Journal of Machine and Computing


Securing Voice Software Applications Using 5G, WSN and AI Driven Privacy Preservation Protocols



Journal of Machine and Computing

Received On : 30 March 2025

Revised On : 26 April 2025

Accepted On : 16 June 2025

Published On : 05 July 2025

Volume 05, Issue 03

Pages :1803-1822


Abstract


The reality-based, dynamic, and context-aware user experiences provided by voice software applications have contributed to their common acceptance. But, problems with data privacy and computer performance are challenges. In order to process voice data reliably, the present research proposes a secure integrated model of 5G-Wireless Sensor Networks with Artificial Intelligence (5G + WSN + AI) to apply privacy preservation protocols. To train decentralized models, the model used Federated Learning (FL). To prevent unauthorized inference, it deployed Secure Multi-Party Computation (SMPC). In the end, to secure sensitive data, it applied adaptive encryption methods. Word Error Rate (WER), Feature Extraction Accuracy (FEA), End-to-End Delay (EED), Network Throughput (NT), Packet Loss Rate (PLR), and Encryption Overhead (EO) represent several of the key performance measures that the model is considered superior to conventional networks such as SVPS, BDPS, GACS, and cloud-based centralized models. Additionally, it proved that next-generation Voice Learning Systems (VLS) are reliable, leveraging AI + 5G setup and maintaining robustness against privacy breaches in real-world asymmetric scenarios.


Keywords


Wireless Sensor Networks, Artificial Intelligence, 5G, Voice Software Applications, Security, Federated Learning.


  1. Y. Li and F. Wu, “Design and Application Research of Embedded Voice Teaching System Based on Cloud Computing,” Wireless Communications and Mobile Computing, vol. 2023, pp. 1–10, Apr. 2023, doi: 10.1155/2023/7873715.
  2. H. B. Essel, D. Vlachopoulos, H. Nunoo‐Mensah, and J. O. Amankwa, “Exploring the impact of VoiceBots on multimedia programming education among Ghanaian university students,” British Journal of Educational Technology, vol. 56, no. 1, pp. 276–295, Jul. 2024, doi: 10.1111/bjet.13504.
  3. Saadia, K. H. (2023). Assessing the Effectiveness of Text-to-Speech and Automatic Speech Recognition in Improving EFL Learner’s Pronunciation of Regular Past-ed.
  4. Karatay, Y., & Hegelheimer, V. An overview of new technologies in English language teaching. Educational technology in English Language Teaching. Eğiten Kitap (2023, Preprint).
  5. J. Li, C. Chen, M. Rahimi Azghadi, H. Ghodosi, L. Pan, and J. Zhang, “Security and privacy problems in voice assistant applications: A survey,” Computers & Security, vol. 134, p. 103448, Nov. 2023, doi: 10.1016/j.cose.2023.103448.
  6. V. Raja, “Exploring Challenges and Solutions in Cloud Computing: A Review of Data Security and Privacy Concerns,” Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023, vol. 4, no. 1, pp. 121–144, Apr. 2024, doi: 10.60087/jaigs.v4i1.86.
  7. Joseph Nnaemeka Chukwunweike, Moshood Yussuf, Oluwatobiloba Okusi, Temitope Oluwatobi Bakare, and Ayokunle J. Abisola, “The role of deep learning in ensuring privacy integrity and security: Applications in AI-driven cybersecurity solutions,” World Journal of Advanced Research and Reviews, vol. 23, no. 2, pp. 1778–1790, Aug. 2024, doi: 10.30574/wjarr.2024.23.2.2550.
  8. Poh Soon JosephNg, Zhuang Cheik EricMok, Koo Yuen Phan, Jianhua Sun, and Zhiming Wei, “Mitigating Social Media Cybercrime: Revolutionising with AES Encryption and Generative AI,” Journal of Advanced Research in Applied Sciences and Engineering Technology, vol. 46, no. 2, pp. 124–154, Jun. 2024, doi: 10.37934/araset.46.2.124154.
  9. J. M. H. Altmemi et al., “A Software-Centric Evaluation of the VEINS Framework in Vehicular Ad-Hoc Networks,” Journal of Robotics and Control (JRC), vol. 6, no. 2, pp. 822–845, Apr. 2025, doi: 10.18196/jrc.v6i2.25839.
  10. M. Burhan et al., “A Comprehensive Survey on the Cooperation of Fog Computing Paradigm-Based IoT Applications: Layered Architecture, Real-Time Security Issues, and Solutions,” IEEE Access, vol. 11, pp. 73303–73329, 2023, doi: 10.1109/access.2023.3294479.
  11. A. Z. Abdulrazzaq et al., “Evaluation of Voice Interface Integration with Arduino Robots in 5G Network Frameworks,” 2024 36th Conference of Open Innovations Association (FRUCT), pp. 44–55, Oct. 2024, doi: 10.23919/fruct64283.2024.10749856.
  12. A. Khedkar, S. Musale, G. Padalkar, R. Suryawanshi, and S. Sahare, “An Overview of 5G and 6G Networks from the Perspective of AI Applications,” Journal of The Institution of Engineers (India): Series B, vol. 104, no. 6, pp. 1329–1341, Oct. 2023, doi: 10.1007/s40031-023-00928-6.
  13. H. N. Fakhouri, S. Alawadi, F. M. Awaysheh, I. B. Hani, M. Alkhalaileh, and F. Hamad, “A Comprehensive Study on the Role of Machine Learning in 5G Security: Challenges, Technologies, and Solutions,” Electronics, vol. 12, no. 22, p. 4604, Nov. 2023, doi: 10.3390/electronics12224604.
  14. A. Lakhan et al., “Secure blockchain assisted Internet of Medical Things architecture for data fusion enabled cancer workflow,” Internet of Things, vol. 24, p. 100928, Dec. 2023, doi: 10.1016/j.iot.2023.100928.
  15. D. Alsadie, “Artificial Intelligence Techniques for Securing Fog Computing Environments: Trends, Challenges, and Future Directions,” IEEE Access, vol. 12, pp. 151598–151648, 2024, doi: 10.1109/access.2024.3463791.
  16. D. Rupanetti and N. Kaabouch, “Combining Edge Computing-Assisted Internet of Things Security with Artificial Intelligence: Applications, Challenges, and Opportunities,” Applied Sciences, vol. 14, no. 16, p. 7104, Aug. 2024, doi: 10.3390/app14167104.
  17. W. Rafique, J. Rani Barai, A. O. Fapojuwo, and D. Krishnamurthy, “A Survey on Beyond 5G Network Slicing for Smart Cities Applications,” IEEE Communications Surveys & Tutorials, vol. 27, no. 1, pp. 595–628, Feb. 2025, doi: 10.1109/comst.2024.3410295.
  18. N. H. Jemaludin et al., “Compact Physical and Electrical Patch Antenna Engineered for 5G Mobile Devices and Multiband Systems,” Progress In Electromagnetics Research B, vol. 111, pp. 71–81, 2025, doi: 10.2528/pierb25022401.
  19. J. K. Madhloom, Z. H. Noori, S. K. Ebis, O. A. Hassen, and S. M. Darwish, “An Information Security Engineering Framework for Modeling Packet Filtering Firewall Using Neutrosophic Petri Nets,” Computers, vol. 12, no. 10, p. 202, Oct. 2023, doi: 10.3390/computers12100202.
  20. Nazrin Haziq Jemaludin et al., A Miniaturized Horizontally Oriented MIMO Antenna for 5G and Wireless Communication Systems, International Journal of Intelligent Engineering and Systems, Vol.18, No.5, 2025.

CRediT Author Statement


The authors confirm contribution to the paper as follows:

Conceptualization: Hayder M A Ghanimi, Swaroopa K, Amit Mishra, Anusha Papasani, Kolluru Suresh Babu and Vivekanandhan Vijayarangan; Methodology: Hayder M A Ghanimi, Swaroopa K and Amit Mishra; Software: Anusha Papasani, Kolluru Suresh Babu and Vivekanandhan Vijayarangan; Data Curation: Hayder M A Ghanimi, Swaroopa K and Amit Mishra; Writing- Original Draft Preparation: Hayder M A Ghanimi, Swaroopa K, Amit Mishra, Anusha Papasani, Kolluru Suresh Babu and Vivekanandhan Vijayarangan; Visualization: Anusha Papasani, Kolluru Suresh Babu and Vivekanandhan Vijayarangan; Investigation: Hayder M A Ghanimi, Swaroopa K and Amit Mishra; Supervision: Anusha Papasani, Kolluru Suresh Babu and Vivekanandhan Vijayarangan; Validation: Hayder M A Ghanimi, Swaroopa K and Amit Mishra; Writing- Reviewing and Editing: Hayder M A Ghanimi, Swaroopa K, Amit Mishra, Anusha Papasani, Kolluru Suresh Babu and Vivekanandhan Vijayarangan; All authors reviewed the results and approved the final version of the manuscript.


Acknowledgements


The authors would like to thank to the reviewers for nice comments on the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Hayder M A Ghanimi, Swaroopa K, Amit Mishra, Anusha Papasani, Kolluru Suresh Babu and Vivekanandhan Vijayarangan, “Securing Voice Software Applications Using 5G, WSN and AI Driven Privacy Preservation Protocols”, Journal of Machine and Computing, vol.5, no.3, pp. 1803-1822, July 2025, doi: 10.53759/7669/jmc202505142.


Copyright


© 2025 Hayder M A Ghanimi, Swaroopa K, Amit Mishra, Anusha Papasani, Kolluru Suresh Babu and Vivekanandhan Vijayarangan. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.