Unlock instant, AI-driven research and patent intelligence for your innovation.

Construction Method of Network Covert Channel Based on LTE Protocol

A construction method and a technology of hidden channels, which are applied in the field of network hidden channel construction based on LTE protocol, can solve problems such as data packet error and packet sequence error, hidden channel stability and general anti-interference performance, and achieve broadening of transmission channels, Enhanced stability and anti-interference effects

Active Publication Date: 2022-04-08
NANJING UNIV OF SCI & TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, during the actual transmission process of the hidden channel, the data packets will be lost, wrong, and packet sequenced due to weather, channel interference, environmental noise, etc., and the stability and anti-interference of the hidden channel are average.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Construction Method of Network Covert Channel Based on LTE Protocol
  • Construction Method of Network Covert Channel Based on LTE Protocol
  • Construction Method of Network Covert Channel Based on LTE Protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The network hidden channel construction method based on LTE protocol of the present invention comprises the following contents:

[0030] Step 1. The sender embeds the secret information based on the LTE protocol;

[0031] Step 2. The receiving party extracts the secret information based on the LTE protocol.

[0032] Further, in one of the embodiments, combined with figure 1 , in step 1, the sender embeds secret information based on the LTE protocol, specifically:

[0033] Step 1-1. The sender performs binary encoding on the concealed information to obtain binary concealed data;

[0034] Step 1-2, self-selecting a subordinate protocol from the LTE protocol as the covert channel carrier protocol;

[0035] Step 1-3, according to the selected covert channel carrier protocol, perform channel coding on the binary covert data in step 1-1;

[0036] Step 1-4, embedding the channel coding result of step 1-3 into the selected covert channel bearer protocol for transmission.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network covert channel construction method based on the LTE protocol, comprising the following content: a sender performs binary coding on covert information to obtain binary covert data; self-selects a subordinate protocol from the LTE protocol as a covert channel carrier protocol; According to the selected covert channel carrier protocol, channel coding is performed on the binary covert data; the channel coding result is embedded in the selected covert channel carrier protocol for transmission. The receiver receives the data packet and extracts the hidden channel information during transmission; extracts the hidden channel data according to the hidden channel carrier protocol selected by the sender; performs BCH channel decoding on the extracted data; performs binary decoding on the BCH channel decoding result . The present invention has good robustness, can correct hidden channel information errors for general channel fluctuations, and is suitable for use in normal environments.

Description

technical field [0001] The invention belongs to the field of network security, in particular to a method for constructing a network hidden channel based on the LTE protocol. Background technique [0002] With the increasing confrontation in cyberspace, more and more covert communication methods are used for information theft and intelligence communication. Cyberspace is the information environment on which people live in the information age. It is a collection of all information systems and has become the fifth largest strategic space after land, sea, air, and space. Countries have issued national strategies for cyberspace. Confrontation became the norm. The targets of network offensive and defensive confrontation are mainly concentrated in important cyberspace facilities such as governments, large enterprises, important institutions, and industrial facilities. Political and geopolitical conflicts are often hidden behind them, or huge economic interests are designed. Compe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L1/00H04L1/24H04W12/03
CPCH04L1/0009H04L1/0006H04L1/0083H04L1/246H04W12/03
Inventor 刘伟伟刘光杰陆明刘员都戴跃伟
Owner NANJING UNIV OF SCI & TECH