{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:08:01Z","timestamp":1772122081590,"version":"3.50.1"},"reference-count":46,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,8,5]],"date-time":"2020-08-05T00:00:00Z","timestamp":1596585600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636217"],"award-info":[{"award-number":["U1636217"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2016QY05X1000"],"award-info":[{"award-number":["2016QY05X1000"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2018YFB1800200"],"award-info":[{"award-number":["2018YFB1800200"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2019B010137003"],"award-info":[{"award-number":["2019B010137003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["U1636217"],"award-info":[{"award-number":["U1636217"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2016QY05X1000"],"award-info":[{"award-number":["2016QY05X1000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2018YFB1800200"],"award-info":[{"award-number":["2018YFB1800200"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2019B010137003"],"award-info":[{"award-number":["2019B010137003"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["U1636217"],"award-info":[{"award-number":["U1636217"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2016QY05X1000"],"award-info":[{"award-number":["2016QY05X1000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2018YFB1800200"],"award-info":[{"award-number":["2018YFB1800200"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2019B010137003"],"award-info":[{"award-number":["2019B010137003"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Key Research and Development Program for Guangdong Province","award":["U1636217"],"award-info":[{"award-number":["U1636217"]}]},{"name":"Key Research and Development Program for Guangdong Province","award":["2016QY05X1000"],"award-info":[{"award-number":["2016QY05X1000"]}]},{"name":"Key Research and Development Program for Guangdong Province","award":["2018YFB1800200"],"award-info":[{"award-number":["2018YFB1800200"]}]},{"name":"Key Research and Development Program for Guangdong Province","award":["2019B010137003"],"award-info":[{"award-number":["2019B010137003"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,8,5]]},"abstract":"<jats:p>In order to protect user privacy or guarantee free access to the Internet, the network covert channel has become a hot research topic. It refers to an information channel in which the messages are covertly transmitted under the network environment. In recent years, many new construction schemes of network covert channels are proposed. But at the same time, network covert channel has also received the attention of censors, leading to many attacks. The network covert channel refers to an information channel in which the messages are covertly transmitted under the network environment. Many users exploit the network covert channel to protect privacy or guarantee free access to the Internet. Previous construction schemes of the network covert channel are based on information steganography, which can be divided into CTCs and CSCs. In recent years, there are some covert channels constructed by changing the transmission network architecture. On the other side, some research work promises that the characteristics of emerging network may better fit the construction of the network covert channel. In addition, the covert channel can also be constructed by changing the transmission network architecture. The proxy and anonymity communication technology implement this construction scheme. In this paper, we divide the key technologies for constructing network covert channels into two aspects: communication content level (based on information steganography) and transmission network level (based on proxy and anonymity communication technology). We give an comprehensively summary about covert channels at each level. We also introduce work for the three new types of network covert channels (covert channels based on streaming media, covert channels based on blockchain, and covert channels based on IPv6). In addition, we present the attacks against the network covert channel, including elimination, limitation, and detection. Finally, the challenge and future research trend in this field are discussed.<\/jats:p>","DOI":"10.1155\/2020\/8892896","type":"journal-article","created":{"date-parts":[[2020,8,5]],"date-time":"2020-08-05T23:47:15Z","timestamp":1596671235000},"page":"1-20","source":"Crossref","is-referenced-by-count":33,"title":["A Survey of Key Technologies for Constructing Network Covert Channel"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2949-5345","authenticated-orcid":true,"given":"Jing","family":"Tian","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Zhen","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3533-4874","authenticated-orcid":true,"given":"Gaopeng","family":"Gou","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"311","reference":[{"key":"2","volume-title":"Tracking ghostnet: investigating a cyber espionage network","year":"2009"},{"issue":"8","key":"7","first-page":"2470","volume":"30","year":"2019","journal-title":"Journal of Software"},{"key":"10","volume-title":"Financial cryptography and data security\u2014FC 2015 international workshops, BITCOIN, WAHC, and wearable, San Juan, Puerto Rico, January 30, 2015","volume":"8976","year":"2015"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2019.1800819"},{"key":"14","first-page":"55","volume":"2020","year":"2020","journal-title":"IACR Cryptology ePrint Archive"},{"key":"15","first-page":"1083","volume":"2019","year":"2019","journal-title":"IACR Cryptology ePrint Archive"},{"issue":"1","key":"17","first-page":"228","volume":"31","year":"2020","journal-title":"Journal of Software"},{"issue":"10","key":"18","first-page":"2373","volume":"52","year":"2015","journal-title":"Computer Research and Development"},{"key":"21","first-page":"1","volume":"3143","year":"2001","journal-title":"RFC"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0024"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0037"},{"issue":"5","key":"28","first-page":"67","volume":"40","year":"2019","journal-title":"Journal on Communications"},{"issue":"3","key":"35","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/COMST.2007.4317620","volume":"9","year":"2007","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"37","first-page":"51","volume-title":"The prisoners\u2019 problem and the subliminal channel","year":"1984"},{"issue":"3","key":"39","first-page":"50","volume":"47","year":"2015","journal-title":"ACM Computing Surveys"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2007.4317620"},{"issue":"2","key":"41","first-page":"274","volume":"13","year":"2015","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"3","key":"48","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1007\/s00500-009-0530-1","volume":"15","year":"2011","journal-title":"Soft Computing"},{"issue":"5","key":"50","volume":"2","year":"1997","journal-title":"First Monday"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968740"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9368-1"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.11.001"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2802783"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2013.2289978"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.03.004"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2945320"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2019.11.002"},{"key":"65","first-page":"211","volume-title":"Untraceable electronic mail, return addresses and digital pseudonyms","year":"2003"},{"issue":"1","key":"66","first-page":"66","volume":"1","year":"1997","journal-title":"ACM Transactions on Information and System Security"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.3233\/jcs-2005-13602"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"70","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0008"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1007\/bf00206326"},{"key":"74","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2016.121"},{"key":"86","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-017-0379-8"},{"issue":"s1","key":"87","first-page":"141","volume":"37","year":"2007","journal-title":"Journal of Southeast University"},{"key":"92","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293778"},{"issue":"164","key":"93","first-page":"30","volume":"63","year":"2001","journal-title":"Designing Privacy Enhancing Technologies"},{"key":"95","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1967.10482916"},{"key":"97","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"},{"key":"99","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.03.007"},{"key":"100","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.01.051"},{"issue":"9","key":"101","volume":"32","year":"2011","journal-title":"Journal of China Institute of Communications"},{"key":"103","doi-asserted-by":"publisher","DOI":"10.1007\/s004220050414"},{"issue":"2","key":"105","first-page":"120","volume":"16","year":"2015","journal-title":"Journal of PLA University of Science and Technology"},{"issue":"3","key":"106","first-page":"540","volume":"24","year":"2013","journal-title":"Journal of Southeast University"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8892896.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8892896.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8892896.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,5]],"date-time":"2020-08-05T23:47:41Z","timestamp":1596671261000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8892896\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,5]]},"references-count":46,"alternative-id":["8892896","8892896"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8892896","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,5]]}}}