of LPC parameters. Proceedings of the IEEE ICASSP, 2, 741–744. Kim, M. Y., Ha, N. K., & Kim, S. R. (1996). Linked split-vector quantizer of LPC parameters. Proceedings of the IEEE ICASSP, 2, 741–744.
22.
Zurück zum Zitat Chin-Chen, C., & Yu-Chen, H. (1998). A fast LBG codebook training algorithm for vector quantization. IEEE Transactions on Consumer Electronics, 44(4), 1201–1208.CrossRef Chin-Chen, C., & Yu-Chen, H. (1998). A fast LBG codebook training algorithm for vector quantization. IEEE Transactions on Consumer Electronics, 44(4), 1201–1208.CrossRef
23.
Zurück zum Zitat Kumar, P. A., & Anup, S. (2011). An efficient codebook initialization approach for LBG algorithm, arXiv preprint arXiv:1109.0090, pp. 54–58. Kumar, P. A., & Anup, S. (2011). An efficient codebook initialization approach for LBG algorithm, arXiv preprint arXiv:​1109.​0090, pp. 54–58.
24.
Zurück zum Zitat Lee, L. M., & Wang, H. (1996). An extended Levinson-Durbin algorithm for the analysis of noisy autoregressive process. EEE Signal Processing Letters, 3(1), 13–5.CrossRef Lee, L. M., & Wang, H. (1996). An extended Levinson-Durbin algorithm for the analysis of noisy autoregressive process. EEE Signal Processing Letters, 3(1), 13–5.CrossRef
25.
Zurück zum Zitat Akif, O. M., Berna, O., & Gokay, S. (2011). Secure voice communication via GSM network. 7th International Conference on Electrical and Electronics Engineering (ELECO), pp. 282–288. Akif, O. M., Berna, O., & Gokay, S. (2011). Secure voice communication via GSM network. 7th International Conference on Electrical and Electronics Engineering (ELECO), pp. 282–288.
26.
Zurück zum Zitat Mahsa, R., Abolghasem, S., & Pejman, M. (2008). Data mapping onto speech-like signal to transmission over the GSM voice channel. 40th IEEE Symposium on System Theory, pp. 54–58. Mahsa, R., Abolghasem, S., & Pejman, M. (2008). Data mapping onto speech-like signal to transmission over the GSM voice channel. 40th IEEE Symposium on System Theory, pp. 54–58.
Metadaten
Titel
Towards Security of GSM Voice Communication
verfasst von
Fauzia I. Abro
Farzana Rauf
Mobeen-ur-Rehman
B. S. Chowdhry
Muttukrishnan Rajarajan
Publikationsdatum
08.05.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06502-y

Weitere Artikel der Ausgabe 3/2019

Wireless Personal Communications 3/2019 Zur Ausgabe

Neuer Inhalt