Computer Science ›› 2024, Vol. 51 ›› Issue (8): 364-370.doi: 10.11896/jsjkx.230500037
• Computer Network • Previous Articles Next Articles
ZHAO Hui, PENG Jianyou, QIN Yulin, HAN Lili
CLC Number:
[1]TASLIMASA H,DADKHAH S,NETO E C P,et al.Security issues in Internet of Vehicles(IoV):A comprehensive survey [J].Internet of Things,2023,22:100809. [2]MAKHDOOM I,ABOLHASAN M,LIPMAN J.A comprehensive survey of covert communication techniques,limitations and future challenges [J].Computers & Security,2022,120:102784. [3]AL-KHULAIDI N A,ZAHARY A T,HAZAA M A S,et al.Covert Channel Detection and Generation Techniques:A Survey[C]//2023 3rd International Conference on Emerging Smart Technologies and Applications(eSmarTA).IEEE,2023:1-9. [4]ELSADIG M A,GAFAR A.Covert channel detection:machine learning approaches [J].IEEE Access,2022,10:38391-38405. [5]LU J,DING Y,LI Z,et al.A timestamp-based covert data transmission method in Industrial Control System[C]//2022 7th IEEE International Conference on Data Science in Cyberspace(DSC).IEEE,2022:526-532. [6]WANG J,ZHANG L,LI Z,et al.CC-Guard:An IPv6 CovertChannel Detection Method Based on Field Matching[C]//2022 IEEE 24th Int Conf on High Performance Computing & Communications;8th Int Conf on Data Science & Systems;20th Int Conf on Smart City;8th Int Conf on Dependability in Sensor,Cloud & Big Data Systems & Application(HPCC/DSS/SmartCity/DependSys).IEEE,2022:1416-1421. [7]DUA A,JINDAL V,BEDI P.Detecting and Locating Storage-Based Covert Channels in Internet Protocol Version 6 [J].IEEE Access,2022,10:110661-110675. [8]SEMUSHIN S,SEYTNAZAROV S.HTTP Header Reordering-based Covert Channel Protocol[C]//2023 6th Interna-tional Conference on Signal Processing and Information Security(ICSPIS).IEEE,2023:145-150. [9]SZARY P,MAZURCZYK W,WENDZEL S,et al.Analysis of reversible network covert channels [J].IEEE Access,2022,10:41226-41238. [10]ABBAS M K,SANDIKKAYA M T.An efficient VoLTE covert timing channel for 5 G networks:RDCTC [J].Optik,2022,270:170076. [11]HARRIS K,HENRY W,DILL R.A network-based IoT covert channel[C]//2022 4th International Conference on Computer Communication and the Internet(ICCCI).IEEE,2022:91-99. [12]XU J,WANG X,JIANG Y,et al.Secured Data TransmissionOver Insecure Networks-on-Chip by Modulating Inter-Packet Delays [J].IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems,2022,41(11):4313-4324. [13]YING X,BERNIERI G,CONTI M,et al.Covert channel-based transmitter authentication in controller area networks [J].IEEE Transactions on Dependable and Secure Computing,2021,19(4):2665-2679. [14]ZHANG H,ZOU Y,YU D,et al.Covert communications with friendly jamming in Internet of vehicles [J].Vehicular Communications,2022,35:100472. [15]TAHERI S,MAHDAVI M,MOGHIM N.A dynamic timing-storage covert channel in vehicular ad hoc networks [J].Telecommunication Systems,2018,69:415-429. [16]SHARMA N,AGARWAL R.HTTP,WebSocket,and SignalR:A Comparison of Real-Time Online Communication Protocols[C]//International Conference on Mining Intelligence and Knowledge Exploration.Cham:Springer Nature Switzerland,2023:128-135. [17]FU Y,GARCÍA-VALLS M.Security aspects of full-duplex web interactions and WebSockets[C]//2023 20th ACS/IEEE International Conference on Computer Systems and Applications(AICCSA).IEEE,2023:1-8. [18]BAYıLMıŞ C,EBLEME M A,ÇAVUŞOĞLU Ü,et al.A survey on communication protocols and performance evaluations for Internet of Things [J].Digital Communications and Networks,2022,8(6):1094-1104. [19]KAVAS-TORRIS O,GELBAL S Y,CANTAS M R,et al.V2X communication between connected and automated vehicles(CAVs) and unmanned aerial vehicles(UAVs) [J].Sensors,2022,22(22):8941. [20]LIU Y,GHOSAL D,ARMKNECHT F,et al.Robust and undetectable steganographic timing channels for iid traffic[C]//Information Hiding:12th International Conference,IH 2010,Calgary,AB,Canada,June 28-30,2010,Revised Selected Papers 12.Berlin:Springer,2010:193-207. [21]DENG Y X,TANG Z G,ZHANG J,et al.Research on covert channels based on block coding of MQTT protocol commands [J].Computer Engineering,2019,45(11):138-143. [22]GUO R,DU Y H,LU T L,et al.Covert channel based on CoAP protocol parameter sequence [J].Computer Applications and Software,2021,38(8):138-143. [23]CHEN C,LUO S L,WU Q,et al.Research on Covert channel Construction Method Based on HTTP Protocol Combination [J].Netinfo Security,2020,20(6):57-64. |
[1] | LI Fengyun, CHEN Mingming, WANG Lin, LI Peng , JU Xianyin. Study on Trust Management Mechanism of Internet of Vehicles Based on Blockchain [J]. Computer Science, 2024, 51(4): 381-387. |
[2] | GAO Yang, JIANG Yini, LIN Hongwei. Local Progressive and Iterative Approximation for Least Squares B-spline Curve and Surface Fitting [J]. Computer Science, 2024, 51(1): 225-232. |
[3] | LIN Xinyu, YAO Zewei, HU Shengxi, CHEN Zheyi, CHEN Xing. Task Offloading Algorithm Based on Federated Deep Reinforcement Learning for Internet of Vehicles [J]. Computer Science, 2023, 50(9): 347-356. |
[4] | GUO Nan, SONG Xiaobo, ZHUANG Luyuan, ZHAO Cong. Anonymous Batch Authentication Scheme in Internet of Vehicles for WAVE Security Services [J]. Computer Science, 2023, 50(4): 308-316. |
[5] | CHEN Jing, WU Ling-ling. Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment [J]. Computer Science, 2022, 49(8): 108-112. |
[6] | SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353. |
[7] | TANG Liang, LI Fei. Research on Forecasting Model of Internet of Vehicles Security Situation Based on Decision Tree [J]. Computer Science, 2021, 48(6A): 514-517. |
[8] | YU Jian-ye, QI Yong, WANG Bao-zhuo. Distributed Combination Deep Learning Intrusion Detection Method for Internet of Vehicles Based on Spark [J]. Computer Science, 2021, 48(6A): 518-523. |
[9] | YU Tian-qi, HU Jian-ling, JIN Jiong, YANG Jian-feng. Mobile Edge Computing Based In-vehicle CAN Network Intrusion Detection Method [J]. Computer Science, 2021, 48(1): 34-39. |
[10] | TANG Jia-lin, ZHANG Chong, GUO Yan-feng, SU Bing-hua and SU Qing-lang. Color Difference Correction Algorithm Based on Multi Colors Space Information [J]. Computer Science, 2020, 47(6A): 157-160. |
[11] | WANG Chun-dong, LUO Wan-wei, MO Xiu-liang, YANG Wen-jun. Survey on Mutual Trust Authentication and Secure Communication of Internet of Vehicles [J]. Computer Science, 2020, 47(11): 1-9. |
[12] | LIU Dan. Fog Computing and Self-assessment Based Clustering and Cooperative Perception for VANET [J]. Computer Science, 2020, 47(10): 55-62. |
[13] | XUE Ling-ling, FAN Xiu-mei. Cognitive Spectrum Allocation Mechanism in Internet of Vehicles Based on Clustering Structure [J]. Computer Science, 2019, 46(9): 143-149. |
[14] | WANG Ding-cheng, LU Yi-yi, ZOU Yong-jie. Multi-output Intuitionistic Fuzzy Least Squares Support Vector Regression Algorithm [J]. Computer Science, 2019, 46(5): 163-168. |
[15] | CHENG Xian-yi, SHI Quan, ZHU Jian-xin, CHEN Feng-mei, DAI Ran-ran. VID Model of Vehicles-infrastructure-driver Collaborative Control in Big Data Environment [J]. Computer Science, 2019, 46(11A): 185-188. |
|