A New Method for Authentication Based on Covert Channel

被引:0
|
作者
Sun, Yanan [1 ]
Guan, Xiaohong [1 ]
Liu, Ting [1 ]
机构
[1] Xi An Jiao Tong Univ, Minist Educ, Key Lab Intelligent Networks & Network Secur, Sch Elect & Informat Engn, Xian, Peoples R China
来源
关键词
Network security; network covert channel; authentication; time intervals;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Authentication is of great importance in information security. Traditional method only focus on encryption of the content itself, which is the same with the later proposed methods named information hiding and digital watermark. Since data transmission is in the open network, it can easily be detected and intercepted by the malicious party. In this paper, we put forward a new method which utilize the communication channel, not the content, as the data carrier, and guarantee the validation of the user's identity during the common data transmission. Specifically, by manipulating the inter-packet delays, we implement a prototype system for authentication and embed the authentication tag within the packet intervals based on network covert channel. By conducting a series of experiments, we prove that our method performs well in LAN and Campus Network.
引用
收藏
页码:160 / 165
页数:6
相关论文
共 50 条
  • [1] A lightweight identity authentication method by exploiting network covert channel
    Xie, Haijiang
    Zhao, Jizhong
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (06) : 1038 - 1047
  • [2] A lightweight identity authentication method by exploiting network covert channel
    Haijiang Xie
    Jizhong Zhao
    Peer-to-Peer Networking and Applications, 2015, 8 : 1038 - 1047
  • [3] Covert Channel-Based Transmitter Authentication in Controller Area Networks
    Ying, Xuhang
    Bernieri, Giuseppe
    Conti, Mauro
    Bushnell, Linda
    Poovendran, Radha
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2665 - 2679
  • [4] Retina as authentication tool for covert channel problem
    Mahajan, Rajiv
    Gupta, Teenum
    Mahajan, Sakshi
    Bawa, Navneet
    World Academy of Science, Engineering and Technology, 2009, 32 : 153 - 158
  • [5] Authentication in 802.11 LANs using a Covert Side Channel
    Calhoun, Telvis E., Jr.
    Newman, Reed
    Beyah, Raheem
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 1034 - 1039
  • [6] A new model-based length covert channel
    Zhai, J. (jiangtaozhai@gmail.com), 2013, ICIC Express Letters Office, Tokai University, Kumamoto Campus, 9-1-1, Toroku, Kumamoto, 862-8652, Japan (07):
  • [7] A New Sensors-Based Covert Channel on Android
    Al-Haiqi, Ahmed
    Ismail, Mahamod
    Nordin, Rosdiadee
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [8] Covert Timing Channel Detection Method Based on Random Forest Algorithm
    Fu, Guangxin
    Li, Qingbao
    Zhang, Ping
    Chen, Zhifeng
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 165 - 171
  • [9] A data validation method based on IP covert channel packet ordering
    Huang, Tianwen
    Zhang, Lejun
    Hu, Xiaoyan
    Lei, Xiaoying
    2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 223 - 227
  • [10] A new covert channel in WIFI networks
    Frikha, L.
    Trabelsi, Z.
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 255 - 260