Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Strategic Study of CAE >> 2007, Volume 9, Issue 12

An End to End Modulating Transmission Scheme With Good Robustness Against the RPE-LTP Vocoder

1.东南大学信息安全研究中心,南京210096;2.福建师范大学网络安全与密码技术重点实验室,福州350007,东南大学信息安全研究中心,南京210096,东南大学信息安全研究中心,南京210096,东南大学信息安全研究中心,南京210096

Received: 2007-06-11 Revised: 2007-09-14

Next Previous

Abstract

A novel endtoend data transmission scheme based on OFDM mechanism with good robustness against the RPE-LTP vocoder in GSM voice channel is proposed. According to the character of RPE-LTP vocoder, data are modulated to orthogonal lowfrequency sinusoidal carrier. In OFDM, the modulation is done by IFFT and the modulated signals are conformed to the time and frequency characters of RPELTP vocoder. The results of simulation show that the transmission bit rate of the proposed scheme reaches 2.4 kb/s,and the bit error rate of the scheme is lower than 0.3 %. This scheme provides a new approach for realtime secure voice data transmission over GSM system.

Figures

图1

图2

图3

图4

References

[ 1 ] Lo Chichun, Chen Yujen.Secure communication mechanisms for GSM networks [ J] .IEEE Transactions on Consumer Electronics, 1999 ,45 ( 4 ) : 1074 ~1079

[ 2 ] Street M.Interoperability and international operation:an introduction to end to end mobile secure [ A] .IEE Secure GSM and Beyond: End to End Security for Mobile Communications [ C] .London, UK, Feb 2003 link1

[ 3 ] Challans P, Gover R, Thorlby J P. End to end data bearer performance characterization for communications over wide area mobile networks [ A] .IEE Secure GSM and Beyond: End to End Security for Mobile Communications [ C] .London, UK, Feb 2003

[ 4 ] ETSI Standard GSM 06.10 , Digital cellular telecommunications system: Full rate speech transcoding [ S] .ETSI SMG 2 Group, Valbonne, France, Mar 1997

[ 5 ] 白剑,杨榆,徐迎晖,等.GSM移动通信系统中语音隐藏算法研究[J].中山大学学报,2004,43(2):156~159 link1

[ 6 ] Katugampala N N, Ai-Nami K T, Villette S, et al.Real time data transmission over GSM voice channel for secure voice & data applications [ A ] .The 2nd IEE Secure Mobile Communications Forum: Exploring the Technical Challenges in Secure GSM and WLAN [ C] .London, UK, Sept 2004 link1

[ 7 ] 陈一帅.GSM语音加密研究[D].北京:北方交通大学,2001

[ 8 ] Mcaulay R J, Quatieri T F.Speech analysis /synthesis based on a sinusoidal representation [ J] .IEEE Transactions on Acoustics, Speech and Signal Proceeding, 1986 , 34 ( 4 ) :744 ~754 link1

[ 9 ] Speth M, Frchtel S A, Fock G,et al.Optimum receiver design for OFDM based broadband transmission-part II: a case study [ J ] . IEEE Transactions on Communications, 2001 , 47 ( 11 ): 571 ~578 link1

Related Research