The GSM voice channel is the world's most widely used mobile communication network. Unfortunately these networks are affected by serious vulnerability from hardware-based attacks and communications can be easy to intercept. This paper describes a prototype implementation of a device which enables secure data and voice transmission over GSM voice channel network. The proposed system is supposed to interact with every cell phone or mobile device connected to the GSM network, differentiating itself from the best-known crypto-phone category. In the following, we will highlight the particular modulation strategy used to generate a specific wave-form that allows the receiver to correctly decipher data with a very low BER. In conclusion, this work aims to define the principles to model a secure infrastructure over a GSM network.
Secure Data and Voice Transmission over GSM Voice Channel: Applications for Secure Communications / Biancucci, Gianluigi; Claudi, Andrea; Dragoni, Aldo Franco. - STAMPA. - (2013), pp. 230-234. (Intervento presentato al convegno 4th International Conference on the Intelligent Systems Modelling & Simulation (ISMS) tenutosi a Bangkok nel 29-31 Jan. 2013) [10.1109/ISMS.2013.10].
Secure Data and Voice Transmission over GSM Voice Channel: Applications for Secure Communications.
BIANCUCCI, Gianluigi;CLAUDI, ANDREA;DRAGONI, Aldo Franco
2013-01-01
Abstract
The GSM voice channel is the world's most widely used mobile communication network. Unfortunately these networks are affected by serious vulnerability from hardware-based attacks and communications can be easy to intercept. This paper describes a prototype implementation of a device which enables secure data and voice transmission over GSM voice channel network. The proposed system is supposed to interact with every cell phone or mobile device connected to the GSM network, differentiating itself from the best-known crypto-phone category. In the following, we will highlight the particular modulation strategy used to generate a specific wave-form that allows the receiver to correctly decipher data with a very low BER. In conclusion, this work aims to define the principles to model a secure infrastructure over a GSM network.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.