Professional Documents
Culture Documents
net/publication/307546042
CITATIONS READS
10 2,720
3 authors:
Ahmed H. El Tengy
Mansoura University
9 PUBLICATIONS 45 CITATIONS
SEE PROFILE
All content following this page was uploaded by Ali Takieldeen on 01 September 2016.
1. INTRODUCTION
Mobile communication devices [1] have become commonplace 3. Voice Over Internet Protocol (VoIP)
during the past few years, integrating multiple wireless
networking technologies to support additional functionality and
services. Smartphones and personal digital assistants (PDAs)
give users mobile access to the internet, email, and many other
applications, but smartphone protection hasn’t maintained the
same theme as computer security [2]. Technical security
procedures, such as firewalls, antivirus, and encryption, are not
usual on mobile phones, and mobile phone operating systems
are not updated as often as those on personal computers.
Because of phone calls are subjected to hacking, espionage, and
eavesdropping, there should be a system that encrypt the phone
call before sending, so it can be more secure and safe [3].
Section 2 Need of Secured Voice Communication
Section 3 Voice Over Internet Protocol (VoIP)
Section 4 Encrypting Voice IP Calls
Section 4 Data Standard Encryption (DES) overview
Section 5 Implementation of an Encryption Scheme for Voice
Calls Fig(1) Diagram for making voice calls over internet
Section 6 Conclusion protocols (VOIP).
1
International Journal of Computer Applications (0975 – 8887)
Volume *83*, April 2016
2
International Journal of Computer Applications (0975 – 8887)
Volume *83*, April 2016
6. REFERENCES
[1] Chin, E., Felt, A. P., Greenwood, K., and Wagner, D.
"Analyzing Inter-Application Communication in
Android". In Proc. of the Annual International Conference
on Mobile Systems, Applications, and Services (2011).
Fig(4) Analog Audio signal before encryption [2] Marko Hassinen, "SafeSMS - End-to-End Encryption for
SMS Messages", IEEE International Conference on
Telecommunications, 2008, 359-365.
[3] S. Jahan, M. M. Hussain,M. R.Amin and S. H. Shah
Newaz, "A Proposal for Enhancing the Security System of
Short Message Service in GSM", IEEE International
Conference on Anti-counterfeiting Security and
Identification, 2008, 235-240.
[4] Nichols, Randall K. & Lekkas, Panos. "Speech
10100101010010 cryptology". Wireless Security: Models, Threats, and
Solutions. New York: McGraw-Hill 2002.
[5] C. K. LaDue, V. V. Sapozhnykov, and K. S. Fienberg. A
Fig(5) Digital Audio signal after encryption data modem for GSM voice channel. IEEE Transactions
on Vehicular Technology, 57(4):2205–2218, July 2008.
[6] Booth, Char, "Chapter 2: IP Phones, Software VoIP, and
Integrated and Mobile VoIP". Library Technology
01001011010101 Reports 46 (5): 11–19, 2010.
[7] Jht2, Echen, “What is VOIP”, “http://www.voip-
info.org/”, 2016.
Fig(6) Digital Audio signal after encryption [8] Sam Narisi, “Business VoIP: Features, Benefits and What
to Look For”, “http://www.itmanagerdaily.com”, 2015.
[9] Saruchi Kukkar, "Encrypted IP Voice Call
Communication on Android through Sip Server on 3G
3
International Journal of Computer Applications (0975 – 8887)
Volume *83*, April 2016