@inproceedings{ccd7c2f4f46c4f4bb8b78bcbb1e5b7e1,
title = "End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation",
abstract = "Voice communication is an important need in daily activities whether delivered with or without technology. Telecommunication technology has accommodated this need by providing a wide range of infrastructure, including large varieties of devices used as intermediary and end devices. One of the cellular technologies that is very widely used by the public is GSM (Global System for Mobile), while in the military, trunked radio is still popular. However, the security systems of GSM and trunked radio have limitations. Therefore, this paper proposes a platform to secure voice data over wireless mobile communication by providing end-to-end encryption. This platform is robust to noise, real-time and remains secure. The proposed encryption utilizes multicircular permutations rotated by expanded keys as dynamic keys to scramble the data. We carry out simulations and testbed implementation to prove that application of the proposed method is feasible.",
keywords = "chaotic algorithm, GSM network, multiple circular, trunked radio, voice encryption",
author = "Nur Hayati and Yohan Suryanto and Kalamullah Ramli and Muhammad Suryanegara",
note = "Publisher Copyright: {\textcopyright} 2019 IEEE.; 2nd International Conference on Communication Engineering and Technology, ICCET 2019 ; Conference date: 12-04-2019 Through 15-04-2019",
year = "2019",
month = apr,
day = "1",
doi = "10.1109/ICCET.2019.8726890",
language = "English",
series = "2019 2nd International Conference on Communication Engineering and Technology, ICCET 2019",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "148--151",
booktitle = "2019 2nd International Conference on Communication Engineering and Technology, ICCET 2019",
address = "United States",
}