Professional Documents
Culture Documents
VOICE CHANNEL
N.N. Katugampala, K.T. Al-Naimi, S. Villette, and A.M. Kondoz
Centre for Communication Systems Research, University of Surrey
Guildford, GU2 7XH, United Kingdom
phone: + 44 1483 689843, fax: +44 1483 686011, email: a.kondoz@surrey.ac.uk
web: www.ee.surrey.ac.uk/CCSR/
quired to represent speech, whilst still retaining an acceptable ever full duplex secure voice communication is possible
speech quality level [7]. A side-effect of this approach is that using the same techniques.
the resulting synthesised speech, whilst perceptually being
similar to the input speech, i.e. it sounds very similar to the
original, may have a fairly different waveform on a sample-
by-sample basis. This objective difference prevents most data 3. REAL-TIME PROTOTYPE
modems from operating over channels, which employ speech
There are several methods to interface the service access
compression systems. This problem is compounded by the
point of the communications network, e.g. GSM handset to
fact that in many networks, and in particular, mobile com-
the modem.
munication systems, the speech signal may undergo more
than one set of compression/decompression stages, a phe-
nomenon known as tandeming. 1. The modem, encryption/decryption, and the speech
codec may be implemented on a personal digital
Therefore it was necessary to design a different modem for assistant (PDA) with a GSM connection. Then the
low bit rate speech channels [5], [6]. This modem can be modulated waveform could be directly copied onto the
used to transmit any form of general digital data, e.g. en- GSM voice buffer.
crypted speech. Figure 1 depicts the relationship between the 2. The secure voice system is implemented as a separate
modulator, the demodulator, and the transmission path in a add on module and the interface provided with a
low bit rate voice communication system. Bluetooth audio link.
3. The secure voice system is implemented as a separate
Figure 2 depicts a more detailed example for the GSM sys- add on module and the interface provided with cables
tem. The example shown is a typical mobile terminal to mo- using the hands free sockets of the GSM handsets.
bile terminal communications path. The input speech signal
is first compressed using a very low bit rate speech encoder It should be noted that Bluetooth provides a digital connec-
[8], e.g. 1.2 kbps, in order to accommodate in the available tion, while the hands free cables provide an analogue con-
bandwidth. The output bit stream of the speech encoder can nection. Analogue connections add extra distortion and per-
be encrypted. The encrypted speech data is fed into the form worse than the digital connections. An integrated PDA
modulator, which converts it into a speech-like waveform to implementation, which directly accesses the GSM voice
feed into the GSM handset. The GSM speech encoder in the buffers, will not add any distortion due to the interface.
handset compresses the modulated waveform. The resulting
digital bit stream is transmitted over the communications The demodulator needs to be frame synchronised before any
channel, which includes a radio link, a speech decoder at the demodulation of data begins. Synchronisation of the frame
base station, a core transmission network, a speech encoder boundaries is achieved by using a different modulated signal
at the second base station and a downlink radio channel. The with a much lower data rate (400 bps). This synchronisation
bit stream is received by the decoder of the receive terminal signal is derived from a known set of data stored at both the
which converts it back to a speech-like waveform. The modulator and the demodulator and transmitted at the be-
transcoding that takes place within the network, cause the ginning. This signal passes through a GSM voice call with
waveform generated by the decoder to differ from that pro- virtually no errors.
duced by the modulator at the transmit end. The demodula-
tor is still able to extract the original transmitted data. For
simplicity only simplex communication is illustrated, how-
Received
Signal Output data
Buffer Demodulator Viterbi decoder
10100011
Lag
REFERENCES
[1] C. Lo and Y. Chen, “Secure communication mechanisms
for GSM networks,” IEEE Transactions on Consumer
Electronics, Vol. 45, No. 4, pp. 1074-1079, November
1999.
[2] M. Street, “Interoperability and international operation: An
introduction to end to end mobile security,” IEE Secure
GSM and Beyond: End to End Security for Mobile
Communications, London, February 2003.
[3] P. Challans, R. Gover, and J.P. Thorlby, “End to end data
bearer performance characterisation for communications
over wide area mobile networks,” IEE Secure GSM and
Beyond: End to End Security for Mobile Communications,
London, February 2003.
[4] ITU-T Recommendation G.114, “One-way transmission
time,” Revision 3, May 2000.
[5] N. Katugampala, S. Villette, and A. Kondoz, “Secure
voice over GSM and other low bit rate systems,” IEE
Secure GSM and Beyond: End to End Security for Mobile
Communications, London, February 2003.
[6] N.N. Katugampala, K.T. Al-Naimi, S. Villette, and A.M.
Kondoz, “Real-time data transmission over GSM voice
channel for secure voice & data applications,” The 2nd IEE
Secure Mobile Communications Forum, London,
September 2004.
[7] A. Kondoz, “Digital speech: coding for low bit rate
communication systems,” J. Wiley, New York, 1994.