Abstract
Authentication is of great importance in information security. Traditional method only focus on encryption of the content itself, which is the same with the later proposed methods named information hiding and digital watermark. Since data transmission is in the open network, it can easily be detected and intercepted by the malicious party. In this paper, we put forward a new method which utilize the communication channel, not the content, as the data carrier, and guarantee the validation of the user’s identity during the common data transmission. Specifically, by manipulating the inter-packet delays, we implement a prototype system for authentication and embed the authentication tag within the packet intervals based on network covert channel. By conducting a series of experiments, we prove that our method performs well in LAN and Campus Network.
Chapter PDF
Similar content being viewed by others
References
Cabuk, S.: Network Covert Channels: Design, Analysis, Detection, and Elimination, Ph.D. thesis (2006)
Lampson, B.W.: A Note on the Confinement Problem. Communications of the ACM 16(10), 613–615 (1973)
Ahsan, K., Kundur, D.: Practical Date Hiding in TCP/IP, MMSec. (2002)
Cabuk, S., et al.: IP Covert Timing Channels: An Initial Exploration. In: CCS 2004, Washington, DC, USA, October 25-29 (2004)
Cabuk, S., Brodley, C.E., Shields, C.: IP Covert Timing Channels: Design and Detection. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004 (2004)
Sellke, S.H., Wang, C.-C., Bagchi, S.: TCP/IP Timing Channels: Theory to Implementation. In: Proceedings of the 28th, Conference on Computer Communications, INFOCOM (April 2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Sun, Y., Guan, X., Liu, T. (2011). A New Method for Authentication Based on Covert Channel. In: Altman, E., Shi, W. (eds) Network and Parallel Computing. NPC 2011. Lecture Notes in Computer Science, vol 6985. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24403-2_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-24403-2_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24402-5
Online ISBN: 978-3-642-24403-2
eBook Packages: Computer ScienceComputer Science (R0)