Browse > Article
http://dx.doi.org/10.5762/KAIS.2012.13.5.2313

End-to-End Digital Secure Speech Communication over UHF and PSTN  

Kim, Ki-Hong (The Attached Institute of ETRI)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.13, no.5, 2012 , pp. 2313-2318 More about this Journal
Abstract
With the widely applications of tactical radio networks, end-to-end secure speech communication in the heterogeneous network has become a very significant security issue. High-grade end-to-end speech security can be achieved using encryption algorithms at user ends. However, the use of encryption techniques results in a problem that encrypted speech data cannot be directly transmitted over heterogeneous tactical networks. That is, the decryption and re-encryption process must be fulfilled at the gateway between two different networks. In this paper, in order to solve this problem and to achieve optimal end-to-end speech security for heterogeneous tactical environments, we propose a novel mechanism for end-to-end secure speech transmission over ultra high frequency (UHF) and public switched telephone network (PSTN) and evaluate against the performance of conventional mechanism. Our proposed mechanism has advantages of no decryption and re-encryption at the gateway, no processing delay at the gateway, and good inter-operability over UHF and PSTN.
Keywords
Digital Secure Speech; Speech Coder; Modem; Gateway; UHF; PSTN; Inter-operability;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Ingerski and A. Sapp, "Mobile Tactical Communications, The Role of The UHF Follows-on Satellite Constellation and Its Successor, Mobile User Objective System," IEEE MILCOM '02, pp. 302-306, 2002.
2 N. N. Katugampala, K. T. Al-Naimi, S. Villette, and A. M. Kondoz, "Real-Time End-to-End Secure Voice Communications over GSM Voice Channel," EURASIP EUSIPCO '05, 2005.
3 S. Islam, F. Ajmal, S. Ali, J. Zahid, and A. Rashdi, "Secure End-to-End Communication over GSM and PSTN Networks," IEEE IET '09, pp. 323-326, 2009.
4 Y. Yang, S. Feng, W. Ye, and X. Ji, "A Transmission Scheme for Encrypted Speech over GSM Network," IEEE ISCSCT '08, pp. 805-808, 2008.
5 T. Chmayssani, G. Baudoin, and G. Hendryckx, "Secure Communications through Speech Dedicated Channels Using Digital Modulations," IEEE ICCST '08, pp. 312-317, 2008.
6 P. Kiley and T. Benedett, "Public Safety Interoperability with an SCA Military Radio Using the P25 Waveform," IEEE MILCOM '07, pp. 1-8, 2007.
7 J. M. Alvermann and M. T. Kurdziel, "The Secure Communication Interoperability Protocol (SCIP) over a VHF/UHF Radio Channel," IEEE SSST '10, pp. 1-6, 2008.
8 K. Kim and J. Hong, "Evaluation of Transmission and Quality Performance of Digital Secure Voice Communications in an HF Network," IEEE ICDT '09, pp. 20-25, 2009.
9 N. M. Anas, Z. Rahman, A. Shafii, M. N. A. Rahman, and Z. A. M. Amin, "Secure Speech Communications over Public Switched Telephone Network," IEEE Asia-Pacific Conference on Applied Electromagnetics '05, pp. 336-339, 2005.
10 T. Chmayssani and G. Baudoin, "Data Transmission over Voice Dedicated Channels Using Digital Modulations," IEEE RADIOELEK '08, pp. 1-4, 2008.
11 ITU-T Recommendation P. 862, 2002.
12 http://www.dvsinc.com/index.htm
13 ITU-T Recommendation V. 22 bis, 1993.
14 US DoD, "MIL-STD-188-110B, Military Standard - Interoperability and Performance Standards for Data Modems," 2000.
15 FIPS PUBS 197, 2001.
16 IETF RFC 5794, 2010.