The GSM voice channel is the world's most widely used mobile communication network. Unfortunately these networks are affected by serious vulnerability from hardware-based attacks and communications can be easy to intercept. This paper describes a prototype implementation of a device which enables secure data and voice transmission over GSM voice channel network. The proposed system is supposed to interact with every cell phone or mobile device connected to the GSM network, differentiating itself from the best-known crypto-phone category. In the following, we will highlight the particular modulation strategy used to generate a specific wave-form that allows the receiver to correctly decipher data with a very low BER. In conclusion, this work aims to define the principles to model a secure infrastructure over a GSM network.

Secure Data and Voice Transmission over GSM Voice Channel: Applications for Secure Communications / Biancucci, Gianluigi; Claudi, Andrea; Dragoni, Aldo Franco. - STAMPA. - (2013), pp. 230-234. (Intervento presentato al convegno 4th International Conference on the Intelligent Systems Modelling & Simulation (ISMS) tenutosi a Bangkok nel 29-31 Jan. 2013) [10.1109/ISMS.2013.10].

Secure Data and Voice Transmission over GSM Voice Channel: Applications for Secure Communications.

BIANCUCCI, Gianluigi;CLAUDI, ANDREA;DRAGONI, Aldo Franco
2013-01-01

Abstract

The GSM voice channel is the world's most widely used mobile communication network. Unfortunately these networks are affected by serious vulnerability from hardware-based attacks and communications can be easy to intercept. This paper describes a prototype implementation of a device which enables secure data and voice transmission over GSM voice channel network. The proposed system is supposed to interact with every cell phone or mobile device connected to the GSM network, differentiating itself from the best-known crypto-phone category. In the following, we will highlight the particular modulation strategy used to generate a specific wave-form that allows the receiver to correctly decipher data with a very low BER. In conclusion, this work aims to define the principles to model a secure infrastructure over a GSM network.
2013
9781467356534
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11566/104667
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 9
  • ???jsp.display-item.citation.isi??? 7
social impact