期刊文献+
共找到1,192篇文章
< 1 2 60 >
每页显示 20 50 100
Cognitive Jammers Assisted Covert Communication in Cognitive Radio Networks
1
作者 Liu Changjun Shi Jia +1 位作者 Tie Zhuangzhuang Wang Yongchao 《China Communications》 SCIE CSCD 2024年第9期75-89,共15页
In this work,we investigate the covert communication in cognitive radio(CR)networks with the existence of multiple cognitive jammers(CJs).Specifically,the secondary transmitter(ST)helps the primary transmitter(PT)to r... In this work,we investigate the covert communication in cognitive radio(CR)networks with the existence of multiple cognitive jammers(CJs).Specifically,the secondary transmitter(ST)helps the primary transmitter(PT)to relay information to primary receiver(PR),as a reward,the ST can use PT's spectrum to transmit private information against the eavesdropper(Eve)under the help of one selected cognitive jammer(CJ).Meanwhile,we propose three jammer-selection schemes,namely,link-oriented jammer selection(LJS),min-max jammer selection(MMJS)and random jammer selection(RJS).For each scheme,we analyze the average covert throughput(ACT)and covert outage probability(COP).Our simulation results show that CJ is helpful to ST's covert communication,the expected minimum detection error probability and ACT can be significantly improved with the increase of false alarm of CJ.Moreover,the LJS scheme achieves best performance in ACT and COP,followed by RJS scheme,and MMJS scheme shows the worst performance. 展开更多
关键词 cognitive jammer cognitive radio covert communication performance analysis
下载PDF
Cooperative Covert Communication in Multi-Antenna Broadcast Channels
2
作者 Qiao Sen Liu Guangjie +1 位作者 Ji Xiaopeng Liu Weiwei 《China Communications》 SCIE CSCD 2024年第6期246-260,共15页
With the gradual popularization of 5G communications,the application of multi-antenna broadcasting technology has become widespread.Therefore,this study aims to investigate the wireless covert communication in the two... With the gradual popularization of 5G communications,the application of multi-antenna broadcasting technology has become widespread.Therefore,this study aims to investigate the wireless covert communication in the two-user cooperative multi-antenna broadcast channel.We focus on the issue that the deteriorated reliability and undetectability are mainly affected by the transmission power.To tackle this issue,we design a scheme based on beamforming to increase the reliability and undetectability of wireless covert communication in the multi-antenna broadcast channel.We first modeled and analyzed the cooperative multi-antenna broadcasting system,and put forward the target question.Then we use the SCA(successive convex approximation)algorithm to transform the target problem into a series of convex subproblems.Then the convex problems are solved and the covert channel capacity is calculated.In order to verify the effectiveness of the scheme,we conducted simulation verification.The simulation results show that the proposed beamforming scheme can effectively improve the reliability and undetectability of covert communication in multi-antenna broadcast channels. 展开更多
关键词 BEAMFORMING covert communication multi-antenna broadcast channels OFDM
下载PDF
Gamma Approximation Based Multi-Antenna Covert Communication Detection
3
作者 Wan Pengwu Chen Dongrui +2 位作者 Wang Danyang Hui Xi Peng Kang 《China Communications》 SCIE CSCD 2024年第9期90-97,共8页
Covert communication technology makes wireless communication more secure,but it also provides more opportunities for illegal users to transmit harmful information.In order to detect the illegal covert communication of... Covert communication technology makes wireless communication more secure,but it also provides more opportunities for illegal users to transmit harmful information.In order to detect the illegal covert communication of the lawbreakers in real time for subsequent processing,this paper proposes a Gamma approximation-based detection method for multi-antenna covert communication systems.Specifically,the Gamma approximation property is used to calculate the miss detection rate and false alarm rate of the monitor firstly.Then the optimization problem to minimize the sum of the missed detection rate and the false alarm rate is proposed.The optimal detection threshold and the minimum error detection probability are solved according to the properties of the Lambert W function.Finally,simulation results are given to demonstrate the effectiveness of the proposed method. 展开更多
关键词 covert communication DETECTION Gamma approximation Lambert W function multi-antenna technique
下载PDF
Age of Information for Short-Packet Covert Communication with Time Modulated Retrodirective Array
4
作者 Ma Yue Ma Ruiqian +4 位作者 Lin Zhi Yang Weiwei Cai Yueming Miao Chen Wu Wen 《China Communications》 SCIE CSCD 2024年第4期23-37,共15页
In this paper,the covert age of information(CAoI),which characterizes the timeliness and covertness performance of communication,is first investigated in the short-packet covert communication with time modulated retro... In this paper,the covert age of information(CAoI),which characterizes the timeliness and covertness performance of communication,is first investigated in the short-packet covert communication with time modulated retrodirective array(TMRDA).Specifically,the TMRDA is designed to maximize the antenna gain in the target direction while the side lobe is sufficiently suppressed.On this basis,the covertness constraint and CAoI are derived in closed form.To facilitate the covert transmission design,the transmit power and block-length are jointly optimized to minimize the CAoI,which demonstrates the trade-off between covertness and timelessness.Our results illustrate that there exists an optimal block-length that yields the minimum CAoI,and the presented optimization results can achieve enhanced performance compared with the fixed block-length case.Additionally,we observe that smaller beam pointing error at Bob leads to improvements in CAoI. 展开更多
关键词 age of information covert communication retrodirective array time modulation
下载PDF
CCM-FL:Covert communication mechanisms for federated learning in crowd sensing IoT
5
作者 Hongruo Zhang Yifei Zou +2 位作者 Haofei Yin Dongxiao Yu Xiuzhen Cheng 《Digital Communications and Networks》 SCIE CSCD 2024年第3期597-608,共12页
The past decades have witnessed a wide application of federated learning in crowd sensing,to handle the numerous data collected by the sensors and provide the users with precise and customized services.Meanwhile,how t... The past decades have witnessed a wide application of federated learning in crowd sensing,to handle the numerous data collected by the sensors and provide the users with precise and customized services.Meanwhile,how to protect the private information of users in federated learning has become an important research topic.Compared with the differential privacy(DP)technique and secure multiparty computation(SMC)strategy,the covert communication mechanism in federated learning is more efficient and energy-saving in training the ma-chine learning models.In this paper,we study the covert communication problem for federated learning in crowd sensing Internet-of-Things networks.Different from the previous works about covert communication in federated learning,most of which are considered in a centralized framework and experimental-based,we firstly proposes a centralized covert communication mechanism for federated learning among n learning agents,the time complexity of which is O(log n),approximating to the optimal solution.Secondly,for the federated learning without parameter server,which is a harder case,we show that solving such a problem is NP-hard and prove the existence of a distributed covert communication mechanism with O(log logΔlog n)times,approximating to the optimal solution.Δis the maximum distance between any pair of learning agents.Theoretical analysis and nu-merical simulations are presented to show the performance of our covert communication mechanisms.We hope that our covert communication work can shed some light on how to protect the privacy of federated learning in crowd sensing from the view of communications. 展开更多
关键词 covert communications Federated learning Crowd sensing SINR model
下载PDF
Covert LEO Satellite Communication Aided by Generative Adversarial Network Based Cooperative UAV Jamming
6
作者 Shi Jia Li Xiaomeng +2 位作者 Liao Xiaomin Tie Zhuangzhuang Hu Junfan 《China Communications》 SCIE CSCD 2024年第9期27-39,共13页
In this paper,we study the covert performance of the downlink low earth orbit(LEO)satellite communication,where the unmanned aerial vehicle(UAV)is employed as a cooperative jammer.To maximize the covert rate of the LE... In this paper,we study the covert performance of the downlink low earth orbit(LEO)satellite communication,where the unmanned aerial vehicle(UAV)is employed as a cooperative jammer.To maximize the covert rate of the LEO satellite transmission,a multi-objective problem is formulated to jointly optimize the UAV’s jamming power and trajectory.For practical consideration,we assume that the UAV can only have partial environmental information,and can’t know the detection threshold and exact location of the eavesdropper on the ground.To solve the multiobjective problem,we propose the data-driven generative adversarial network(DD-GAN)based method to optimize the power and trajectory of the UAV,in which the sample data is collected by using genetic algorithm(GA).Simulation results show that the jamming solution of UAV generated by DD-GAN can achieve an effective trade-off between covert rate and probability of detection errors when only limited prior information is obtained. 展开更多
关键词 covert communication generative adversarial network LEO satellite UAV jammer
下载PDF
Jamming Assisted Covert Wireless Communication in Multi-Channel Systems
7
作者 Che Bohan Sha Nan +2 位作者 Yang Weiwei Lu Xingbo Gao Chang 《China Communications》 SCIE CSCD 2024年第9期211-224,共14页
This paper investigates the jammerassisted multi-channel covert wireless communication(CWC)by exploiting the randomness of sub-channel selection to confuse the warden.In particular,we propose two sub-channel selection... This paper investigates the jammerassisted multi-channel covert wireless communication(CWC)by exploiting the randomness of sub-channel selection to confuse the warden.In particular,we propose two sub-channel selection transmission schemes,named random sub-channel selection(RSS)scheme and maximum sub-channel selection(MSS)scheme,to enhance communication covertness.For each proposed scheme,we first derive closed-form expressions of the transmission outage probability(TOP),the average effective rate,and the minimum average detection error probability(DEP).Then,the average effective covert rate(ECR)is maximized by jointly optimizing the transmit power at the transmitter and the number of sub-channels.Numerical results show that there is an optimal value of the number of sub-channels that maximizes the average ECR.We also find that to achieve the maximum average ECR,a larger number of subchannels are needed facing a stricter covertness constraint. 展开更多
关键词 covert wireless communication jamming multi-channel system
下载PDF
Intelligent Reflecting Surface-Aided Secure and Covert Communications
8
作者 Zhou Xiaobo Jiang Yong +2 位作者 Xia Tingting Xia Guiyang Shen Tong 《China Communications》 SCIE CSCD 2024年第9期1-10,共10页
This work employs intelligent reflecting surface(IRS)to enhance secure and covert communication performance.We formulate an optimization problem to jointly design both the reflection beamformer at IRS and transmit pow... This work employs intelligent reflecting surface(IRS)to enhance secure and covert communication performance.We formulate an optimization problem to jointly design both the reflection beamformer at IRS and transmit power at transmitter Alice in order to optimize the achievable secrecy rate at Bob subject to a covertness constraint.We first develop a Dinkelbach-based algorithm to achieve an upper bound performance and a high-quality solution.For reducing the overhead and computational complexity of the Dinkelbach-based scheme,we further conceive a low-complexity algorithm in which analytical expression for the IRS reflection beamforming is derived at each iteration.Examination result shows that the devised low-complexity algorithm is able to achieve similar secrecy rate performance as the Dinkelbach-based algorithm.Our examination also shows that introducing an IRS into the considered system can significantly improve the secure and covert communication performance relative to the scheme without IRS. 展开更多
关键词 covert communications intelligent reflecting surface physical layer security reflection beamforming
下载PDF
Delta Compression Correction Method for Covert Communication in IoT
9
作者 Hu Zhijuan Liu Shuangyu +2 位作者 Xu Fei Liu Liqiang Li Guiping 《China Communications》 SCIE CSCD 2024年第9期60-74,共15页
Covert communication can conceal the existence of wireless transmission and thus has the ability to address information security transfer issue in many applications of the booming Internet of Things(IoT).However,the p... Covert communication can conceal the existence of wireless transmission and thus has the ability to address information security transfer issue in many applications of the booming Internet of Things(IoT).However,the proliferation of sensing devices has generated massive amounts of data,which has increased the burden of covert communication.Considering the spatiotemporal correlation of data collection causing redundancy between data,eliminating duplicate data before transmission is beneficial for shortening transmission time,reducing the average received signal power of warden,and ultimately realizing covert communication.In this paper,we propose to apply delta compression technology in the gateway to reduce the amount of data generated by IoT devices,and then sent it to the cloud server.To this end,a cost model and evaluation method that is closer to the actual storage mode of computer systems is been constructed.Based on which,the delta version sequence obtained by existing delta compression algorithms is no longer compact,manifested by the still high cost.In this situation,we designed the correction scheme based on instructions merging(CSIM)correction to save costs by merging instructions.Firstly,the delta version sequence is divided into five categories and corresponding merge rules were derived.Then,for any COPY/ADD class delta compression algorithm,merge according to strict to relaxed to selection rules while generating instructions.Finally,a more cost-effective delta version sequence can be gained.The experimental results on random data show that the delta version sequences output by the CSIM corrected 1.5-pass and greedy algorithms have better performance in cost reducing. 展开更多
关键词 correction method covert communica-tion delta compression Internet of Things(IoT)
下载PDF
Joint Active and Passive Beamforming Design in Intelligent Reflecting Surface(IRS)-Assisted Covert Communications:A Multi-Agent DRL Approach
10
作者 Gao Ang Ren Xiaoyu +2 位作者 Deng Bin Sun Xinshun Zhang Jiankang 《China Communications》 SCIE CSCD 2024年第9期11-26,共16页
Intelligent Reflecting Surface(IRS),with the potential capability to reconstruct the electromagnetic propagation environment,evolves a new IRSassisted covert communications paradigm to eliminate the negligible detecti... Intelligent Reflecting Surface(IRS),with the potential capability to reconstruct the electromagnetic propagation environment,evolves a new IRSassisted covert communications paradigm to eliminate the negligible detection of malicious eavesdroppers by coherently beaming the scattered signals and suppressing the signals leakage.However,when multiple IRSs are involved,accurate channel estimation is still a challenge due to the extra hardware complexity and communication overhead.Besides the crossinterference caused by massive reflecting paths,it is hard to obtain the close-formed solution for the optimization of covert communications.On this basis,the paper improves a heterogeneous multi-agent deep deterministic policy gradient(MADDPG)approach for the joint active and passive beamforming(Joint A&P BF)optimization without the channel estimation,where the base station(BS)and multiple IRSs are taken as different types of agents and learn to enhance the covert spectrum efficiency(CSE)cooperatively.Thanks to the‘centralized training and distributed execution’feature of MADDPG,each agent can execute the active or passive beamforming independently based on its partial observation without referring to others.Numeral results demonstrate that the proposed deep reinforcement learning(DRL)approach could not only obtain a preferable CSE of legitimate users and a low detection of probability(LPD)of warden,but also alleviate the communication overhead and simplify the IRSs deployment. 展开更多
关键词 covert communications deep reinforcement learning intelligent reflecting surface
下载PDF
Deep Learning for Covert Communication
11
作者 Shen Weiguo Chen Jiepeng +4 位作者 Zheng Shilian Zhang Luxin Pei Zhangbin Lu Weidang Yang Xiaoniu 《China Communications》 SCIE CSCD 2024年第9期40-59,共20页
In recent years,deep learning has been gradually used in communication physical layer receivers and has achieved excellent performance.In this paper,we employ deep learning to establish covert communication systems,en... In recent years,deep learning has been gradually used in communication physical layer receivers and has achieved excellent performance.In this paper,we employ deep learning to establish covert communication systems,enabling the transmission of signals through high-power signals present in the prevailing environment while maintaining covertness,and propose a convolutional neural network(CNN)based model for covert communication receivers,namely Deep CCR.This model leverages CNN to execute the signal separation and recovery tasks commonly performed by traditional receivers.It enables the direct recovery of covert information from the received signal.The simulation results show that the proposed Deep CCR exhibits significant advantages in bit error rate(BER)compared to traditional receivers in the face of noise and multipath fading.We verify the covert performance of the covert method proposed in this paper using the maximum-minimum eigenvalue ratio-based method and the frequency domain entropy-based method.The results indicate that this method has excellent covert performance.We also evaluate the mutual influence between covert signals and opportunity signals,indicating that using opportunity signals as cover can cause certain performance losses to covert signals.When the interference-tosignal power ratio(ISR)is large,the impact of covert signals on opportunity signals is minimal. 展开更多
关键词 convolutional neural network covert communication deep learning
下载PDF
Space/Air Covert Communications:Potentials,Scenarios,and Key Technologies
12
作者 Mao Haobin Liu Yanming +5 位作者 Zhu Lipeng Mao Tianqi Xiao Zhenyu Zhang Rui Han Zhu Xia Xianggen 《China Communications》 SCIE CSCD 2024年第3期1-18,共18页
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel... Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation. 展开更多
关键词 artificial intelligence(AI) sixth generation(6G) space-air-ground integrated networks(SAGINs) space/air covert communications
下载PDF
Covert Communication in Integrated High Altitude Platform Station Terrestrial Networks
13
作者 Zeke Wu Kefeng Guo +1 位作者 Rui Liu Shibin Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第4期583-598,共16页
In recent years,Internet of Things(IoT)technology has emerged and gradually sprung up.As the needs of largescale IoT applications cannot be satisfied by the fifth generation(5G)network,wireless communication network n... In recent years,Internet of Things(IoT)technology has emerged and gradually sprung up.As the needs of largescale IoT applications cannot be satisfied by the fifth generation(5G)network,wireless communication network needs to be developed into the sixth generation(6G)network.However,with the increasingly prominent security problems of wireless communication networks such as 6G,covert communication has been recognized as one of the most promising solutions.Covert communication can realize the transmission of hidden information between both sides of communication to a certain extent,which makes the transmission content and transmission behavior challenging to be detected by noncooperative eavesdroppers.In addition,the integrated high altitude platform station(HAPS)terrestrial network is considered a promising development direction because of its flexibility and scalability.Based on the above facts,this article investigates the covert communication in an integrated HAPS terrestrial network,where a constant power auxiliary node is utilized to send artificial noise(AN)to realize the covert communication.Specifically,the covert constraint relationship between the transmitting and auxiliary nodes is derived.Moreover,the closed-form expressions of outage probability(OP)and effective covert communication rate are obtained.Finally,numerical results are provided to verify our analysis and reveal the impacts of critical parameters on the system performance. 展开更多
关键词 covert communication the integrated HAPS terrestrial network constant power auxiliary node artificial noise(AN) effective covert communication rate
下载PDF
Covert Communication with a Spectrum Sharing Relay in the Finite Blocklength Regime 被引量:5
14
作者 Ruiqian Ma Weiwei Yang +2 位作者 Hui Shi Xingbo Lu Jue Liu 《China Communications》 SCIE CSCD 2023年第4期195-211,共17页
In this paper,we investigate the feasibility and performance of the covert communication with a spectrum sharing relay in the finite blocklength regime.Specifically,the relay opportunistically forwards the source'... In this paper,we investigate the feasibility and performance of the covert communication with a spectrum sharing relay in the finite blocklength regime.Specifically,the relay opportunistically forwards the source's messages to the primary receiver or conveys the covert messages to its own receiver via the sharing spectrum,while the warden attempts to detect the transmission.First,we derive a lower bound on the covertness constraint,and the analytical expressions of both the primary average effective covert throughput(AECT)and sum AECT are presented by considering the overall decoding error performance.Then,we formulate two optimization problems to maximize the primary and sum AECT respectively by optimizing the blocklength and the transmit power at the source and the relay.Our examinations show that there exists an optimal blocklength to maximize the primary and sum AECT.Besides,it is revealed that,to maximize the primary AECT,the optimal transmit power of each hop increases as its channel quality deteriorates.Furthermore,in the optimization for maximizing the sum AECT,the optimal transmit power at the source equals to zero when the channel quality from relay to the secondary receiver is not weaker than that from relay to the primary receiver. 展开更多
关键词 covert communication finite blocklength RELAY spectrum sharing
下载PDF
Multi-Antenna Jammer Assisted Covert Communications in Data Collected IoT with NOMA 被引量:2
15
作者 Liwei Tao Weiwei Yang +3 位作者 Xingbo Lu Ruiqian Ma Ling Yang Yi Song 《China Communications》 SCIE CSCD 2023年第5期217-231,共15页
In this paper,we investigate covert communications in data collected IoT with NOMA,where the paired sensor nodes S_(m) and S_(n) transmit covert messages to a legitimate receiver(Bob)in the presence of a Warden(Willie... In this paper,we investigate covert communications in data collected IoT with NOMA,where the paired sensor nodes S_(m) and S_(n) transmit covert messages to a legitimate receiver(Bob)in the presence of a Warden(Willie).To confuse the detection at Willie,an extra multi-antenna friendly jammer(Jammer)has been employed to transmit artificial noise(AN)with random power.Based on the CSI of Willie is available or not at Jammer,three AN transmission schemes,including null-space artificial noise(NAN),transmit antenna selection(TAS),and zeroforcing beamforming(ZFB),are proposed.Furthermore,the closed-form expressions of expected minimum detection error probability(EMDEP)and joint connection outage probability(JCOP)are derived to measure covertness and reliability,respectively.Finally,the maximum effective covert rate(ECR)is obtained with a given covertness constraint.The numerical results show that ZFB scheme has the best maximum ECR in the case of the number of antennas satisfies N>2,and the same maximum ECR can be achieved in ZFB and NAN schemes with N=2.Moreover,TAS scheme also can improve the maximum ECR compared with the benchmark scheme(i.e.,signal-antenna jammer).In addition,a proper NOMA node pairing can further improve the maximum ECR. 展开更多
关键词 IOT covert communications NOMA node pairing multi-antenna jammer
下载PDF
Intelligent Covert Communication Design for Cooperative Cognitive Radio Network 被引量:2
16
作者 Zan Li Jia Shi +3 位作者 Chao Wang Danyang Wang Xiaomeng Li Xiaomin Liao 《China Communications》 SCIE CSCD 2023年第7期122-136,共15页
Extensive research attentions have been devoted to studying cooperative cognitive radio networks(CCRNs),where secondary users(SU)providing cooperative transmissions can be permitted by primary users(PU)to use spectrum... Extensive research attentions have been devoted to studying cooperative cognitive radio networks(CCRNs),where secondary users(SU)providing cooperative transmissions can be permitted by primary users(PU)to use spectrum.In order to maximize SU’s utility,SU may transmit its own information during the period of cooperative transmission,which stimulates the use of covert transmission against PU’s monitoring.For this sake,this article reviews the motivations of studying covert communications in CCRN.In particular,three intelligent covert transmission approaches are developed for maximizing SU’s utility in CCRNs,namely,intelligent parasitic covert transmission(IPCT),intelligent jammer aided covert transmission(IJCT)and intelligent reflecting surface assisted covert transmission(IRSC).Further,some raw performance evaluations are discussed,and a range of potential research directions are also provided. 展开更多
关键词 cognitive radio networks covert transmis-sion machine learning
下载PDF
Deep Reinforcement Learning for IRS-Assisted UAV Covert Communications 被引量:1
17
作者 Songjiao Bi Langtao Hu +3 位作者 Quanjin Liu Jianlan Wu Rui Yang Lei Wu 《China Communications》 SCIE CSCD 2023年第12期131-141,共11页
Covert communications can hide the existence of a transmission from the transmitter to receiver.This paper considers an intelligent reflecting surface(IRS)assisted unmanned aerial vehicle(UAV)covert communication syst... Covert communications can hide the existence of a transmission from the transmitter to receiver.This paper considers an intelligent reflecting surface(IRS)assisted unmanned aerial vehicle(UAV)covert communication system.It was inspired by the high-dimensional data processing and decisionmaking capabilities of the deep reinforcement learning(DRL)algorithm.In order to improve the covert communication performance,an UAV 3D trajectory and IRS phase optimization algorithm based on double deep Q network(TAP-DDQN)is proposed.The simulations show that TAP-DDQN can significantly improve the covert performance of the IRS-assisted UAV covert communication system,compared with benchmark solutions. 展开更多
关键词 covert communication deep reinforcement learning intelligent reflective surface UAV
下载PDF
A Derivative Matrix-Based Covert Communication Method in Blockchain
18
作者 Xiang Zhang Xiaona Zhang +3 位作者 Xiaorui Zhang Wei Sun Ruohan Meng Xingming Sun 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期225-239,共15页
The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert communication.However,the existing methods of covert communication in bloc... The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert communication.However,the existing methods of covert communication in blockchain suffer from the predefined channel structure,the capacity of a single transaction is not high,and the fixed transaction behaviors will lower the concealment of the communication channel.Therefore,this paper proposes a derivation matrix-based covert communication method in blockchain.It uses dual-key to derive two types of blockchain addresses and then constructs an address matrix by dividing addresses into multiple layers to make full use of the redundancy of addresses.Subsequently,to solve the problem of the lack of concealment caused by the fixed transaction behaviors,divide the rectangular matrix into square blocks with overlapping regions and then encrypt different blocks sequentially to make the transaction behaviors of the channel addresses match better with those of the real addresses.Further,the linear congruence algorithm is used to generate random sequence,which provides a random order for blocks encryption,and thus enhances the security of the encryption algorithm.Experimental results show that this method can effectively reduce the abnormal transaction behaviors of addresses while ensuring the channel transmission efficiency. 展开更多
关键词 covert communication blockchain CONCEALMENT SECURITY capacity DERIVATION
下载PDF
An Empirical Study on the Differences between Overt Translation and Covert Translation in Legal
19
作者 Chunxu Qian 《Journal of Educational Theory and Management》 2023年第1期12-16,共5页
Currently,it is key to convey precise meanings to readers for translators.Observing expressing habits between different languages is the precondition to make target texts more readable.It is crucial to ensure the exac... Currently,it is key to convey precise meanings to readers for translators.Observing expressing habits between different languages is the precondition to make target texts more readable.It is crucial to ensure the exactness and seriousness of legal texts,but it does not mean that translators have to take machined way to leave out and even give up transmitting in-deep cultural implications for the intention of achieving the all-inclusive integrity of target content.It is a correct choice for translators to take overt translation and covert translation in line with traits of source language and target language and differences between civil law system and common law system.The intention of the article is to make an empirical study between overt translation and covert translation. 展开更多
关键词 Legal text Overt translation covert translation READABILITY Empirical study
下载PDF
Integrated criteria for covert channel auditing
20
作者 Chang-da WANG Shi-guang JU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第6期737-743,共7页
A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for cov... A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for covert channel auditing are given. Whereas TCSEC (Trusted Computer System Evaluation Criteria) or CC (Common Criteria for Information Technology Security Evaluation) only use the bandwidth to evaluate the threat of covert channels, our new criteria integrate the security level difference, the bandwidth sensitive parameter, bandwidth, duration and instantaneous time of covert channels, so as to give a comprehensive evaluation of the threat of covert channels in a multilevel security system. 展开更多
关键词 Multilevel security covert channel covert channel auditing
下载PDF
上一页 1 2 60 下一页 到第
使用帮助 返回顶部