Implementation and Performance Analysis of Reliable and Secure End to End Voice Encryption over Public Mobile Network Based on Frequency Domain Using Dual Processor in FPGA Platform

نویسندگان

  • Yohan Suryanto
  • Kalamullah Ramli
چکیده

This research aims in designing a method for implementing end-to-end voice encryption over mobile network such as GSM that independent to phone devices, operating system and network devices. The proposing method is an encryption system in domain frequency to keep the encryption signal remain within the range of sound frequencies that can be transmitted through GSM/2G/3G. This method differ compare to the method used in the previous studies, in which they use the time-based encryption method to get a low rate encrypted data so the results can be communicated via GSM network. We simulated the method using Matlab. The simulation results showed that the voice encryption on the frequency domain characteristics is very different from the original signal and can be passed completely through the GSM network. This method was implemented in the Xilinx FPGA using microblaze dual core processor on the Atlys board. The results of the signal reconstruction using FFT/IFFT module in FPGA Xilinx varied in a relatively small deviation, maximum -10.42 dB, compared to the original signal. Performance analysis of the prototype showed the sender speech can be reconstructed real time in the mobile handset of the receiver side, even in the unsynchronized condition. However, in a further prototype development, the precision level of the FFT/IFFT module needs to be improved, meanwhile the synchronization module and echo canceller need to be added. Keywords— Voice encryption, End-to-end mobile network, GSM/2G/3G, Dual core microblaze, Xilinx FPGA, FFT-IFFT, Domain frequency.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and Implementation of Field Programmable Gate Array Based Baseband Processor for Passive Radio Frequency Identification Tag (TECHNICAL NOTE)

In this paper, an Ultra High Frequency (UHF) base band processor for a passive tag is presented. It proposes a Radio Frequency Identification (RFID) tag digital base band architecture which is compatible with the EPC C C2/ISO18000-6B protocol. Several design approaches such as clock gating technique, clock strobe design and clock management are used. In order to reduce the area Decimal Matrix C...

متن کامل

Image encryption based on chaotic tent map in time and frequency domains

The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...

متن کامل

Implementation of Low-Cost Architecture for Control an Active Front End Rectifier

In AC-DC power conversion, active front end rectifiers offer several advantages over diode rectifiers such as bidirectional power flow capability, sinusoidal input currents and controllable power factor. A digital finite control set model predictive controller based on fixed-point computations of an active front end rectifier with unity displacement of input voltage and current to improve dynam...

متن کامل

Network Investigation and Performance Analysis of ZigBee Technology using OPNET

Abstract- Communication has become inevitably part of our day to day activities, in academic, business, banking, and other sectors. It has therefore become so important to implement good and efficient communication system. A reference point according to this research is the wireless sensor networking (WSN) system, and most important thing in communication is to be free from interference, attenu...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014