|Title||Secure Data and Voice Transmission over GSM Voice Channel: Applications for Secure Communications|
|Publication Type||Conference Paper|
|Year of Publication||2013|
|Authors||Biancucci, G., A. Claudi, and A F. Dragoni|
|Conference Name||Intelligent Systems Modelling Simulation (ISMS), 2013 4th International Conference on|
|Keywords||BER, cell phone, cellular radio, communication security, crypto-phone category, cryptography, Data Modulator, data security, GSM, GSM voice channel network, hardware-based attacks, mobile communication network, mobile device, modulation, modulation strategy, Secure data transmission, Secure voice transmission, System Modelling, telecommunication security, voice communication, voice transmission|
The GSM voice channel is the world's most widely used mobile communication network. Unfortunately these networks are affected by serious vulnerability from hardware-based attacks and communications can be easy to intercept. This paper describes a prototype implementation of a device which enables secure data and voice transmission over GSM voice channel network. The proposed system is supposed to interact with every cell phone or mobile device connected to the GSM network, differentiating itself from the best-known crypto-phone category. In the following, we will highlight the particular modulation strategy used to generate a specific wave-form that allows the receiver to correctly decipher data with a very low BER. In conclusion, this work aims to define the principles to model a secure infrastructure over a GSM network.