Preprint Open Access

[Preprint] A Survey of Voice and Communication Protection Solutions Against Wiretapping

Ntantogian Christoforos; Veroni Eleni; Karopoulos Georgios; Xenakis Christos

Dublin Core Export

<?xml version='1.0' encoding='utf-8'?>
<oai_dc:dc xmlns:dc="" xmlns:oai_dc="" xmlns:xsi="" xsi:schemaLocation="">
  <dc:creator>Ntantogian Christoforos</dc:creator>
  <dc:creator>Veroni Eleni</dc:creator>
  <dc:creator>Karopoulos Georgios</dc:creator>
  <dc:creator>Xenakis Christos</dc:creator>
  <dc:description>This paper categorizes, presents and evaluates a set of schemes and solutions that provide end-to-end encryption for voice communications. First, we analyze the research works that propose new schemes that enable the transfer of encrypted speech over the voice channel of the 2nd generation mobile network. Next, we analyze a set of popular widespread software applications that use Voice over IP technology to provide secure communications, and finally, we investigate commercial solutions, which are hardware-based and offer voice encryption for both 2nd generation and Voice over IP communications. After the presentation of the existing solutions, we evaluate them based on the following criteria: i) security level provided, ii) possible performance issues and iii) usability. We conclude this work by providing future research directions. To the best of our knowledge, this is the first paper that categorizes and provides a comprehensive evaluation of end-to-end voice encryption schemes for mobile networks.</dc:description>
  <dc:subject>voice encryption</dc:subject>
  <dc:subject>mobile networks</dc:subject>
  <dc:subject>secure communications</dc:subject>
  <dc:subject>secure voice</dc:subject>
  <dc:subject>end-to-end encryption</dc:subject>
  <dc:title>[Preprint] A Survey of Voice and Communication Protection Solutions Against Wiretapping</dc:title>
All versions This version
Views 107107
Downloads 312312
Data volume 98.8 MB98.8 MB
Unique views 9292
Unique downloads 277277


Cite as