ABSTRACT
This paper deals with the prototype for secure voice communication with hardware encryption of data. The main elements are hands-free headset, on which microcontroller with in-flow symmetrical algorithm of block encryption is supported as well as switching server, mobile application and encrypting center.
- Kafetzakis, Emmanouil; Boulgouris, Nikolaos V.; Panaousis, Emmanouil; Kourtis, Anastasios. "Secure Communications for Mobile Verification Platforms," Wireless Communication Systems (ISWCS 2013), Proceedings of the Tenth International Symposium on, vol., no., pp. 1, 4, 27--30 Aug. 2013.Google Scholar
- Das, S.; Kaul, V.; Jaewon Kang; Sinkar, K.; Chee, D.; Samtani, S.; Foresta, B. D.; Reis, N. W.; Wiener, P. B.; Sepka, T. G. "Realizing Secure Cellular and Mobile Hot-Spot Extension to Tactical Networks," Military Communications Conference, MILCOM 2013 -- 2013 IEEE, vol., no., pp. 674, 679, 18--20 Nov. 2013.Google ScholarCross Ref
- Yun-kyung Lee; Jeong-Nye Kim. "Secure mobile services using secure region," ICT Convergence (ICTC), 2013 International Conference on, vol., no., pp. 894, 895, 14--16 Oct. 2013.Google Scholar
- Ali, T.; Awal, M. A. "Secure mobile communication in m-payment system using NFC technology," Informatics, Electronics & Vision (ICIEV), 2012 International Conference on, vol., no., pp. 133, 136, 18--19 May 2012.Google ScholarCross Ref
- Mikhailov D. M., Zhukov I. Yu. Mobile devices protection from attacks. Ed. by Ivashko A. M. M.: Foylis, 2011. -- 192 pages.: ill.Google Scholar
- Froimson M. I., Kutepov S. V., Tarakanov O. V., Sheremetov A. V. Main principles of building safe operational systems for mobile devices. Scientific and technical journal «Specialized machinery and communication» No.1 January-February 2013. Moscow 2013. Pages 43--47.Google Scholar
- Savchuk A. V., Kholyavin V. B., Rubin D. T., Fomin K. G. Development of trusted hardware platform for mobile client device and data protection methods on a hardware level. Scientific and technical journal «Specialized machinery and communication» No.1 January-February 2014. Moscow 2014. Pages 44--48.Google Scholar
- Zhukov I. Yu., Mikhailov D. M., Froimson M. I., Kharkov S. M., Rubin D. T. Algorithm of untrusted mobile network points detection «Specialized machinery and communication» No.5 September-October 2013. Moscow 2013. Pages 45--48.Google Scholar
- Stealtphone. Official web-site, reference date -- 2015. URL: http://stealthphone.ru.Google Scholar
- Telephone set "Fractal GSM BL". Science and technical information bureau, 2007. URL: http://www.bnti.ru/des.asp?itm=3647&tbl=04.03.07.02.Google Scholar
- Special cell phone SMP-ATJIAC/2. R&D and manufacturing information protection service FSUE «NTC «Atlas», reference date -- 2015. URL: http://www.nikolasoft.ru/atlas_test/index.php?iid=17&nn=2.Google Scholar
- TopSec Mobile. ROHDE&SCHWARZ, reference date -- 2015. URL: http://www.rohde-schwarz.com/en/product/topsec-mobile-productstartpage_63493-10284.html.Google Scholar
- Semenov Yu. A. RTP -- real time protocol // Telecommunication technologies (v4.11, 17th May, 2013).Google Scholar
- Goldstein B. S. {and others.} SIP protocol. Reference book. // SPb.: BHV-Saint-Petersburg, 2005. ---456 p.;Google Scholar
- Scott Ludwig {at al.} XEP-0166: Jingle // XMPP Standards Foundation. -- 2009.Google Scholar
- Scott Ludwig {at al.} XEP-0167: Jingle RTP Sessions // XMPP Standards Foundation. -- 2009;Google Scholar
- RFC-2631-Diffie-Hellman key agreement method // The Internet Society. 1999.Google Scholar
- Specification for the ADVANCED ENCRYPTION STANDARD (AES) // Federal Information Processing Standards Publication 197 November 26, 2001.Google Scholar
- RTP Control Protocol Extended Reports (RTCP XR) // The Internet Society. 2003.Google Scholar
- ITU-T Recommendation G.107 // ITU-T.-1998.Google Scholar
Index Terms
- Secure voice communication system with hardware encryption of data on hands-free headset
Recommendations
Provably Secure Timed-Release Public Key Encryption
A timed-release cryptosystem allows a sender to encrypt a message so that only the intended recipient can read it only after a specified time. We formalize the concept of a secure timed-release public-key cryptosystem and show that, if a third party is ...
A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds
To assure the confidentiality of the sensitive data stored in public cloud storages, the data owners should encrypt their data before submitting them to the clouds. However, it brings new challenge for us to effectively share the encrypted data in the ...
Secure public-key encryption scheme without random oracles
Since the first practical and secure public-key encryption scheme without random oracles proposed by Cramer and Shoup in 1998, Cramer-Shoup's scheme and its variants remained the only practical and secure public-key encryption scheme without random ...
Comments