Enforceable Network Protocols

2004 ◽  
Author(s):  
Tom E. Anderson ◽  
David J. Wetherall
Keyword(s):  
Author(s):  
Leonel Moyou Metcheka ◽  
René Ndoundam

AbstractClassical or traditional steganography aims at hiding a secret in cover media such as text, image, audio, video or even in network protocols. Recent research has improved this approach called distributed steganography by fragmenting the secret message and embedding each secret piece into a distinct cover media. The major interest of this approach is to make the secret message detection extremely difficult. However, these file modifications leave fingerprints which can reveal a secret channel to an attacker. Our contribution is a new steganography paradigm transparent to any attacker and resistant to the detection and the secret extraction. Two properties contribute to achieve these goals: the files do not undergo any modification while the distribution of the secret in the multi-cloud storage environment allows us to hide the existence of the covert channel between the communicating parties. Information’s are usually hidden inside the cover media. In this work, the covert media is a pointer to information. Therefore the file carries the information without being modified and the only way to access it is to have the key. Experiments show interesting comparison results with remarkable security contributions. The work can be seen as a new open direction for further research in the field.


1993 ◽  
Vol 23 (4) ◽  
pp. 64-73 ◽  
Author(s):  
Chandramohan A. Thekkath ◽  
Thu D. Nguyen ◽  
Evelyn Moy ◽  
Edward D. Lazowska
Keyword(s):  

2007 ◽  
Author(s):  
Hengtai Ma ◽  
Zhiguo Hong ◽  
Dengke Zhu ◽  
Gang Zheng

1993 ◽  
Vol 1 (5) ◽  
pp. 554-565 ◽  
Author(s):  
C.A. Thekkath ◽  
T.D. Nguyen ◽  
E. Moy ◽  
E.D. Lazowska
Keyword(s):  

2017 ◽  
Vol 11 (11) ◽  
pp. 1815-1821 ◽  
Author(s):  
Yao Zhang ◽  
Zhiming Zheng ◽  
Xiao Zhang

2021 ◽  
Vol 1 (2) ◽  
pp. 239-251
Author(s):  
Ky Tran ◽  
Sid Keene ◽  
Erik Fretheim ◽  
Michail Tsikerdekis

Marine network protocols are domain-specific network protocols that aim to incorporate particular features within the specialized marine context that devices are implemented in. Devices implemented in such vessels involve critical equipment; however, limited research exists for marine network protocol security. In this paper, we provide an analysis of several marine network protocols used in today’s vessels and provide a classification of attack risks. Several protocols involve known security limitations, such as Automated Identification System (AIS) and National Marine Electronic Association (NMEA) 0183, while newer protocols, such as OneNet provide more security hardiness. We further identify several challenges and opportunities for future implementations of such protocols.


Sign in / Sign up

Export Citation Format

Share Document