Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
PSTN Networks
Saad Islam, Fatima Ajmal, Salman Ali, Jawad Zahid and Adnan Rashdi
College of Signals
National University of Sciences and Technology, Pakistan
saadislam, fatima, salmanali, adnanrashdi@ieee.org
Abstract—GSM (Global System for Mobiles) is the most widely hopping; the real-time interception of the exchanged
spread mobile communication system in the world. An important information is completely practical. While GSM was
objective in mobile communication systems is secure speech anticipated to be a secure wireless system and considered the
communication. GSM suffers from various security weaknesses. user authentication and over-the-air encryption, it is completely
The GSM voice traffic is secure outside the core network but it vulnerable to several attacks. The conversation of the GSM
has no security over the core network. This system can be made subscribers is susceptible to security attacks like replay attack,
thoroughly secure by encrypting the speech which is to be interleaving attack and man-in-the-middle attack [3].
transmitted on the GSM voice channel. In this paper we have
demonstrated a real-time prototype of an end-to-end secure This paper outlines the provision of encrypted
communication system developed in MATLAB Simulink. Our communication over second generation mobile networks and
technique comprises of encryption of the speech before entering the landline connections. The requirements of users for such
the GSM handset which adds security and confidentiality to our encryption, and mechanisms to provide it are considered. An
communication. The encryption algorithm is private to the entirely new approach to encryption has been proposed. Use of
communicating GSM subscribers and even the service providing stream ciphers is the most commonly used technique in mobile
company will not judge what was said. This is amazing because communication, which requires the voice data to be in binary
now the GSM channel will become exclusively concealed and form [4]. The technique presented in this paper is unique as it
confidential to the two subscribers so that even the company provides encryption directly on symbols without going on to
people cannot listen to them.
the bit level. This technique is much simpler than other GSM
ciphering techniques and thus a more robust and efficient
Keywords-GSM, security, Simulink, QAM system is achieved.
We have used Simulink as the simulation tool for
implementing our system. Simulink is a software package that
I.INTRODUCTION enables modeling, simulation, and analysis of a wide range of
real time systems [5]. Simulink provides an environment where
With the advent of wireless communication technology, the physical system can be modeled as a block diagram. For
mobile communication has become more convenient than ever. modeling, Simulink provides a graphical user interface (GUI)
However, because of the openness of wireless communication, for building models using click-and-drag mouse operation and
how to prevent the privacy between the communicating parties keyboard for editing block parameters. Simulating a dynamic
is becoming a very important issue. Due to the fact that unlike system is a two-step process with Simulink i.e. creation of a
a fixed phone, which offers some level of physical security (i.e. block diagram and the command to Simulink to simulate the
physical access is needed to the phone line for listening in), system represented by the model from a specified start time to
with a radio link, anyone with a receiver is able to passively a specified stop time. Simulations are interactive, so parameters
monitor the airwaves [1]. Security is a major issue in can be changed on the fly results viewed right away [6]. Real-
communication systems. By secure communication we mean time execution was the essential attraction in using Simulink.
“A condition that results from the establishment and
maintenance of protective measures that ensures a state of Following sections discuss the proposed scheme in detail.
inviolability from hostile acts or influences”. Jammers, hackers Section II describes our proposed encryption technique;
and intruders are an importunate threat to the privacy of a Section III describes the hardware platform which we have
communication system. utilized for testing our technique, introduction and evaluation
of the simulation tool used for development of our algorithm is
Although the security architecture of GSM is intended to given in Section IV. Finally Section V and VI close the paper
prevent unauthorized network access, disallow subscriber with comments on our success in achieving security for both
impersonation, protect confidentiality, and provide privacy [2]. mobile and fixed-line communication.
The biggest drawback of GSM system is that the GSM voice
channel between the two communicating parties doesn’t
provide traffic confidentiality. GSM tried to harden the
interception by using several techniques such as frequency
This will change the levels of all the samples of the input
speech depending upon the user defined scheme. The user
defined scheme determines how the quantization levels will be
changed and mapped to other levels. To incorporate maximum
Figure 1. Subsystem Implementing Encryption
difference between the original and the encrypted level of the
sample, Level 0 should be mapped to Level 8, 1 to 9, 2 to 10
and so on as shown in Fig.2.
For simplicity let’s say the speech signal has 16
quantization levels. Our technique will encrypt this speech by a Function block parameters of Rectangular QAM
16-QAM Binary-Coded modulator along with a User-Defined Demodulator (User-Defined) are shown in Fig. 3. The
QAM demodulator. constellation mapping is defined as a vector [128:255 0:127]
which shows our User-Defined modulation scheme for 256-
QAM system.
324
IV.SIMULATION ENVIRONMENT
III.HARDWARE PLATFORM As discussed above MATLAB 7.4.0.287 (R2007a)
Simulink 6.6 was used for real-time simulation of the desired
Our hardware platform comprised of two Personal secure communication system. We developed a model
Computers, each consisting of two Sound playback and incorporating security for full-duplex communication i.e.
Recording Devices, SoundMAX Digital Audio and Creative model for a transceiver. The same model in Fig.7 was used at
Sound Blaster PCI. Each PC was connected to headphones and both the terminals executing encryption and decryption on
a GSM handset (NOKIA 1100) as shown in Fig.4. transmit and receive paths respectively.
325
V.RESULTS VI.CONCLUSION
Results and comparison of original versus encrypted speech In this paper a novel mechanism is proposed for secure
signal with 16 quantization levels is presented in this section. communication over GSM as well as PSTN networks. A new
encryption technique is devised to provide surefire security.
The technique is implemented in Real-time in Simulink
enabling two standard GSM mobile phones communicate in
full-duplex mode while maintaining end-to-end security. This
encryption technique has demonstrated excellent results on
GSM-GSM, PSTN-PSTN as well as GSM-PSTN calls. The
proposed idea ensures confidentiality and the GSM channel is
made secure and private to the communicating parties. In this
way all kinds of man-in-the-middle attacks are made totally
impossible.
REFERENCES
[1] “Security in the GSM System” By Jeremy Quirke
[2] Mohsen Tooran and Ali Asghar Beheshti Shirazi, “Solutions to the GSM
(a) Unencrypted Speech Waveform Security Weaknesses” The Second International Conference on Next
Generation Mobile Applications, Services, and Technologies
[3] C. Lo and Y. Chen, “Secure communication mechanisms for GSM
networks,” IEEE Transactions on Consumer Electronics, Vol. 45, No. 4,
pp. 1074-1079, November 1999.
[4] David G. W. Birch and Ian J. Shaw, “Mobile communications security-
private or public”, IEE, June 1994
[5] Simulink - Simulation and Model-Based Design
http://www.mathworks.com/products/simulink/
[6] Asad Azemi and Edwin Engin Yaz, “Utilizing SIMULINK and
MATLAB in a Graduate Nonlinear Systems Analysis Course”
[7] Signal Processing Blockset 6.8
http://www.mathworks.com/products/sigprocblockset/
326