How communication channels can be protected?
Answers from top 17 papers
More filters
Papers (17) | Insight |
---|---|
19 Citations | Covert channels provide a method for leaking data from protected systems, which is a major concern for big enterprises and governments. |
Hybrid Covert Channels are a major threat for security which is clearly unacceptable in presence of secured network communication. | |
24 Oct 2016 | Covert channels present serious security threat because they allow secret communication between two malicious processes even if the system inhibits direct communication. |
113 Citations | Finally, the choice of channels depends on the amount of information, how instant it needs to be, and the efficiency and effectiveness of communication. |
12 May 2014 | On the other hand, we demonstrate that the keyhole property of PLC channels generally diminishes the secure communication capability compared to what would be achieved in a similar wireless communications setting. |
21 Citations | confirm that the scheme can operate efficiently over impaired communication channels. |
89 Citations | These channels have content visible to all principals-their content is not concealed or protected by a secret key-but are highly robust to an active warden. |
09 Feb 2010 | This, in turn, ensures that protocol messages cannot be used as subliminal channels, something achieved in prior work only by making strong assumptions on the communication network. |
01 Oct 2008 | When transmitted over speech channels, the secure communication signal transmission could be subjected to a high damage, especially in mobile networks, due to the presence of speech coders. |
These proposed covert channels provide signalling method in order to have reliable communication. | |
To alleviate this problem, we show how trade-offs can be made to reduce the threat of covert channels. | |
Covert communication over a previously unexplored class of channels thereby becomes possible, which forms the focus of this paper. | |
In this scenario preventing hidden communication channels remains an open problem that we believe the research community should put more focus on. | |
We show that stealth communication over discrete memoryless channels and additive white Gaussian noise channels is possible without secret key as soon as the legitimate receiver's channel is “better” than the warden's channel, which generalizes previously known results to a much larger class of channels. | |
20 Sep 2006 | We also show that communication channels not optimized for minimal latency imperil the security of distance-bounding protocols. |
Possible preventive measurements can be found in the reduction of communication channels. | |
130 Citations | Moreover, the two communication channels strengthen each other. |
Related Questions
What is communication channel?4 answersA communication channel is an abstract structure facilitating message exchange between processes or systems. It can be a physical medium or a logical space for public announcements. Various forms of communication channels exist, such as those used in programming languages like OCCAM, in messaging systems for formatting and routing messages, and in healthcare for women to contact breast cancer screening programs. Claude Shannon's information theory introduced the concept of a communication channel to understand information sharing between a source and a receiver, applicable across diverse fields like image segmentation and virtual scene illumination. Additionally, Multiple Channel Logic addresses the complexities of public announcements, agent beliefs, and truthfulness in communication channels.
How to protect confidential data?5 answersTo protect confidential data, various methods and techniques can be employed. One approach involves using an image sensor and processing means to capture multiple images and generate a sensor fingerprint. This fingerprint is then encoded and used as a key to encrypt and/or decrypt the confidential data. Another method utilizes blockchain technology to share confidential information securely. The information, along with an agreement and financial bond, is stored in blocks of a blockchain. Behavior data of the parties involved is analyzed against the confidential data and agreement to detect any violations. Additionally, a method involves selecting and copying data from a screen, determining if it represents confidential information, and marking it as such. The copied data is then pasted into another location before being deleted from memory. Another approach involves maintaining a submission history table to track user submissions of confidential data. Based on this history and user usage information, it can be determined if a user is permitted to submit confidential information. Finally, a lock base attached to a computer housing can be used, where a controller performs a handshake with the computer's processor and flash memory to generate a checksum key. Access to the data on the computer's memory device requires this key, which is erased if the circuit loop is broken or the cable socket is dislocated from the lock base.
How are consumers protected?5 answersConsumers are protected through various measures. One approach is the criminalization of consumer grievances, which involves the use of penal provisions to deter potential wrongdoers and provide justice to injured consumers. Legal protection is also provided through consumer protection laws, which guarantee legal certainty and empower consumers to obtain their choice of goods and services, as well as defend their rights if harmed by business actors. Additionally, specific regulations and institutions are in place to protect consumers in different sectors. For example, in the field of food and beverage sales, institutions such as LPPOM MUI and the POM Agency play a role in ensuring halal certification and supervising product circulation. In the context of electronic contracts, EU law and directives provide mechanisms for consumer rights protection, including the use of distance contracts and the principle of a durable medium for information provision. Overall, these measures aim to balance the interests of consumers and business actors and ensure a healthy economy.
What is communication channel?5 answersA communication channel is an abstract data structure that allows for the transmission of messages between processes or nodes. It is a method or mechanism through which information is exchanged between entities. Communication channels can be used in various contexts, such as programming languages, vehicle ad hoc networks, information theory, and integrated development environments. In programming languages like OCCAM, channels are used to pass messages between processes. In vehicle ad hoc networks, communication channels consist of control channels and service channels, enabling the exchange of information for specific services and applications. In information theory, communication channels characterize the distortions that occur when information is transmitted through them. Communication channels are also used in integrated development environments to record discussions and track communications related to specific code sections. Overall, communication channels facilitate the flow of information between entities in various domains.
How can we protect inventions such as electronic systems or wireless networks?4 answersInventions such as electronic systems or wireless networks can be protected through various methods. One approach is to use protection systems that detect and clear faults within the electrical systems, such as spot networks and grid networks. Another method is to rely on non-disclosure agreements (NDAs) to protect intellectual property. NDAs are commonly used to prevent the disclosure of confidential information and can be of great value in litigated cases, even more valuable than a patent. Additionally, patents can be obtained to protect inventions. By filing and prosecuting a patent application, inventors can secure legal protection for their ideas. Furthermore, a new invention has been developed that makes the protection a functional part of the object to be protected. This approach involves irreversibly deactivating and/or deleting essential components or information within these components, making it difficult to circumvent the security device.
How can we protect information in telehealth?5 answersTo protect information in telehealth, it is important to address threats and implement security measures. Perceived patients' information security threat, privacy risk, and telehealth systems security threat, as well as self-efficacy, significantly influence health professionals' behaviors to use telehealth services. Laws and regulations play a crucial role in protecting patient privacy in telehealth, even when information is transmitted over public networks. Access control is essential to ensure the privacy of patients' personal and physiological data in telehealth systems, and blockchain technology can provide a distributed and reliable access control mechanism. Encryption and watermarking methods can be used to ensure the confidentiality and integrity of medical images in telemedicine applications. User awareness and education are also important in securing data in telemedicine applications, with a focus on information handling and password management.