Unlock instant, AI-driven research and patent intelligence for your innovation.

A data verification method based on packet sorting ip covert channel

A technology of data verification and covert channel, applied in the field of data verification based on IP covert channel of packet sorting, can solve the problems of not verifying the correctness of transmission data, affecting transmission performance, etc., so as to save computer performance, save transmission bandwidth, reduce The effect of computational complexity

Active Publication Date: 2020-10-30
YANGZHOU UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are two deficiencies in the above-mentioned method. One is that the secret communication method of reliable packet sorting mainly improves the data retrieval speed of the mapping table and port sorting, but does not verify the correctness of the transmitted data; the other is that the UDP packet content is modified, although The authenticity of UDP data packet transmission data has been improved, but the UDP data packet content needs to be modified. If a large amount of data is transmitted, the transmission performance will be affected.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data verification method based on packet sorting ip covert channel
  • A data verification method based on packet sorting ip covert channel
  • A data verification method based on packet sorting ip covert channel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0054] combine figure 1 , the present invention a kind of data checking method based on packet sorting IP covert channel, comprises the following contents:

[0055] (1) Define the number of sending ports as m=4, the number of receiving ports of the receiver as m'=1, and the sending ports establish UDP connections with the receiving ports in turn.

[0056] (2) According to the number of sending ports m=4, by:

[0057]

[0058] It can be obtained that the number n of bits that the sender can send data each time is n=3 or 4, and n=4 is taken in this embodiment;

[0059] Depend on

[0060]

[0061] The bit number t=1 corresponding to the time interval for sending data from each sending port can be obtained;

[0062] The type M of time interval values ​​obtained from t is:

[0063] M=2 t =2.

[0064] (3) Encode the 4 sending ports, and establish the corresponding relationship table table1 between the sequence of data sent by the 4 sending ports and the binary code as sh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data verification method based on packet sorting IP covert channel, which comprises the following steps: firstly, define the sending port number m of the sending party, and the receiving port number m' of the receiving party; and then determine that the sending party can send data each time The number of bits n, the number of bits t corresponding to the time interval of data sent by the sending port, and the type of time interval value M; then establish the correspondence table between the order of data sent by m sending ports and the binary code, and the values ​​of M types of time intervals and Binary-coded correspondence table, M time interval threshold ranges and binary-coded correspondence table; then the sender transmits the secret data A, and combines the above three tables to obtain the secret data A' corresponding to the sending port sequence of the actual sent data and the actual Concealed data B' composed of the received time interval value; finally compare the secret data A' and B' to judge the verification result. The method of the invention is simple, has low data processing complexity, saves transmission bandwidth, and has good application prospects.

Description

technical field [0001] The invention belongs to the field of information hiding, in particular to a data verification method based on packet sorting IP covert channels. Background technique [0002] IP covert channel is the application of information hiding in IP data packets. IP covert channel uses the part of network data that is not originally used for data transmission to transmit secret information and realize the transmission of covert data. IP covert channels are divided into IP storage covert channels and IP time covert channels according to different data hiding methods. IP time covert channel refers to the transmission of data packets using the transmission interval of data packets. Since the data interval between data packets is inevitable in network communication, many researchers have studied how to use the interval of data packets to transmit secret data. In the IP time covert channel, by controlling the arrival time of data packets and sorting the data packet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L1/18G06F11/08
CPCG06F11/08H04L1/18H04L63/0428H04L69/164
Inventor 张乐君黄天文雷晓颖薛霄
Owner YANGZHOU UNIV