Advertisement

Implementation of Confidentiality for Voice Traffic

  • W. Sherine MaryEmail author
  • S. Muthukumar
  • K. S. Akilanayaki
  • N. Sathya Priya
  • S. Sathish Kumar
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)

Abstract

Network security has been an area of concern and with more and more devices getting connected to the internet, security is an indispensable functionality. Statistics show that, networks are attacked every day and we need to keep protecting the data and network from different types of attacks. In our work we have considered security issues specifically for voice communication over a mobile device. The security features implemented in the proposed work differ from existing systems. Existing systems rely on the service provider for confidentiality and authentication. In our work security measures are implemented at the device. Thus this system can provide better security when the security measures provided by the service provider are compromised. Additionally the work can also be used to provide confidently in Bluetooth networks.

Keywords

Voice Mobiledevice Security Network Confidentiality 

Notes

Acknowledgements

The authors would like to thank Er. C. Sukumaran for his constant encouragement. Special thanks for providing sophisticated laboratory facilities, for carrying out this work.

The authors would like to thank Dr. N. Kathiravan for his unconditional support during the design and development of the proposed system.

The authors would like to thank the co-coordinators of Smart India Hackathon. The problem statement for this solution was taken from problem defined by Department of Defence Production.

References

  1. 1.
    Calyptix, Top 8 network attacks by type in 2017, Oct 23, 2017. https://www.calyptix.com/top-threats/top-8-network-attacks-type-2017. Accessed 02 Feb 2018
  2. 2.
    Bagwe, G.R., Apsingekar, D.S., Gandhare, S., Pawar, S.: Voice encryption and decryption in telecommunication. In: International Conference on Communication and Signal Processing, pp. 1790–1793, April 6–8, 2016, India (2016)Google Scholar
  3. 3.
    Richey, R.: Adaptive Differential Pulse Code Modulation Using PICmicro™ Microcontrollers, pp. 1–41. Microchip Technology Inc., Chandler (1997)Google Scholar
  4. 4.
    Salomon, D.: Data Compression, pp. 1790–1793. Springer, New York (1998)CrossRefGoogle Scholar
  5. 5.
    Li, H., Qin, Z.: Audio scrambling algorithm based on variable dimension space. In: International Conference on Industrial and Information System, pp. 316–319 (2009)Google Scholar
  6. 6.
    Naveen, C., Satpute, V.R.: Image encryption technique using improved A5/1 cipher on image bitplanes for wireless data security. In: IEEE Conference, India (2016)Google Scholar
  7. 7.
    Enache, F., Deparateanu, D., Oroian, T., Popescu, F., Vizitiu, I.: Theoretical and practical implementation of scrambling algorithms for speech signals. In: International Conference, Romania, pp. 50–52 (2015)Google Scholar
  8. 8.
    Yan, W.-Q., Fu, W.-G., Gandhare, S., Kankanhalli, M.S.: Progressive audio scrambling in compressed domain. In: International Conference on Communication and Signal Processing, IEEE Transactions on Multimedia, India, vol. 10, pp. 960–968 (2008)CrossRefGoogle Scholar
  9. 9.
    Hamdi, M., Hermassi, H., Rhouma, R.: A new secure and efficient scheme of ADPCM encoder based on chatic encryption. In: 1st International Conference on Advanced Technologies for Signal and Image Processing, Sousse, Tunisia, pp. 7–11 (2014)Google Scholar
  10. 10.
    Han, S., Fingscheidt, T.: An improved ADPCM decoder by adaptively controlled quantization interval centroids. In: 23rd European Signal Processing Conference, Germany, pp. 335–339 (2015)Google Scholar
  11. 11.
    Kitson, F.L., Zeger, K.A.: A real-time ADPCM encoder using variable order prediction. In: IEEE Conference, ICASSP 86, pp. 825–828, Tokyo (1986)Google Scholar
  12. 12.
    Gang, C., Han, B.: An audio scrambling degree measure based on information criteria. In: 2nd International Conference on Signal Processing System, pp. 181–185 (2010)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • W. Sherine Mary
    • 1
  • S. Muthukumar
    • 1
  • K. S. Akilanayaki
    • 1
  • N. Sathya Priya
    • 1
  • S. Sathish Kumar
    • 1
  1. 1.Department of ECEAdithya Institute of TechnologyCoimbatoreIndia

Personalised recommendations