Implementation of Confidentiality for Voice Traffic
Network security has been an area of concern and with more and more devices getting connected to the internet, security is an indispensable functionality. Statistics show that, networks are attacked every day and we need to keep protecting the data and network from different types of attacks. In our work we have considered security issues specifically for voice communication over a mobile device. The security features implemented in the proposed work differ from existing systems. Existing systems rely on the service provider for confidentiality and authentication. In our work security measures are implemented at the device. Thus this system can provide better security when the security measures provided by the service provider are compromised. Additionally the work can also be used to provide confidently in Bluetooth networks.
KeywordsVoice Mobiledevice Security Network Confidentiality
The authors would like to thank Er. C. Sukumaran for his constant encouragement. Special thanks for providing sophisticated laboratory facilities, for carrying out this work.
The authors would like to thank Dr. N. Kathiravan for his unconditional support during the design and development of the proposed system.
The authors would like to thank the co-coordinators of Smart India Hackathon. The problem statement for this solution was taken from problem defined by Department of Defence Production.
- 1.Calyptix, Top 8 network attacks by type in 2017, Oct 23, 2017. https://www.calyptix.com/top-threats/top-8-network-attacks-type-2017. Accessed 02 Feb 2018
- 2.Bagwe, G.R., Apsingekar, D.S., Gandhare, S., Pawar, S.: Voice encryption and decryption in telecommunication. In: International Conference on Communication and Signal Processing, pp. 1790–1793, April 6–8, 2016, India (2016)Google Scholar
- 3.Richey, R.: Adaptive Differential Pulse Code Modulation Using PICmicro™ Microcontrollers, pp. 1–41. Microchip Technology Inc., Chandler (1997)Google Scholar
- 5.Li, H., Qin, Z.: Audio scrambling algorithm based on variable dimension space. In: International Conference on Industrial and Information System, pp. 316–319 (2009)Google Scholar
- 6.Naveen, C., Satpute, V.R.: Image encryption technique using improved A5/1 cipher on image bitplanes for wireless data security. In: IEEE Conference, India (2016)Google Scholar
- 7.Enache, F., Deparateanu, D., Oroian, T., Popescu, F., Vizitiu, I.: Theoretical and practical implementation of scrambling algorithms for speech signals. In: International Conference, Romania, pp. 50–52 (2015)Google Scholar
- 9.Hamdi, M., Hermassi, H., Rhouma, R.: A new secure and efficient scheme of ADPCM encoder based on chatic encryption. In: 1st International Conference on Advanced Technologies for Signal and Image Processing, Sousse, Tunisia, pp. 7–11 (2014)Google Scholar
- 10.Han, S., Fingscheidt, T.: An improved ADPCM decoder by adaptively controlled quantization interval centroids. In: 23rd European Signal Processing Conference, Germany, pp. 335–339 (2015)Google Scholar
- 11.Kitson, F.L., Zeger, K.A.: A real-time ADPCM encoder using variable order prediction. In: IEEE Conference, ICASSP 86, pp. 825–828, Tokyo (1986)Google Scholar
- 12.Gang, C., Han, B.: An audio scrambling degree measure based on information criteria. In: 2nd International Conference on Signal Processing System, pp. 181–185 (2010)Google Scholar