Loading [MathJax]/extensions/MathZoom.js
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation | IEEE Conference Publication | IEEE Xplore

End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation


Abstract:

Voice communication is an important need in daily activities whether delivered with or without technology. Telecommunication technology has accommodated this need by prov...Show More

Abstract:

Voice communication is an important need in daily activities whether delivered with or without technology. Telecommunication technology has accommodated this need by providing a wide range of infrastructure, including large varieties of devices used as intermediary and end devices. One of the cellular technologies that is very widely used by the public is GSM (Global System for Mobile), while in the military, trunked radio is still popular. However, the security systems of GSM and trunked radio have limitations. Therefore, this paper proposes a platform to secure voice data over wireless mobile communication by providing end-to-end encryption. This platform is robust to noise, real-time and remains secure. The proposed encryption utilizes multicircular permutations rotated by expanded keys as dynamic keys to scramble the data. We carry out simulations and testbed implementation to prove that application of the proposed method is feasible.
Date of Conference: 12-15 April 2019
Date Added to IEEE Xplore: 03 June 2019
ISBN Information:
Conference Location: Nagoya, Japan

Contact IEEE to Subscribe

References

References is not available for this document.