A New Method for Authentication Based on Covert Channel

被引:0
|
作者
Sun, Yanan [1 ]
Guan, Xiaohong [1 ]
Liu, Ting [1 ]
机构
[1] Xi An Jiao Tong Univ, Minist Educ, Key Lab Intelligent Networks & Network Secur, Sch Elect & Informat Engn, Xian, Peoples R China
来源
关键词
Network security; network covert channel; authentication; time intervals;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Authentication is of great importance in information security. Traditional method only focus on encryption of the content itself, which is the same with the later proposed methods named information hiding and digital watermark. Since data transmission is in the open network, it can easily be detected and intercepted by the malicious party. In this paper, we put forward a new method which utilize the communication channel, not the content, as the data carrier, and guarantee the validation of the user's identity during the common data transmission. Specifically, by manipulating the inter-packet delays, we implement a prototype system for authentication and embed the authentication tag within the packet intervals based on network covert channel. By conducting a series of experiments, we prove that our method performs well in LAN and Campus Network.
引用
收藏
页码:160 / 165
页数:6
相关论文
共 50 条
  • [21] ZM-CTC: Covert timing channel construction method based on zigzag matrix
    Zheng, Jiamin
    Li, Shupan
    Hao, Shengang
    Li, Yuanzhang
    Zhang, Yu
    Computer Communications, 2022, 182 : 212 - 222
  • [22] ZM-CTC: Covert timing channel construction method based on zigzag matrix
    Zheng, Jiamin
    Li, Shupan
    Hao, Shengang
    Li, Yuanzhang
    Zhang, Yu
    COMPUTER COMMUNICATIONS, 2022, 182 : 212 - 222
  • [23] RETRACTED: Covert Channel Construction Method Based on HTTP Composite Protocols (Retracted Article)
    Jin, Longxing
    Liu, Zijun
    Huang, Fuquan
    Lin, Zizhao
    Li, Ming
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2022, 2022
  • [24] MIMO wireless covert channel based on precoding
    Cao, Pengcheng
    Liu, Weiwei
    Liu, Guangjie
    Mao, Weiwei
    Dai, Yuewei
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2022, 49 (02): : 42 - 49
  • [25] Covert Channel Detection: A Survey Based Analysis
    Gober, S. Zerafshan
    Javed, Barkha
    Saqib, Nazar Abbas
    2012 9TH INTERNATIONAL CONFERENCE ON HIGH CAPACITY OPTICAL NETWORKS AND EMERGING/ENABLING TECHNOLOGIES (HONET), 2012, : 57 - 64
  • [26] BEHAVIOR-BASED COVERT CHANNEL IN CYBERSPACE
    Johnson, Daryl
    Lutz, Peter
    Yuan, Bo
    INTELLIGENT DECISION MAKING SYSTEMS, VOL. 2, 2010, : 311 - +
  • [27] A Novel Covert Channel Based on Length of Messages
    Ji, Liping
    Jiang, Wenhao
    Dai, Benyang
    Niu, Xiamu
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 551 - 554
  • [28] Covert Channel Capacity Analysis Based on Entropy
    Chen, Li
    Ju, Shiguang
    Zhou, Conghua
    Zhang, Yi
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 363 - 367
  • [29] A Proposed Covert Channel Based on Memory Reclamation
    Hussein, Omar
    Hamza, Nermin
    Hefny, Hesham
    2015 IEEE SEVENTH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INFORMATION SYSTEMS (ICICIS), 2015, : 343 - 347
  • [30] Ultrannel: Ultrasound based Covert Communication Channel
    Zhang, Jianyi
    Wu, Ruilong
    Li, Xiuying
    Wang, Shuo
    Jin, Qichao
    Li, Zhenkui
    Shi, Rui
    Proceedings - 2022 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Autonomous and Trusted Vehicles, Scalable Computing and Communications, Digital Twin, Privacy Computing, Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022, 2022, : 1760 - 1767