Nothing Special   »   [go: up one dir, main page]

Liang et al., 2018 - Google Patents

Building packet length covert channel over mobile VoIP traffics

Liang et al., 2018

Document ID
11780200617646747946
Author
Liang C
Tan Y
Zhang X
Wang X
Zheng J
Zhang Q
Publication year
Publication venue
Journal of Network and Computer Applications

External Links

Snippet

Abstract Mobile VoIP (Voice over Internet Protocol) has shown its widely prevalence and laid the feasibility for concealed communication. VoIP contains continuous and huge amount of data transmission during communication which provides attractive chance for constructing …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L29/00Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
    • H04L29/02Communication control; Communication processing contains provisionally no documents
    • H04L29/06Communication control; Communication processing contains provisionally no documents characterised by a protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/60Media handling, encoding, streaming or conversion
    • H04L65/608Streaming protocols, e.g. RTP or RTCP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer

Similar Documents

Publication Publication Date Title
Liang et al. Building packet length covert channel over mobile VoIP traffics
Liang et al. A payload-dependent packet rearranging covert channel for mobile VoIP traffic
Zhang et al. Building covert timing channels by packet rearrangement over mobile networks
CN111818031B (en) Block chain based covert communication message security encoding method, system and medium
Anjum et al. Security for wireless ad hoc networks
Zhang et al. A packet-reordering covert channel over VoLTE voice and video traffics
KR102368749B1 (en) System and method for efficient and semantically secure symmetric encryption over channels with limited bandwidth
Malekzadeh et al. A new security model to prevent denial‐of‐service attacks and violation of availability in wireless networks
Zhang et al. A Novel Privacy‐Preserving Authentication Protocol Using Bilinear Pairings for the VANET Environment
AlMheiri et al. Data link layer security protocols in wireless sensor networks: A survey
Engelmann et al. A content-delivery protocol, exploiting the privacy benefits of coded caching
Ghosal et al. A lightweight security scheme for query processing in clustered wireless sensor networks
Velasco et al. Lightweight method of shuffling overlapped data-blocks for data integrity and security in WSNs
Vanhoef A time-memory trade-off attack on WPA3's SAE-PK
Azadmanesh et al. A reliable and efficient micro-protocol for data transmission over an RTP-based covert channel
Heinz et al. Covert channels in transport layer security
Jiang et al. Lightweight data security protection method for AMI in power Internet of Things
Noura et al. Novel one round message authentication scheme for constrained IoT devices
Agosta et al. Cyber-security analysis and evaluation for smart home management solutions
Liu et al. Secure data aggregation aided by privacy preserving in Internet of Things
Liang et al. Towards robust and stealthy communication for wireless intelligent terminals
Yang et al. A source authentication scheme based on message recovery digital signature for multicast
Nasiraee et al. A new three party key establishment scheme: Applicable for internet-enabled sensor networks
Akhtari et al. Middleman covert channel establishment based on MORE routing protocol using network coding in ad hoc networks
Vučinić et al. Requirements for a Lightweight AKE for OSCORE