Liang et al., 2018 - Google Patents
Building packet length covert channel over mobile VoIP trafficsLiang et al., 2018
- Document ID
- 11780200617646747946
- Author
- Liang C
- Tan Y
- Zhang X
- Wang X
- Zheng J
- Zhang Q
- Publication year
- Publication venue
- Journal of Network and Computer Applications
External Links
Snippet
Abstract Mobile VoIP (Voice over Internet Protocol) has shown its widely prevalence and laid the feasibility for concealed communication. VoIP contains continuous and huge amount of data transmission during communication which provides attractive chance for constructing …
- 238000009826 distribution 0 abstract description 27
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/02—Communication control; Communication processing contains provisionally no documents
- H04L29/06—Communication control; Communication processing contains provisionally no documents characterised by a protocol
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/60—Media handling, encoding, streaming or conversion
- H04L65/608—Streaming protocols, e.g. RTP or RTCP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liang et al. | Building packet length covert channel over mobile VoIP traffics | |
Liang et al. | A payload-dependent packet rearranging covert channel for mobile VoIP traffic | |
Zhang et al. | Building covert timing channels by packet rearrangement over mobile networks | |
CN111818031B (en) | Block chain based covert communication message security encoding method, system and medium | |
Anjum et al. | Security for wireless ad hoc networks | |
Zhang et al. | A packet-reordering covert channel over VoLTE voice and video traffics | |
KR102368749B1 (en) | System and method for efficient and semantically secure symmetric encryption over channels with limited bandwidth | |
Malekzadeh et al. | A new security model to prevent denial‐of‐service attacks and violation of availability in wireless networks | |
Zhang et al. | A Novel Privacy‐Preserving Authentication Protocol Using Bilinear Pairings for the VANET Environment | |
AlMheiri et al. | Data link layer security protocols in wireless sensor networks: A survey | |
Engelmann et al. | A content-delivery protocol, exploiting the privacy benefits of coded caching | |
Ghosal et al. | A lightweight security scheme for query processing in clustered wireless sensor networks | |
Velasco et al. | Lightweight method of shuffling overlapped data-blocks for data integrity and security in WSNs | |
Vanhoef | A time-memory trade-off attack on WPA3's SAE-PK | |
Azadmanesh et al. | A reliable and efficient micro-protocol for data transmission over an RTP-based covert channel | |
Heinz et al. | Covert channels in transport layer security | |
Jiang et al. | Lightweight data security protection method for AMI in power Internet of Things | |
Noura et al. | Novel one round message authentication scheme for constrained IoT devices | |
Agosta et al. | Cyber-security analysis and evaluation for smart home management solutions | |
Liu et al. | Secure data aggregation aided by privacy preserving in Internet of Things | |
Liang et al. | Towards robust and stealthy communication for wireless intelligent terminals | |
Yang et al. | A source authentication scheme based on message recovery digital signature for multicast | |
Nasiraee et al. | A new three party key establishment scheme: Applicable for internet-enabled sensor networks | |
Akhtari et al. | Middleman covert channel establishment based on MORE routing protocol using network coding in ad hoc networks | |
Vučinić et al. | Requirements for a Lightweight AKE for OSCORE |