CN111431877A - Block chain-based tamper-proof covert communication method and device - Google Patents
Block chain-based tamper-proof covert communication method and device Download PDFInfo
- Publication number
- CN111431877A CN111431877A CN202010178563.5A CN202010178563A CN111431877A CN 111431877 A CN111431877 A CN 111431877A CN 202010178563 A CN202010178563 A CN 202010178563A CN 111431877 A CN111431877 A CN 111431877A
- Authority
- CN
- China
- Prior art keywords
- time interval
- interval sequence
- module
- information
- modulation mode
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/556—Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0014—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the source coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/34—Encoding or coding, e.g. Huffman coding or error correction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Quality & Reliability (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a tamper-proof covert communication method and device based on a block chain, wherein the method comprises the steps of coding original covert information by using Huffman coding, arithmetic coding or L-Z coding to obtain coded information, modulating the coded information at a set time interval by using an ASK modulation mode, an FSK modulation mode, a PSK modulation mode, a QAM modulation mode, an MSK modulation mode, a GSM modulation mode or an OFDM modulation mode to generate a time interval sequence for normal information transmission, sending the time interval sequence to a block chain network to stamp the time interval sequence, transmitting and storing the time interval sequence by using the block chain network, obtaining the time interval sequence sent by a sender by a receiver of the covert information in a wireless mode, and obtaining the original covert information after demodulating and decoding.
Description
Technical Field
The invention relates to the field of network security, in particular to a block chain-based tamper-proof covert communication method and device.
Background
With the development of network technology, the security of network information communication is more and more emphasized. On one hand, malicious information (such as Trojan horse programs, viruses, network attacks and the like) needs to be blocked and detected; on the other hand, the security and privacy of normal communication information (e.g., business information, personal privacy information, etc.) needs to be protected. The network covert channel can be applied to two aspects of network information communication security, and therefore, the network covert channel is also increasingly emphasized. The network covert channel is defined as a communication channel for carrying out covert information transmission in violation of communication restriction rules under a network environment. Most network hidden channels adopt a mode of direct communication between two communication parties, and a communication line is single in static state and easy to detect, interfere and block pertinently. Although the existing dynamic routing technology can realize the change of a transmission line, the transmission process is still a single line, and the reliability guarantee is lacked.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a block chain based tamper-resistant covert communication method and apparatus capable of improving the reliability of covert communication, aiming at the above-mentioned defects of the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows: a block chain-based anti-tampering covert communication method is constructed, and the method comprises the following steps:
A) encoding the original hidden information by using Huffman coding, arithmetic coding or L-Z coding mode to obtain encoded information;
B) modulating the coded information at a set time interval by using an ASK modulation mode, an FSK modulation mode, a PSK modulation mode, a QAM modulation mode, an MSK modulation mode, a GSM modulation mode or an OFDM modulation mode to generate a time interval sequence for normal information transmission;
C) sending the time interval sequence to a block chain network, and stamping a time stamp for the time interval sequence;
D) transmitting and storing the time interval sequence by using a block chain network;
E) the receiver of the hidden information obtains the time interval sequence sent by the sender in a wireless mode;
F) the receiver of the hidden information demodulates the time interval sequence according to the set time interval, and acquires demodulated information by taking the time stamp of each piece of normal information as a time reference;
G) and decoding the demodulated information to obtain the original hidden information.
In the tamper-resistant covert communication method based on the block chain, the wireless mode is any one or combination of any more of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and an L oRa module.
In the block chain-based tamper-resistant covert communication method, the step D) further includes:
D1) the time interval sequence is broadcasted in a block chain network in a mode appointed by a point-to-point communication protocol;
D2) and all the block chain network nodes receiving the time interval sequence perform distributed storage on the time interval sequence and continue broadcasting the time interval sequence to the block chain network until a receiving party of the hidden information receives the time interval sequence and stores the time interval sequence.
The invention also relates to a device for realizing the anti-tampering covert communication method based on the block chain, which comprises the following steps:
the coding unit is used for coding the original hidden information by using Huffman coding, arithmetic coding or L-Z coding mode to obtain coded information;
a modulation unit: the time interval sequence is used for modulating the coded information at set time intervals by using an ASK modulation mode, an FSK modulation mode, a PSK modulation mode, a QAM modulation mode, an MSK modulation mode, a GSM modulation mode or an OFDM modulation mode to generate normal information transmission time interval sequence;
a time stamping unit: the time interval sequence is sent to a block chain network, and the time interval sequence is stamped by the time stamp;
a transmission storage unit: for transmitting and storing the sequence of time intervals using a blockchain network;
a time interval sequence acquisition unit: the receiver for concealing the information obtains the time interval sequence sent by the sender in a wireless mode;
a demodulation unit: the receiving party for the hidden information demodulates the time interval sequence according to the set time interval, and acquires demodulated information by taking the time stamp of each piece of normal information as a time reference;
a decoding unit: and the decoding module is used for decoding the demodulated information to obtain the original hidden information.
In the device of the invention, the wireless mode is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and an L oRa module.
In the apparatus of the present invention, the transmission storage unit further includes:
a broadcasting module: broadcasting the time interval sequence in a blockchain network in a manner agreed by a point-to-point communication protocol;
a distributed storage module: and the blockchain network nodes used for receiving the time interval sequence perform distributed storage on the time interval sequence and continue broadcasting the time interval sequence to the blockchain network until the receiving party of the hidden information receives the time interval sequence and stores the time interval sequence.
The block chain-based tamper-resistant covert communication method and device have the following beneficial effects: because the original hidden information is coded, the coded information is obtained; modulating the coded information at a set time interval to generate a time interval sequence for normal information transmission; sending the time interval sequence of normal information transmission to a block chain network, and stamping a time stamp for the time interval sequence; transmitting and storing the time interval sequence by using a block chain network; a receiver of the hidden information obtains a time interval sequence sent by a sender in a wireless mode; then, demodulation and decoding are carried out, which can overcome the defects of the traditional network hidden channel, and the invention can improve the reliability of hidden communication.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow diagram of a method in one embodiment of a blockchain based tamper resistant covert communication method and apparatus of the present invention;
FIG. 2 is a specific flow diagram for transmitting and storing a sequence of time intervals using a blockchain network in the embodiment;
fig. 3 is a schematic structural diagram of the device in the embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiment of the tamper-resistant covert communication method and device based on the blockchain, a flow chart of the tamper-resistant covert communication method based on the blockchain is shown in fig. 1. In fig. 1, the block chain-based tamper-resistant covert communication method includes the following steps:
in the step, the original hidden information is subjected to source coding by using Huffman coding, arithmetic coding or L-Z coding, and the coded information is obtained after the source coding.
Step S02 modulates the encoded information at a set time interval by using an ASK modulation mode, an FSK modulation mode, a PSK modulation mode, a QAM modulation mode, an MSK modulation mode, a GSM modulation mode, or an OFDM modulation mode, to generate a time interval sequence for normal information transmission: in this step, the coded information is modulated at a set time interval by an ASK (amplitude modulation) modulation mode, an FSK (frequency modulation) modulation mode, a PSK (phase modulation) modulation mode, a QAM modulation mode, an MSK modulation mode, a GSM modulation mode, or an OFDM modulation mode, to generate a time interval sequence for normal information transmission. Quadrature amplitude modulation QAM is a combination of amplitude modulation and phase modulation; MSK is an improvement of FSK; GMSK is an improvement of MSK, in which a Gaussian low-pass pre-modulation filter is inserted before an MSK (minimum frequency Shift keying) modulator, so that the spectrum utilization rate and the communication quality can be improved; OFDM can be considered a modulation method for multiple carriers.
Step S03 sends the time interval sequence to the blockchain network, and time stamps the time interval sequence: in this step, the time interval sequence is sent to the block chain network, and a timestamp is stamped for each piece of information of the time interval sequence according to the block chain network rule.
Step S04 transmits and stores the time interval sequence using the blockchain network: in this step, the modulated time interval sequence is transmitted and stored by using the blockchain network, and the detailed process thereof will be described later.
The step S05 is that the receiver of the hidden information obtains the time interval sequence sent by the sender through wireless mode, in this step, the receiver of the hidden information observes the block chain network, and obtains the time interval sequence sent by the sender through wireless mode, the wireless mode is any one or combination of any several of 5G communication module, 4G communication module, Bluetooth module, WiFi module, GSM module, CDMA2000 module, WCDMA module, TD-SCDMA module, Zigbee module and L oRa module, through setting up multiple wireless communication modes, it can not only increase the flexibility of the wireless communication mode, but also meet the requirements of different users and different occasions, especially when L oRa module is adopted, its communication distance is far, and the communication performance is stable, and it is suitable for occasions with higher requirement to the communication quality, it can reach high data rate, reduce delay, save energy, reduce cost, improve system capacity and large-scale equipment connection by adopting 5G communication mode.
Step S06 the receiver of the hidden information demodulates the time interval sequence at the set time intervals, and obtains the demodulated information with the time stamp of each piece of normal information as the time reference: in this step, the receiver of the hidden information demodulates the time interval sequence according to the set time interval, and takes the time stamp of each piece of normal information as the time reference, so as to obtain the demodulated information.
And step S07, decoding the demodulated information to obtain original hidden information, wherein in the step, the demodulated information is decoded by using the Huffman coding, arithmetic coding or L-Z coding mechanism to obtain the original hidden information.
For the present embodiment, the step S04 can be further refined, and the detailed flowchart is shown in fig. 2. In fig. 2, the step S04 further includes:
step S41 the time interval sequence is broadcast in the blockchain network in a manner agreed by the point-to-point communication protocol: in this step, the modulated time interval sequence is broadcasted in the blockchain network in a manner agreed by the point-to-point communication protocol.
Step S42 is to perform distributed storage on the time interval sequence by all the blockchain network nodes that receive the time interval sequence, and continue broadcasting the time interval sequence to the blockchain network until the receiver of the hidden information receives the time interval sequence and stores it: in this step, all the network nodes of the block chain that receive the modulated time interval sequence store the modulated time interval sequence in a distributed manner, and continue broadcasting the time interval sequence to the block chain network until the receiver of the hidden information receives the time interval sequence and stores the time interval.
The embodiment also relates to a device for realizing the tamper-resistant covert communication method based on the block chain, and the structural schematic diagram of the device is shown in fig. 3. in fig. 3, the device comprises a coding unit 1, a modulation unit 2, a time stamp unit 3, a transmission storage unit 4, a time interval sequence acquisition unit 5, a demodulation unit 6 and a decoding unit 7, wherein the coding unit 1 is used for carrying out source coding on original covert information by using Huffman coding, arithmetic coding or L-Z coding to obtain coded information, the purpose of the source coding is to reduce redundancy of a source, the transmission is more effective and economical, and the most common application form is compression.
The modulation unit 2 is configured to modulate the encoded information at a set time interval by using an ASK modulation mode, an FSK modulation mode, a PSK modulation mode, a QAM modulation mode, an MSK modulation mode, a GSM modulation mode, or an OFDM modulation mode, and generate a time interval sequence for normal information transmission; quadrature amplitude modulation QAM is a combination of amplitude modulation and phase modulation; MSK is an improvement of FSK; GMSK is an improvement of MSK, in which a Gaussian low-pass pre-modulation filter is inserted before an MSK (minimum frequency Shift keying) modulator, so that the spectrum utilization rate and the communication quality can be improved; OFDM can be considered a modulation method for multiple carriers.
The time stamping unit 3 is configured to send the time interval sequence to the block chain network, and time stamp the time interval sequence. The transmission storage unit 4 is used for transmitting and storing the time interval sequence by using the block chain network.
The time interval sequence acquisition unit 5 is used for a receiver of the hidden information to acquire a time interval sequence sent by a sender in a wireless mode, wherein the wireless mode is any one or combination of any more of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and an L oRa module.
The demodulation unit 6 is used for the receiver of the hidden information to demodulate the time interval sequence according to the set time interval, and the time stamp of each piece of normal information is used as the time reference to obtain the demodulated information; the decoding unit 7 is configured to decode the demodulated information to obtain original hidden information. The device can overcome the defect of the traditional network hidden channel, and the device can improve the reliability of hidden communication.
In this embodiment, the transmission storage unit 4 further includes a broadcasting module 41 and a distributed storage module 42; the broadcasting module 41 is configured to broadcast the time interval sequence in the blockchain network in a manner agreed by a point-to-point communication protocol; the distributed storage module 42 is used for all the blockchain network nodes receiving the time interval sequence, performing distributed storage on the time interval sequence, and continuously broadcasting the time interval sequence to the blockchain network until a receiving party of the hidden information receives the time interval sequence and stores the time interval sequence.
In a word, the invention can overcome the defect of the traditional network hidden channel and can improve the reliability of hidden communication.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (6)
1. A tamper-resistant covert communication method based on a block chain is characterized by comprising the following steps:
A) encoding the original hidden information by using Huffman coding, arithmetic coding or L-Z coding mode to obtain encoded information;
B) modulating the coded information at a set time interval by using an ASK modulation mode, an FSK modulation mode, a PSK modulation mode, a QAM modulation mode, an MSK modulation mode, a GSM modulation mode or an OFDM modulation mode to generate a time interval sequence for normal information transmission;
C) sending the time interval sequence to a block chain network, and stamping a time stamp for the time interval sequence;
D) transmitting and storing the time interval sequence by using a block chain network;
E) the receiver of the hidden information obtains the time interval sequence sent by the sender in a wireless mode;
F) the receiver of the hidden information demodulates the time interval sequence according to the set time interval, and acquires demodulated information by taking the time stamp of each piece of normal information as a time reference;
G) and decoding the demodulated information to obtain the original hidden information.
2. The tamper-resistant covert communication method based on the block chain of claim 1, wherein the wireless mode is any one or a combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and an L oRa module.
3. The block chain based tamper resistant covert communication method of claim 1 or 2, wherein said step D) further comprises:
D1) the time interval sequence is broadcasted in a block chain network in a mode appointed by a point-to-point communication protocol;
D2) and all the block chain network nodes receiving the time interval sequence perform distributed storage on the time interval sequence and continue broadcasting the time interval sequence to the block chain network until a receiving party of the hidden information receives the time interval sequence and stores the time interval sequence.
4. An apparatus for implementing the blockchain-based tamper-resistant covert communication method of claim 1, comprising:
the coding unit is used for coding the original hidden information by using Huffman coding, arithmetic coding or L-Z coding mode to obtain coded information;
a modulation unit: the time interval sequence is used for modulating the coded information at set time intervals by using an ASK modulation mode, an FSK modulation mode, a PSK modulation mode, a QAM modulation mode, an MSK modulation mode, a GSM modulation mode or an OFDM modulation mode to generate normal information transmission time interval sequence;
a time stamping unit: the time interval sequence is sent to a block chain network, and the time interval sequence is stamped by the time stamp;
a transmission storage unit: for transmitting and storing the sequence of time intervals using a blockchain network;
a time interval sequence acquisition unit: the receiver for concealing the information obtains the time interval sequence sent by the sender in a wireless mode;
a demodulation unit: the receiving party for the hidden information demodulates the time interval sequence according to the set time interval, and acquires demodulated information by taking the time stamp of each piece of normal information as a time reference;
a decoding unit: and the decoding module is used for decoding the demodulated information to obtain the original hidden information.
5. The apparatus of claim 4, wherein the wireless mode is any one or a combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and an L oRa module.
6. The apparatus of claim 4 or 5, wherein the transmission storage unit further comprises:
a broadcasting module: broadcasting the time interval sequence in a blockchain network in a manner agreed by a point-to-point communication protocol;
a distributed storage module: and the blockchain network nodes used for receiving the time interval sequence perform distributed storage on the time interval sequence and continue broadcasting the time interval sequence to the blockchain network until the receiving party of the hidden information receives the time interval sequence and stores the time interval sequence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010178563.5A CN111431877A (en) | 2020-03-14 | 2020-03-14 | Block chain-based tamper-proof covert communication method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010178563.5A CN111431877A (en) | 2020-03-14 | 2020-03-14 | Block chain-based tamper-proof covert communication method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111431877A true CN111431877A (en) | 2020-07-17 |
Family
ID=71547828
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010178563.5A Withdrawn CN111431877A (en) | 2020-03-14 | 2020-03-14 | Block chain-based tamper-proof covert communication method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111431877A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114978756A (en) * | 2022-06-22 | 2022-08-30 | 郑州大学 | Generation type block chain covert communication method based on Markov chain |
-
2020
- 2020-03-14 CN CN202010178563.5A patent/CN111431877A/en not_active Withdrawn
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114978756A (en) * | 2022-06-22 | 2022-08-30 | 郑州大学 | Generation type block chain covert communication method based on Markov chain |
CN114978756B (en) * | 2022-06-22 | 2024-04-26 | 郑州大学 | Markov chain-based generation type block chain hidden communication method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109040115B (en) | Covert communication method under block chain network environment | |
Sharma et al. | Analog & digital modulation techniques: an overview | |
US20160336977A1 (en) | Method and system for non-persistent communication | |
KR20050114160A (en) | Method and device for uplink ack information transmission in ofdma systems | |
CN103840909A (en) | Method for improving demodulation correctness | |
Fitz | Fundamentals of communications systems | |
Muslimin et al. | SDR-based transceiver of digital communication system using USRP and GNU radio | |
US20220368575A1 (en) | Modulation Scheme with Amplitude Variation Within Symbol in 5G/6G | |
CN111431877A (en) | Block chain-based tamper-proof covert communication method and device | |
Channi | A comparative study of various digital modulation techniques | |
CN111245570B (en) | Block chain network covert communication method based on multi-node timestamp collusion | |
CN104753841A (en) | Mobile terminal and method for transmitting non-voice data by using voice channel | |
KR20220024962A (en) | A method for generating a signal comprising a temporally continuous chirp, a method for estimating a symbol carrying such a signal, a computer program product and a corresponding apparatus | |
CN110290126A (en) | A kind of radio frequency watermark transmission method based on fsk signal modulation | |
CN103036828B (en) | Multi-carrier frequency hopping communication system based on on-off keying (OOK) modulation | |
CN104993902A (en) | Satellite communication system channel reuse method | |
Adeleke et al. | Modulation methods employed in digital communication: an analysis | |
KR20120090735A (en) | Data transmission apparatus and data transmission method for inserting of additional data at data modulation, and data reconstitution apparatus and data reconstitution method for separately processing data | |
WO2020151836A1 (en) | Dual-modulation transmission in a wireless communication system | |
Udawant et al. | Digital image processing by using GMSK | |
CN116366233B (en) | Secure multicast-oriented data link communication system transmission encryption method and system | |
Thiasiriphet et al. | Chirp-spreaded OFDM-MFSK with differentially encoded phase for applications in low-power wide-area networks | |
CN110383881A (en) | A kind of information sending, receiving method and equipment | |
Latif et al. | Error rate performance of hybrid QAM-FSK in OFDM systems exhibiting low PAPR | |
Phuntsho et al. | Digital Modulation Techniques |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20200717 |