Independent Encryption Technique for Mobile Voice Calls
نویسنده
چکیده
The legality of some countries or agencies’ acts to spy on personal phone calls of the public became a hot topic to many social groups’ talks. It is believed that this act is considered an invasion to someone’s privacy. Such act may be justified if it is singling out specific cases but to spy without limits is very unacceptable. This paper discusses the needs for not only a simple and light weight technique to secure mobile voice calls but also a technique that is independent from any encryption standard or library. It then presents and tests one encrypting algorithm that is based of Frequency scrambling technique to show fair and delay-free process that can be used to protect phone calls from such spying acts. Keywords—Frequency Scrambling, Mobile Applications, RealTime Voice Encryption, Spying on Calls.
منابع مشابه
Implementation and Performance Analysis of Reliable and Secure End to End Voice Encryption over Public Mobile Network Based on Frequency Domain Using Dual Processor in FPGA Platform
This research aims in designing a method for implementing end-to-end voice encryption over mobile network such as GSM that independent to phone devices, operating system and network devices. The proposing method is an encryption system in domain frequency to keep the encryption signal remain within the range of sound frequencies that can be transmitted through GSM/2G/3G. This method differ comp...
متن کاملA Preemptive Priority Handoff Scheme in Integrated Voice and Data Cellular Mobile Systems
In this paper, we propose a preemptive priority handoff scheme for integrated voice/data cellular mobile systems. In our scheme, calls are divided into three different classes: handoff voice calls, originating voice calls, and data calls. In each cell of the system there is a queue only for data calls. Priority is given to handoff voice calls over the other two kinds of calls. That is, the righ...
متن کاملThe Impact of Security on VoIP Call Quality
Modern multimedia communication tools must have high security, high availability and high quality of service (QoS). Any security implementation will directly impact on QoS. This paper will investigate how end-to-end security impacts on QoS in Voice over Internet Protocol (VoIP). The QoS is measured in terms of lost packet ratio, latency and jitter using different encryption algorithms, no secur...
متن کاملThe Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملSensitivity analysis of Quadrature Amplitude Modulation over AMR-WB voice codec
The voice calls over cellular networks are encrypted only over small sections of the full path, usually only between the Mobile Equipment and the Base Station/eNodeB. In this paper we propose a solution for highly secure end-to-end voice calls over the already existing voice call. As opposite to data channels, the normal audio channel provides low lag, low jitter and increased security due to t...
متن کامل