skip to main content
10.1145/2799979.2800030acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Secure voice communication system with hardware encryption of data on hands-free headset

Authors Info & Claims
Published:08 September 2015Publication History

ABSTRACT

This paper deals with the prototype for secure voice communication with hardware encryption of data. The main elements are hands-free headset, on which microcontroller with in-flow symmetrical algorithm of block encryption is supported as well as switching server, mobile application and encrypting center.

References

  1. Kafetzakis, Emmanouil; Boulgouris, Nikolaos V.; Panaousis, Emmanouil; Kourtis, Anastasios. "Secure Communications for Mobile Verification Platforms," Wireless Communication Systems (ISWCS 2013), Proceedings of the Tenth International Symposium on, vol., no., pp. 1, 4, 27--30 Aug. 2013.Google ScholarGoogle Scholar
  2. Das, S.; Kaul, V.; Jaewon Kang; Sinkar, K.; Chee, D.; Samtani, S.; Foresta, B. D.; Reis, N. W.; Wiener, P. B.; Sepka, T. G. "Realizing Secure Cellular and Mobile Hot-Spot Extension to Tactical Networks," Military Communications Conference, MILCOM 2013 -- 2013 IEEE, vol., no., pp. 674, 679, 18--20 Nov. 2013.Google ScholarGoogle ScholarCross RefCross Ref
  3. Yun-kyung Lee; Jeong-Nye Kim. "Secure mobile services using secure region," ICT Convergence (ICTC), 2013 International Conference on, vol., no., pp. 894, 895, 14--16 Oct. 2013.Google ScholarGoogle Scholar
  4. Ali, T.; Awal, M. A. "Secure mobile communication in m-payment system using NFC technology," Informatics, Electronics & Vision (ICIEV), 2012 International Conference on, vol., no., pp. 133, 136, 18--19 May 2012.Google ScholarGoogle ScholarCross RefCross Ref
  5. Mikhailov D. M., Zhukov I. Yu. Mobile devices protection from attacks. Ed. by Ivashko A. M. M.: Foylis, 2011. -- 192 pages.: ill.Google ScholarGoogle Scholar
  6. Froimson M. I., Kutepov S. V., Tarakanov O. V., Sheremetov A. V. Main principles of building safe operational systems for mobile devices. Scientific and technical journal «Specialized machinery and communication» No.1 January-February 2013. Moscow 2013. Pages 43--47.Google ScholarGoogle Scholar
  7. Savchuk A. V., Kholyavin V. B., Rubin D. T., Fomin K. G. Development of trusted hardware platform for mobile client device and data protection methods on a hardware level. Scientific and technical journal «Specialized machinery and communication» No.1 January-February 2014. Moscow 2014. Pages 44--48.Google ScholarGoogle Scholar
  8. Zhukov I. Yu., Mikhailov D. M., Froimson M. I., Kharkov S. M., Rubin D. T. Algorithm of untrusted mobile network points detection «Specialized machinery and communication» No.5 September-October 2013. Moscow 2013. Pages 45--48.Google ScholarGoogle Scholar
  9. Stealtphone. Official web-site, reference date -- 2015. URL: http://stealthphone.ru.Google ScholarGoogle Scholar
  10. Telephone set "Fractal GSM BL". Science and technical information bureau, 2007. URL: http://www.bnti.ru/des.asp?itm=3647&tbl=04.03.07.02.Google ScholarGoogle Scholar
  11. Special cell phone SMP-ATJIAC/2. R&D and manufacturing information protection service FSUE «NTC «Atlas», reference date -- 2015. URL: http://www.nikolasoft.ru/atlas_test/index.php?iid=17&nn=2.Google ScholarGoogle Scholar
  12. TopSec Mobile. ROHDE&SCHWARZ, reference date -- 2015. URL: http://www.rohde-schwarz.com/en/product/topsec-mobile-productstartpage_63493-10284.html.Google ScholarGoogle Scholar
  13. Semenov Yu. A. RTP -- real time protocol // Telecommunication technologies (v4.11, 17th May, 2013).Google ScholarGoogle Scholar
  14. Goldstein B. S. {and others.} SIP protocol. Reference book. // SPb.: BHV-Saint-Petersburg, 2005. ---456 p.;Google ScholarGoogle Scholar
  15. Scott Ludwig {at al.} XEP-0166: Jingle // XMPP Standards Foundation. -- 2009.Google ScholarGoogle Scholar
  16. Scott Ludwig {at al.} XEP-0167: Jingle RTP Sessions // XMPP Standards Foundation. -- 2009;Google ScholarGoogle Scholar
  17. RFC-2631-Diffie-Hellman key agreement method // The Internet Society. 1999.Google ScholarGoogle Scholar
  18. Specification for the ADVANCED ENCRYPTION STANDARD (AES) // Federal Information Processing Standards Publication 197 November 26, 2001.Google ScholarGoogle Scholar
  19. RTP Control Protocol Extended Reports (RTCP XR) // The Internet Society. 2003.Google ScholarGoogle Scholar
  20. ITU-T Recommendation G.107 // ITU-T.-1998.Google ScholarGoogle Scholar

Index Terms

  1. Secure voice communication system with hardware encryption of data on hands-free headset

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              SIN '15: Proceedings of the 8th International Conference on Security of Information and Networks
              September 2015
              350 pages
              ISBN:9781450334532
              DOI:10.1145/2799979

              Copyright © 2015 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 8 September 2015

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • short-paper

              Acceptance Rates

              SIN '15 Paper Acceptance Rate34of92submissions,37%Overall Acceptance Rate102of289submissions,35%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader