Abstract

As the predominant trade secret of manufacturing enterprises, industrial data may be monitored and stolen by competitive adversaries during the transmission via open wireless link. Such information leakage will cause severe economic losses. Hence, a VoNR-IPD covert timing steganography based on 5G network is proposed in this paper, in which VoNR traffic is employed as the steganographic carrier of covert communication in Industrial Internet. Interference of network jitter noise is fully considered and the high-order statistical properties of jittered VoNR interpacket delays (IPDs) are imitated during the modulation of confidential industrial data. Thus, the generated covert VoNR IPDs can possess consistent statistical properties with the normal case in order to improve undetectability. Besides, the synchronization mechanism of steganographic embedding mode is designed to control the embedding density of industrial data flexibly. The experimental results show that our scheme can resist statistical-based detections and the network noise effectively, which outperforms the existing methods in terms of undetectability and robustness.

Highlights

  • Industrial Internet realizes the comprehensive sensing, dynamic transmission, and real-time analysis of industrial data by constructing a basic network connecting the machines, materials, human, and information systems. us, scientific decision and intelligent control can be achieved to improve the efficiency of manufacturing resource allocation and production management, among which the intelligent production management and supervisory control system are mainly engaged in the automatic acquisition, transmission, and analysis of crucial industrial data, such as the core parameters, the overall production data, and the running state of devices

  • On the basis of the above analysis, in order to overcome the drawbacks of the current methods, a VoNR-interpacket delays (IPDs) covert timing steganography based on 5G network is proposed in this paper, in which VoNR traffic is employed as the steganographic carrier of covert communication in Industrial Internet. e main contribution of this paper is as follows: (1) Interference of network jitter noise is fully considered and the high-order statistical properties of jittered VoNR traffic are imitated during the steganographic process

  • Only the noised VoNR traffic may be captured and analyzed by the network monitor device or an adversary. us, it should be noted that only the jittered case of normal or covert traffic is considered in this paper

Read more

Summary

Introduction

Industrial Internet realizes the comprehensive sensing, dynamic transmission, and real-time analysis of industrial data by constructing a basic network connecting the machines, materials, human, and information systems. us, scientific decision and intelligent control can be achieved to improve the efficiency of manufacturing resource allocation and production management, among which the intelligent production management and supervisory control system are mainly engaged in the automatic acquisition, transmission, and analysis of crucial industrial data, such as the core parameters, the overall production data, and the running state of devices. Since 5G communication technique based on New Radio (NR) standard possesses the advantages of high data rate, low cost, low power consumption, ultralow latency, and availability, it has gradually become the main means of data transfer in the Industrial Internet It will achieve more wide and comprehensive application in the future. On the basis of the above analysis, in order to overcome the drawbacks of the current methods, a VoNR-IPD covert timing steganography based on 5G network is proposed in this paper, in which VoNR traffic is employed as the steganographic carrier of covert communication in Industrial Internet. (2) e synchronization mechanism of steganographic embedding mode is designed to control the embedding density of industrial data flexibly In this manner, our scheme can resist the network noise effectively, so as to improve the undetectability and robustness of covert communication in Industrial Internet.

Related Work
Basis of Our Scheme
The Proposed Scheme
Steganography Encoding
Steganography Decoding
Experiment Results and Analysis
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call