scholarly journals Design and Development of Secure Mobile Communication over GSM Network Using Open Source Operating System (OS)

With the rapidly advancing technology of today, exchange of information and data is a very pertinent matter. The world has just recently witnessed the effects of information leakage through the issue of WikiLeaks. There are huge amounts of data being shared over different platforms nowadays. Global System for Mobile Communication (GSM) is one of the most reliable platforms known to and used by almost all people in the world for text as well as voice communication. With the tools like Android Studio and NetBeans available, it is now possible to encrypt the text that has to be sent over the GSM, so that it can be decrypted at the other end of the communication path. However, the encryption and decryption of voice being transmitted over the GSM network still remains a question. In the domain of real time voice encryption, much of the work being carried out pertains to the voice being exchanged through the Internet Protocol. As compared to the Voice over Internet Protocol (VoIP), voice over the GSM network has not seen much research work related to its security aspects. The purpose of this paper is to document the results of a project aimed at developing a platform for mobile phones in order to communicate over the GSM network in a secure manner. The most suitable method for achieving the above mentioned objective is to use an open source Operating System (OS), so that the source code is easily accessible and usable. In this paper, the Android OS will be under discussion, which is compatible with all the Android mobile phones. In this way, the maximum number of mobile phone users can be benefitted because Android cell phones are being widely used nowadays. The use of cryptographic algorithms for securing the voice communication over the GSM network is also a part of this paper. The work revolves around the Java programming language since the Android application development has been carried out in Java through the use of Android Studio. Also, NetBeans has been employed for developing algorithms for voice encryption

2019 ◽  
Vol 7 (2) ◽  
pp. 123-132
Author(s):  
Hendra Supendar ◽  
Yopi Handrianto ◽  
Santoso Setiawan

Abstract   Communication is very important and a success factor of the system at the company. Communication can be done using telephone media and internet media. PT. Interdev Prakarsa has several branches and communication between branches is still done using telephone media, and it is very costly for the company especially since the company is already using internet media in the network. The solution to this problem in this study was designing an internet-based technology as communication between branches, the technology is called Voice over Internet Protocol (VoIP) with an open source operating system and an open source firewall that was Shorewall. Result showed that after installation and testing, this firewall reliable enough to overcome the problem of attack problems from outside. The results of VoIP tightening on service quality found that the application of VoIP did not consume a lot of CPU Benchmarks, i.e. only 0.80 to 1.35 per cent. The bandwidth used is also very small between 86 to 86.8 kbps for incoming calls and 83.4 up to 84.3 kbps for outgoing calls. Communication built between VoIP peripherals has also been tested to run well because the value of delay, jitter and packet loss is included in the good category. Keywords: VoIP, Shorewall, Comunication   Abstrak   Komunikasi pada sebuah perusahaan sangatlah penting, dimana komunikasi menjadi alat ukur keberhasilan sistem di perusahaan tersebut. Komunikasi yang dilakukan dapat menggunakan media telepon dan media internet. PT. Interdev Prakarsa memiliki beberapa cabang dan komunikasi antar cabang masih dilakukan dengan menggunakan media telepon, dan itu sangatlah menghabiskan cost perusahaan apalagi perusahaan tersebut sudah menggunakan media internet dalam jaringan. Solusi dari permasalahan tersebut adalah dengan mendesain sebuah teknologi yang berbasis jaringan internet sebagai komunikasi antar cabang, teknologi tersebut bernama Voice over Internet Protocol (VoIP) dengan sebuah sistem operasi open source dan sebuah firewall open source yaitu Shorewall dimana setelah dilakukan penginstallan dan pengetesan, firewall ini cukup handal untuk mengatasi masalah masalah serangan dari luar.  Hasil dari pengetasan VoIP terhadap kualitas pelayanan didapatkan bahwa penerapan VoIP tidak banyak menghabiskan Benchmark CPU yaitu hanya 0,80 sampai degan 1.35 persen per call.  Untuk bandwidth yang di pakai juga sangatlah kecil berada di antara 86 sampai dengan 86.8 kbps untuk panggilan masuk dan 83.4 sampai dengan 84.3 kbps untuk panggilan keluar. Komunikasi yang dibangun antar peripheral VoIP pun teruji berjalan dengan baik karena nilai dari delay, jitter dan packet loss termasuk dalam katagori baik.   Kata kunci: VoIP, Shorewall, Komunikasi


Author(s):  
Suvarna Gaikwad ◽  
Parth Dode ◽  
Shubham Chhipa ◽  
Shubhangi Vaikole

<p>Vehicles being the most widely used machines need to get smarter compared to their current technology. The necessity described by the younger generation of users, the millennials, for their devices to be smart and their vision to have more computerized and smarter applications of various sensors. The invention and development of better-computerized systems for infotainment and control of vehicles have taken speed and research is done mainly in an open-source on Linux kernel-based operating systems. The Smart Bike System is a Raspberry pi based operating system(AGL) for bikes tracks the various components of the bike like Speed, Quantity of fuel, Distance covered in a single trip, Temperature, Date and Time. We make a note that the current system of dashboards for representing the various aspects of a bike is old. A significant improvement would be made in the quality of the bike and the way people use it if the current computer technology of the world embraces the vehicular system. Automotive Grade Linux(AGL) is an (open source tech) operating system for automobiles which when installed on a computer in synchronization with the parts of a motor-bike has an ability to display more information in a more colorful and animated format like a computer desktop but specifically for automobiles.</p>


Filomat ◽  
2020 ◽  
Vol 34 (15) ◽  
pp. 4953-4966
Author(s):  
Ameer Khan ◽  
Shuai Li ◽  
Dechao Chen ◽  
Yangming Li

Open-Source has not only removed the monopoly of the few technological companies, but has also distributed the knowledge, at no cost. With knowledge moves on from person to person, and each person adds his/her contribution to the past work, a knowledge production chain keeps rolling, greatly reducing the effort to re-invent wheels. It allows the public availability of data and enables the addition, modification, and edition of data more efficiently at a faster pace. Robots, considered as a replacement of man-power are of meticulous interests for researchers in the past few decades. Their immunity to walk and talk more or less like a human is worth praising, but this radical change was not so obvious a decade or two ago before the wide propagation of open-source, the continuous spread of research work around the world allows the brilliant minds to add their pieces to incrementally growing joint efforts. It has revolutionized the robotics from the simple remote-control cars to the self-driven cars. This survey summarizes main stream open source projects emerging in recent years and expects to increase the exposure of existing open source projects and increase the popularity of them, with an intention to further reduce unnecessary effort to re-invent existing systems.


2016 ◽  
Vol 33 (9) ◽  
pp. 10-13
Author(s):  
Adetoun A. Oyelude

Purpose This paper aims to concentrate on reviewing articles on open source software (OSS), found on the internet, that were published in the year 2016. Design/methodology/approach A critical look is taken at OSS generally as found in the literature and also on the commonly used OSS in libraries and information science work or research work. Findings It is hoped that this review will assist in pointing out the trends and aid in informed decision-making, as it concerns OSS. Social implications Akintomide (2016) described OSS as a part of human existence which is exhibited in mobile devices that run on the android operating system, to computers, laptops and servers that run on the Linux operating system, to other software (Library management software inclusive) that are open access. Originality/value The openness of it makes the users (libraries and scholars) leave documentation that steers how the open software technologies are implemented and by whom. They are free, have used communities, are vetted by users and are constantly in development.


Author(s):  
Obaida M. Al-hazaimeh

This paper introduces a dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol to enhance the services of the real-time applications such as increases the security level and reduces latency. The proposed algorithm was divided into two processes: dynamic key generation process using 128-bit hash value to dynamically alter the initial secret keys, and encryption and decryption process using Lorenz system. In the proposed algorithm, the performance evaluation is carried out through efficient simulations and implementations and statistical analysis. In addition, the average time delay in the proposed algorithm and some of the existing algorithms such as AES is compared. The obtained results concluded that, the proposed dynamic speech encryption algorithm is effectually secured against various cryptanalysis attacks and has useful cryptographic properties such as confusion and diffusion for better voice communication in the voice applications field in the Internet.


Children tracking system based on android terminals is proposed. Recently, all over the world crime against the children in the age of 14 to 17 years is more popular. Parent’s always worry about their children whenever they are outside from the home. In this paper, the proposed system consists of two sides out of them one is parent module and another is the child module. The child module consists of ARM7 Microcontroller (LPC 2148), GPS (Global Positioning System), GSM (Global System for Mobile Communication) and voice chip where the parent module consists of android mobile phone. This paper gives the information about missing child from school campus. There are two android mobile phones for the safety of the both modules. The system tracking the child from source to destination i.e. from home to school or anywhere.


2018 ◽  
Vol 6 (1) ◽  
pp. 177-186
Author(s):  
Sese Tuperekiye Ebimobowei ◽  
Zoukemefa Enebraye Peter ◽  
Yerikema Pual

In the world today most country’s economy is gradually going cashless and Nigeria is no exception. In other for this to be achieved the use of computers and computerized networks and its software comes greatly into play.  In an attempt to make the country’s economy cashless driven, we will discover that software plays a prominent role and can only be unveiled when we take a close study of how some of these payment mechanisms functions. Such mechanisms include POS TERMINALS, smart mobile phones and computers (laptop/desk top). There are basically two categories of software are installed on each of these devices; they include an operating system and application software. Also this paper went the extra mile of explaining what cashless economy is, the aim of establishing the policy in Nigeria and the benefits.


Author(s):  
Hardik Tandel ◽  
Parag H. Rughani

VoIP – Voice over IP is becoming an important aspect of communication. With invention of high speed Internet together with mobile phones has made it possible to utilize this highly important technology for voice communication. International calls are now possible with VoIP at compatible rates compared to  past. The trend made people develop applications based on VoIP not only for private IP PBX but for subscribed users from all over the world. The dependency in whole technology is its VoIP Server, which is not directly exposed to end users, but if can be compromsed then can affect all the connected users. Looking at increasing popularity of VoIP, attackers are now targeting these VoIP servers for various purposes like stealing information or using service to make free calls. It is always difficult to prevent such attacks but investigation may always help in solving such attacks and preventing future attacks with similar modus operandi. These work focuses on forensic analysis of VoIP server asterisk and discusses important artifacts which can be retrieved from affected VoIP server.


2011 ◽  
Vol 328-330 ◽  
pp. 147-150
Author(s):  
Qun Deng ◽  
Wei Qiang Zhang

Using the existing GSM network for location is currently a hot, but usually the system only can complete the location function, and could not communication with others. For the purpose of the voice communication between the mobile terminals in forklifts and the service center, this paper designed a new emergency call system to overcome the above disadvantages, and especially taken their applications into consideration.


Sign in / Sign up

Export Citation Format

Share Document