2019
DOI: 10.1016/j.jnca.2018.11.001
|View full text |Cite
|
Sign up to set email alerts
|

A packet-reordering covert channel over VoLTE voice and video traffics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
17
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 40 publications
(17 citation statements)
references
References 26 publications
0
17
0
Order By: Relevance
“…Such a CTC simulates the phenomenon of naturally occurring packet reordering over networks, which has higher channel capacity than those of CTCs based on the fixed time windows and the IPDs. Zhang et al [13] proposed a method for establishing a VoLTE CTC through packet re-orderings. To further improve the robustness of such a CTC, Gray code is employed to encode the covert message for the purpose of alleviating the packet loss and packet out-of-order.…”
Section: Related Workmentioning
confidence: 99%
“…Such a CTC simulates the phenomenon of naturally occurring packet reordering over networks, which has higher channel capacity than those of CTCs based on the fixed time windows and the IPDs. Zhang et al [13] proposed a method for establishing a VoLTE CTC through packet re-orderings. To further improve the robustness of such a CTC, Gray code is employed to encode the covert message for the purpose of alleviating the packet loss and packet out-of-order.…”
Section: Related Workmentioning
confidence: 99%
“…great value for promoting the development of smart grid. And big data technologies can be used to analyze power related data obtained from SDN-based smart grid and use analysis results to analyze user electricity behavior and improve equipment management in power systems [7], [8].…”
Section: Introductionmentioning
confidence: 99%
“…The covert timing channel means that the influence of the sender on system events (performance, behavior, etc. [11]- [17]) can be observed by the receiver, and the two parties use the sequence of events, interval, frequency and other time factors to transmit covert message. Covert channels have both legitimate and malicious applications.…”
Section: Introductionmentioning
confidence: 99%