{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T17:45:08Z","timestamp":1768412708756,"version":"3.49.0"},"reference-count":24,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,6,28]],"date-time":"2020-06-28T00:00:00Z","timestamp":1593302400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100010023","name":"Natural Science Research of Jiangsu Higher Education Institutions of China","doi-asserted-by":"publisher","award":["19KJB510019"],"award-info":[{"award-number":["19KJB510019"]}],"id":[{"id":"10.13039\/501100010023","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010023","name":"Natural Science Research of Jiangsu Higher Education Institutions of China","doi-asserted-by":"publisher","award":["201913114004Y"],"award-info":[{"award-number":["201913114004Y"]}],"id":[{"id":"10.13039\/501100010023","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010023","name":"Natural Science Research of Jiangsu Higher Education Institutions of China","doi-asserted-by":"publisher","award":["CM20183002"],"award-info":[{"award-number":["CM20183002"]}],"id":[{"id":"10.13039\/501100010023","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010023","name":"Natural Science Research of Jiangsu Higher Education Institutions of China","doi-asserted-by":"publisher","award":["2019-YBKJ-05"],"award-info":[{"award-number":["2019-YBKJ-05"]}],"id":[{"id":"10.13039\/501100010023","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovation and Entrepreneurship Training Program for College Students of Jiangsu Province","award":["19KJB510019"],"award-info":[{"award-number":["19KJB510019"]}]},{"name":"Innovation and Entrepreneurship Training Program for College Students of Jiangsu Province","award":["201913114004Y"],"award-info":[{"award-number":["201913114004Y"]}]},{"name":"Innovation and Entrepreneurship Training Program for College Students of Jiangsu Province","award":["CM20183002"],"award-info":[{"award-number":["CM20183002"]}]},{"name":"Innovation and Entrepreneurship Training Program for College Students of Jiangsu Province","award":["2019-YBKJ-05"],"award-info":[{"award-number":["2019-YBKJ-05"]}]},{"name":"Changzhou Key Laboratory of Industrial Internet and Data Intelligence","award":["19KJB510019"],"award-info":[{"award-number":["19KJB510019"]}]},{"name":"Changzhou Key Laboratory of Industrial Internet and Data Intelligence","award":["201913114004Y"],"award-info":[{"award-number":["201913114004Y"]}]},{"name":"Changzhou Key Laboratory of Industrial Internet and Data Intelligence","award":["CM20183002"],"award-info":[{"award-number":["CM20183002"]}]},{"name":"Changzhou Key Laboratory of Industrial Internet and Data Intelligence","award":["2019-YBKJ-05"],"award-info":[{"award-number":["2019-YBKJ-05"]}]},{"name":"Project of Changzhou Vocational Institute of Mechatronic Technology","award":["19KJB510019"],"award-info":[{"award-number":["19KJB510019"]}]},{"name":"Project of Changzhou Vocational Institute of Mechatronic Technology","award":["201913114004Y"],"award-info":[{"award-number":["201913114004Y"]}]},{"name":"Project of Changzhou Vocational Institute of Mechatronic Technology","award":["CM20183002"],"award-info":[{"award-number":["CM20183002"]}]},{"name":"Project of Changzhou Vocational Institute of Mechatronic Technology","award":["2019-YBKJ-05"],"award-info":[{"award-number":["2019-YBKJ-05"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,6,28]]},"abstract":"<jats:p>As the predominant trade secret of manufacturing enterprises, industrial data may be monitored and stolen by competitive adversaries during the transmission via open wireless link. Such information leakage will cause severe economic losses. Hence, a VoNR-IPD covert timing steganography based on 5G network is proposed in this paper, in which VoNR traffic is employed as the steganographic carrier of covert communication in Industrial Internet. Interference of network jitter noise is fully considered and the high-order statistical properties of jittered VoNR interpacket delays (IPDs) are imitated during the modulation of confidential industrial data. Thus, the generated covert VoNR IPDs can possess consistent statistical properties with the normal case in order to improve undetectability. Besides, the synchronization mechanism of steganographic embedding mode is designed to control the embedding density of industrial data flexibly. The experimental results show that our scheme can resist statistical-based detections and the network noise effectively, which outperforms the existing methods in terms of undetectability and robustness.<\/jats:p>","DOI":"10.1155\/2020\/8846230","type":"journal-article","created":{"date-parts":[[2020,6,28]],"date-time":"2020-06-28T23:30:57Z","timestamp":1593387057000},"page":"1-14","source":"Crossref","is-referenced-by-count":3,"title":["VoNR-IPD: A Novel Timing-Based Network Steganography for Industrial Internet"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1142-4274","authenticated-orcid":true,"given":"Mingqian","family":"Wang","sequence":"first","affiliation":[{"name":"School of Information Engineering, Changzhou Vocational Institute of Mechatronic Technology, Changzhou 213164, China"}]},{"given":"Shuai","family":"Cao","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Changzhou Vocational Institute of Mechatronic Technology, Changzhou 213164, China"}]},{"given":"Yunliang","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Changzhou Vocational Institute of Mechatronic Technology, Changzhou 213164, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2015.2389960"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.15837\/ijccc.2013.3.469"},{"issue":"3","key":"3","first-page":"11","volume":"6","year":"2016","journal-title":"International Journal of Advances in Computer Networks and Its Security"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.8.1.182-188"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1772-4"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5264526"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2020.2982534"},{"issue":"2","key":"8","first-page":"243","volume":"55","year":"2018","journal-title":"Computers Materials & Continua"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2015.2505688"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_12"},{"issue":"1","key":"11","first-page":"1","volume":"55","year":"2018","journal-title":"Computers Materials & Continua"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.03.007"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.11.001"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2218-0"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2012.64"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2015.2446769"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/tbc.2016.2623241"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2517-0"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.01.051"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2596-y"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2937969"},{"issue":"3","key":"25","first-page":"433","volume":"56","year":"2018","journal-title":"Computers Materials & Continua"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2010.46"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2019.05450"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8846230.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8846230.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8846230.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,28]],"date-time":"2020-06-28T23:31:09Z","timestamp":1593387069000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8846230\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,28]]},"references-count":24,"alternative-id":["8846230","8846230"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8846230","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,28]]}}}