Lejun Zhang1, Tianwen Huang1, Xiaoyan Hu1, Zhijie Zhang1, Weizheng Wang2, Donghai Guan3, *, Chunhui Zhao1, 4, Seokhoon Kim5
CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 2013-2030, 2020, DOI:10.32604/cmc.2020.011219
- 30 June 2020
Abstract Covert channel of the packet ordering is a hot research topic. Encryption
technology is not enough to protect the security of both sides of communication. Covert
channel needs to hide the transmission data and protect content of communication. The
traditional methods are usually to use proxy technology such as tor anonymous tracking
technology to achieve hiding from the communicator. However, because the
establishment of proxy communication needs to consume traffic, the communication
capacity will be reduced, and in recent years, the tor technology often has vulnerabilities
that led to the leakage of secret information. In… More >