期刊文献+

端到端语音加密通信技术 被引量:6

Techniques of the End-to-End Speech Encryption Communication
下载PDF
导出
摘要 移动通信安全形势越发严峻,目前还没有找到完全无漏洞的安全通信系统解决方案。对端到端的加密通信进行了研究,对端到端的语音加密通信过程进行了详细分析。探讨了实现该类通信过程要解决的关键性技术难题。综合国内外现有的研究成果,比较分析了适合于端到端加密通信的语音加密算法。对于加密之后的语音信号和解密恢复的语音信号如何评价,给出了参数指标和评价标准。端到端的解决方案可以避免常见的窃听和信息窃取,有着比较广阔的发展前景。 The security situation of mobile communication becomes even more grim,and the complete bugfree secure communications system solutions has not been found at present. The end-to-end encryption communications was studied and the process of speech encryption was analyzed in detail. We discussed the way to solve the key technical problems of the communication process. Combining with the existing domestic and international research results,the suitable speech encryption algorithm for end-to-end encryption communication was compared and analyzed. The parameters of indicators and evaluation criteria were given to evaluate the encrypted speech signal and decrypt speech signal. End-to-end communication can avoid the common eavesdropping and theft and has a relatively broad prospects for development.
机构地区 装备学院
出处 《四川兵工学报》 CAS 2015年第12期103-108,共6页 Journal of Sichuan Ordnance
关键词 端到端 语音加密 通信安全 end-to-end speech encryption communication security
  • 相关文献

参考文献26

  • 1Toorani M, Beheshti A. Solutions to the GSM security weak- nesses [ C ]//Next Generation Mobile Applications, Services and Technologies ,2008. NGMAST' 08. The Second Interna- tional Conference on. IEEE. [ S. 1. ] : [ s. n. ], 2008 : 576 - 581. 被引量:1
  • 2Hemlata Kohad, V R Ingle, M Gaikwad. An Overview of Speech Encryption[ J]. Techniques. International Journal of Engineering Research and Development, 2012,3 (4). 被引量:1
  • 3ESTI GSM 06.10-1995 ,GSM Full Rate Speech Transeod- ing[ S]. 被引量:1
  • 4ESTI GSM 06.01-1992, Speech Processing Functions General Description[ S]. 被引量:1
  • 5Ieavitt N. Mobile security: finally a serious problem [ J]. Computer,2011,44(6) :11 - 14. 被引量:1
  • 6Dupas L. Secure voice MW 3026 S&MW 3026 S - MR N C500 ~ Amadeus Station [ C ]//COLLOQUIUM DIGEST - IEE. lEE. 1999. [ S. 1. ] : [ s. n. ] ,2003:14 - 14. 被引量:1
  • 7Moldal L, Jorgensen T. End to end encryption in GSM, DECT and satellite networks using NSK200 [ C ]// Secure GSM and Beyond:End to End Security for Mobile Commu- nications. IEE Seminar on (Digest No. 2003/10059 ). lxMon ,2003:5/1 - 5/5. 被引量:1
  • 8朱峰编著..通信保密技术[M].北京:清华大学出版社,2014:241.
  • 9李晔等编著..数字语音编码技术[M].北京:电子工业出版社,2013:345.
  • 10Ma F, Cheng J, Wang Y. Wavelet transform-based analogue speech scrambling scheme [ J 3. Electronics Letters, 1996,32 (8) :719 -721. 被引量:1

二级参考文献5

  • 1N.Katugampala, S.Villette, and A.Kondoz, "Secure Voice over GSM and other low bit rate Systems". IEE Secure GSM and Beyond: End to End Security for Mobile Communica- tions, London, UK, Feb.2003. 被引量:1
  • 2A. Kondoz, N. Katugampala, K. T. A1-Naimi, S. Villette, DataTransmission, WIPO Patent GB05/001729, November 17, 2005. 被引量:1
  • 3M. Boloursaz, R. Kazemi, D. Nashtaali and F. Behnia, "Se- cure Dataover GSM based on Algebraic Codebooks," 10thIEEE East-West Design& Test Symposium, pp. 409-412, September 2012. 被引量:1
  • 4A.Dhananjay, A. Sharma, M. Paik, J. Chen, T. K. Kuppus- amy, J. Li, and L. Subramanian, "Hermes: data trans- mission over unknown voice channels," In MobiCom ' 10: Proceedings of the sixteenth annual international conference on Mobile computing and networking, pp. 113-124, 2010. 被引量:1
  • 5Liquan Chen, Qi Guo, "An OFDM-based Secure Data Com- municatingScheme in GSM Voice Channel" Electronics, Communications and Control (ICECC), 2011 International Conference on, 9-11 Sept. 2011,723 - 726. 被引量:1

共引文献2

同被引文献39

引证文献6

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部