Results 1 to 10 of about 154,396 (109)

A Formulation of the Potential for Communication Condition using C2KA [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2014
An integral part of safeguarding systems of communicating agents from covert channel communication is having the ability to identify when a covert channel may exist in a given system and which agents are more prone to covert channels than others. In this
Jason Jaskolka, Ridha Khedri
doaj   +4 more sources

Optimization of Covert Communication in Multi-Sensor Asymmetric Noise Systems [PDF]

open access: yesSensors
This work investigates wireless covert communication in a multi-sensor asymmetric noise scenario. We adopt KL (Kullback–Leibler) divergence as the covertness constraint metric and mutual information as the transmission rate metric.
Sen Qiao   +4 more
doaj   +2 more sources

STAR-RIS enabled covert integration of sensing communication and over-the-air computing with analysis and optimization [PDF]

open access: yesScientific Reports
This paper addresses the challenges of security and reliability in simultaneously transmitting and reflecting reconfigurable intelligence surface (STAR-RIS) assisted integrated sensing, communication, and computation over-the-air (ISCCO) system.
Miao Zhang   +3 more
doaj   +2 more sources

Covert underwater communication through cepstrum modulation mimicking Pseudorca crassidens whistles using machine learning [PDF]

open access: yesScientific Reports
The increasing demand for clandestine communication in underwater acoustic environment reflects the remarkable growth of research in underwater acoustic communication and networking.
Muhammad Bilal   +7 more
doaj   +2 more sources

Blockchain covert communication scheme based on the cover of normal transactions

open access: yes网络与信息安全学报, 2022
With the development of computer technology, the situation of modern network attack and defense is becoming increasingly severe, and the problem of secure transmission of secret information needs to be solved urgently.Covert communication technology ...
Pengkun JIANG   +4 more
doaj   +3 more sources

Wireless Covert Communication with Polarization Dirty Constellation

open access: yesApplied Sciences, 2023
Wireless covert communication is an emerging communication technique that prevents eavesdroppers. This paper presents a novel approach to wireless covert communication based on polar codes with dirty constellation polarization.
Mingyu Hu, Sen Qiao, Xiaopeng Ji
doaj   +1 more source

A Multi-Dimensional Covert Transaction Recognition Scheme for Blockchain

open access: yesMathematics, 2023
Covert communication was widely studied in recent years in terms of keeping the communication of entities on the Internet secret from the point of view of information security. Due to the anonymity of accounts and the publicness of the ledger, blockchain
Zijian Zhang   +4 more
doaj   +1 more source

Multi‐antenna joint covert communication with a public communication link over wireless fading channel

open access: yesIET Communications, 2021
This paper studies multi‐antenna covert communication exploiting a public communication link over the wireless fading channel. In particular, a relatively practical covert communication scenario is considered for the first time, where a warden with ...
Yuda Lin   +3 more
doaj   +1 more source

Covert Performance for Integrated Satellite Multiple Terrestrial Relay Networks with Partial Relay Selection

open access: yesSensors, 2022
Integrated satellite multiple terrestrial relay network (ISMTRN) is a new network architecture that combines satellite communication with terrestrial communication.
Zeke Wu   +4 more
doaj   +1 more source

Covert Channel Communication as an Emerging Security Threat in 2.5D/3D Integrated Systems

open access: yesSensors, 2023
In this paper, first, a broad overview of existing covert channel communication-based security attacks is provided. Such covert channels establish a communication link between two entities that are not authorized to share data. The secret data is encoded
Ivan Miketic   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy