Secret communication by using data hiding in IPv6

被引:0
|
作者
Carli, M. [1 ]
De Castro, A. [1 ]
Neri, A. [1 ]
机构
[1] Univ Rome TRE, Dept Appl Elect, Rome, Italy
来源
SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS AND INTELLIGENCE (C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE VI | 2007年 / 6538卷
关键词
data hiding; internet protocol; security;
D O I
10.1117/12.720708
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper the use of Internet Protocol ver.6 packets to convey hidden information is exploited. The possibility to hide information in commonly used data transport mechanisms allows one to send extra information in a transparent way. The hidden message does not affect the routing mechanism neither interferes with the security mechanisms implemented on IP based networks, as firewalls, intrusion detection systems, authentication tools.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Securing Vehicular IPv6 Communications
    Fernandez, Pedro J.
    Santa, Jose
    Bernal, Fernando
    Skarmeta, Antonio F.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (01) : 46 - 58
  • [22] The Shim6 Architecture for IPv6 Multihoming
    Garcia-Martinez, Alberto
    Bagnulo, Marcelo
    van Beijnum, Iljitsch
    IEEE COMMUNICATIONS MAGAZINE, 2010, 48 (09) : 152 - 157
  • [23] A New Mechanism to Secure IPv6 Networks Using Symmetric Cryptography
    El Ksimi, Ali
    Leghirs, Cherkaoui
    MOBILE, SECURE, AND PROGRAMMABLE NETWORKING, 2019, 11557 : 229 - 246
  • [24] The Blind Man's Bluff Approach to Security Using IPv6
    Dunlop, Matthew
    Groat, Stephen
    Urbanski, William
    Marchany, Randy
    Tront, Joseph
    IEEE SECURITY & PRIVACY, 2012, 10 (04) : 35 - 43
  • [25] Designing the mobile IPv6 security protocolConception du Protocole de Sécurité Pour Mobile IPV6
    Tuomas Aura
    Michael Roe
    Annales Des Télécommunications, 2006, 61 (3-4): : 332 - 356
  • [26] Hiding Secret Data by using Modulo Function in Quad Difference Expansion
    Kurniawan, Yogi
    Rahmania, Lidya Amalia
    Ahmad, Tohari
    Wibisono, Waskitho
    Ijtihadie, Royyana M.
    2016 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS (ICACSIS), 2016, : 433 - 438
  • [27] A COMPARISON OF THE PERFORMANCE OF IPv4 & IPv6 INFRASTRUCTURE NETWORKS
    Tevkun, Mariya
    Davies, John N.
    Comerford, Paul
    Grout, Vic
    Kazymyr, Volodymyr
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 13), 2013, : 154 - 160
  • [28] Randomly Hiding Secret Data using Dynamic Programming for Image Steganography
    Khandelwal, Pulkit
    Bisht, Neha
    Thanikaiselvan, V
    2015 INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORK COMMUNICATIONS (COCONET), 2015, : 777 - 783
  • [29] IPv4 and IPv6 for Blockchain Networks: a Comparative Analysis
    Davies, Jack
    Pagani, Alessio
    2022 IEEE 1ST GLOBAL EMERGING TECHNOLOGY BLOCKCHAIN FORUM: BLOCKCHAIN & BEYOND, IGETBLOCKCHAIN, 2022,
  • [30] Routing optimization security in mobile IPv6
    Ren, Kui
    Lou, Wenjing
    Zeng, Kai
    Bao, Feng
    Zhou, Jianying
    Deng, Robert H.
    COMPUTER NETWORKS, 2006, 50 (13) : 2401 - 2419