浏览全部资源
扫码关注微信
1. 南京信息工程大学计算机学院、软件学院、网络空间安全学院,江苏 南京 210044
2. 数字取证教育部工程研究中心,江苏 南京 210044
[ "熊礼治(1988- ),男,湖北荆州人,博士,南京信息工程大学教授,主要研究方向为多媒体内容安全、数字取证与区块链安全等" ]
[ "朱蓉(1998- ),女,江苏泰州人,南京信息工程大学硕士生,主要研究方向为区块链与数字取证等" ]
[ "付章杰(1983- ),男,河南南阳人,博士,南京信息工程大学教授、博士生导师,主要研究方向为人工智能安全、区块链安全、数字取证等" ]
网络出版日期:2022-08,
纸质出版日期:2022-08-25
移动端阅览
熊礼治, 朱蓉, 付章杰. 基于交易构造和转发机制的区块链网络隐蔽通信方法[J]. 通信学报, 2022,43(8):176-187.
Lizhi XIONG, Rong ZHU, Zhangjie FU. Covert communication method of blockchain network based on transaction construction and forwarding mechanism[J]. Journal on communications, 2022, 43(8): 176-187.
熊礼治, 朱蓉, 付章杰. 基于交易构造和转发机制的区块链网络隐蔽通信方法[J]. 通信学报, 2022,43(8):176-187. DOI: 10.11959/j.issn.1000-436x.2022161.
Lizhi XIONG, Rong ZHU, Zhangjie FU. Covert communication method of blockchain network based on transaction construction and forwarding mechanism[J]. Journal on communications, 2022, 43(8): 176-187. DOI: 10.11959/j.issn.1000-436x.2022161.
针对现有存储型区块链网络隐蔽通信方案存在含密交易多副本、永久存储的问题,以及现有时间型方案隐藏容量低的问题,提出了一种基于交易构造和转发机制的区块链网络隐蔽通信方法。首先发送方借助交易构造机制创建无效交易,并将秘密信息嵌入其中,再利用交易转发机制向邻居节点发送无效交易,形成隐蔽通信信道模型,使含密交易在节点间传播且不存于区块链账本中,达到信息隐蔽安全传输的目的。实验结果表明,传输容量高于现有方案,单次通信时间减少至2.5 s。
Aiming at the problems of multiple copies and permanent storage of the transactions containing secret information in the existing storage-based covert communication schemes in blockchain network
as well as the issue of low hidden capacity of the existing time-based schemes
a covert communication method of blockchain network based on transaction construction and forwarding mechanism was proposed.First
an invalid transaction was created by the sender with the help of the transaction construction mechanism
and the secret information was embedded in it
and then the transaction forwarding mechanism was used to send the invalid transaction to the neighbor nodes to form a covert communication channel model
enabling that the transactions containing secret information were spread between nodes and did not exist in the blockchain ledger
so as to achieve the purpose of information concealment and safe transmission.Experimental results show that the transmission capacity of the proposed method is higher than that of the existing schemes
and the single communication time is reduced to 2.5 s.
SIMMONS G J , . The prisoners’ problem and the subliminal channel [C ] // Advances in Cryptology . Berlin:Springer , 1984 : 51 - 67 .
李彦峰 , 丁丽萍 , 吴敬征 , 等 . 网络隐蔽信道关键技术研究综述 [J ] . 软件学报 , 2019 , 30 ( 8 ): 2470 - 2490 .
LI Y F , DING L P , WU J ZH , et al . Survey on key issues in networks covert channel [J ] . Journal of Software , 2019 , 30 ( 8 ): 2470 - 2490 .
SOHN T , SEO J , MOON J . A study on the covert channel detection of TCP/IP header using support vector machine [C ] // International Conference on Information and Communications Security . Berlin:Springer , 2003 : 313 - 324 .
FISK G , FISK M , PAPADOPOULOS C , et al . Eliminating steganography in Internet traffic with active wardens [C ] // International Workshop on Information Hiding . Berlin:Springer , 2002 : 18 - 35 .
HANDLEY M , PAXSON V , KREIBICH C . Network intrusion detection:evasion,traffic normalization,and end-to-end protocol semantics [C ] // Proceedings of the 10th conference on USENIX Security Symposium . Berkeley:USENIX Association , 2001 :9.
LEWANDOWSKI G , LUCENA N B , CHAPIN S J . Analyzing network-aware active wardens in IPv6 [C ] // International Workshop on Information Hiding . Berlin:Springer , 2006 : 58 - 77 .
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system [R ] . Decentralized Business Review , 2008 .
祝烈煌 , 高峰 , 沈蒙 , 等 . 区块链隐私保护研究综述 [J ] . 计算机研究与发展 , 2017 , 54 ( 10 ): 2170 - 2186 .
ZHU L H , GAO F , SHEN M , et al . Survey on privacy preserving techniques for blockchain technology [J ] . Journal of Computer Research and Development , 2017 , 54 ( 10 ): 2170 - 2186 .
PARTALA J . Provably secure covert communication on blockchain [J ] . Cryptography , 2018 , 2 ( 3 ): 18 .
CAO H , YIN H , GAO F , et al . Chain-based covert data embedding schemes in blockchain [J ] . IEEE Internet of Things Journal,2020:doi.org/10.1109/JIOT.2020.3040389 .
BASUKI A I , ROSIYADI D . Joint transaction-image steganography for high capacity covert communication [C ] // Proceedings of 2019 International Conference on Computer,Control,Informatics and its Applications (IC3INA) . Piscataway:IEEE Press , 2019 : 41 - 46 .
TIAN J , GOU G P , LIU C , et al . DLchain:a covert channel over blockchain based on dynamic labels [C ] // Information and Communications Security . Berlin:Springer , 2020 : 814 - 830 .
BRENNER M , CHRISTIN N , JOHNSON B , et al . Financial cryptography and data security [M ] . Berlin : Springer , 2015 .
GAO F , ZHU L H , GAI K K , et al . Achieving a covert channel over an open blockchain network [J ] . IEEE Network , 2020 , 34 ( 2 ): 6 - 13 .
PLOHMANN D , YAKDAN K , KLATT M , et al . A comprehensive measurement study of domain generating malware [C ] // Proceedings of the 25th USENIX Conference on Security Symposium . Berkeley:USENIX Association , 2016 : 263 - 278 .
吕婧淑 , 操晓春 . 基于比特币系统的隐蔽通信技术 [J ] . 信息安全学报 , 2021 , 6 ( 2 ): 143 - 152 .
LYU J S , CAO X C . Covert communication technology based on bitcoin [J ] . Journal of Cyber Security , 2021 , 6 ( 2 ): 143 - 152 .
ZHANG L J , ZHANG Z J , WANG W Z , et al . A covert communication method using special bitcoin addresses generated by vanitygen [J ] . Computers,Materials & Continua , 2020 , 65 ( 1 ): 597 - 616 .
李彦峰 , 丁丽萍 , 吴敬征 , 等 . 区块链环境下的新型网络隐蔽信道模型研究 [J ] . 通信学报 , 2019 , 40 ( 5 ): 67 - 78 .
LI Y F , DING L P , WU J Z , et al . Research on a new network covert channel model in blockchain environment [J ] . Journal on Communications , 2019 , 40 ( 5 ): 67 - 78 .
ABDULAZIZ M , ÇULHA D , YAZICI A . A decentralized application for secure messaging in a trustless environment [C ] // Proceedings of 2018 International Congress on Big Data,Deep Learning and Fighting Cyber Terrorism (IBIGDELFT) . Piscataway:IEEE Press , 2018 : 1 - 5 .
LEE B , LEE M Y , KO H S , et al . A secure mobile messenger based on Ethereum whisper [J ] . The Journal of Korean Institute of Communications and Information Sciences , 2017 , 42 ( 7 ): 1477 - 1484 .
ZHANG L J , ZHANG Z J , JIN Z L , et al . An approach of covert communication based on the Ethereum whisper protocol in blockchain [J ] . International Journal of Intelligent Systems , 2021 , 36 ( 2 ): 962 - 996 .
DEMERS A , GREENE D , HAUSER C , et al . Epidemic algorithms for replicated database maintenance [C ] // Proceedings of the 6th Annual ACM Symposium on Principles of Distributed Computing . New York:ACM Press , 1987 : 1 - 12 .
BONNEAU J , MILLER A , CLARK J , et al . SoK:research perspectives and challenges for bitcoin and cryptocurrencies [C ] // Proceedings of 2015 IEEE Symposium on Security and Privacy . Piscataway:IEEE Press , 2015 : 104 - 121 .
0
浏览量
717
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构