{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:32:25Z","timestamp":1761129145532},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2014,5,29]],"date-time":"2014-05-29T00:00:00Z","timestamp":1401321600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s12083-014-0287-x","type":"journal-article","created":{"date-parts":[[2014,5,27]],"date-time":"2014-05-27T22:57:50Z","timestamp":1401231470000},"page":"1038-1047","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A lightweight identity authentication method by exploiting network covert channel"],"prefix":"10.1007","volume":"8","author":[{"given":"Haijiang","family":"Xie","sequence":"first","affiliation":[]},{"given":"Jizhong","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,29]]},"reference":[{"key":"287_CR1","doi-asserted-by":"crossref","unstructured":"Butler KRB, Ryu S, Traynor P, McDaniel PD (2009) Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. Parallel and Distributed Systems, IEEE Transactions on, vol. 20, pp. 1803\u20131815, 2009-01-01","DOI":"10.1109\/TPDS.2008.249"},{"key":"287_CR2","unstructured":"Byeong-Thaek O, Sang-Bong L, Ho-Jin P (2008) A Peer Mutual Authentication Method using PKI on Super Peer based Peer-to-Peer Systems. In Advanced Communication Technology. ICACT 2008. 10th International Conference on, 2008, pp. 2221\u20132225"},{"key":"287_CR3","doi-asserted-by":"crossref","unstructured":"Lamport L (1981) Password authentication with insecure communication, Communications of ACM, no. 24, pp. 770\u2013772","DOI":"10.1145\/358790.358797"},{"key":"287_CR4","unstructured":"Neuman BC, Ts\u2019O T (1994) Kerberos: an authentication service for computer networks, Communications Magazine, IEEE, vol. 32, pp. 33\u201338, 1994-01-01"},{"key":"287_CR5","doi-asserted-by":"crossref","unstructured":"Rhee K, Kwark, Kim S, Won D (2005) Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. 3450: p. 70\u201384","DOI":"10.1007\/978-3-540-32004-3_9"},{"key":"287_CR6","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"DP David Pointcheval","year":"2000","unstructured":"David Pointcheval DP, Jacques Stern JS (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13:361\u2013396","journal-title":"J Cryptol"},{"key":"287_CR7","doi-asserted-by":"crossref","unstructured":"Huang K, Ou Q, Wu X, Song Y (2009) Cryptanalysis of a Remote User Authentication Scheme Using Smart Cards, Proc. Wireless Communications, Networking and Mobile Computing, 2009. WiCom \u201909. 5th International Conference on, pp. 1\u20134","DOI":"10.1109\/WICOM.2009.5302288"},{"issue":"1","key":"287_CR8","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/S0920-5489(99)00029-X","volume":"22","author":"J Hwang","year":"2000","unstructured":"Hwang J, Wu K, Liu D (2000) Access control with role attribute certificates. Comput Stand Interfaces 22(1):43\u201353","journal-title":"Comput Stand Interfaces"},{"issue":"2","key":"287_CR9","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/TIFS.2010.2043188","volume":"5","author":"M Upmanyu","year":"2010","unstructured":"Upmanyu M, Namboodiri AM, Srinathan K, Jawahar CV (2010) Blind authentication: a secure crypto-biometric verification protocol. IEEE Trans Inform Forensics Secur 5(2):255\u2013268","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"4","key":"287_CR10","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1109\/TMM.2004.830814","volume":"6","author":"W Min","year":"2004","unstructured":"Min W, Liu B (2004) Data hiding in binary image for authentication and annotation. IEEE Trans Multimedia 6(4):528\u2013538","journal-title":"IEEE Trans Multimedia"},{"key":"287_CR11","doi-asserted-by":"crossref","unstructured":"Chen GX, Chen HF, Xie L, Song GL, Zhuang T (2010) An identity authentication scheme in wireless peer-to-peer network. In Communication Technology (ICCT), 12th IEEE International Conference on, 2010, pp. 473\u2013476","DOI":"10.1109\/ICCT.2010.5688868"},{"issue":"9","key":"287_CR12","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/JSAC.2013.SUP.0513007","volume":"31","author":"S He","year":"2013","unstructured":"He S, Li X, Chen J, Cheng P, Sun Y, Simplot-Ryl D (2013) EMD: energy-efficient P2P message dissemination in delay-tolerant wireless sensor and actor networks. IEEE J Sel Areas in Commun 31(9):75\u201384. doi: 10.1109\/JSAC.2013.SUP.0513007","journal-title":"IEEE J Sel Areas in Commun"},{"key":"287_CR13","unstructured":"Zhou YH, Lin HQ (2010) An authentication protocol without trusted third party on P2P network. In Future Computer and Communication (ICFCC), 2nd International Conference on, 2010, pp. V2-686-V2-689"},{"key":"287_CR14","doi-asserted-by":"crossref","unstructured":"Monrose F, Rubin A (1997) Authentication via keystroke dynamics. In Proceedings of the 4th ACM conference on Computer and communications security. Zurich, Switzerland: ACM","DOI":"10.1145\/266420.266434"},{"key":"287_CR15","doi-asserted-by":"crossref","unstructured":"Zhang C, Lu R, Lin X, Ho P, Shen X (2008) An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. In INFOCOM 2008. The 27th Conference on Computer Communications. IEEE","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"287_CR16","unstructured":"Cabuk S (2006) Network covert channels: design, analysis, detection, and elimination. West Lafayette, IN, USA"},{"key":"287_CR17","doi-asserted-by":"crossref","unstructured":"Sun Y, Guan X, Liu T, Qu Y (2012) An identity authentication mechanism based on timing covert channel. in 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, June 25, 2012 - June 27, 2012, Liverpool, United kingdom, pp. 832\u2013836","DOI":"10.1109\/TrustCom.2012.80"},{"issue":"10","key":"287_CR18","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"BW Lampson","year":"1973","unstructured":"Lampson BW (1973) A note on the confinement problem. Commun ACM 16(10):613\u2013615","journal-title":"Commun ACM"},{"key":"287_CR19","unstructured":"U.D.of Defense (1985) Trusted Computer System Evaluation Criteria TCSEC. DOD5200.28-STD. Washington"},{"issue":"2","key":"287_CR20","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1109\/TSE.1987.233153","volume":"13","author":"CG Griling","year":"1987","unstructured":"Griling CG (1987) Covert channels in LANs[J]. IEEE Trans Softw Eng 13(2):292\u2013296","journal-title":"IEEE Trans Softw Eng"},{"key":"287_CR21","unstructured":"Wolf M (1989) Covert channels in LAN protocols Local Area Network Security. 396: p. 89\u2013101."},{"key":"287_CR22","unstructured":"Handel T, Sandford M (1996) Hiding data in the OSI network model Information Hiding. 1174: p. 23\u201338"},{"key":"287_CR23","volume-title":"Covert channels analysis and practical data hiding in TCP\/IP","author":"A Kamran","year":"2002","unstructured":"Kamran A (2002) Covert channels analysis and practical data hiding in TCP\/IP. University of Toronto, Canada"},{"key":"287_CR24","unstructured":"Kamran A, Deepa K (2002) Practical Data Hiding in TCP\/IP. In Proc. ACM Workshop on Multimedia Security, vol. 2002"},{"key":"287_CR25","unstructured":"Murdoch S, Lewis S (2005) Embedding Covert Channels into TCP\/IP Information Hiding. 3727: p. 247\u2013261"},{"key":"287_CR26","unstructured":"Steven JM, Stephen L (2005) Embedding Covert Channels into TCP\/IP. in Proceedings of the 7th Information Hidding Workshop"},{"issue":"3","key":"287_CR27","doi-asserted-by":"crossref","first-page":"219","DOI":"10.3233\/JCS-1992-13-403","volume":"1","author":"JC Wray","year":"1992","unstructured":"Wray JC (1992) An analysis of covert timing channels. J Comput Secur 1(3):219\u2013232","journal-title":"J Comput Secur"},{"issue":"1","key":"287_CR28","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/TPDS.2013.36","volume":"25","author":"H Zhu","year":"2014","unstructured":"Zhu H, Du S, Gao Z, Dong M, Cao Z (2014) A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Trans Parallel Distrib Syst 25(1):22\u201332","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"287_CR29","doi-asserted-by":"crossref","unstructured":"Sellke SH, Wang CC, Bagchi S, Shroff N (2009) TCP\/IP Timing Channels: Theory to Implementation. In INFOCOM 2009, IEEE","DOI":"10.1109\/INFCOM.2009.5062145"},{"key":"287_CR30","doi-asserted-by":"crossref","unstructured":"Liu Y, Ghosal D, Armknecht F, Sadeghi A, Schultz S, Katzenbeisser S (2009) Hide and seek in time\u2014robust covert timing channels. Computer Security\u2013ESORICS 2009: 120\u2013135","DOI":"10.1007\/978-3-642-04444-1_8"},{"key":"287_CR31","volume-title":"Robust and undetectable steganographic timing channels for iid traffic. Information hiding","author":"Y Liu","year":"2010","unstructured":"Liu Y, Ghosal D, Armknecht F, Sadeghi A, Schultz S, Katzenbeisser S (2010) Robust and undetectable steganographic timing channels for iid traffic. Information hiding. Springer, Berlin\/Heidelberg"},{"issue":"24","key":"287_CR32","doi-asserted-by":"crossref","first-page":"6387","DOI":"10.1109\/TSP.2013.2286102","volume":"61","author":"J He","year":"2013","unstructured":"He J, Cheng P, Shi L, Chen J (2013) SATS: secure average-consensus-based time synchronization in wireless sensor networks. IEEE Trans Signal Process 61(24):6387\u20136400","journal-title":"IEEE Trans Signal Process"},{"key":"287_CR33","doi-asserted-by":"crossref","DOI":"10.1145\/1030083.1030108","volume-title":"IP covert timing channels: design and detection. In proceedings of the 11th ACM conference on computer and communications security","author":"S Cabuk","year":"2004","unstructured":"Cabuk S, Brodley CE, Shields C (2004) IP covert timing channels: design and detection. In proceedings of the 11th ACM conference on computer and communications security. ACM, Washington"},{"key":"287_CR34","doi-asserted-by":"crossref","unstructured":"Hongwei Li, Xiaodong Lin, Haomiao Yang, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen, EPPDR: An Efficient Privacy \u2013 Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid, IEEE Transactions on Parallel and Distributed Systems, doi: 10.1109\/TPDS.2013.124","DOI":"10.1109\/TPDS.2013.124"},{"key":"287_CR35","doi-asserted-by":"crossref","unstructured":"Hongwei Li, Rongxing Lu, Liang Zhou, Bo Yang, and Xuemin (Sherman) Shen. An Efficient Merkle Tree Based Authentication Scheme for Smart Grid, IEEE SYSTEMS Journal, doi: 10.1109\/JSYST.2013.2271537","DOI":"10.1109\/JSYST.2013.2271537"},{"key":"287_CR36","doi-asserted-by":"crossref","unstructured":"Dong M, Ota K, Li H, Du S, Zhu H, Guo S (2013) RENDEZVOUS: towards fast event detecting in wireless sensor and actor networks. Computing, pp. 1\u201316. doi: 10.1007\/s00607-013-0364-7","DOI":"10.1007\/s00607-013-0364-7"},{"key":"287_CR37","doi-asserted-by":"crossref","unstructured":"Dong M, Ota K, Lin M, Tang Z, Du S, Zhu H (2014) UAV-assisted data gathering in wireless sensor networks. The Journal of Supercomputing, pp. 1\u201314. doi: 10.1007\/s11227-014-1161-6","DOI":"10.1007\/s11227-014-1161-6"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0287-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-014-0287-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0287-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T22:22:08Z","timestamp":1565475728000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-014-0287-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,29]]},"references-count":37,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["287"],"URL":"https:\/\/doi.org\/10.1007\/s12083-014-0287-x","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,29]]}}}