scispace - formally typeset
Search or ask a question

Answers from top 17 papers

More filters
Papers (17)Insight
Covert channels provide a method for leaking data from protected systems, which is a major concern for big enterprises and governments.
Hybrid Covert Channels are a major threat for security which is clearly unacceptable in presence of secured network communication.
Covert channels present serious security threat because they allow secret communication between two malicious processes even if the system inhibits direct communication.
Finally, the choice of channels depends on the amount of information, how instant it needs to be, and the efficiency and effectiveness of communication.
Proceedings ArticleDOI
Yifei Zhuang, Lutz Lampe 
12 May 2014
29 Citations
On the other hand, we demonstrate that the keyhole property of PLC channels generally diminishes the secure communication capability compared to what would be achieved in a similar wireless communications setting.
confirm that the scheme can operate efficiently over impaired communication channels.
These channels have content visible to all principals-their content is not concealed or protected by a secret key-but are highly robust to an active warden.
Open accessBook ChapterDOI
09 Feb 2010
123 Citations
This, in turn, ensures that protocol messages cannot be used as subliminal channels, something achieved in prior work only by making strong assumptions on the communication network.
When transmitted over speech channels, the secure communication signal transmission could be subjected to a high damage, especially in mobile networks, due to the presence of speech coders.
These proposed covert channels provide signalling method in order to have reliable communication.
Proceedings ArticleDOI
Ira S. Moskowitz, Myong H. Kang 
27 Jun 1994
145 Citations
To alleviate this problem, we show how trade-offs can be made to reduce the threat of covert channels.
Covert communication over a previously unexplored class of channels thereby becomes possible, which forms the focus of this paper.
In this scenario preventing hidden communication channels remains an open problem that we believe the research community should put more focus on.
We show that stealth communication over discrete memoryless channels and additive white Gaussian noise channels is possible without secret key as soon as the legitimate receiver's channel is “better” than the warden's channel, which generalizes previously known results to a much larger class of channels.
We also show that communication channels not optimized for minimal latency imperil the security of distance-bounding protocols.
Possible preventive measurements can be found in the reduction of communication channels.
Moreover, the two communication channels strengthen each other.

Related Questions

What is communication channel?4 answersA communication channel is an abstract structure facilitating message exchange between processes or systems. It can be a physical medium or a logical space for public announcements. Various forms of communication channels exist, such as those used in programming languages like OCCAM, in messaging systems for formatting and routing messages, and in healthcare for women to contact breast cancer screening programs. Claude Shannon's information theory introduced the concept of a communication channel to understand information sharing between a source and a receiver, applicable across diverse fields like image segmentation and virtual scene illumination. Additionally, Multiple Channel Logic addresses the complexities of public announcements, agent beliefs, and truthfulness in communication channels.
How to protect confidential data?5 answersTo protect confidential data, various methods and techniques can be employed. One approach involves using an image sensor and processing means to capture multiple images and generate a sensor fingerprint. This fingerprint is then encoded and used as a key to encrypt and/or decrypt the confidential data. Another method utilizes blockchain technology to share confidential information securely. The information, along with an agreement and financial bond, is stored in blocks of a blockchain. Behavior data of the parties involved is analyzed against the confidential data and agreement to detect any violations. Additionally, a method involves selecting and copying data from a screen, determining if it represents confidential information, and marking it as such. The copied data is then pasted into another location before being deleted from memory. Another approach involves maintaining a submission history table to track user submissions of confidential data. Based on this history and user usage information, it can be determined if a user is permitted to submit confidential information. Finally, a lock base attached to a computer housing can be used, where a controller performs a handshake with the computer's processor and flash memory to generate a checksum key. Access to the data on the computer's memory device requires this key, which is erased if the circuit loop is broken or the cable socket is dislocated from the lock base.
How are consumers protected?5 answersConsumers are protected through various measures. One approach is the criminalization of consumer grievances, which involves the use of penal provisions to deter potential wrongdoers and provide justice to injured consumers. Legal protection is also provided through consumer protection laws, which guarantee legal certainty and empower consumers to obtain their choice of goods and services, as well as defend their rights if harmed by business actors. Additionally, specific regulations and institutions are in place to protect consumers in different sectors. For example, in the field of food and beverage sales, institutions such as LPPOM MUI and the POM Agency play a role in ensuring halal certification and supervising product circulation. In the context of electronic contracts, EU law and directives provide mechanisms for consumer rights protection, including the use of distance contracts and the principle of a durable medium for information provision. Overall, these measures aim to balance the interests of consumers and business actors and ensure a healthy economy.
What is communication channel?5 answersA communication channel is an abstract data structure that allows for the transmission of messages between processes or nodes. It is a method or mechanism through which information is exchanged between entities. Communication channels can be used in various contexts, such as programming languages, vehicle ad hoc networks, information theory, and integrated development environments. In programming languages like OCCAM, channels are used to pass messages between processes. In vehicle ad hoc networks, communication channels consist of control channels and service channels, enabling the exchange of information for specific services and applications. In information theory, communication channels characterize the distortions that occur when information is transmitted through them. Communication channels are also used in integrated development environments to record discussions and track communications related to specific code sections. Overall, communication channels facilitate the flow of information between entities in various domains.
How can we protect inventions such as electronic systems or wireless networks?4 answersInventions such as electronic systems or wireless networks can be protected through various methods. One approach is to use protection systems that detect and clear faults within the electrical systems, such as spot networks and grid networks. Another method is to rely on non-disclosure agreements (NDAs) to protect intellectual property. NDAs are commonly used to prevent the disclosure of confidential information and can be of great value in litigated cases, even more valuable than a patent. Additionally, patents can be obtained to protect inventions. By filing and prosecuting a patent application, inventors can secure legal protection for their ideas. Furthermore, a new invention has been developed that makes the protection a functional part of the object to be protected. This approach involves irreversibly deactivating and/or deleting essential components or information within these components, making it difficult to circumvent the security device.
How can we protect information in telehealth?5 answersTo protect information in telehealth, it is important to address threats and implement security measures. Perceived patients' information security threat, privacy risk, and telehealth systems security threat, as well as self-efficacy, significantly influence health professionals' behaviors to use telehealth services. Laws and regulations play a crucial role in protecting patient privacy in telehealth, even when information is transmitted over public networks. Access control is essential to ensure the privacy of patients' personal and physiological data in telehealth systems, and blockchain technology can provide a distributed and reliable access control mechanism. Encryption and watermarking methods can be used to ensure the confidentiality and integrity of medical images in telemedicine applications. User awareness and education are also important in securing data in telemedicine applications, with a focus on information handling and password management.

See what other people are reading

What affects the Wi-Fi accessibility in school and the School location that impacts signal strength?
5 answers
What steps should be taken follwoing a dta breach?
5 answers
Is targeted learning beneficial for nursing clinicals?
5 answers
What is the difference between unidirectional data flow and bidirectional data flow in software engineering?
4 answers
What are the key differences between unidirectional and bidirectional data flow in software development?
5 answers
What steps should be taken follwoing a dta breach?
5 answers
Is targeted learning beneficial for nursing clinicals?
5 answers
How a door security system impacts on the health industry?
4 answers
Why is facebook popular in sweden?
4 answers
Facebook is popular in Sweden due to its widespread adoption among the population, especially students. In Sweden, 75% of the general population and a striking 98% of students are active Facebook users, indicating its near necessity in contemporary Swedish society. Swedish users primarily utilize Facebook for social network maintenance rather than meeting new people, with women being more engaged and active on the platform. Additionally, Facebook serves as a tool for affiliating with friends and family, showcasing positive aspects of users' lives, but also potentially leading to negative comparisons and decreased well-being, especially among women spending more time on the platform. Furthermore, Facebook groups in Sweden focusing on environmental issues demonstrate strong support for counterhegemonic, ecocentric positions, reflecting a broader societal engagement with critical topics through the platform.
How do students in Manila identify and avoid online business scams?
4 answers
Students in Manila can identify and avoid online business scams by being vigilant and informed about common scam tactics. Research highlights the prevalence of online scams in the Philippines, emphasizing the need for awareness. Understanding the characteristics of scams and being cautious with online transactions can help students protect themselves. Utilizing data mining techniques like classification algorithms can aid in analyzing online scam data to identify patterns and predict potential scams. Moreover, platforms often exercise control over teachers, imposing penalties and surveillance, indicating the importance of being aware of such practices to avoid falling victim to scams. By staying informed, cautious, and utilizing available tools for analysis, students in Manila can enhance their ability to identify and steer clear of online business scams.
What is building means?
5 answers
Building means refer to various structural components and methods used in constructing buildings. This includes elements like main plate portions, ledges, bolt portions, steel frame structures, roof, wall, window, and door portions, as well as interlocking building elements with passages and locking rods. Additionally, building means can involve innovative construction methods such as using Prefabricated Prefinished Volumetric Construction (PPVC) modules that are fastened together using mating surfaces and channels filled with fasteners. These building means aim to create thermally insulative barriers, inhibit air travel, and facilitate efficient assembly of elemental pieces into rigid frame structures for buildings. Overall, building means encompass a wide range of components and techniques crucial for the construction and functionality of buildings.