solidot新版网站常见问题,请点击这里查看。
消息
本文已被查看3703次
Fundamental Limits of Covert Bit Insertion in Packets. (arXiv:1810.03510v1 [cs.NI])
来源于:arXiv
Covert communication is necessary when revealing the mere existence of a
message leaks sensitive information to an attacker. Consider a network link
where an authorized transmitter Jack sends packets to an authorized receiver
Steve, and the packets visit Alice, Willie, and Bob, respectively, before they
reach Steve. Covert transmitter Alice wishes to alter the packet stream in some
way to send information to covert receiver Bob without watchful and capable
adversary Willie being able to detect the presence of the message. In our
previous works, we addressed two techniques for such covert transmission from
Alice to Bob: packet insertion and packet timing. In this paper, we consider
covert communication via bit insertion in packets with available space (e.g.,
with size less than the maximum transmission unit). We consider three
scenarios: 1) packet sizes are independent and identically distributed (i.i.d.)
with a probability mass function (pmf) whose support is a set of one bit spaced
va 查看全文>>