Standard
Securing GSM voice through scrambling. / Naeem, Iftikhar Ali; Rauf, Usman; Ahmad, Syed Faraz et al.
Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010. IEEE, 2010. p. 156-158 5555330.
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Harvard
Naeem, IA, Rauf, U, Ahmad, SF
& Shirazi, SN 2010,
Securing GSM voice through scrambling. in
Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010., 5555330, IEEE, pp. 156-158, 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010, Irkutsk Listvyanka, Russian Federation,
11/07/10.
https://doi.org/10.1109/SIBIRCON.2010.5555330
APA
Vancouver
Naeem IA, Rauf U, Ahmad SF
, Shirazi SN.
Securing GSM voice through scrambling. In Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010. IEEE. 2010. p. 156-158. 5555330 doi: 10.1109/SIBIRCON.2010.5555330
Author
Naeem, Iftikhar Ali ; Rauf, Usman ; Ahmad, Syed Faraz et al. /
Securing GSM voice through scrambling. Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010. IEEE, 2010. pp. 156-158
Bibtex
@inproceedings{2df0e21c02a14c44a2b63f238b6d431b,
title = "Securing GSM voice through scrambling",
abstract = "GSM is the most widely used mobile communication system, which provides authenticity, confidentiality and integrity. The encryption however is for air interface only which means that it secures channel till the BTS. This air interface encryption has been cracked and other vulnerabilities like replay and man in the middle attacks have put all the personal and confidential communications at stake. A lot of work has been done on voice encryption over GSM's Circuit Switched Data (CSD) channel. But CSD channel impairments and quality issues have been prohibitive in the realization of a reliable and acceptable solution. In this paper, we propose voice scrambling technique which not only is hard to break but also will be in subscriber's control. We further discuss its performance over the GSM network.",
author = "Naeem, {Iftikhar Ali} and Usman Rauf and Ahmad, {Syed Faraz} and Shirazi, {Syed Noorulhassan}",
year = "2010",
doi = "10.1109/SIBIRCON.2010.5555330",
language = "English",
isbn = "9781424476268",
pages = "156--158",
booktitle = "Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010",
publisher = "IEEE",
note = "2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010 ; Conference date: 11-07-2010 Through 15-07-2010",
}
RIS
TY - GEN
T1 - Securing GSM voice through scrambling
AU - Naeem, Iftikhar Ali
AU - Rauf, Usman
AU - Ahmad, Syed Faraz
AU - Shirazi, Syed Noorulhassan
PY - 2010
Y1 - 2010
N2 - GSM is the most widely used mobile communication system, which provides authenticity, confidentiality and integrity. The encryption however is for air interface only which means that it secures channel till the BTS. This air interface encryption has been cracked and other vulnerabilities like replay and man in the middle attacks have put all the personal and confidential communications at stake. A lot of work has been done on voice encryption over GSM's Circuit Switched Data (CSD) channel. But CSD channel impairments and quality issues have been prohibitive in the realization of a reliable and acceptable solution. In this paper, we propose voice scrambling technique which not only is hard to break but also will be in subscriber's control. We further discuss its performance over the GSM network.
AB - GSM is the most widely used mobile communication system, which provides authenticity, confidentiality and integrity. The encryption however is for air interface only which means that it secures channel till the BTS. This air interface encryption has been cracked and other vulnerabilities like replay and man in the middle attacks have put all the personal and confidential communications at stake. A lot of work has been done on voice encryption over GSM's Circuit Switched Data (CSD) channel. But CSD channel impairments and quality issues have been prohibitive in the realization of a reliable and acceptable solution. In this paper, we propose voice scrambling technique which not only is hard to break but also will be in subscriber's control. We further discuss its performance over the GSM network.
U2 - 10.1109/SIBIRCON.2010.5555330
DO - 10.1109/SIBIRCON.2010.5555330
M3 - Conference contribution/Paper
AN - SCOPUS:77957263554
SN - 9781424476268
SP - 156
EP - 158
BT - Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010
PB - IEEE
T2 - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010
Y2 - 11 July 2010 through 15 July 2010
ER -