Covert communication based privacy preservation in mobile vehicular networks

R Hussain, D Kim, AO Tokuta… - … Communications …, 2015 - ieeexplore.ieee.org
… In this paper, we proposed a multiple pseudonymous covert communication-based mechanism
to preserve conditional privacy in mobile VANET. The nodes have choice to either use …

Covert channels in privacy-preserving identification systems

DV Bailey, D Boneh, EJ Goh, A Juels - … Computer and communications …, 2007 - dl.acm.org
… We also develop a weaker privacy model where a continuous observer … privacypreserving
tag identification scheme that is CCF-checkable and prove it secure under the weaker privacy

Blockchain meets covert communication: A survey

Z Chen, L Zhu, P Jiang, C Zhang, F Gao… - … Communications …, 2022 - ieeexplore.ieee.org
… • Discuss privacy aspects of the covert communication in … privacy issues that may arise from
the covert communication in … -based covert communication can provide privacy preservation

Towards adaptive covert communication system

FV Yarochkin, SY Dai, CH Lin… - 2008 14th IEEE Pacific …, 2008 - ieeexplore.ieee.org
Covert channels are secret communication paths, which existance is not expected in the
original system design. Covert … resistance, anonimity and privacy preservation to address issues …

CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks

MT Ahvanooey, MX Zhu, W Mazurczyk, Q Li… - Journal of Information …, 2022 - Elsevier
… , military operations, and privacy preservation. Moreover, the current … In this paper, we
present a systematic covert communication … 2, to guarantee the security and privacy of such …

A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022 - Elsevier
… Therefore, users are vulnerable to various security and privacy threats. Contrary to this, covert
communication techniques hide the existence of communication and thus achieve security …

Covert wireless communications in IoT systems: Hiding information in interference

Z Liu, J Liu, Y Zeng, J Ma - IEEE Wireless Communications, 2018 - ieeexplore.ieee.org
… In another scenario, covert communication can also be used to preserve the location privacy
of users. … Practical Privacy Rate: While we can derive the privacy rate of covert wireless …

A steganography algorithm based on CycleGAN for covert communication in the Internet of Things

R Meng, Q Cui, Z Zhou, Z Fu, X Sun - IEEE Access, 2019 - ieeexplore.ieee.org
privacy disclosure and covert communication. In order to make sure secure communications
], adapting to the covert communication and privacy preserving of IoT. Steganalysis network …

Research on a covert communication model realized by using smart contracts in blockchain environment

L Zhang, Z Zhang, W Wang, Z Jin, Y Su… - IEEE Systems …, 2021 - ieeexplore.ieee.org
… , we propose a covert communication model combined with smart contracts to covertly transfer
… On the premise of ensuring the privacy of voting, applying this two-round protocol to the …

Covert and Reliable Semantic Communication Against Cross-Layer Privacy Inference over Wireless Edge Networks

R Xu, G Li, Z Yang, M Chen, Y Liu… - … Communications and …, 2024 - ieeexplore.ieee.org
… of anti-eavesdropping and privacy reconstruction has not yet been … presents a covert and
reliable semantic communication (… for privacy preserving,” IEEE Communications Letters, 2023. …