Blockchain meets covert communication: A survey

Z Chen, L Zhu, P Jiang, C Zhang, F Gao… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Covert communication enables covert information transmission in an undetectable way to
prevent the exposure of communication behaviors. Blockchain-based covert communication …

[HTML][HTML] A Comprehensive Review of Tunnel Detection on Multilayer Protocols: From Traditional to Machine Learning Approaches

Z Sui, H Shu, F Kang, Y Huang, G Huo - Applied Sciences, 2023 - mdpi.com
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade
censorship. While providing convenience to users, tunnel technology poses a hidden …

Covert channel detection: machine learning approaches

MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has
made covert communications easier to construct, faster, undetectable and more secure than …

Performances of single and double basin solar-stills

AA Al-Karaghouli, WE Alnaser - Applied Energy, 2004 - Elsevier
Two solar stills (single basin and double decker) were fabricated and tested. Both have the
same basin area. The inner dimensions of each was 90× 50 cm (effective area 0.45 m2). For …

Building covert timing channel of the IoT-enabled MTS based on multi-stage verification

C Liang, T Baker, Y Li, R Nawaz… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Although the global shipping industry is experiencing a productivity revolution due to the
adoption of IoTs (Internet of Things), the dependence on complex data transmission and …

Mobile ad hoc network routing protocols: performance evaluation and assessment

MA Elsadig, YA Fadlalla - International Journal of Computing …, 2018 - journal.uob.edu.bh
Recently a great deal of attention has been paid to Mobile Ad Hoc Networks (MANETs) due
to their important roles in many different applications that include, but are not limited to: civil …

[PDF][PDF] An ensemble model to detect packet length covert channels.

MA Elsadig, A Gafar - … of Electrical & Computer Engineering (2088 …, 2023 - researchgate.net
Covert channel techniques have enriched the way to commit dangerous and unwatched
attacks. They exploit ways that are not intended to convey information; therefore, traditional …

[PDF][PDF] Security issues and challenges on wireless sensor networks

MA Elsadig, A Altigani, MAA Baraka - Int. J. Adv. Trends Comput …, 2019 - researchgate.net
ABSTRACT Wireless Sensor Networks (WSNs) are emerging as a rich field of active
research that is involved different aspects. Nowadays, sensors are used in many domains as …

[HTML][HTML] PowerBridge: Covert Air-Gap Exfiltration/Infiltration via Smart Plug

Y Liang, H Shan, Z Luo, L Qi, Y Xie - Applied Sciences, 2024 - mdpi.com
Power lines are commonly utilized for energy transmission, and they serve as a conduit for
data exfiltration or infiltration in some specific scenarios. This paper explores the feasibility of …

A balanced approach to eliminate packet length-based covert channels

MA Elsadig, YA Fadlalla - 2017 4th IEEE International …, 2017 - ieeexplore.ieee.org
When information is leaked covertly in a way that violate a system's security policy, a covert
channel does exist. A covert channel is a channel that is exploited for illicit information flow …