A survey on covert communicationbased access control enhancement technology
Zhang Hong,Guo Yunwei
(School of Computing Science,Beijing Institute of Technology, Beijing 100081, China)
Abstract: The network access control model is important for security prevention and protection. Most of the existing network access control models are implemented through encryption, which has defects in concealment and controllability, and is easy to detect and attack. The covert communication technology based on steganographic labels mainly detects whether network packets contain stegantic headers, and determines the flow direction of packets according to access control rules, to effectively control the subject’s access to objects. In addition, this paper introduces the access control rules under several access control methods in detail, and describes the corresponding detection methods for various types of covert channels. Finally, this paper analyzes the development trend of blockchain covert communication construction technology and its detection methods, aiming to provide some significant value for related research.
Key words : access control; covert communication; blockchain; information hiding