期刊文献+

端到端语音加密通信技术 被引量:6

Techniques of the End-to-End Speech Encryption Communication
下载PDF
导出
摘要 移动通信安全形势越发严峻,目前还没有找到完全无漏洞的安全通信系统解决方案。对端到端的加密通信进行了研究,对端到端的语音加密通信过程进行了详细分析。探讨了实现该类通信过程要解决的关键性技术难题。综合国内外现有的研究成果,比较分析了适合于端到端加密通信的语音加密算法。对于加密之后的语音信号和解密恢复的语音信号如何评价,给出了参数指标和评价标准。端到端的解决方案可以避免常见的窃听和信息窃取,有着比较广阔的发展前景。 The security situation of mobile communication becomes even more grim,and the complete bugfree secure communications system solutions has not been found at present. The end-to-end encryption communications was studied and the process of speech encryption was analyzed in detail. We discussed the way to solve the key technical problems of the communication process. Combining with the existing domestic and international research results,the suitable speech encryption algorithm for end-to-end encryption communication was compared and analyzed. The parameters of indicators and evaluation criteria were given to evaluate the encrypted speech signal and decrypt speech signal. End-to-end communication can avoid the common eavesdropping and theft and has a relatively broad prospects for development.
机构地区 装备学院
出处 《四川兵工学报》 CAS 2015年第12期103-108,共6页 Journal of Sichuan Ordnance
关键词 端到端 语音加密 通信安全 end-to-end speech encryption communication security
  • 相关文献

参考文献22

  • 1Toorani M, Beheshti A. Solutions to the GSM security weak- nesses [ C ]//Next Generation Mobile Applications, Services and Technologies ,2008. NGMAST' 08. The Second Interna- tional Conference on. IEEE. [ S. 1. ] : [ s. n. ], 2008 : 576 - 581.
  • 2Hemlata Kohad, V R Ingle, M Gaikwad. An Overview of Speech Encryption[ J]. Techniques. International Journal of Engineering Research and Development, 2012,3 (4).
  • 3ESTI GSM 06.10-1995 ,GSM Full Rate Speech Transeod- ing[ S].
  • 4ESTI GSM 06.01-1992, Speech Processing Functions General Description[ S].
  • 5Ieavitt N. Mobile security: finally a serious problem [ J]. Computer,2011,44(6) :11 - 14.
  • 6Dupas L. Secure voice MW 3026 S&MW 3026 S - MR N C500 ~ Amadeus Station [ C ]//COLLOQUIUM DIGEST - IEE. lEE. 1999. [ S. 1. ] : [ s. n. ] ,2003:14 - 14.
  • 7Moldal L, Jorgensen T. End to end encryption in GSM, DECT and satellite networks using NSK200 [ C ]// Secure GSM and Beyond:End to End Security for Mobile Commu- nications. IEE Seminar on (Digest No. 2003/10059 ). lxMon ,2003:5/1 - 5/5.
  • 8Ma F, Cheng J, Wang Y. Wavelet transform-based analogue speech scrambling scheme [ J 3. Electronics Letters, 1996,32 (8) :719 -721.
  • 9Jayant N, McDermott B, Christensen S, et at. A comparison of four methods for analog speech privacy [ C]//IEEE Transactions on Communications. 1"981,29( 1 ) :18- 23.
  • 10Anil Kumar, Abhijit Mitra, S R Mahadeva Prasanna. On the Effectivity of Different Pseudo-Noise and Orthogonal se- quences for Speech Encryption from Correlation Properties [ Z]. International journal of information technology,2007.

二级参考文献5

  • 1N.Katugampala, S.Villette, and A.Kondoz, "Secure Voice over GSM and other low bit rate Systems". IEE Secure GSM and Beyond: End to End Security for Mobile Communica- tions, London, UK, Feb.2003.
  • 2A. Kondoz, N. Katugampala, K. T. A1-Naimi, S. Villette, DataTransmission, WIPO Patent GB05/001729, November 17, 2005.
  • 3M. Boloursaz, R. Kazemi, D. Nashtaali and F. Behnia, "Se- cure Dataover GSM based on Algebraic Codebooks," 10thIEEE East-West Design& Test Symposium, pp. 409-412, September 2012.
  • 4A.Dhananjay, A. Sharma, M. Paik, J. Chen, T. K. Kuppus- amy, J. Li, and L. Subramanian, "Hermes: data trans- mission over unknown voice channels," In MobiCom ' 10: Proceedings of the sixteenth annual international conference on Mobile computing and networking, pp. 113-124, 2010.
  • 5Liquan Chen, Qi Guo, "An OFDM-based Secure Data Com- municatingScheme in GSM Voice Channel" Electronics, Communications and Control (ICECC), 2011 International Conference on, 9-11 Sept. 2011,723 - 726.

共引文献2

同被引文献39

引证文献6

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部