Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (2)

Search Parameters:
Keywords = voice source real-time encryption

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 2293 KB  
Article
A Novel Approach to Reduce Breaches of Aircraft Communication Data
by Shahzaib Tahir, Muhammad Arslan Shahbaz, Hasan Tahir, Muhammad Awais, Fawad Khan, Ruhma Tahir, Saqib Saeed and Abdullah M. Almuhaideb
Electronics 2023, 12(1), 172; https://doi.org/10.3390/electronics12010172 - 30 Dec 2022
Cited by 4 | Viewed by 6480
Abstract
Aircraft are complex systems that rely heavily on monitoring and real-time communications with the base station. During aviation and flight operations, diverse data are gathered from different sources, including the Cockpit Voice Recorder (CVR), Flight Data Recorder (FDR), logbook, passenger data, passenger manifest [...] Read more.
Aircraft are complex systems that rely heavily on monitoring and real-time communications with the base station. During aviation and flight operations, diverse data are gathered from different sources, including the Cockpit Voice Recorder (CVR), Flight Data Recorder (FDR), logbook, passenger data, passenger manifest etc. Given the high sensitivity of flight data, it is an attractive target for adversaries which could result in operational, financial and safety related incidents. Communications between aircraft pilots and air traffic controllers are all unencrypted. The data, mainly audio communication files, are placed openly within data centers on the ground stations which could lead to a serious compromise in security and privacy. One may rely on the cloud owing to its on-demand features but to thwart possible attacks, the data need to be encrypted first, giving rise to the issue of conducting search over encrypted data. This research presents a novel approach for data security in aviation industry by introducing a semantic-based searchable encryption scheme over the cloud. The designed system has proven to be extraordinarily effective for semantic-based searchable encryption at the word and the text level. The rigorous security and complexity analysis shows that the proposed solution provides a high level of security and efficiency and can be effectively deployed in the aviation sector. The designed scheme is tested through a real-world aviation dataset collected to demonstrate the significance of this research. The proof of concept proves to be secure, privacy-preserving and lightweight while resisting distinguishability attacks. Full article
(This article belongs to the Special Issue Security and Privacy in Blockchain/IoT)
Show Figures

Figure 1

11 pages, 1746 KB  
Article
FPGA-Based Voice Encryption Equipment under the Analog Voice Communication Channel
by Xinyu Ge, Guiling Sun, Bowen Zheng and Ruili Nan
Information 2021, 12(11), 456; https://doi.org/10.3390/info12110456 - 4 Nov 2021
Cited by 4 | Viewed by 5204
Abstract
This paper describes a voice encryption device that can be widely used in civil voice call encryption. This article uses a composite encryption method to divide the speech into frames, rearrange them in the time domain, and encrypt the content of the frames. [...] Read more.
This paper describes a voice encryption device that can be widely used in civil voice call encryption. This article uses a composite encryption method to divide the speech into frames, rearrange them in the time domain, and encrypt the content of the frames. The experimental results show that the device can complete the encryption normally under various analog voice call conditions, and the voice delay, quality, encryption effect, etc. are guaranteed. Compared with traditional time-domain encryption, it effectively solves the original voice information remaining in the encrypted information, and further increases the security of the voice. Full article
(This article belongs to the Special Issue Wireless Communications and Network Security)
Show Figures

Figure 1

Back to TopTop