期刊文献+

基于扩频Manchester码的可靠自同步网络隐蔽时间通信模型 被引量:3

Robust and self-synchronous network covert timing communication model based on spread Manchester code
在线阅读 下载PDF
导出
摘要 针对包间延迟网络隐蔽时间信道存在的鲁棒性差、同步机制脆弱问题,提出了一种基于M anchester编码的可靠自同步网络隐蔽时间通信模型.首先,对秘密消息进行扩频操作,得到扩频码.然后,将流持续时间划分为若干相同长度时隙,每相邻两时隙构成一对,通过调整时隙对内包数量来模拟扩频码对应的Manchester编码中0和1的编码过程,以实现扩频码在流中的嵌入.同时,采用时间偏移量指示同步位置,使得调制后的流呈现自同步性,以便接收端准确恢复秘密消息.实验结果表明,与包间延迟方法相比,该模型能使收发双方更快速准确地保持同步,在不同网络负载下,秘密消息检测错误率最大值降低约85%,显著提升了对网络干扰因素的抵抗能力,且在网络流量较大时呈现出更好的隐蔽性. To solve the problem of poor robustness and vulnerable synchronization of the current network covert timing channel using inter-packet delay (IPD), a robust and self-synchronous covert timing communication model based on spread manchester code (ROSMC) is proposed. First, the spectrum of the covert message is spread to produce spreading code (SC). Then, the duration of network flow is divided into many time intervals with equal length and two adjacent time intervals constitute one pair. Each bit of SC is embedded into flow through simulating 0 and 1 encoding process of the corresponding Manchester code (MC). The encoding process can be implemented by adjusting the number of the packets in the time interval pair. Meanwhile, an offset from the starting moment of flow is used to indicate the synchronous position. The offset and MC features make the adjusted flow present self-synchronization which can help receiver decode covert message accurately. The experimental results show that, compared with the IPD-based methods, the proposed model synchronizes sender and receiver more quickly and accurately. The maximum of the detection error rate can be reduced by 85% under different network traffic loads and the resistance to interference is significantly enhanced. Besides, the proposed model presents better covertness under heavier network traffic loads.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2015年第1期23-30,共8页 Journal of Southeast University:Natural Science Edition
基金 江苏省未来网络前瞻性基金资助项目(BY2013095-5-03) 江苏省普通高校研究生科研创新计划资助项目(KYLX_0141) 西藏自治区自然科学基金资助项目(2013)
关键词 信息安全 网络隐蔽时间信道 Manchester编码 鲁棒性 隐蔽性 information security network covert timing channel Manchester code robustness covertness
作者简介 郭晓军(1983-),男,博士生;程光(联系人),男,博士,教授,博士生导师,gcheng@njnet.edu.cn.
  • 相关文献

参考文献15

二级参考文献72

  • 1姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 2孙星明,黄华军,王保卫,孙光,黄俊伟.一种基于等价标记的网页信息隐藏算法[J].计算机研究与发展,2007,44(5):756-760. 被引量:17
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1835

同被引文献13

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部