2017 Iranian Conference on Electrical Engineering (ICEE) 2017
DOI: 10.1109/iraniancee.2017.7985274
|View full text |Cite
|
Sign up to set email alerts
|

Binary middleman covert channel in ExOR protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…A binary middleman covert channel based on ExOR (extremely opportunistic routing) protocol is introduced in Akhtari et al The authors manipulate fragment size to convey one covert bit during fragment transmission. The channel ensures security and stealth.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A binary middleman covert channel based on ExOR (extremely opportunistic routing) protocol is introduced in Akhtari et al The authors manipulate fragment size to convey one covert bit during fragment transmission. The channel ensures security and stealth.…”
Section: Related Workmentioning
confidence: 99%
“…In order to have an accurate and precise comparison, the proposed covert storage channel is compared to the other covert channels that presented based on ad hoc routing protocols. The proposed covert channel, the ExOR‐based covert channel, and the AODV‐based covert channel presented in Li and Epliremides are simulated in the same ad hoc network condition mentioned in Table . The mentioned covert channels are all covert storage channels over routing protocols in ad hoc networks.…”
Section: Performance Evaluationmentioning
confidence: 99%