2022
DOI: 10.1016/j.comcom.2021.10.040
|View full text |Cite
|
Sign up to set email alerts
|

ZM-CTC: Covert timing channel construction method based on zigzag matrix

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
7
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 34 publications
0
7
0
Order By: Relevance
“…It can be categorized into two types. One is a type to exploit the upper layer, including MAC layer protocol, such as in mobile network [11], [12], [13], [14], [15], [16], in IEEE 802.11 WLAN [17], [18], [19], [20], [21], [22], in IoT covert channel [24], [25], [26], [27], [28]. And, the other type is based on the physical layer which is commonly used in radio frequency (RF) signal characteristics.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…It can be categorized into two types. One is a type to exploit the upper layer, including MAC layer protocol, such as in mobile network [11], [12], [13], [14], [15], [16], in IEEE 802.11 WLAN [17], [18], [19], [20], [21], [22], in IoT covert channel [24], [25], [26], [27], [28]. And, the other type is based on the physical layer which is commonly used in radio frequency (RF) signal characteristics.…”
Section: Related Workmentioning
confidence: 99%
“…The most of all the mobile environment CTCs are based on Voice over Long-Term Evolution (VoLTE) packets. Zheng et al [11], Liang et al [12], Li et al [13], and Zhang et al [14], [15], [16] proposed various CTC algorithms called ZM-CTC, MSC-CTC, RPDCRC, VRCTC, NoP-GCTC, and SPCC. To communicate covertly in LTE, they used packet drop, silence period, interleaving ordering, and rearrangement for the VoLTE packets.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Accordingly, the adversary neutralizes the CSC through data rewriting and format normalization. The packet rate is high for real‐time communication applications, and the covert channel based on stored content also performs well 35,36 . The CSC works well in video and multimedia applications when combined with stealthy and other data embedding technologies 37,38 .…”
Section: Related Workmentioning
confidence: 99%
“…The packet rate is high for real-time communication applications, and the covert channel based on stored content also performs well. 35,36 The CSC works well in video and multimedia applications when combined with stealthy and other data embedding technologies. 37,38 The CTC, unlike the CSC, is based on fine-tuning traffic transmission patterns without modifying the precise content.…”
Section: Related Workmentioning
confidence: 99%