Skip to main content

Advertisement

Log in

Effective Model for Real Time End to End Secure Communication Over GSM Voice Channel

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Due to the availability, robustness and reliability; Global System for Mobile Communications (GSM) plays a vital role in our daily life. GSM security is not so strong and is susceptible to attacks. One of the most important issues is insecurity in voice communicated over the GSM. While the system provides limited voice security over air links through encryption; yet, availability of a solution, that provides end-to-end secure voice assurance, is considered important to meet user security requirements. To make the communication secure (end-to-end) one option is to encrypt the speech and then transmit it over GSM channel. In this paper, a novel approach is proposed for secure end-to-end voice communication over GSM. The biggest challenge is that the GSM channel only transmits speech like a symbol; therefore, a modulation technique is required which can effectively generate modulation signal similar to the human voice. Next problem in this regard is the requirement of associated encryption and speech compression technique. The proposed methodology uses codec2 700 bits/s as an encoder and decoder, with coherent PSK as a modulation and demodulation technique. In addition to this KASUMI based encryption algorithm is adopted which best fits in our proposed flow. The quality assessment of the speech after its reconstruction on the receiver side has shown good results. The proposed methodology has shown viable results on the computer-based system as well as an embedded system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. El.Zouka, H. A. (2015). Providing end-to-end secure communications in gsm networks. International Journal of Network Security & Its Applications (IJNSA), 7, 31–41.

    Article  Google Scholar 

  2. Kazemi, R., Mosayebi, R., Etemadi, S., Boloursaz, M., & Behnia, F. (2012). A lower capacity bound of secure end to end data transmission via gsm network. In 6th International Symposium on Telecommunications (IST). (IEEE). pp. 1015–1020.

  3. Chouhan, A., & Singh, S. (2015). Real time secure end to end communication over gsm network. In 2015 International Conference on Energy Systems and Applications. (IEEE), 2015. pp. 663–668.

  4. Challans, P., Gover, R., & Thorlby, J. (2003). End to end data bearer performance characterisation for communications over wide area mobile networks. In IEE Seminar Secure GSM and Beyond: End to End Security for Mobile Communications. IET, 2013.

  5. Ciornei, S., & Bogdan, I. (2008). Gsm security-attacks and protection methods (II). In BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI, Publicat de Universitatea Tehnică „Gheorghe Asachi” din Iaşi (pp. 73-82).

  6. Blanchard, C. (2000). Security for the third generation (3g) mobile system. Information Security Technical Report, 3(5), 55–65.

    Article  Google Scholar 

  7. Ciornei, S., Bogdan, I., Scripcariu, L., & Calin, M. (2015). A low cost and open-source solution for end-to-end secure calls over volte. University Politehnica of Bucharest Scientific Bulletin Series C-Electrical Engineering and Computer Science, 77(4), 347–358.

    Google Scholar 

  8. Anand, A., Pejovic, V., Belding, E. M., & Johnson, D. L. (2012). Villagecell: Cost effective cellular connectivity in rural areas’. In Proceedings of the Fifth International Conference on Information and Communication Technologies and Development. ACM, 2012. pp. 180–189.

  9. Katugampala, N., Al.Naimi, K. T., Villette, S., & Kondoz, A. M. (2005). Real-time end-to-end secure voice communications over gsm voice channel. In 2005 13th European Signal Processing Conference. IEEE, pp. 1–4.

  10. Yang, Y., Feng, S., Ye, W., & Ji, X. (2008). A transmission scheme for encrypted speech over gsm network. In 2008 International Symposium on Computer Science and Computational Technology. vol. 2. IEEE, pp. 805–808.

  11. Özkan, M. A., & Örs, S. B. (2015). Data transmission via gsm voice channel for end to end security. In 2015 IEEE 5th International Conference on Consumer Electronics-Berlin (ICCE-Berlin). IEEE, 2015. pp. 378–382.

  12. Boloursaz, M., Kazemi, R., Nashtaali, D., Nasiri, M., & Behnia, F. (2013) Secure data over gsm based on algebraic codebooks. In East-West Design & Test Symposium (EWDTS 2013). IEEE, 2013. pp. 1–4.

  13. Ridha, O. A., Jawad, G. N., & Kadhim, S. F. (2018). Modified blind source separation for securing end-to-end mobile voice calls. IEEE Communications Letters, 22(10), 2072–2075.

    Article  Google Scholar 

  14. LaDue, C. K., Sapozhnykov, V. V., & Fienberg, K. S. (2008). A data modem for gsm voice channel. IEEE Transactions on Vehicular Technology, 57(4), 2205–2218.

    Article  Google Scholar 

  15. Ciornei, S., Bogdan, I., & Scripcariu, L. (2012). Hd voice modem for end to end secure call. In 2012 20th Telecommunications Forum (TELFOR). IEEE, 2012. pp. 580–583.

  16. Islam, S., Haq, I. U., & Saeed, A. (2015). Secure end-to-end sms communication over gsm networks. In 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST). IEEE, 2015. pp. 286–292.

  17. Chmayssani, T., & Baudoin, G. (2008). Performances of digital modulations for data transmission over voice dedicated channels. In 2008 50th International Symposium ELMAR. vol. 1. IEEE, 2008. pp. 273–276.

  18. Rowe, D. G. (1997). Techniques for harmonic sinusoidal coding. University of South Australia.

  19. Gupta, S., Jain, S., & Agarwal, M. (2018). Ensuring data security in databases using format preserving encryption. In 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence). IEEE, 2018. pp. 1–5.

  20. PUB, F. (1999). Data encryption standard (des). FIPS PUB, pp. 46–3.

  21. Ozkan, M. A., Ors, B., & Saldamli, G. (2011). Secure voice communication via gsm network. In 2011 7th International Conference on Electrical and Electronics Engineering (ELECO). IEEE, 2011. pp. II–288.

  22. Kotnik, B., Mezgec, Z., Svečko, J., & Chowdhury, A. (2009). Data transmission over gsm voice channel using digital modulation technique based on autoregressive modeling of speech production. Digital Signal Processing, 19(4), 612–627.

    Article  Google Scholar 

  23. Rashidi, M., Sayadiyan, A., & Mowlaee, P. (2008). Data mapping onto speech-like signal to transmission over the gsm voice channel. In 2008 40th Southeastern Symposium on System Theory (SSST). IEEE, 2008. pp. 54–58.

  24. Katugampala, N., Villette, S., & Kondoz, A. (2003). Secure voice over gsm and other low bit rate systems.  In IEE Seminar Secure GSM and Beyond: End to End Security for Mobile Communications. IET, 2013.

  25. Nizami, I. F., Majid, M., ur Rehman, M., Anwar, S. M., Nasim, A., & Khurshid, K. (2020). No-reference image quality assessment using bag-of-features with feature selection. Multimedia Tools and Applications, 79(11), 7811–7836.

    Article  Google Scholar 

  26. Nizami, I. F., ur Rehman, M., Majid, M., & Anwar, S. M. (2020). Natural scene statistics model independent no-reference image quality assessment using patch based discrete cosine transform. Multimedia Tools and Applications, 79(35), 26285–26304.

    Article  Google Scholar 

  27. Shakir, M., Rehman, O. U., Abbas, Z., Masood, A., & Shahid, W. (2016). Evaluation of video quality in wireless multimedia sensor networks. International Journal of Electrical and Computer Engineering, 6(1), 223.

    Google Scholar 

  28. Cipressi, E., & Merani, M. L. (2020). An effective machine learning (ml) approach to quality assessment of voice over ip (voip) calls. IEEE Networking Letters, 2(2), 90–94.

    Article  Google Scholar 

  29. Mittag, G., & Möller, S. (2019). Non-intrusive speech quality assessment for super-wideband speech communication networks. In ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2019. pp. 7125–7129.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ammar Masood.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rehman, M.U., Adnan, M., Batool, M. et al. Effective Model for Real Time End to End Secure Communication Over GSM Voice Channel. Wireless Pers Commun 119, 1643–1659 (2021). https://doi.org/10.1007/s11277-021-08299-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08299-1

Keywords

Navigation