Abstract

With the rapidly advancing technology of today, exchange of information and data is a very pertinent matter. The world has just recently witnessed the effects of information leakage through the issue of WikiLeaks. There are huge amounts of data being shared over different platforms nowadays. Global System for Mobile Communication (GSM) is one of the most reliable platforms known to and used by almost all people in the world for text as well as voice communication. With the tools like Android Studio and NetBeans available, it is now possible to encrypt the text that has to be sent over the GSM, so that it can be decrypted at the other end of the communication path. However, the encryption and decryption of voice being transmitted over the GSM network still remains a question. In the domain of real time voice encryption, much of the work being carried out pertains to the voice being exchanged through the Internet Protocol. As compared to the Voice over Internet Protocol (VoIP), voice over the GSM network has not seen much research work related to its security aspects. The purpose of this paper is to document the results of a project aimed at developing a platform for mobile phones in order to communicate over the GSM network in a secure manner. The most suitable method for achieving the above mentioned objective is to use an open source Operating System (OS), so that the source code is easily accessible and usable. In this paper, the Android OS will be under discussion, which is compatible with all the Android mobile phones. In this way, the maximum number of mobile phone users can be benefitted because Android cell phones are being widely used nowadays. The use of cryptographic algorithms for securing the voice communication over the GSM network is also a part of this paper. The work revolves around the Java programming language since the Android application development has been carried out in Java through the use of Android Studio. Also, NetBeans has been employed for developing algorithms for voice encryption

Highlights

  • The prime objective of this paper is to analyse the voice communication over the Global System for Mobile Communication in terms of the security of the data being transmitted

  • The initial aim was to develop a single platform that could capture the voice being transmitted over the Global System for Mobile Communication (GSM) and tamper it in a way that additional security was added to it

  • It is worth mentioning that security ciphers are already implemented on the communication being conducted over the GSM network

Read more

Summary

Introduction

The prime objective of this paper is to analyse the voice communication over the Global System for Mobile Communication in terms of the security of the data being transmitted. Secure communication is fundamentally aimed at creating a barrier between information assets and threats. It comprises the following three aspects: Confidentiality: Whenever sensitive information is being exchanged, it is deemed necessary to let only the authorized parties have access to it since sharing it with other people may have catastrophic results. This aspect of information security falls under the category of confidentiality [1]. Integrity: While data is transmitted from one end to the other end, it is important to make sure that no intruder is involved in the communication. The protection of data in a way that it remains in the same form at both the sender and the receiver ends can be considered as protecting the integrity of the data [2]

Objectives
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.