Novel end-to-end voice encryption method in GSM system

被引:0
|
作者
Qi, H. F. [1 ]
Yang, X. H. [1 ]
Jiang, R. [1 ]
Liang, B. [1 ]
Zhou, S. J. [1 ]
机构
[1] SE Univ, Sch Informat Sci & Engn, Nanjing 210096, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For the GSM security mechanism cannot assure end-to-end secure communications, this paper presents a novel voice encryption method based on current voice channel, which overcomes data channel's shortages and solves the problem of voice encryption penetrating the RPE-LTP vocoder. The proposed method realizes the end-to-end secure communications in the GSM system with short time delay, good compatibility to all GSM networks, and easy implementation without any modification in current GSM signaling system.
引用
收藏
页码:217 / 220
页数:4
相关论文
共 50 条
  • [41] MemFHE: End-to-end Computing with Fully Homomorphic Encryption in Memory
    Gupta, Saransh
    Cammarota, Rosario
    Simunic, Tajana
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2024, 23 (02)
  • [42] End-to-End Encryption in Resource-Constrained IoT Device
    Alluhaidan, Ala Saleh D.
    Prabu, P.
    IEEE ACCESS, 2023, 11 : 70040 - 70051
  • [43] Securing SCADA Applications Using OpenPLC With End-To-End Encryption
    Alves, Thiago
    Morris, Thomas
    Yoo, Seong-Moo
    3RD ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2017), 2017, : 1 - 6
  • [44] End-to-end Encryption for SMS Messages in the Health Care Domain
    Hassinen, Marko
    Laitinen, Pertti
    CONNECTING MEDICAL INFORMATICS AND BIO-INFORMATICS, 2005, 116 : 316 - 321
  • [45] Towards Efficient End-to-End Encryption for Container Checkpointing Systems
    Stoyanov, Radostin
    Reber, Adrian
    Ueno, Daiki
    Clapinski, Michal
    Vagin, Andrei
    Bruno, Rodrigo
    PROCEEDINGS OF THE 15TH ACM SIGOPS ASIA-PACIFIC WORKSHOP ON SYSTEMS, APSYS 2024, 2024, : 60 - 66
  • [46] Integrating end-to-end encryption and authentication technology into broadband networks
    Pierson, LG
    INTEGRATION ISSUES IN LARGE COMMERCIAL MEDIA DELIVERY SYSTEMS, 1996, 2615 : 260 - 269
  • [47] Usability of End-to-End Encryption in E-Mail Communication
    Reuter, Adrian
    Abdelmaksoud, Ahmed
    Boudaoud, Karima
    Winckler, Marco
    FRONTIERS IN BIG DATA, 2021, 4
  • [48] Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE
    Isobe, Takanori
    Minematsu, Kazuhiko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 313 - 324
  • [49] Scalable, Practical VoIP Teleconferencing With End-to-End Homomorphic Encryption
    Rohloff, Kurt
    Cousins, David Bruce
    Sumorok, Daniel
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) : 1031 - 1041
  • [50] Hybrid Cryptographic End-to-End Encryption Method for Protecting IoT Devices Against MitM Attacks
    Karmous, Nader
    Hizem, Moez
    BEN Dhiab, Yassmine
    Aoueileyine, Mohamed OULD-ELHASSEN
    Bouallegue, Ridha
    Youssef, Neji
    RADIOENGINEERING, 2024, 33 (04) : 583 - 592