2022
DOI: 10.1002/int.23063
|View full text |Cite
|
Sign up to set email alerts
|

Towards robust and stealthy communication for wireless intelligent terminals

Abstract: Fifth‐generation (5G) wireless systems provide an opportunity for improving the existing Voice over Internet Protocol communication service's user experience. To mitigate the security risk of 5G data leakage, building covert channel is an alternative approach of providing confidential data transmission. Due to the high transmission rate of 5G, the interpacket intervals become small and derandomized, this caused the encoding phase of the covert timing channel imports relatively large modulation errors. rearrang… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 52 publications
0
2
0
Order By: Relevance
“…The second is data communication mechanisms to realize the adaptive transmission of a multi-mode communication network and ensure communication reliability with the data platform [112,113]. The third is system integration technology to realize the positioning and communication between intelligent terminals and UAVs [114].…”
Section: Intelligent Sensor Monitoring Terminals (Ismt)mentioning
confidence: 99%
“…The second is data communication mechanisms to realize the adaptive transmission of a multi-mode communication network and ensure communication reliability with the data platform [112,113]. The third is system integration technology to realize the positioning and communication between intelligent terminals and UAVs [114].…”
Section: Intelligent Sensor Monitoring Terminals (Ismt)mentioning
confidence: 99%
“…Tere are some common types of attacks including Denial-of-Service (DoS) attacks [6][7][8][9], false data injection (FDI) attacks [10][11][12] and so on, which could result in unacceptable consequences by hampering the critical infrastructure. Hence, security issues have become a crucial factor for wireless systems [13,14].…”
Section: Introductionmentioning
confidence: 99%