期刊文献+
共找到52篇文章
< 1 2 3 >
每页显示 20 50 100
Cooperative Covert Communication in Multi-Antenna Broadcast Channels
1
作者 Qiao Sen Liu Guangjie +1 位作者 Ji Xiaopeng Liu Weiwei 《China Communications》 SCIE CSCD 2024年第6期246-260,共15页
With the gradual popularization of 5G communications,the application of multi-antenna broadcasting technology has become widespread.Therefore,this study aims to investigate the wireless covert communication in the two... With the gradual popularization of 5G communications,the application of multi-antenna broadcasting technology has become widespread.Therefore,this study aims to investigate the wireless covert communication in the two-user cooperative multi-antenna broadcast channel.We focus on the issue that the deteriorated reliability and undetectability are mainly affected by the transmission power.To tackle this issue,we design a scheme based on beamforming to increase the reliability and undetectability of wireless covert communication in the multi-antenna broadcast channel.We first modeled and analyzed the cooperative multi-antenna broadcasting system,and put forward the target question.Then we use the SCA(successive convex approximation)algorithm to transform the target problem into a series of convex subproblems.Then the convex problems are solved and the covert channel capacity is calculated.In order to verify the effectiveness of the scheme,we conducted simulation verification.The simulation results show that the proposed beamforming scheme can effectively improve the reliability and undetectability of covert communication in multi-antenna broadcast channels. 展开更多
关键词 BEAMFORMING covert communication multi-antenna broadcast channels OFDM
下载PDF
Age of Information for Short-Packet Covert Communication with Time Modulated Retrodirective Array
2
作者 Ma Yue Ma Ruiqian +4 位作者 Lin Zhi Yang Weiwei Cai Yueming Miao Chen Wu Wen 《China Communications》 SCIE CSCD 2024年第4期23-37,共15页
In this paper,the covert age of information(CAoI),which characterizes the timeliness and covertness performance of communication,is first investigated in the short-packet covert communication with time modulated retro... In this paper,the covert age of information(CAoI),which characterizes the timeliness and covertness performance of communication,is first investigated in the short-packet covert communication with time modulated retrodirective array(TMRDA).Specifically,the TMRDA is designed to maximize the antenna gain in the target direction while the side lobe is sufficiently suppressed.On this basis,the covertness constraint and CAoI are derived in closed form.To facilitate the covert transmission design,the transmit power and block-length are jointly optimized to minimize the CAoI,which demonstrates the trade-off between covertness and timelessness.Our results illustrate that there exists an optimal block-length that yields the minimum CAoI,and the presented optimization results can achieve enhanced performance compared with the fixed block-length case.Additionally,we observe that smaller beam pointing error at Bob leads to improvements in CAoI. 展开更多
关键词 age of information covert communication retrodirective array time modulation
下载PDF
Space/Air Covert Communications:Potentials,Scenarios,and Key Technologies
3
作者 Mao Haobin Liu Yanming +5 位作者 Zhu Lipeng Mao Tianqi Xiao Zhenyu Zhang Rui Han Zhu Xia Xianggen 《China Communications》 SCIE CSCD 2024年第3期1-18,共18页
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel... Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation. 展开更多
关键词 artificial intelligence(AI) sixth generation(6G) space-air-ground integrated networks(SAGINs) space/air covert communications
下载PDF
Simulated patient methodology as a“gold standard”in community pharmacy practice:Response to criticism
4
作者 Christian Kunow Bernhard Langer 《World Journal of Methodology》 2024年第2期172-174,共3页
The simulated patient methodology(SPM)is considered the“gold standard”as covert participatory observation.SPM is attracting increasing interest for the investigation of community pharmacy practice;however,there is c... The simulated patient methodology(SPM)is considered the“gold standard”as covert participatory observation.SPM is attracting increasing interest for the investigation of community pharmacy practice;however,there is criticism that SPM can only show a small picture of everyday pharmacy practice and therefore has limited external validity.On the one hand,a certain design and application of the SPM goes hand in hand with an increase in external validity.Even if,on the other hand,this occurs at the expense of internal validity due to the trade-off situation,the justified criticism of the SPM for investigating community pharmacy practice can be countered. 展开更多
关键词 Simulated patient methodology Community pharmacy Gold standard Covert participatory observation Internal validity External validity
下载PDF
Covert Communication with a Spectrum Sharing Relay in the Finite Blocklength Regime 被引量:1
5
作者 Ruiqian Ma Weiwei Yang +2 位作者 Hui Shi Xingbo Lu Jue Liu 《China Communications》 SCIE CSCD 2023年第4期195-211,共17页
In this paper,we investigate the feasibility and performance of the covert communication with a spectrum sharing relay in the finite blocklength regime.Specifically,the relay opportunistically forwards the source'... In this paper,we investigate the feasibility and performance of the covert communication with a spectrum sharing relay in the finite blocklength regime.Specifically,the relay opportunistically forwards the source's messages to the primary receiver or conveys the covert messages to its own receiver via the sharing spectrum,while the warden attempts to detect the transmission.First,we derive a lower bound on the covertness constraint,and the analytical expressions of both the primary average effective covert throughput(AECT)and sum AECT are presented by considering the overall decoding error performance.Then,we formulate two optimization problems to maximize the primary and sum AECT respectively by optimizing the blocklength and the transmit power at the source and the relay.Our examinations show that there exists an optimal blocklength to maximize the primary and sum AECT.Besides,it is revealed that,to maximize the primary AECT,the optimal transmit power of each hop increases as its channel quality deteriorates.Furthermore,in the optimization for maximizing the sum AECT,the optimal transmit power at the source equals to zero when the channel quality from relay to the secondary receiver is not weaker than that from relay to the primary receiver. 展开更多
关键词 covert communication finite blocklength RELAY spectrum sharing
下载PDF
Covert Communication in Integrated High Altitude Platform Station Terrestrial Networks
6
作者 Zeke Wu Kefeng Guo +1 位作者 Rui Liu Shibin Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第4期583-598,共16页
In recent years,Internet of Things(IoT)technology has emerged and gradually sprung up.As the needs of largescale IoT applications cannot be satisfied by the fifth generation(5G)network,wireless communication network n... In recent years,Internet of Things(IoT)technology has emerged and gradually sprung up.As the needs of largescale IoT applications cannot be satisfied by the fifth generation(5G)network,wireless communication network needs to be developed into the sixth generation(6G)network.However,with the increasingly prominent security problems of wireless communication networks such as 6G,covert communication has been recognized as one of the most promising solutions.Covert communication can realize the transmission of hidden information between both sides of communication to a certain extent,which makes the transmission content and transmission behavior challenging to be detected by noncooperative eavesdroppers.In addition,the integrated high altitude platform station(HAPS)terrestrial network is considered a promising development direction because of its flexibility and scalability.Based on the above facts,this article investigates the covert communication in an integrated HAPS terrestrial network,where a constant power auxiliary node is utilized to send artificial noise(AN)to realize the covert communication.Specifically,the covert constraint relationship between the transmitting and auxiliary nodes is derived.Moreover,the closed-form expressions of outage probability(OP)and effective covert communication rate are obtained.Finally,numerical results are provided to verify our analysis and reveal the impacts of critical parameters on the system performance. 展开更多
关键词 Covert communication the integrated HAPS terrestrial network constant power auxiliary node artificial noise(AN) effective covert communication rate
下载PDF
Multi-Antenna Jammer Assisted Covert Communications in Data Collected IoT with NOMA
7
作者 Liwei Tao Weiwei Yang +3 位作者 Xingbo Lu Ruiqian Ma Ling Yang Yi Song 《China Communications》 SCIE CSCD 2023年第5期217-231,共15页
In this paper,we investigate covert communications in data collected IoT with NOMA,where the paired sensor nodes S_(m) and S_(n) transmit covert messages to a legitimate receiver(Bob)in the presence of a Warden(Willie... In this paper,we investigate covert communications in data collected IoT with NOMA,where the paired sensor nodes S_(m) and S_(n) transmit covert messages to a legitimate receiver(Bob)in the presence of a Warden(Willie).To confuse the detection at Willie,an extra multi-antenna friendly jammer(Jammer)has been employed to transmit artificial noise(AN)with random power.Based on the CSI of Willie is available or not at Jammer,three AN transmission schemes,including null-space artificial noise(NAN),transmit antenna selection(TAS),and zeroforcing beamforming(ZFB),are proposed.Furthermore,the closed-form expressions of expected minimum detection error probability(EMDEP)and joint connection outage probability(JCOP)are derived to measure covertness and reliability,respectively.Finally,the maximum effective covert rate(ECR)is obtained with a given covertness constraint.The numerical results show that ZFB scheme has the best maximum ECR in the case of the number of antennas satisfies N>2,and the same maximum ECR can be achieved in ZFB and NAN schemes with N=2.Moreover,TAS scheme also can improve the maximum ECR compared with the benchmark scheme(i.e.,signal-antenna jammer).In addition,a proper NOMA node pairing can further improve the maximum ECR. 展开更多
关键词 IOT covert communications NOMA node pairing multi-antenna jammer
下载PDF
A Derivative Matrix-Based Covert Communication Method in Blockchain
8
作者 Xiang Zhang Xiaona Zhang +3 位作者 Xiaorui Zhang Wei Sun Ruohan Meng Xingming Sun 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期225-239,共15页
The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert communication.However,the existing methods of covert communication in bloc... The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert communication.However,the existing methods of covert communication in blockchain suffer from the predefined channel structure,the capacity of a single transaction is not high,and the fixed transaction behaviors will lower the concealment of the communication channel.Therefore,this paper proposes a derivation matrix-based covert communication method in blockchain.It uses dual-key to derive two types of blockchain addresses and then constructs an address matrix by dividing addresses into multiple layers to make full use of the redundancy of addresses.Subsequently,to solve the problem of the lack of concealment caused by the fixed transaction behaviors,divide the rectangular matrix into square blocks with overlapping regions and then encrypt different blocks sequentially to make the transaction behaviors of the channel addresses match better with those of the real addresses.Further,the linear congruence algorithm is used to generate random sequence,which provides a random order for blocks encryption,and thus enhances the security of the encryption algorithm.Experimental results show that this method can effectively reduce the abnormal transaction behaviors of addresses while ensuring the channel transmission efficiency. 展开更多
关键词 Covert communication blockchain CONCEALMENT SECURITY capacity DERIVATION
下载PDF
Deep Reinforcement Learning for IRS-Assisted UAV Covert Communications
9
作者 Songjiao Bi Langtao Hu +3 位作者 Quanjin Liu Jianlan Wu Rui Yang Lei Wu 《China Communications》 SCIE CSCD 2023年第12期131-141,共11页
Covert communications can hide the existence of a transmission from the transmitter to receiver.This paper considers an intelligent reflecting surface(IRS)assisted unmanned aerial vehicle(UAV)covert communication syst... Covert communications can hide the existence of a transmission from the transmitter to receiver.This paper considers an intelligent reflecting surface(IRS)assisted unmanned aerial vehicle(UAV)covert communication system.It was inspired by the high-dimensional data processing and decisionmaking capabilities of the deep reinforcement learning(DRL)algorithm.In order to improve the covert communication performance,an UAV 3D trajectory and IRS phase optimization algorithm based on double deep Q network(TAP-DDQN)is proposed.The simulations show that TAP-DDQN can significantly improve the covert performance of the IRS-assisted UAV covert communication system,compared with benchmark solutions. 展开更多
关键词 covert communication deep reinforcement learning intelligent reflective surface UAV
下载PDF
Intelligent Covert Communication Design for Cooperative Cognitive Radio Network
10
作者 Zan Li Jia Shi +3 位作者 Chao Wang Danyang Wang Xiaomeng Li Xiaomin Liao 《China Communications》 SCIE CSCD 2023年第7期122-136,共15页
Extensive research attentions have been devoted to studying cooperative cognitive radio networks(CCRNs),where secondary users(SU)providing cooperative transmissions can be permitted by primary users(PU)to use spectrum... Extensive research attentions have been devoted to studying cooperative cognitive radio networks(CCRNs),where secondary users(SU)providing cooperative transmissions can be permitted by primary users(PU)to use spectrum.In order to maximize SU’s utility,SU may transmit its own information during the period of cooperative transmission,which stimulates the use of covert transmission against PU’s monitoring.For this sake,this article reviews the motivations of studying covert communications in CCRN.In particular,three intelligent covert transmission approaches are developed for maximizing SU’s utility in CCRNs,namely,intelligent parasitic covert transmission(IPCT),intelligent jammer aided covert transmission(IJCT)and intelligent reflecting surface assisted covert transmission(IRSC).Further,some raw performance evaluations are discussed,and a range of potential research directions are also provided. 展开更多
关键词 cognitive radio networks covert transmis-sion machine learning
下载PDF
An Empirical Study on the Differences between Overt Translation and Covert Translation in Legal
11
作者 Chunxu Qian 《Journal of Educational Theory and Management》 2023年第1期12-16,共5页
Currently,it is key to convey precise meanings to readers for translators.Observing expressing habits between different languages is the precondition to make target texts more readable.It is crucial to ensure the exac... Currently,it is key to convey precise meanings to readers for translators.Observing expressing habits between different languages is the precondition to make target texts more readable.It is crucial to ensure the exactness and seriousness of legal texts,but it does not mean that translators have to take machined way to leave out and even give up transmitting in-deep cultural implications for the intention of achieving the all-inclusive integrity of target content.It is a correct choice for translators to take overt translation and covert translation in line with traits of source language and target language and differences between civil law system and common law system.The intention of the article is to make an empirical study between overt translation and covert translation. 展开更多
关键词 Legal text Overt translation Covert translation READABILITY Empirical study
下载PDF
SPLIT-ADC BASED DIGITAL BACKGROUND CALIBRATION FOR TIME-INTERLEAVED ADC 被引量:3
12
作者 Zhang Rui Yin Yongsheng Gao Minglun 《Journal of Electronics(China)》 2012年第3期302-309,共8页
A novel Time-Interleaved Analog-to-Digital Converter (TIADC) digital background calibration for the mismatches of offsets, gain errors, and timing skews based on split-ADC is proposed. Firstly, the split-ADC channels ... A novel Time-Interleaved Analog-to-Digital Converter (TIADC) digital background calibration for the mismatches of offsets, gain errors, and timing skews based on split-ADC is proposed. Firstly, the split-ADC channels in present TIADC architecture are designed to convert input signal at two different channel sampling rates so that redundant channel to facilitate pair permutation is avoided. Secondly, a high-order compensation scheme for correction of timing skew error is employed for effective calibration to preserve high-resolution when input frequency is high. Numerical simulation performed by MATLAB for a 14-bit TIADC based on 7 split-ADC channels shows that Signal-to-Noise and Distortion Ratio (SNDR) and Spurious Free Dynamic Range (SFDR) of the TIADC achieve 86.2 dBc and 106 dBc respectively after calibration with normalized input frequency near Nyquist frequency. 展开更多
关键词 Time-Interleaved Analog-to-Digital coverter (TIADC) Split architecture Digital background calibration Adaptive calibration High-order timing skew compensation
下载PDF
母语表层显性迁移和深层隐性迁移
13
作者 周红红 徐蔚 《江苏社会科学》 CSSCI 北大核心 2010年第S1期183-187,共5页
一、研究设计(一)研究问题笔者在本研究中提出了母语迁移可分为"表层显性迁移"和"深层隐性迁移"的假说。所谓显性迁移。
关键词 second LANGUAGE WRITING NATIVE LANGUAGE TRANSFER overt TRANSFER in surface covert TRANSFER in depth
下载PDF
Quality of life in patients with minimal hepatic encephalopathy 被引量:14
14
作者 Lorenzo Ridola Silvia Nardelli +1 位作者 Stefania Gioia Oliviero Riggio 《World Journal of Gastroenterology》 SCIE CAS 2018年第48期5446-5453,共8页
Minimal hepatic encephalopathy(MHE) represents the mildest type of hepatic encephalopathy(HE). This condition alters the performance of psychometric tests by impairing attention, working memory, psychomotor speed, and... Minimal hepatic encephalopathy(MHE) represents the mildest type of hepatic encephalopathy(HE). This condition alters the performance of psychometric tests by impairing attention, working memory, psychomotor speed, and visuospatial ability, as well as electrophysiological and other functional brain measures. MHE is a frequent complication of liver disease, affecting up to 80% of tested patients, depending of the diagnostic tools used for the diagnosis. MHE is related to falls, to an impairment in fitness to drive and the development of overt HE, MHE severely affects the lives of patients and caregivers by altering their quality of life(QoL) and their socioeconomic status. MHE is detected in clinically asymptomatic patients through appropriate psychometric tests and neurophysiological methods which highlight neuropsychological alterations such as video-spatial orientation deficits, attention disorders, memory, reaction times, electroencephalogram slowing, prolongation of latency evoked cognitive potentials and reduction in the critical flicker frequency. Several treatments have been proposed for MHE treatment such as non-absorbable disaccharides, poorly absorbable antibiotics such rifaximin, probiotics and branched chain amino acids. However, because of the multiple diagnosis methods, the various endpoints of treatment trials and the variety of agents used in trials, to date the treatment of MHE is not routinely recommended apart from on a case-by-case basis. Aim of this review is analyze the burden of MHE on QoL of patients and provide a brief summary of therapeutic approaches. 展开更多
关键词 CIRRHOSIS MINIMAL HEPATIC ENCEPHALOPATHY Covert HEPATIC ENCEPHALOPATHY HEALTH related quality of life
下载PDF
A Covert Communication Method Using Special Bitcoin Addresses Generated by Vanitygen 被引量:6
15
作者 Lejun Zhang Zhijie Zhang +4 位作者 Weizheng Wang Rasheed Waqas Chunhui Zhao Seokhoon Kim Huiling Chen 《Computers, Materials & Continua》 SCIE EI 2020年第10期597-616,共20页
As an extension of the traditional encryption technology,information hiding has been increasingly used in the fields of communication and network media,and the covert communication technology has gradually developed.T... As an extension of the traditional encryption technology,information hiding has been increasingly used in the fields of communication and network media,and the covert communication technology has gradually developed.The blockchain technology that has emerged in recent years has the characteristics of decentralization and tamper resistance,which can effectively alleviate the disadvantages and problems of traditional covert communication.However,its combination with covert communication thus far has been mostly at the theoretical level.The BLOCCE method,as an early result of the combination of blockchain and covert communication technology,has the problems of low information embedding efficiency,the use of too many Bitcoin addresses,low communication efficiency,and high costs.The present research improved on this method,designed the V-BLOCCE which uses base58 to encrypt the plaintext and reuses the addresses generated by Vanitygen multiple times to embed information.This greatly improves the efficiency of information embedding and decreases the number of Bitcoin addresses used.Under the premise of ensuring the order,the Bitcoin transaction OP_RETURN field is used to store the information required to restore the plaintext and the transactions are issued at the same time to improve the information transmission efficiency.Thus,a more efficient and feasible method for the application of covert communication on the blockchain is proposed.In addition,this paper also provides a more feasible scheme and theoretical support for covert communication in blockchain. 展开更多
关键词 Covert communication blockchain Bitcoin address
下载PDF
Undercover communication using image and text as disguise and countermeasures 被引量:3
16
作者 王朔中 陈超 张新鹏 《Journal of Shanghai University(English Edition)》 CAS 2006年第1期33-43,共11页
A brief survey of some representative techniques of steganography and steganalysis is presented. Various methods developed in the authors' laboratory are introduced, including symmetric LSB embedding, secure steganog... A brief survey of some representative techniques of steganography and steganalysis is presented. Various methods developed in the authors' laboratory are introduced, including symmetric LSB embedding, secure steganography in JPEG, palette, and uncompressed color images, histogram-based analysis and least histogram abnormality steganography, multiple-base notational system based embedding, stego-encoding integrated with error correction, etc. Some of the proposed approaches provide overall improvement, while others offer alternatives to existing techniques with advantage in certain aspects. Data hiding in text using the typesetting tool TeX is also introduced, with a brief description of a recently developed technique. Current research topics and the future plan are outlined. The discussion is focused mainly on steganography/steganalysis in still images. 展开更多
关键词 STEGANOGRAPHY STEGANALYSIS information hiding covert communication security.
下载PDF
Advances in cirrhosis: Optimizing the management of hepatic encephalopathy 被引量:3
17
作者 Andy Liu Ryan B Perumpail +3 位作者 Radhika Kumari Zobair M Younossi Robert J Wong Aijaz Ahmed 《World Journal of Hepatology》 CAS 2015年第29期2871-2879,共9页
Hepatic encephalopathy(HE) is a major complication of cirrhosis resulting in significant socioeconomic burden, morbidity, and mortality. HE can be further subdivided into covert HE(CHE) and overt HE(OHE). CHE is a sub... Hepatic encephalopathy(HE) is a major complication of cirrhosis resulting in significant socioeconomic burden, morbidity, and mortality. HE can be further subdivided into covert HE(CHE) and overt HE(OHE). CHE is a subclinical, less severe manifestation of HE and requires psychometric testing for diagnosis. Due to the time consuming screening process and lack of standardized diagnostic criteria, CHE is frequently underdiagnosed despite its recognized role as a precursor to OHE. Screening for CHE with the availability of the Stroop test has provided a pragmatic method to promptly diagnose CHE. Management of acute OHE involves institution of lactulose, the preferred first-line therapy. In addition, prompt recognition and treatment of precipitating factors is critical as it may result in complete resolution of acute episodes of OHE. Treatment goals include improvement of daily functioning, evaluation for liver transplantation, and prevention of OHE recurrence. For secondary prophylaxis, intolerance to indefinite lactulose therapy may lead to non-adherence and has been identified as a precipitating factor for recurrent OHE. Rifaximin is an effective add-on therapy to lactulose for treatment and prevention of recurrent OHE. Recent studies have demonstrated comparable efficacy of probiotic therapy to lactulose use in both primary prophylaxis and secondary prophylaxis. 展开更多
关键词 Overt HEPATIC ENCEPHALOPATHY LACTULOSE RIFAXIMIN HEPATIC ENCEPHALOPATHY Covert HEPATICENCEPHALOPATHY
下载PDF
Improving the Covertness in the Physical-Layer Authentication 被引量:2
18
作者 Ning Xie TianXing Hu 《China Communications》 SCIE CSCD 2021年第3期122-131,共10页
A well-designed Physical-Layer Authentication(PLA)scheme should consider three properties:covertness,robustness,and security.However,the three properties always cause some dilemmas,e.g.,higher covertness leading to lo... A well-designed Physical-Layer Authentication(PLA)scheme should consider three properties:covertness,robustness,and security.However,the three properties always cause some dilemmas,e.g.,higher covertness leading to lower robustness.This paper concerns the problem of improving the covertness without sacrificing the robustness.This problem is important because of the following reasons:reducing the errors in recovered source message,improving the security,and ease of constructing a multi-factor authentication system.In this paper,we propose three covert PLA schemes to address the problem.In the first scheme,we improve the covertness by reducing the modification ratio on the source message based on an encoding mechanism.In the second scheme,we improve the covertness by optimizing the superimposing angle,which maximizes the minimum distance between the tagged symbols and the boundary line of the demodulation decision for the source message.In the third scheme,referred to as the hybrid scheme,we further improve the covertness by jointly using the advantages of both the above two schemes.Our experimental results show that when the SNR at a legitimate receiver is 25 dB,as compared with the prior scheme,the first scheme improves the covertness by 17:74%,the second scheme improves the covertness by 28:79%,and the third scheme improves the covertness by 32:09%,while they have similar robustness as Received:Aug.07,2020 Revised:Sep.08,2020 Editor:Nanrun Zhou that of the prior scheme. 展开更多
关键词 physical-layer AUTHENTICATION ENCODING covertness superimposing angle SECURITY
下载PDF
An Efficient Secure Real-Time Concurrency Control Protocol 被引量:1
19
作者 XIAO Yingyuan LIU Yunsheng CHEN Xiangyang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1899-1902,共4页
Secure real-time databases must simultaneously satisfy two requirements in guaranteeing data security and minimizing the missing deadlines ratio of transactions. However, these two requirements can conflict with each ... Secure real-time databases must simultaneously satisfy two requirements in guaranteeing data security and minimizing the missing deadlines ratio of transactions. However, these two requirements can conflict with each other and achieve one requirement is to sacrifice the other. This paper presents a secure real-time concurrency control protocol based on optimistic method. The concurrency control protocol incorporates security constraints in a real-time optimistic concurrency control protocol and makes a suitable tradeoff between security and real-time requirements by introducing secure influence factor and real-time influence factor. The experimental results show the concurrency control protocol achieves data security without degrading real-time perform ance significantly. 展开更多
关键词 real-time databases concurrency control SECURITY covert channel
下载PDF
Real-Time Timing Channel Detection in a Software-Defined Networking Virtual Environment 被引量:2
20
作者 Anyi Liu Jim X. Chen Harry Wechsler 《Intelligent Information Management》 2015年第6期283-302,共20页
Despite extensive research, timing channels (TCs) are still known as a principal category of threats that aim to leak and transmit information by perturbing the timing or ordering of events. Existing TC detection appr... Despite extensive research, timing channels (TCs) are still known as a principal category of threats that aim to leak and transmit information by perturbing the timing or ordering of events. Existing TC detection approaches use either signature-based approaches to detect known TCs or anomaly-based approach by modeling the legitimate network traffic in order to detect unknown TCs. Un-fortunately, in a software-defined networking (SDN) environment, most existing TC detection approaches would fail due to factors such as volatile network traffic, imprecise timekeeping mechanisms, and dynamic network topology. Furthermore, stealthy TCs can be designed to mimic the legitimate traffic pattern and thus evade anomalous TC detection. In this paper, we overcome the above challenges by presenting a novel framework that harnesses the advantages of elastic re-sources in the cloud. In particular, our framework dynamically configures SDN to enable/disable differential analysis against outbound network flows of different virtual machines (VMs). Our framework is tightly coupled with a new metric that first decomposes the timing data of network flows into a number of using the discrete wavelet-based multi-resolution transform (DWMT). It then applies the Kullback-Leibler divergence (KLD) to measure the variance among flow pairs. The appealing feature of our approach is that, compared with the existing anomaly detection approaches, it can detect most existing and some new stealthy TCs without legitimate traffic for modeling, even with the presence of noise and imprecise timekeeping mechanism in an SDN virtual environment. We implement our framework as a prototype system, OBSERVER, which can be dynamically deployed in an SDN environment. Empirical evaluation shows that our approach can efficiently detect TCs with a higher detection rate, lower latency, and negligible performance overhead compared to existing approaches. 展开更多
关键词 Covert CHANNEL TIMING CHANNEL INTRUSION Detection VIRTUALIZATION Software-Defined Network
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部