CN111431877A - Block chain-based tamper-proof covert communication method and device - Google Patents

Block chain-based tamper-proof covert communication method and device Download PDF

Info

Publication number
CN111431877A
CN111431877A CN202010178563.5A CN202010178563A CN111431877A CN 111431877 A CN111431877 A CN 111431877A CN 202010178563 A CN202010178563 A CN 202010178563A CN 111431877 A CN111431877 A CN 111431877A
Authority
CN
China
Prior art keywords
time interval
interval sequence
module
information
modulation mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010178563.5A
Other languages
Chinese (zh)
Inventor
洪志加
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hongxin E Commerce Technology Co ltd
Original Assignee
Guangdong Hongxin E Commerce Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hongxin E Commerce Technology Co ltd filed Critical Guangdong Hongxin E Commerce Technology Co ltd
Priority to CN202010178563.5A priority Critical patent/CN111431877A/en
Publication of CN111431877A publication Critical patent/CN111431877A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/556Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0014Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the source coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a tamper-proof covert communication method and device based on a block chain, wherein the method comprises the steps of coding original covert information by using Huffman coding, arithmetic coding or L-Z coding to obtain coded information, modulating the coded information at a set time interval by using an ASK modulation mode, an FSK modulation mode, a PSK modulation mode, a QAM modulation mode, an MSK modulation mode, a GSM modulation mode or an OFDM modulation mode to generate a time interval sequence for normal information transmission, sending the time interval sequence to a block chain network to stamp the time interval sequence, transmitting and storing the time interval sequence by using the block chain network, obtaining the time interval sequence sent by a sender by a receiver of the covert information in a wireless mode, and obtaining the original covert information after demodulating and decoding.

Description

Block chain-based tamper-proof covert communication method and device
Technical Field
The invention relates to the field of network security, in particular to a block chain-based tamper-proof covert communication method and device.
Background
With the development of network technology, the security of network information communication is more and more emphasized. On one hand, malicious information (such as Trojan horse programs, viruses, network attacks and the like) needs to be blocked and detected; on the other hand, the security and privacy of normal communication information (e.g., business information, personal privacy information, etc.) needs to be protected. The network covert channel can be applied to two aspects of network information communication security, and therefore, the network covert channel is also increasingly emphasized. The network covert channel is defined as a communication channel for carrying out covert information transmission in violation of communication restriction rules under a network environment. Most network hidden channels adopt a mode of direct communication between two communication parties, and a communication line is single in static state and easy to detect, interfere and block pertinently. Although the existing dynamic routing technology can realize the change of a transmission line, the transmission process is still a single line, and the reliability guarantee is lacked.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a block chain based tamper-resistant covert communication method and apparatus capable of improving the reliability of covert communication, aiming at the above-mentioned defects of the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows: a block chain-based anti-tampering covert communication method is constructed, and the method comprises the following steps:
A) encoding the original hidden information by using Huffman coding, arithmetic coding or L-Z coding mode to obtain encoded information;
B) modulating the coded information at a set time interval by using an ASK modulation mode, an FSK modulation mode, a PSK modulation mode, a QAM modulation mode, an MSK modulation mode, a GSM modulation mode or an OFDM modulation mode to generate a time interval sequence for normal information transmission;
C) sending the time interval sequence to a block chain network, and stamping a time stamp for the time interval sequence;
D) transmitting and storing the time interval sequence by using a block chain network;
E) the receiver of the hidden information obtains the time interval sequence sent by the sender in a wireless mode;
F) the receiver of the hidden information demodulates the time interval sequence according to the set time interval, and acquires demodulated information by taking the time stamp of each piece of normal information as a time reference;
G) and decoding the demodulated information to obtain the original hidden information.
In the tamper-resistant covert communication method based on the block chain, the wireless mode is any one or combination of any more of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and an L oRa module.
In the block chain-based tamper-resistant covert communication method, the step D) further includes:
D1) the time interval sequence is broadcasted in a block chain network in a mode appointed by a point-to-point communication protocol;
D2) and all the block chain network nodes receiving the time interval sequence perform distributed storage on the time interval sequence and continue broadcasting the time interval sequence to the block chain network until a receiving party of the hidden information receives the time interval sequence and stores the time interval sequence.
The invention also relates to a device for realizing the anti-tampering covert communication method based on the block chain, which comprises the following steps:
the coding unit is used for coding the original hidden information by using Huffman coding, arithmetic coding or L-Z coding mode to obtain coded information;
a modulation unit: the time interval sequence is used for modulating the coded information at set time intervals by using an ASK modulation mode, an FSK modulation mode, a PSK modulation mode, a QAM modulation mode, an MSK modulation mode, a GSM modulation mode or an OFDM modulation mode to generate normal information transmission time interval sequence;
a time stamping unit: the time interval sequence is sent to a block chain network, and the time interval sequence is stamped by the time stamp;
a transmission storage unit: for transmitting and storing the sequence of time intervals using a blockchain network;
a time interval sequence acquisition unit: the receiver for concealing the information obtains the time interval sequence sent by the sender in a wireless mode;
a demodulation unit: the receiving party for the hidden information demodulates the time interval sequence according to the set time interval, and acquires demodulated information by taking the time stamp of each piece of normal information as a time reference;
a decoding unit: and the decoding module is used for decoding the demodulated information to obtain the original hidden information.
In the device of the invention, the wireless mode is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and an L oRa module.
In the apparatus of the present invention, the transmission storage unit further includes:
a broadcasting module: broadcasting the time interval sequence in a blockchain network in a manner agreed by a point-to-point communication protocol;
a distributed storage module: and the blockchain network nodes used for receiving the time interval sequence perform distributed storage on the time interval sequence and continue broadcasting the time interval sequence to the blockchain network until the receiving party of the hidden information receives the time interval sequence and stores the time interval sequence.
The block chain-based tamper-resistant covert communication method and device have the following beneficial effects: because the original hidden information is coded, the coded information is obtained; modulating the coded information at a set time interval to generate a time interval sequence for normal information transmission; sending the time interval sequence of normal information transmission to a block chain network, and stamping a time stamp for the time interval sequence; transmitting and storing the time interval sequence by using a block chain network; a receiver of the hidden information obtains a time interval sequence sent by a sender in a wireless mode; then, demodulation and decoding are carried out, which can overcome the defects of the traditional network hidden channel, and the invention can improve the reliability of hidden communication.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow diagram of a method in one embodiment of a blockchain based tamper resistant covert communication method and apparatus of the present invention;
FIG. 2 is a specific flow diagram for transmitting and storing a sequence of time intervals using a blockchain network in the embodiment;
fig. 3 is a schematic structural diagram of the device in the embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiment of the tamper-resistant covert communication method and device based on the blockchain, a flow chart of the tamper-resistant covert communication method based on the blockchain is shown in fig. 1. In fig. 1, the block chain-based tamper-resistant covert communication method includes the following steps:
in the step, the original hidden information is subjected to source coding by using Huffman coding, arithmetic coding or L-Z coding, and the coded information is obtained after the source coding.
Step S02 modulates the encoded information at a set time interval by using an ASK modulation mode, an FSK modulation mode, a PSK modulation mode, a QAM modulation mode, an MSK modulation mode, a GSM modulation mode, or an OFDM modulation mode, to generate a time interval sequence for normal information transmission: in this step, the coded information is modulated at a set time interval by an ASK (amplitude modulation) modulation mode, an FSK (frequency modulation) modulation mode, a PSK (phase modulation) modulation mode, a QAM modulation mode, an MSK modulation mode, a GSM modulation mode, or an OFDM modulation mode, to generate a time interval sequence for normal information transmission. Quadrature amplitude modulation QAM is a combination of amplitude modulation and phase modulation; MSK is an improvement of FSK; GMSK is an improvement of MSK, in which a Gaussian low-pass pre-modulation filter is inserted before an MSK (minimum frequency Shift keying) modulator, so that the spectrum utilization rate and the communication quality can be improved; OFDM can be considered a modulation method for multiple carriers.
Step S03 sends the time interval sequence to the blockchain network, and time stamps the time interval sequence: in this step, the time interval sequence is sent to the block chain network, and a timestamp is stamped for each piece of information of the time interval sequence according to the block chain network rule.
Step S04 transmits and stores the time interval sequence using the blockchain network: in this step, the modulated time interval sequence is transmitted and stored by using the blockchain network, and the detailed process thereof will be described later.
The step S05 is that the receiver of the hidden information obtains the time interval sequence sent by the sender through wireless mode, in this step, the receiver of the hidden information observes the block chain network, and obtains the time interval sequence sent by the sender through wireless mode, the wireless mode is any one or combination of any several of 5G communication module, 4G communication module, Bluetooth module, WiFi module, GSM module, CDMA2000 module, WCDMA module, TD-SCDMA module, Zigbee module and L oRa module, through setting up multiple wireless communication modes, it can not only increase the flexibility of the wireless communication mode, but also meet the requirements of different users and different occasions, especially when L oRa module is adopted, its communication distance is far, and the communication performance is stable, and it is suitable for occasions with higher requirement to the communication quality, it can reach high data rate, reduce delay, save energy, reduce cost, improve system capacity and large-scale equipment connection by adopting 5G communication mode.
Step S06 the receiver of the hidden information demodulates the time interval sequence at the set time intervals, and obtains the demodulated information with the time stamp of each piece of normal information as the time reference: in this step, the receiver of the hidden information demodulates the time interval sequence according to the set time interval, and takes the time stamp of each piece of normal information as the time reference, so as to obtain the demodulated information.
And step S07, decoding the demodulated information to obtain original hidden information, wherein in the step, the demodulated information is decoded by using the Huffman coding, arithmetic coding or L-Z coding mechanism to obtain the original hidden information.
For the present embodiment, the step S04 can be further refined, and the detailed flowchart is shown in fig. 2. In fig. 2, the step S04 further includes:
step S41 the time interval sequence is broadcast in the blockchain network in a manner agreed by the point-to-point communication protocol: in this step, the modulated time interval sequence is broadcasted in the blockchain network in a manner agreed by the point-to-point communication protocol.
Step S42 is to perform distributed storage on the time interval sequence by all the blockchain network nodes that receive the time interval sequence, and continue broadcasting the time interval sequence to the blockchain network until the receiver of the hidden information receives the time interval sequence and stores it: in this step, all the network nodes of the block chain that receive the modulated time interval sequence store the modulated time interval sequence in a distributed manner, and continue broadcasting the time interval sequence to the block chain network until the receiver of the hidden information receives the time interval sequence and stores the time interval.
The embodiment also relates to a device for realizing the tamper-resistant covert communication method based on the block chain, and the structural schematic diagram of the device is shown in fig. 3. in fig. 3, the device comprises a coding unit 1, a modulation unit 2, a time stamp unit 3, a transmission storage unit 4, a time interval sequence acquisition unit 5, a demodulation unit 6 and a decoding unit 7, wherein the coding unit 1 is used for carrying out source coding on original covert information by using Huffman coding, arithmetic coding or L-Z coding to obtain coded information, the purpose of the source coding is to reduce redundancy of a source, the transmission is more effective and economical, and the most common application form is compression.
The modulation unit 2 is configured to modulate the encoded information at a set time interval by using an ASK modulation mode, an FSK modulation mode, a PSK modulation mode, a QAM modulation mode, an MSK modulation mode, a GSM modulation mode, or an OFDM modulation mode, and generate a time interval sequence for normal information transmission; quadrature amplitude modulation QAM is a combination of amplitude modulation and phase modulation; MSK is an improvement of FSK; GMSK is an improvement of MSK, in which a Gaussian low-pass pre-modulation filter is inserted before an MSK (minimum frequency Shift keying) modulator, so that the spectrum utilization rate and the communication quality can be improved; OFDM can be considered a modulation method for multiple carriers.
The time stamping unit 3 is configured to send the time interval sequence to the block chain network, and time stamp the time interval sequence. The transmission storage unit 4 is used for transmitting and storing the time interval sequence by using the block chain network.
The time interval sequence acquisition unit 5 is used for a receiver of the hidden information to acquire a time interval sequence sent by a sender in a wireless mode, wherein the wireless mode is any one or combination of any more of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and an L oRa module.
The demodulation unit 6 is used for the receiver of the hidden information to demodulate the time interval sequence according to the set time interval, and the time stamp of each piece of normal information is used as the time reference to obtain the demodulated information; the decoding unit 7 is configured to decode the demodulated information to obtain original hidden information. The device can overcome the defect of the traditional network hidden channel, and the device can improve the reliability of hidden communication.
In this embodiment, the transmission storage unit 4 further includes a broadcasting module 41 and a distributed storage module 42; the broadcasting module 41 is configured to broadcast the time interval sequence in the blockchain network in a manner agreed by a point-to-point communication protocol; the distributed storage module 42 is used for all the blockchain network nodes receiving the time interval sequence, performing distributed storage on the time interval sequence, and continuously broadcasting the time interval sequence to the blockchain network until a receiving party of the hidden information receives the time interval sequence and stores the time interval sequence.
In a word, the invention can overcome the defect of the traditional network hidden channel and can improve the reliability of hidden communication.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (6)

1. A tamper-resistant covert communication method based on a block chain is characterized by comprising the following steps:
A) encoding the original hidden information by using Huffman coding, arithmetic coding or L-Z coding mode to obtain encoded information;
B) modulating the coded information at a set time interval by using an ASK modulation mode, an FSK modulation mode, a PSK modulation mode, a QAM modulation mode, an MSK modulation mode, a GSM modulation mode or an OFDM modulation mode to generate a time interval sequence for normal information transmission;
C) sending the time interval sequence to a block chain network, and stamping a time stamp for the time interval sequence;
D) transmitting and storing the time interval sequence by using a block chain network;
E) the receiver of the hidden information obtains the time interval sequence sent by the sender in a wireless mode;
F) the receiver of the hidden information demodulates the time interval sequence according to the set time interval, and acquires demodulated information by taking the time stamp of each piece of normal information as a time reference;
G) and decoding the demodulated information to obtain the original hidden information.
2. The tamper-resistant covert communication method based on the block chain of claim 1, wherein the wireless mode is any one or a combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and an L oRa module.
3. The block chain based tamper resistant covert communication method of claim 1 or 2, wherein said step D) further comprises:
D1) the time interval sequence is broadcasted in a block chain network in a mode appointed by a point-to-point communication protocol;
D2) and all the block chain network nodes receiving the time interval sequence perform distributed storage on the time interval sequence and continue broadcasting the time interval sequence to the block chain network until a receiving party of the hidden information receives the time interval sequence and stores the time interval sequence.
4. An apparatus for implementing the blockchain-based tamper-resistant covert communication method of claim 1, comprising:
the coding unit is used for coding the original hidden information by using Huffman coding, arithmetic coding or L-Z coding mode to obtain coded information;
a modulation unit: the time interval sequence is used for modulating the coded information at set time intervals by using an ASK modulation mode, an FSK modulation mode, a PSK modulation mode, a QAM modulation mode, an MSK modulation mode, a GSM modulation mode or an OFDM modulation mode to generate normal information transmission time interval sequence;
a time stamping unit: the time interval sequence is sent to a block chain network, and the time interval sequence is stamped by the time stamp;
a transmission storage unit: for transmitting and storing the sequence of time intervals using a blockchain network;
a time interval sequence acquisition unit: the receiver for concealing the information obtains the time interval sequence sent by the sender in a wireless mode;
a demodulation unit: the receiving party for the hidden information demodulates the time interval sequence according to the set time interval, and acquires demodulated information by taking the time stamp of each piece of normal information as a time reference;
a decoding unit: and the decoding module is used for decoding the demodulated information to obtain the original hidden information.
5. The apparatus of claim 4, wherein the wireless mode is any one or a combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and an L oRa module.
6. The apparatus of claim 4 or 5, wherein the transmission storage unit further comprises:
a broadcasting module: broadcasting the time interval sequence in a blockchain network in a manner agreed by a point-to-point communication protocol;
a distributed storage module: and the blockchain network nodes used for receiving the time interval sequence perform distributed storage on the time interval sequence and continue broadcasting the time interval sequence to the blockchain network until the receiving party of the hidden information receives the time interval sequence and stores the time interval sequence.
CN202010178563.5A 2020-03-14 2020-03-14 Block chain-based tamper-proof covert communication method and device Withdrawn CN111431877A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010178563.5A CN111431877A (en) 2020-03-14 2020-03-14 Block chain-based tamper-proof covert communication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010178563.5A CN111431877A (en) 2020-03-14 2020-03-14 Block chain-based tamper-proof covert communication method and device

Publications (1)

Publication Number Publication Date
CN111431877A true CN111431877A (en) 2020-07-17

Family

ID=71547828

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010178563.5A Withdrawn CN111431877A (en) 2020-03-14 2020-03-14 Block chain-based tamper-proof covert communication method and device

Country Status (1)

Country Link
CN (1) CN111431877A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114978756A (en) * 2022-06-22 2022-08-30 郑州大学 Generation type block chain covert communication method based on Markov chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114978756A (en) * 2022-06-22 2022-08-30 郑州大学 Generation type block chain covert communication method based on Markov chain
CN114978756B (en) * 2022-06-22 2024-04-26 郑州大学 Markov chain-based generation type block chain hidden communication method

Similar Documents

Publication Publication Date Title
CN109040115B (en) Covert communication method under block chain network environment
Sharma et al. Analog & digital modulation techniques: an overview
US20160336977A1 (en) Method and system for non-persistent communication
KR20050114160A (en) Method and device for uplink ack information transmission in ofdma systems
CN103840909A (en) Method for improving demodulation correctness
Fitz Fundamentals of communications systems
Muslimin et al. SDR-based transceiver of digital communication system using USRP and GNU radio
US20220368575A1 (en) Modulation Scheme with Amplitude Variation Within Symbol in 5G/6G
CN111431877A (en) Block chain-based tamper-proof covert communication method and device
Channi A comparative study of various digital modulation techniques
CN111245570B (en) Block chain network covert communication method based on multi-node timestamp collusion
CN104753841A (en) Mobile terminal and method for transmitting non-voice data by using voice channel
KR20220024962A (en) A method for generating a signal comprising a temporally continuous chirp, a method for estimating a symbol carrying such a signal, a computer program product and a corresponding apparatus
CN110290126A (en) A kind of radio frequency watermark transmission method based on fsk signal modulation
CN103036828B (en) Multi-carrier frequency hopping communication system based on on-off keying (OOK) modulation
CN104993902A (en) Satellite communication system channel reuse method
Adeleke et al. Modulation methods employed in digital communication: an analysis
KR20120090735A (en) Data transmission apparatus and data transmission method for inserting of additional data at data modulation, and data reconstitution apparatus and data reconstitution method for separately processing data
WO2020151836A1 (en) Dual-modulation transmission in a wireless communication system
Udawant et al. Digital image processing by using GMSK
CN116366233B (en) Secure multicast-oriented data link communication system transmission encryption method and system
Thiasiriphet et al. Chirp-spreaded OFDM-MFSK with differentially encoded phase for applications in low-power wide-area networks
CN110383881A (en) A kind of information sending, receiving method and equipment
Latif et al. Error rate performance of hybrid QAM-FSK in OFDM systems exhibiting low PAPR
Phuntsho et al. Digital Modulation Techniques

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200717