GANPAT UNIVERSITY JOURNAL OF ENGINEERING & TECHNOLOGY, VOL.-1, ISSUE-1, JAN-JUN-2011 19

Secure voice communication over wi-fi area network Mr. Keyur N Brahmbhatt1, Prof.prashant B. Swadas2 , Mr.Udesang K Jaliya3 1ME Computer Engineering, ISTAR College, S.P University, V.V.Nagar, Gujarat, India. 2Head CP Department, BVM Engineering College, S.P University, V.V.Nagar, Gujarat, India. 3 IT Department, BVM Engineering College, S.P University V.V.Nagar, Gujarat, India. E-mail: [email protected], [email protected], [email protected]

Abstract—In this Paper our main area of concern is the footprint for secure voice communication over wi-fi security of the Voice communication in the Wi-Fi area networks.[6] network. This paper is basically is related to secure voice communication over Wi-Fi network with IP enable phone. IP phones are nothing but the fixed type, thus even though IP With voice over Wi-Fi, organizations can guarantee in phone communication over the networks like LAN presents building coverage for Smartphone, tablet and other mobile it doesn’t matters more. Rather here the communication over voice users while reducing telephony costs. In wi-fi network the Wi-Fi networks tried to implement. But this it uses 2.4 GHz bandwidth for communication channel. As communication network which is implemented over the Wi- this bandwidth is open it can affected by my many kinds of Fi is vulnerable for the security threats because such network networks issues and any other hacker’s attack. For proposed communication channels use the free bandwidth means such paper IP mobile devices with the Wi-Fi enabled used. To networks are open in nature. Thus the main area of interest in make secure communication java base application is created. such systems now days are the security and communication This application for the secure voice communication is cost for the same. generated using two algorithms thus its provides high quality secure voice communication. Such systems will be 2. EXISTING SYSTEM preinstalled on device and using that secure communication over the Wi-Fi networks can be done. This is most cost effective and secure communication mechanism for the Wi- There are many more VOIP applications developed for the Fi networks and completely free. various reasons and widely used over the enterprise levels and business for the takings and meetings. Some VOIP Keywords— Wi-Fi , VOIP, , J2ME , IP Phone applications which are developed over the mobile networks Voice Communication using the existing communication channels, some are for the intranet based communications which are having 1. INTRODUCTION the secure communication channels because they are not As companies and individuals have started to use wireless open for any kinds of attacks. But some VOIP applications devices for important communications such as personalized over the Wi-Fi network in which the communication channel Talk, email, mobile commerce activities, corporate data uses the free bandwidth for the communication over such transmission etc. Apart from voice communication, data networks between the mobile users. Such network which communication is also being done through mobile devices. used the free bandwidth is vulnerable for the various kinds of This is possible due to very high advancement happened in the attacks, security threats, and hackings by hackers. Hence wireless technology industry. At the same time, as wireless such insecure communication channels are dangerous for the platforms mature, grow in popularity and store valuable serious and important information leakage, data lost, hacking information, hackers are also stepping their evil efforts on etc. With the commercial communication channels which are these new gadgets. As any other medium of communication not uses the free bandwidth for the communication, and commerce, wireless has not been spared of insidious security is provided extensively and no chance for the any attacks. The wireless industry has been hit particularly hard security threats. But such systems are very costly as per the by the illegal use of resources and the violation of privacy communication point of view. [7] and access to confidential data. One major reason for this insecurity is due to the fact that these free bandwidth and Following are the drawbacks of the existing methods for the Internet access-capable and intelligent devices were not communication over the Wi-Fi networks: designed at the beginning with security aspect as a top priority. The challenge here is to implement security in - Vulnerable to attacks small- - Vulnerable to hacking of important data

GNUJET © 2011 http://gnujet.ganpatuniversity.ac.in

GANPAT UNIVERSITY JOURNAL OF ENGINEERING & TECHNOLOGY, VOL.-1, ISSUE-1, JAN-JUN-2011 20

- Not cost effective mechanisms 3.2.1Encryption mechanism used - Several issues of security threats - Security enable communication channels are costly. For this proposed mechanism the algorithm used is the standard AES with 128 bits for the voice encryption and decryption. We chose here the AES Rijndael algorithm for 3. PROPOSED SYSTEM the same. AES is stands for the Advanced Encryption Standard for the security mechanism. Main problem with this Thus in order to overcome the above problems and providing scheme how to agree on the between the client and the secure communication and transmission of data over the server more securely. To avoid this problem and to provide Wi-Fi networks, the proposed system is comes in place more security we have used one more diffie-hellman which is take cares of this things. In the proposed system the algorithm.[9][10] communication application is developed for the voice communication over the IP in the Wi-Fi networks which uses - In , the Advanced Encryption standard (AES) the mechanisms of the encryption on the voice and data is a symmetric-key encryption. packets. Thus in the proposed systems the IP packets are - If a symmetric key encryption scheme (such as AES) is encrypted and the send to the destination over the free used, the sender and receiver have to first agree on a key that communication channel so that it will be not intercepted by they both (Client and Server) know. the hackers. This type of communication mechanism is both - Symmetric key ciphers are much faster than public key means free as well as secure for the end users. Ciphers -Thus for proposed paper we used the encryption 3.1 Methodology For Secure Communication mechanism of AES.

Technology used The use of J2MEF or a mobile device to Main problem with this scheme how to agree on the key communicate with a router it needs a platform. A J2ME between the client and server more securely. application can be used in a mobile device that is Wi-Fi enabled to communicate with a router. This is a very useful tool because by communicating with the router directly, many processes of networking can be simplified. J2ME provides a robust, flexible environment for applications running on mobile. It includes flexible user interfaces, robust security, built-in network protocols, and support for networked and offline applications that can be downloaded dynamically. So this platform is what connects the user and his device to the router. The developed software will perform the payload encryption on the transmission side and payload decryption of packets in the receiver side through software manipulations of digital format of data.[8]

3.2 Algorithm Used we conclude the following findings for the proposed methodologies. Security system is enabled with these Figure. 1: Encryption and Decryption Mechanism methodologies in the Wi-Fi communication network by adding the encryption mechanisms for the voice which To avoid this problem and to provide more security we have transferred over the free bandwidth. Cost for the used one more diffie-hellman algorithm. communication is completely removed and Wi-Fi area is using the free bandwidth, thus their communication service Diffie-hellman was designed for . In the Diffe- also uses the free bandwidth. Using the IP packets header hellman , two parties create a symmetric and payload part, data is encrypted before transmission of it session key exchange data without having to remember or and this mechanism adding the significant support for the store the key for future use. Before establishing a symmetric data encryption. key, the two parties need to choose two numbers p and g. the first number, p is a large prime no and second number is a random number. These two numbers need not be confidential. they can be sent through the internet as they are public.[12]

GNUJET © 2011 http://gnujet.ganpatuniversity.ac.in

GANPAT UNIVERSITY JOURNAL OF ENGINEERING & TECHNOLOGY, VOL.-1, ISSUE-1, JAN-JUN-2011 21

javax.microedition.media: Manager, Player, Player Listener Working flow of the Algorithm and many control types.

1. Global Public Elements 4.1.4 Cellular client 2. User A (Client) Key Generation 3. User B (Server) Key Generation The .jar file is presented for the deployment of application 4. Generation of Secret Key by User A into the mobile device. Once the application is deployed, 5. Generation of Secret Key by User B first it needs to do with the settings for the Bluetooth connectivity like press on the menu in mobile, then select the So using above two algorithm and J2ME applications we client application and then find the permissions in which it can have secure connection over wi-fi networks. must to select the option of “Multimedia” with the “Always allow”. 4. RESULTS & DISCUSSIONS 4.1.5 Other device(server) Thus according to our proposed techniques we implemented the same in Java and J2ME technology. We divided the For this also .jar file is generated for which it only needs to system into the two parts means mobile client and desktop execute and then the server will start at the system tray server. The speech between the client and server is handled which uses the library of “BlueCov”. The system tray icon by using the Bluetooth mechanism. Here the voice is shows the current status of the system working. Now also captured by the mobile applications which means the client one setting requires microphone to make it possible to hear application and sent to the server application which is the sound from the mobile application. running at desktop pc. At the side of client this voice is encrypted using the above described algorithm and encrypted at the side of server. Start the Start the Client Server As our aim is to provide the security over the Wi-Fi area of network between the two mobile users, here we can use the Bluetooth mechanism on basis of simulation to create the Wi-Fi area network which provides the radio frequency of 2.4 GHz. Searching Device in 4.1 Installation and Execution for server listening connection mode

4.1.1Bluetooth

Here we are using Bluetooth for the simulation purpose. False This is nothing but the wireless personnel area networks which can be employed to exchange the information in terms True of voice, files, data etc between the wireless devices through Connection If server established the Wi-Fi radio frequency range of 2.4Gz and hence which found? covers the our basic objective for this project.[11]

4.1.2 JSR-82 True

It is a Java API reliable for Bluetooth for accessing J2ME Client Device application. It contains two packages: javax.bluetooth and sending decrypting javax.obex. The class first can be used for the searching encrypted voice devices, offers for connection and communication. Using the voice arrays of bytes the speech can be represented.

4.1.3 JSR-135 Secure Voice Communication It is a Media API for Bluetooth in which it allows to record and play audio and video, and capturing images for J2ME Figure. 2: Flow of the Proposed System application. This API uses four classes in the package

GNUJET © 2011 http://gnujet.ganpatuniversity.ac.in

GANPAT UNIVERSITY JOURNAL OF ENGINEERING & TECHNOLOGY, VOL.-1, ISSUE-1, JAN-JUN-2011 22

Now on the base of above steps in figure further secure (Java ME) which provides users a robust, flexible communication will take place. environment for applications that run on mobile and other embedded devices.

Future work includes system scaling studies and parameter analysis. More tests can be performed on larger test beds with different number of nodes and system complexity.

6. References

[1] Janice Reynolds. Going Wi-Fi: A Practical Guide to Planning and Building an 802.11 Network. CMP, 2003.

[2] Frank Bulk. ABC’s of WAP2 Wi-Fi Security. Network Computing Magazine. Retrieved October 23, 2006, from http://magazine- directory.com/Network-Computing.html.

[3] Tom Sheldon. Encyclopedia of Networking, New York: McGraw-Hill, 2001.

[4] Frank Ohrtman and Konrad Roeder. Wi-Fi.

[5] Pintel Corp., Next Generation VoIP Services and Applications Using SIP and .Java Technology Guide.

[6] http://www.peterindia.net/WirelessSecurity.html

Figure 3 USBTrace Packets Analysis. [7] Wi-Fi. Retrieved October 23, 2006, fromhttp://en.wikipedia.org/wiki/Wi-Fi.

While the communication is going on in between the client [8]http://java.sun.com/developer/technicalArticles/Security/AES/A as well as server we used the packet trace analysers called ES_v1.html. USB trace. The screenshot explaining the logs for the packets which are transferred in between client and other [9] AES homepage at NIST. http://csrc.nist.gov/CryptoToolkit/aes/. device with proposed mechanism as well is shown in above figure Which shows packet transmission between two [10] AES Proposal: Rijndael, Joan Daemen and Vincent Rijmen, AES submission. devices [11] A paper on “Voice Calls over Wi-fi” by Venkatraman.S , 5. CONCLUSION Siddharth Natarajan and T.V. Padmavathi.

In proposed paper presenting the way to communicate with [12] Data communication and networking by Forouzan. the security over the Wi-Fi area of network. The J2ME based software is developed for the proposed system working with [13] A Paper on “ Encrypted voice calls with IP Enabled wireless the encryption mechanism which is allowing communicating phones over GSM/CDMA/ Wi-fi networks” by Mohammed a freely over the wireless area network. Here I want to encrypt Qadeer, Robin Kasana, Sarvat Sayeed. the voice over the Wi-Fi but I used Bluetooth because I didn’t find the proper java API packages to support Wi-Fi in J2ME. I confined my development to Bluetooth since I’ve found enough J2ME packages to get outcome of the project. Bluetooth uses the same radio frequency as Wi-Fi 2.4GHz which is completely free and hence Bluetooth plays major role for the whole network. Now the project presented an approach towards building an application to encrypt the voice calls over wireless network. For this system I used the Bluetooth enabled mobile phones to make the communication between them over the wireless are network. This application was built on Java Platform, Micro Edition

GNUJET © 2011 http://gnujet.ganpatuniversity.ac.in