Covert information transmission through the use of standard collision resolution algorithms

被引:0
|
作者
Dogu, TM [1 ]
Ephremides, A
机构
[1] Univ Maryland, Syst Res Inst, College Pk, MD 20742 USA
[2] Univ Maryland, Dept Elect Engn, College Pk, MD 20742 USA
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The objective of this paper is to demonstrate the potential of the wireless medium to host covert channels. We do so by considering a simple covert channel and evaluating its performance. The channel is based on the First Come First Serve (FCFS) spliting algorithm, which is a standard collision resolution algorithm [1,2] that operates in a distributed fashion and coordinates access to a standard collision channel (possibly wireless medium or multi access cable) shared by a large number of users.
引用
收藏
页码:419 / 433
页数:15
相关论文
共 50 条
  • [21] COLLISION RESOLUTION ALGORITHMS IN MULTISTATION PACKET-RADIO NETWORKS
    BARDAVID, A
    SIDI, M
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1989, 37 (12) : 1387 - 1391
  • [22] Retracted: Blockchain-based covert software information transmission for bitcoin
    Dhiman, Gaurav
    dos Reis, Marcello Carvalho
    Barbosa, Paulo C. S.
    de Albuquerque, Victor Hugo C.
    Kautish, Sandeep
    [J]. IET Software, 2023, 17 (04): : 822 - 831
  • [23] Age of Information With Collision-Resolution Random Access
    Pan, Haoyuan
    Chan, Tse-Tin
    Li, Jianqiang
    Leung, Victor C. M.
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (10) : 11295 - 11300
  • [24] RANDOM INFINITE-TREES AND SUPERCRITICAL BEHAVIOR OF COLLISION RESOLUTION ALGORITHMS
    JACQUET, P
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) : 1460 - 1465
  • [25] Modeling and performance evaluation of collision resolution algorithms for LonWorks control networks
    Lin, EW
    Wang, MY
    Kam, M
    [J]. 2005 IEEE NETWORKING, SENSING AND CONTROL PROCEEDINGS, 2005, : 656 - 664
  • [26] Covert Information Mapped Spatial and Directional Modulation toward Secure Wireless Transmission
    Tian, Jie
    Chen, Hao
    Wang, Zhigang
    Shi, Xianhua
    Ji, Zhengyu
    Li, Xianglu
    [J]. SENSORS, 2021, 21 (22)
  • [27] Information theft through covert channel by exploiting HTTP Post method
    Tomar, Nishi
    Gaur, Manoj Singh
    [J]. 2013 TENTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2013,
  • [28] Numerical algorithms for use in quantum information
    Ramos, RV
    [J]. JOURNAL OF COMPUTATIONAL PHYSICS, 2003, 192 (01) : 95 - 104
  • [29] Secure Audio Information Transmission with Encryption Algorithms in PKI
    Pleshkova, Snejana
    Kinanev, Dimitar
    Bekiarski, Alexander
    [J]. 2018 INTERNATIONAL CONFERENCE ON HIGH TECHNOLOGY FOR SUSTAINABLE DEVELOPMENT (HITECH), 2018,
  • [30] Provenance Transmission through a Two-Dimensional Covert Timing Channel in WSNs
    Xu, Qinbao
    Liu, Li
    Akhtar, Rizwan
    Raja, Muhammad Asif Zahoor
    Wang, Changda
    [J]. MOBILE INFORMATION SYSTEMS, 2020, 2020