首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
信息隐藏作为一门新兴的信息安全技术最近受到人们的普遍关注。文章选择VoIP作为信息隐藏的载体,研究了基于VoIP的隐蔽通信的实现方法。首先分析了基于VoIP隐蔽通信技术的特征和优点;提出了VoIP隐蔽通信的实现过程的模型和多种隐蔽信道;最后介绍了基于VoIP的隐蔽通信软件的实现算法。  相似文献   

2.
一种基于通信信道容量的多级安全模型   总被引:3,自引:0,他引:3       下载免费PDF全文
刘雄  卓雪君  汤永利  戴一奇 《电子学报》2010,38(10):2460-2464
 安全模型有多种代表模型,如BLP模型和不可推断模型等.这些模型在理论描述或者实际应用方面存在一定的局限性,如BLP模型未能考虑隐蔽通道,不可推断模型不适应非确定系统.针对这些模型的不足,本文在BLP模型基础上,考虑了隐蔽通道的特性,提出了泄密通道有限容忍的通信信道模型,该模型能通过调节泄密通道信道容量上限来平衡实际系统可用性和安全性.  相似文献   

3.
针对网络隐蔽信道在强噪声环境中信息传递错误率高的问题,该文提出一种基于CDMA扩频编码的可靠网络隐蔽信道设计方法。该方法利用数据包在传输过程中的包际时延传递隐蔽信息,发送方采用散列扩频编码,接收方采用信道噪声预测消除等技术进行信道抗干扰处理,提高了强噪声环境中隐蔽信道通信的可靠性。针对信道抗干扰性与信道传输率两个主要衡量指标互斥、综合性能难以达到最优的问题,提出了基于选定传输率的抗干扰能力最优化方法。在TCP/IP网络中构建了该隐蔽信道,并进行了隐蔽信息传输实验,结果表明该文方法与解决同类问题的其他方法相比隐蔽信道数据传输的综合抗干扰能力提高20%左右。  相似文献   

4.
目前针对隐蔽信道的研究工作大部分都基于互联网协议,在数字电视中实现隐蔽通信是信息隐藏技术的一个新方向。论文在隐蔽信道信息传递框架的基础上,阐明了数字电视网络中隐蔽信道存在的可能性和必然性。本文提出了基于TS包的填充域与PCR域保留位的信息隐藏方法,并实现仿真,然后对两种隐藏方案的性能进行了分析与比较。研究工作对在数字电视网络中构建隐蔽信道有一定的指导意义。  相似文献   

5.
研究了UWB通信系统的Scholtz室内信道传播模型,进行了信道仿真,仿真结果具有明显成簇现象,与已公布的UWB信道实测结果具有很好的相似性。同时,研究了UWB通信系统的另3种信道传播模型,S—V信道模型、IEEE802.15.3a信道模型和AT&T信道模型,进行了信道仿真,得到了特征参数。并将Scholtz信道在3种不同房间中的传播特性以及各信道模型在同样的环境中进行了比较。为UWB系统在不同的信道模型上得到的分析值之间的转化提供参考。  相似文献   

6.
隐蔽通信是指在无线通信过程中,利用隐蔽技术使监测人无法检测到无线传输的存在,使得信息在传递过程中受攻击的风险大大降低。论文主要研究物理层隐蔽通信的检测方法和性能分析,首先,在现有隐蔽通信研究的基础上归纳出物理层隐蔽通信的理论框架;其次,阐述了看守者的检测度量方法及其检测性能分析;第三,以文献比较的方式对隐蔽通信的性能和仿真结果的评价进行了分析,最后,总结了一些撰写本文时未解决的技术挑战,并讨论了隐蔽通信的未来趋势。  相似文献   

7.
信息隐藏是一门新兴的交叉学科,在隐蔽通信和数字水印等领域有着广阔的应用前景。研究了信息隐藏技术的基本理论,通过介绍信息隐藏技术的定义、系统模型和特性,指出该技术应用于隐蔽通信的可行性。为了在现有语音传输网络中隐蔽地传输秘密信息,设计以语音信号为公开载体的隐蔽通信系统,详细阐述系统的设计原理、性能要求和关键技术,为研制隐蔽通信系统终端奠定了基础。  相似文献   

8.
在网络信息安全问题日益突出的背景下,研究了网络隐蔽信道的通信机制。提出一种基于多重协议建立网络隐蔽信道的方法:通信双方通过ICMP协议进行密钥协商,用协商密钥加密传输的隐蔽信息,加密后的信息写入TCP协议的32位序列号字段,加密后的会话密钥写入IP协议的16位标识位字段。该方法在Linux平台下实现并检验。实验结果表明,此隐蔽信道隐蔽性高、传输速度快、切实可行,为防范隐蔽信道的恶意攻击提供了理论依据和技术支持。  相似文献   

9.
数字货币伴生的区块链技术具有去中心化、匿名性、强稳健性和抗篡改性等特点,是构建隐蔽通信信道的天然载体。首先介绍了网络隐蔽信道的定义和发展历史,区块链技术的架构,以及传统的网络隐蔽信道并引出了区块链网络隐蔽信道的优势;然后按照交易地址、签名算法、智能合约和P2P广播机制对区块链网络隐蔽信道进行分类,并从隐蔽性、传输效率和通信成本3个方面分析了其优缺点;最后提出了区块链网络隐蔽信道仍存在的问题并给出了未来研究方向。  相似文献   

10.
DNS(domain name system)作为互联网基础设施的重要组成部分,其数据一般不会被防火墙等网络安全防御设备拦截。以DNS协议为载体的隐蔽信道具有较强的穿透性和隐蔽性,已然成为攻击者惯用的命令控制和数据回传手段。现有研究中缺乏对真实APT(advanced persistent threat)攻击中DNS隐蔽信道的检测技术或方法,且提取的特征不够全面。为深入分析攻击流量和行为特征,基于有限状态机对真实APT攻击中DNS隐蔽通信建模,剖析了APT攻击场景下DNS隐蔽信道的构建机理,详细阐述了其数据交互过程,通过总结和分析DNS隐蔽通信机制,基于有限状态机建立通信模型,提出通信过程中存在关闭、连接、命令查询、命令传输等7种状态,控制消息和数据消息等不同类型消息的传输将触发状态迁移。利用泄露的Glimpse工具模拟真实APT攻击下DNS隐蔽通信,结合Helminth等恶意样本实验验证了模型的适用性和合理性,为人工提取特征提供了充分的依据。  相似文献   

11.
基于DNS协议的隐蔽信道研究   总被引:1,自引:0,他引:1  
隐蔽信道能够以危害系统安全策略的方式传输信息,目前,基于网络协议的隐蔽信道研究已成为热点。域名系统协议(Domain Name System,DNS)用于将主机名字和IP地址之间的转换,是双向协议,互联网正常运行离不开DNS协议,因此可以基于DNS协议建立隐蔽信道。文中首先介绍隐蔽信道、DNS隐蔽信道的概念和原理,搭建DNS隐蔽信道系统,然后演示了DNS隧道工具的使用方法,最后针对现有的DNS隐蔽信道工具提出了几点改进措施,使DNS隐蔽信道数据传输更加高效。  相似文献   

12.
Wireless communication channels may change greatly from one transmission to the next, due to variations in propagation loss and interference. The use of fixed transmission parameters for such channels results in wasted energy when channel conditions are good. Adaptation of the power, code rate, and symbol rate reduces energy consumption and interference caused to other systems. Such adaptation requires information about the characteristics of the channel, which is more difficult to obtain in a packet radio network (PRN) or other mobile ad hoc network than in a typical cellular communication system. We develop methods for providing partial information about the channel state from three statistics that are derived by different subsystems in the receiving terminals of a direct-sequence spread-spectrum PRN. We present and evaluate a protocol that uses this information to adapt the transmission parameters in response to changes in interference and propagation conditions in the network. The performance of the new adaptive-transmission protocol is compared with a system with fixed transmission parameters and with an adaptive protocol that is furnished with perfect knowledge of the channel state at the completion of each transmission.  相似文献   

13.

To address the explosive traffic demands, the capacity of the fading channel is increasingly becoming a prime concern in the designing of the wireless communication system. The channel capacity is an extremely important quantity, since it allows the transmission of the data through the channel with an arbitrarily small probability of error. In other words, capacity dictates the maximum rate of information transmission, called as ‘capacity’ of channel, determined by the intrinsic properties of the channel and is independent of the content of the transmitted information. In this paper, we present a comprehensive survey of the existing work related to the channel capacity model over various fading channels. With an elaborated explanation of the theory of channel capacity, definitions of channel capacity based on the channel state information are reviewed. To compliment this, review of the technique to enhance the channel capacity is discussed and reviewed. An effective capacity model to overcome the channel capacity limitation is also explained. Furthermore, as the secure transmission of data is of utmost importance, to address this physical layer security model is also reviewed. We also summarize the work related to channel capacity in various types of wireless networks. We finally cover the future research directions, including less explored aspects of the channel capacity that can be studied to design efficient communication systems.

  相似文献   

14.
Wu  Huihui  Zhang  Yuanyu  Liao  Xuening  Shen  Yulong  Jiang  Xiaohong 《Wireless Networks》2020,26(5):3275-3289
Wireless Networks - Covert wireless communication ensures information security by hiding the existence of the information transmission itself. Available works mainly focused on the covert...  相似文献   

15.
Vehicular Ad hoc Network (VANET) enables high speed vehicles to communicate with each other. This kind of communication can provide road safety and passengers’ comfort. Covert channels are used to transmit information secretly over the network. Network covert channel is not only used as a hacking tool, but also used to convey secret information such as private keys. Unlike wired and conventional wireless networks, few studies are conducted on covert communication in VANET. The goal of this paper is to develop a hybrid (timing and storage) covert channel in VANET. In the timing part, covert messages are sent by altering the timing pattern of the service and control packets. The proposed covert timing algorithm is dynamically changed based on the vehicular traffic volume in the transmitter’s radio range. This dynamism is used to achieve better covert capacity with an acceptable error rate. On the other hand, some fields of the periodic status messages, sent in the control channel, are utilized in the storage part. An encoding algorithm is also proposed to embed the covert data in the mentioned covert timing and storage opportunities. The encoding algorithm provides a high embedding capacity, even if the number of opportunities’ possible values is not any power of two. Finally, the transmitted secret data volume, the packet loss ratio, the channel error rate and the effect of the proposed method on other vehicles’ throughput are evaluated in a simulation process.  相似文献   

16.
1 IntroductionTheexplosivegrowthofwirelesscommunica tionsisincreasingthedemandsforhigh speed ,reli able,andspectrallyefficientcommunicationsoverwirelessmedium[1~2 ] .However,thereareseveralchallengesinattemptstoprovidehigh qualityserviceinthisdynamicenvironm…  相似文献   

17.
针对认知信号在多径衰落信道中发生畸变而导致通信质量急剧降低的问题,本文根据信息论和通信原理知识,提出了一种对认知信号采用频谱成形技术实现优化的新方法,使认知信号的传输速率与通信质量得以提高。最后通过仿真实验与无频谱成形情况对比,证实了该优化方法确实能够减小多径衰落信道对认知信号的影响,提高了认知信号传输速率和质量。  相似文献   

18.
The reliable transmission of information over communication channels depends greatly on the adequacy of the maintenance program provided for the transmission medium. An integral part of such a program is the procedure used for determining the quality of a communication link. In this concise paper, we discuss several statistical methods for ascertaining those impairments-and their respective levels-which reveal the most information about the fidelity of the channel in signal transmission. For the purpose of illustration, an example is presented which demonstrates how a testing program could implement each particular statistical method.  相似文献   

19.
Covert channels have been recently the subject of the study in both creation and countermeasure aspects. There are many different ways to embed the covert data in network standards and protocols, especially in wireless networks. MORE (MAC‐independent opportunistic routing) is an opportunistic routing protocol which uses networks coding to enhance routing performance by reducing the repetitions. This protocol can be a suitable medium for covert channel establishment. A middleman covert channel establishment method is proposed in this paper over MORE routing protocol and with the use of network coding. Hidden data are transferred through packet's payload bytes. Covert sender manipulates coding mechanism by calculating packets' coefficients instead of random selection. The proposed covert channel provides the average throughput of 218 and 231 bps, using two different data length approaches which is relatively a good comparing to the previous network layer covert channels. The proposed covert channel is also a covert storage channel and cannot be removed or restricted. Effect of different network characteristics on the proposed method's capacity and security is investigated by a simulation study, and the results are discussed.  相似文献   

20.
Channel estimation and optimisation are the main challenging tasks in Multi Input Multi Output (MIMO) wireless communication systems. In this work, a Multi-Channel Bacterial Foraging Optimization Algorithm approach is proposed for the selection of antenna in a transmission area. The main advantage of this method is, it reduces the loss of bandwidth during data transmission effectively. Here, we considered the channel estimation and optimisation for improving the transmission speed and reducing the unused bandwidth. Initially, the message is given to the input of the communication system. Then, the symbol mapping process is performed for converting the message into signals. It will be encoded based on the space–time encoding technique. Here, the single signal is divided into multiple signals and it will be given to the input of space–time precoder. Hence, the multiplexing is applied to transmission channel estimation. In this paper, the Rayleigh channel is selected based on the bandwidth range. This is the Gaussian distribution type channel. Then, the demultiplexing is applied on the obtained signal that is the reverse function of multiplexing, which splits the combined signal arriving from a medium into the original information signal. Furthermore, the long-term evolution technique is used for scheduling the time to channels during transmission. Here, the hidden Markov model technique is employed to predict the status information of the channel. Finally, the signals are decoded and the reconstructed signal is obtained after performing the scheduling process. The experimental results evaluate the performance of the proposed MIMO communication system in terms of bit error rate, mean squared error, average throughput, outage capacity and signal to interference noise ratio.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号