An Analysis of Eavesdropping Countermeasures for Secure Voice and Communication Systems
PDF

Keywords

Voice encryption
wiretapping
mobile networks
secure communications
secure voice
end-to-end encryption.

Categories

How to Cite

[1]
E. C. di Torino and I. Italy., “An Analysis of Eavesdropping Countermeasures for Secure Voice and Communication Systems”, J. Comput. Eng., vol. 15, no. 3, Mar. 2026, Accessed: Apr. 13, 2026. [Online]. Available: https://journalofcomputerengineering.com/index.php/jce/article/view/1998

Abstract

This paper categorizes, presents and evaluates a set of schemes and solutions that provide end-to-end encryption for voice communications. First, we analyze the research works that propose new schemes that enable the transfer of encrypted speech over the voice channel of the 2nd generation mobile network. Next, we analyze a set of popular widespread software applications that use Voice over IP technology to provide secure communications, and finally, we investigate commercial solutions, which are hardwarebased and offer voice encryption for both 2nd generation and Voice over IP communications. After the presentation of the existing solutions, we evaluate them based on the following criteria: i) security level provided, ii) possible performance issues and iii) usability. We conclude this work by providing future research directions. To the best of our knowledge, this is the first paper that categorizes and provides a comprehensive evaluation of end-to-end voice encryption schemes for mobile networks.
PDF
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright (c) 2026 Erasmo Carrera Politecnico di Torino, Italy. Italy. (Author)