Raspberry Pi Based Secure Mobile IP PBX Design to Support Outdoor Activities Communication for Air Force Academy Cadets
The Air Force Academy is a candradimuka crater for prospective soldiers who will later
produce Air Force officers who are Tanggon, Responsive and Trengginas. In their activities they carry out learning and practicing activities both inside and outside the knighthood. Outdoor activities are carried out in a field full of challenges. Under any circumstances and under any conditions the activity must be carried out properly. Communication is one of the main keys to the success of a mission. In this study, a secure mobile IP PBX based on raspberry pi 4. This VoIP server replaces the conventional PABX and is used as a means of communication even though there is no internet signal. The device is designed as a standalone PABX field that is not dependent on a particular vendor. The user uses a softphone that is embedded in the smartphone. In addition, the security side remains the main factor in maintaining the content of the communication content. This device is equipped with TLS and ZRTP protocols to prevent MiTM attacks from occurring. In the end, this device is a communication bridge when AAU cadets are carrying out external activities.
“Visi Misi – AKADEMI ANGKATAN UDARA.” https://aau.ac.id/?page_id=22 (accessed Oct. 24,
 T. Surasak and C.-H. Scott Huang, “Enhancing VoIP Security and Efficiency using VPN,” in 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, Feb. 2019, pp. 180–184. doi: 10.1109/ICCNC.2019.8685553.
T. De Pessemier, L. Martens, and W. Joseph, “A large-scale, long-term, user-centric evaluation of a commercial voice-over-IP application,” in 2014 IEEE International Symposium on Broadband
Multimedia Systems and Broadcasting, Beijing, China, Jun. 2014, pp. 1–6. doi: 10.1109/BMSB.2014.6873464.
I.-L. Lin, Y.-S. Yen, B.-L. Wu, and H.-Y. Wang, “VoIP Digital Evidence Forensics Standard
Operating Procedure (DEFSOP),” in 2010 International Conference on Broadband, Wireless
Computing, Communication and Applications, Fukuoka, Nov. 2010, pp. 407–412. doi:
L. Carvajal, L. Chen, C. Varol, and D. Rawat, “Detecting unprotected SIP-based voice over IP
traffic,” in 2016 4th International Symposium on Digital Forensic and Security (ISDFS), Little Rock, AR, USA, Apr. 2016, pp. 44–48. doi: 10.1109/ISDFS.2016.7473515.
D. Schürmann, F. Kabus, G. Hildermeier, and L. Wolf, “Wiretapping End-to-End Encrypted VoIP
Calls: Real-World Attacks on ZRTP,” Proc. Priv. Enhancing Technol., vol. 2017, no. 3, pp. 4–20,
Jul. 2017, doi: 10.1515/popets-2017-0025.
R. Bresciani and A. Butterfield, “A formal security proof for the ZRTP Protocol,” in 2009
International Conference for Internet Technology and Secured Transactions, (ICITST), London,
Nov. 2009, pp. 1–6. doi: 10.1109/ICITST.2009.5402595.
THE OFFICIAL Raspberry Pi Beginner’s Guide: How to use your new computer. 2020.
A. Avorizano and A. Fajar, “Penggunaan Raspberry Pi sebagai Alternatif Micro Controller pada
Robot Sederhana,” vol. 6, no. 2, p. 4, 2013.
“raspberry-pi-4-product-brief.pdf.” https://datasheets.raspberrypi.com/rpi4/raspberry-pi-4-productbrief.pdf (accessed Nov. 03, 2021).
Y. Yuniati, H. Fitriawan, and D. F. J. Patih, “ANALISA PERANCANGAN SERVER VOIP (VOICE INTERNET PROTOCOL) DENGAN OPENSOURCE ASTERISK DAN VPN (VIRTUAL PRIVATE NETWORK) SEBAGAI PENGAMAN JARINGAN ANTAR CLIENT,” vol. 12, no. 1, p. 10, 2014.
B. Jackson and C. Clark, Asterisk Hacking. Books24x7.com, 2007. [Online]. Available:
R. Bryant, Asterisk: the definitive guide, Fourth edition. Beijing : Sebastopol: O’Reilly, 2013.
M. Petraschek, T. Hoeher, O. Jung, H. Hlavacs, and W. Gansterer, “Security and Usability Aspects
of Man-in-the-Middle Attacks on ZRTP,” Security ..., p. 20.
P. Zimmermann, A. Johnston, and J. Callas, “ZRTP: Media Path Key Agreement for Unicast Secure RTP,” RFC Editor, RFC6189, Apr. 2011. doi: 10.17487/rfc6189.
D. Perez-Botero and Y. Donoso, “VoIP Eavesdropping: A Comprehensive Evaluation of
Cryptographic Countermeasures,” in 2011 Second International Conference on Networking and
Distributed Computing, Beijing, China, Sep. 2011, pp. 192–196. doi: 10.1109/ICNDC.2011.46.
H. Dwivedi, Hacking VoIP: protocols, attacks, and countermeasures. San Francisco: No Starch Press, 2009.
A. Rachmat, “17-ANALISIS KINERJA VOICE OVER INTERNET PROTOCOL PADA MOBILE AD-HOC NETWORK,” p. 15.
Copyright (c) 2021 Muhammad Kharrel Dwiadamajati, Muhammad Fahrurozi, Edi Supartono, Bambang Gastomo
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.