Home > Research > Publications & Outputs > Securing GSM voice through scrambling

Links

Text available via DOI:

View graph of relations

Securing GSM voice through scrambling

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Securing GSM voice through scrambling. / Naeem, Iftikhar Ali; Rauf, Usman; Ahmad, Syed Faraz et al.
Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010. IEEE, 2010. p. 156-158 5555330.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Naeem, IA, Rauf, U, Ahmad, SF & Shirazi, SN 2010, Securing GSM voice through scrambling. in Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010., 5555330, IEEE, pp. 156-158, 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010, Irkutsk Listvyanka, Russian Federation, 11/07/10. https://doi.org/10.1109/SIBIRCON.2010.5555330

APA

Naeem, I. A., Rauf, U., Ahmad, S. F., & Shirazi, S. N. (2010). Securing GSM voice through scrambling. In Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010 (pp. 156-158). Article 5555330 IEEE. https://doi.org/10.1109/SIBIRCON.2010.5555330

Vancouver

Naeem IA, Rauf U, Ahmad SF, Shirazi SN. Securing GSM voice through scrambling. In Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010. IEEE. 2010. p. 156-158. 5555330 doi: 10.1109/SIBIRCON.2010.5555330

Author

Naeem, Iftikhar Ali ; Rauf, Usman ; Ahmad, Syed Faraz et al. / Securing GSM voice through scrambling. Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010. IEEE, 2010. pp. 156-158

Bibtex

@inproceedings{2df0e21c02a14c44a2b63f238b6d431b,
title = "Securing GSM voice through scrambling",
abstract = "GSM is the most widely used mobile communication system, which provides authenticity, confidentiality and integrity. The encryption however is for air interface only which means that it secures channel till the BTS. This air interface encryption has been cracked and other vulnerabilities like replay and man in the middle attacks have put all the personal and confidential communications at stake. A lot of work has been done on voice encryption over GSM's Circuit Switched Data (CSD) channel. But CSD channel impairments and quality issues have been prohibitive in the realization of a reliable and acceptable solution. In this paper, we propose voice scrambling technique which not only is hard to break but also will be in subscriber's control. We further discuss its performance over the GSM network.",
author = "Naeem, {Iftikhar Ali} and Usman Rauf and Ahmad, {Syed Faraz} and Shirazi, {Syed Noorulhassan}",
year = "2010",
doi = "10.1109/SIBIRCON.2010.5555330",
language = "English",
isbn = "9781424476268",
pages = "156--158",
booktitle = "Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010",
publisher = "IEEE",
note = "2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010 ; Conference date: 11-07-2010 Through 15-07-2010",

}

RIS

TY - GEN

T1 - Securing GSM voice through scrambling

AU - Naeem, Iftikhar Ali

AU - Rauf, Usman

AU - Ahmad, Syed Faraz

AU - Shirazi, Syed Noorulhassan

PY - 2010

Y1 - 2010

N2 - GSM is the most widely used mobile communication system, which provides authenticity, confidentiality and integrity. The encryption however is for air interface only which means that it secures channel till the BTS. This air interface encryption has been cracked and other vulnerabilities like replay and man in the middle attacks have put all the personal and confidential communications at stake. A lot of work has been done on voice encryption over GSM's Circuit Switched Data (CSD) channel. But CSD channel impairments and quality issues have been prohibitive in the realization of a reliable and acceptable solution. In this paper, we propose voice scrambling technique which not only is hard to break but also will be in subscriber's control. We further discuss its performance over the GSM network.

AB - GSM is the most widely used mobile communication system, which provides authenticity, confidentiality and integrity. The encryption however is for air interface only which means that it secures channel till the BTS. This air interface encryption has been cracked and other vulnerabilities like replay and man in the middle attacks have put all the personal and confidential communications at stake. A lot of work has been done on voice encryption over GSM's Circuit Switched Data (CSD) channel. But CSD channel impairments and quality issues have been prohibitive in the realization of a reliable and acceptable solution. In this paper, we propose voice scrambling technique which not only is hard to break but also will be in subscriber's control. We further discuss its performance over the GSM network.

U2 - 10.1109/SIBIRCON.2010.5555330

DO - 10.1109/SIBIRCON.2010.5555330

M3 - Conference contribution/Paper

AN - SCOPUS:77957263554

SN - 9781424476268

SP - 156

EP - 158

BT - Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010

PB - IEEE

T2 - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010

Y2 - 11 July 2010 through 15 July 2010

ER -