Encryption of Voice in GSM Network Using RC4 Algorithm
Keywords:
GSM Voice Encryption, GSM Speech Coding, GMSK, Voice Coefficients, Voice Encryption, RPE-LTP.Abstract
Mobile telecommunications such as Global System for Mobile Communication ( GSM ) are now well established globally and users rely heavily on the convenient communications it provides. The level of security provided by GSM is superior to its predecessors and is more than adequate for the majority of users. However, some users in the areas of government, defense or business require more security over and above that provided by the GSM standards and by standard GSM equipment. In a GSM network, only the radio channels between the mobile station (MS) and the base transceiver station (BTS) are encrypted. This paper presents methodology for implementation of end-to-end security over the available GSM infrastructure by adding encryption algorithm (RC4 algorithm) to standard GSM. The communications between parties is encrypted in GSM environments and simulation is carried using MATLAB software as simulation tool the results show that’s the proposed method can be applied and without any modification to GSM standard and optimum result can be obtained.
References
- Data Communication and Networking By Behrouz A.Forouzan 4th Edition.
- Mobile-Communications 4th Edition by Dr-Jochen-Schiller .
- Securing Speech in GSM Networks using DES with Random Permutation and Inversion Algorithm (International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.4, July 2012)
- Role of Multiple Encryption in Secure Voice Communication (International Journal of Computer Science and Electronics Engineering (IJCSEE) Volume 1, Issue 2 (2013) ISSN 2320–4028 (Online)
- GSM and Personal Communications Handbook (Mobile Communications Library) by Siegmund Redl , Matthias Weber , Malcolm W. Oliphant .
- Brand/GSM_vokoder.pdf
- Security in the GSM Network Ammar Yasir Korkusuz Bogazici University, Electrical-Electronics Engineering Department, MSc. Student.
- Wireless Communication by V. S. Bagad .
- An Investigation Into Authentication Security of GSM Algorithm for Mobile banking By Ali Raheem .
- Proceedings of the International Conference on Information Systems Design and Intelligent Application 2012 edited by Suresh Chandra Satapathy, P S Avadhani, Ajith Abraham.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.