通信学报 ›› 2022, Vol. 43 ›› Issue (10): 121-132.doi: 10.11959/j.issn.1000-436x.2022194
佘维1,2,3, 荣欣鹏1,3, 刘炜1,2,3, 田钊1,3
修回日期:
2022-09-08
出版日期:
2022-10-25
发布日期:
2022-10-01
作者简介:
佘维(1977− ),男,湖南常德人,博士,郑州大学教授、博士生导师,主要研究方向为区块链技术、信息安全、智能系统基金资助:
Wei SHE1,2,3, Xinpeng RONG1,3, Wei LIU1,2,3, Zhao TIAN1,3
Revised:
2022-09-08
Online:
2022-10-25
Published:
2022-10-01
Supported by:
摘要:
摘 要:为了解决目前区块链隐蔽通信中信道构建风险高、信息交叉、隐蔽性不足等问题,提出了一种基于马尔可夫链的生成式区块链隐蔽通信模型。首先,发送方使用文本数据集获取候选单词集并进行马尔可夫模型训练,获得转移概率矩阵,并生成哈夫曼树集合;随后,对需要传输的秘密信息二进制流进行迭代式哈夫曼解码,以获得一组符合正常语言与语义特征、可读性强的载密信息语句,利用生成式隐写方法完成秘密信息嵌入;然后,将该载密信息进行环签名后,作为正常交易发布到区块链网络中并完成打包和出块;最后,接收方利用相同的文本数据集获取转移概率权值哈夫曼树,逆向操作获得秘密信息二进制流。实验结果表明,相较于目前的同类模型,所提模型可进一步提高嵌入强度和时间效率,降低隐蔽信道构建风险,避免信息交叉,提升隐蔽性。
中图分类号:
佘维, 荣欣鹏, 刘炜, 田钊. 基于马尔可夫链的生成式区块链隐蔽通信模型[J]. 通信学报, 2022, 43(10): 121-132.
Wei SHE, Xinpeng RONG, Wei LIU, Zhao TIAN. Generative blockchain-based covert communication model based on Markov chain[J]. Journal on Communications, 2022, 43(10): 121-132.
表1
FISCO BCOS模拟区块链网络账户信息"
账户 | 公钥 | 地址 |
1 | MFYwEAYHKoZIzj0CAQYFK4EEAAoDQgAE1AmpGkJIvbwXh0W5LoSz/3Dz4NgWyCaj | 0x4bfb4f1264cbb514efe0e7 |
2zvJzQ0oeVHKd3RZ2LsCxI9cL1oJ6EeC4nFb4K6e/hqOcQrBkEyQfQ== | 9a46b20414923f8793 | |
2 | MFYwEAYHKoZIzj0CAQYFK4EEAAoDQgAE610GR0AyCCw78xnzXwIg5JeV2AqolzE2 | 0x30a92712e37b6073be81c |
sH11pIfyJ6DJ0SP231rUlhsBrPJ/GXIqwMWdpbftWc57sQ+XSSwnIg== | 1e34f723a9087d7fe44 | |
3 | MFYwEAYHKoZIzj0CAQYFK4EEAAoDQgAEf+aglmFKjTAqjQ6CLC/nqt5GL0lU1Xvf | 0x1851cddaad12516966af0 |
bBc2RfDOabl3hGN5+wB6Z4qRaDZ8ipZ23cEjlVJlZIIv2zCCeJFwjg== | dff981948b6651b3676 | |
4 | MFYwEAYHKoZIzj0CAQYFK4EEAAoDQgAEEyyhr/81h6ddsRFfIBsWXmq/M2SSyC/x | 0xa12c5e342abe3fac5a085d |
R8UfbXKrlUtLod6GdOkM1OkHHP5H1TZYpxw2pV3MsZOCaDzvoINi8g== | 62db38371d507d23c7 | |
5 | MFYwEAYHKoZIzj0CAQYFK4EEAAoDQgAEg+5PW6D7sbBXsS0PkuAKUf9uyimKPuvt | 0x9b89659737c90a697459f |
FAu/+Oa8h7uGHRCYgSYaR2dgzP2VstgUX2UHOBKdslSYmyLAUegbDg== | b3e70759774559b34ce | |
? | ? | ? |
20 | MFYwEAYHKoZIzj0CAQYFK4EEAAoDQgAEC7xmrxLLJESpjah0Gn1XJwh5g2sww5nx | 0x5f761a44f9d99eda0e3dca |
00w4C+loMEE0E4E6ogAtHCp+7LLkuSsH7fw/WY/QOQacuay9IjZ9Ow== | 67bdd10638771eed59 |
表4
区块部分字段结构"
字段 | 内容 |
hash | 0x8035ddf8cbaccde09e6c8e8f8ca9c234891592152c08be6776c3e1e958cf6b43 |
TransactionHash | 0xd4ebcc34d085c4486313f727aa2b05eb69bcca402b1c905f1b8caffcb7e64028 |
parentHash | 0xce5bbcbd5ff2445780f19ba8e14b6ac04da26ede9dfb70f7885a8bfb54acff3f |
transactionsRoot | 0x82e86fa5a9cccdb1aaffd9ef75ff64746cb50282b7a3ab9c253d70edc4734078 |
receiptsRoot | 0x31fedd393d3f418ebb75f6c3b8320c71c34effbf326d629535dbef54051d7b86 |
stateRoot | 0x490d0bed041454dcd8b314c22e71d234a11d8b987df62cbbbf8625be5117267f |
sealer | 156fa8be62dda0bc318f71c713e8fd50365269cd8f1018abd4977d1c7fb7017bfd1c479555063891730ffb48a547ea19a534b2f 782893847b20e5c124c6aa5fd |
timestamp | 0x18109da9d51 |
表5
交易部分字段结构"
字段 | 内容 |
hash | 0xd4ebcc34d085c4486313f727aa2b05eb69bcca402b1c905f1b8caffcb7e64028 |
blockHash | 0x8035ddf8cbaccde09e6c8e8f8ca9c234891592152c08be6776c3e1e958cf6b43 |
from | 0x4bfb4f1264cbb514efe0e79a46b20414923f8793 |
gas | 0x419ce0 |
data | i hate when i have so much school work to do and does anyone know if there is a book for student |
to | 0xe03cd2fde34edb14424271781f7e7b4ad2c58a53 |
gasPrice | 0x51f4d5c00 |
[1] | 李彦峰, 丁丽萍, 吴敬征 ,等. 网络隐蔽信道关键技术研究综述[J]. 软件学报, 2019,30(8): 2470-2490. |
LI Y F , DING L P , WU J Z ,et al. Survey on key issues in networks covert channel[J]. Journal of Software, 2019,30(8): 2470-2490. | |
[2] | BERNSTEIN D J , HENINGER N , LOU P ,et al. Post-quantum RSA[C]// Proceedings of 2017 International Workshop on Post-Quantum Cryptography. Berlin:Springer, 2017: 311-329. |
[3] | BERNSTEIN D J , BREITNER J , GENKIN D ,et al. Sliding right into disaster:left-to-right sliding windows leak[C]// Proceedings of International Conference on Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2017: 555-576. |
[4] | PETITCOLAS F A P , ANDERSON R J , KUHN M G . Information hiding-a survey[J]. Proceedings of the IEEE, 1999,87(7): 1062-1078. |
[5] | 刘敖迪, 杜学绘, 王娜 ,等. 区块链技术及其在信息安全领域的研究进展[J]. 软件学报, 2018,29(7): 2092-2115. |
LIU A D , DU X H , WANG N ,et al. Research progress of blockchain technology and its application in information security[J]. Journal of Software, 2018,29(7): 2092-2115. | |
[6] | PARTALA J . Provably secure covert communication on blockchain[J]. Cryptography, 2018,2(3): 18. |
[7] | 宋上, 彭伟 . BLOCCE+:一种改进的基于区块链的隐蔽通信方法[J]. 重庆理工大学学报(自然科学), 2020,34(9): 238-244. |
SONG S , PENG W . BLOCCE +:an improved blockchain-based covert communication approach[J]. Journal of Chongqing University of Technology (Natural Science), 2020,34(9): 238-244. | |
[8] | ZHANG L J , ZHANG Z J , WANG W Z ,et al. A covert communication method using special bitcoin addresses generated by vanitygen[J]. Computers,Materials & Continua, 2020,65(1): 597-616. |
[9] | GUO Z Z , SHI L C , XU M Z ,et al. MRCC:a practical covert channel over monero with provable security[J]. IEEE Access, 2021,9: 31816-31825. |
[10] | 蓝怡琴, 张方国, 田海博 . 利用门罗币实现隐蔽通信[J]. 西安电子科技大学学报, 2020,47(5): 19-27. |
LAN Y Q , ZHANG F G , TIAN H B . Using Monero to realize covert communication[J]. Journal of Xidian University, 2020,47(5): 19-27. | |
[11] | SHE W , HUO L J , TIAN Z ,et al. A double steganography model combining blockchain and interplanetary file system[J]. Peer-to-Peer Networking and Applications, 2021,14(5): 3029-3042. |
[12] | 佘维, 霍丽娟, 田钊 ,等. 面向纯文本信息隐藏的区块链隐蔽通信模型[J]. 计算机科学, 2022,49(1): 345-352. |
SHE W , HUO L J , TIAN Z ,et al. Blockchain covert communication model for plain text information hiding[J]. Computer Science, 2022,49(1): 345-352. | |
[13] | 佘维, 霍丽娟, 刘炜 ,等. 一种可隐藏敏感文档和发送者身份的区块链隐蔽通信模型[J]. 电子学报, 2022,50(4): 1002-1013. |
SHE W , HUO L J , LIU W ,et al. A blockchain-based covert communication model for hiding sensitive documents and sender identity[J]. Acta Electronica Sinica, 2022,50(4): 1002-1013. | |
[14] | 姜鹏坤, 张问银, 王九如 ,等. 基于正常交易掩盖下的区块链隐蔽通信方案[J]. 网络与信息安全学报, 2022,8(4): 77-86. |
JIANG P K , ZHANG W Y , WANG J R ,et al. Blockchain covert communication scheme based on the cover of normal transactions[J]. Chinese Journal of Network and Information Security, 2022,8(4): 77-86. | |
[15] | DAI W H , YU Y , DAI Y H ,et al. Text steganography system using Markov chain source model and DES algorithm[J]. Journal of Software, 2010,5(7): 785-792. |
[16] | RIVEST R L , SHAMIR A , TAUMAN Y . How to leak a secret[M]. Berlin: Springer, 2001. |
[17] | 马春光, 安婧, 毕伟 ,等. 区块链中的智能合约[J]. 信息网络安全, 2018(11): 8-17. |
MA C G , AN J , BI W ,et al. Smart contract in blockchain[J]. Netinfo Security, 2018(11): 8-17. | |
[18] | KUZLU M , PIPATTANASOMPORN M , GURSES L ,et al. Performance analysis of a hyperledger fabric blockchain framework:throughput,latency and scalability[C]// Proceedings of IEEE International Conference on Blockchain (Blockchain). Piscataway:IEEE Press, 2019: 536-540. |
[19] | 袁勇, 王飞跃 . 区块链技术发展现状与展望[J]. 自动化学报, 2016,42(4): 481-494. |
YUAN Y , WANG F Y . Blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 2016,42(4): 481-494. | |
[20] | 佘维, 荣欣鹏, 贾骏 ,等. 区块链隐蔽通信的构建技术及检测方法研究综述[J]. 郑州大学学报(理学版), 2022,54(6): 1-11. |
SHE W , RONG X P , JIA J ,et al. Technology development and research status of blockchain covert communication and detection methods[J]. Journal of Zhengzhou University (Natural Science Edition), 2022,54(6): 1-11. | |
[21] | OLEKH T , GOGUNSKII V . Use of discrete and continuous Markov chains for system absorbing states[C]// Proceedings of IEEE International Conference on Advanced Trends in Information Theory. Piscataway:IEEE Press, 2019: 518-521. |
[22] | LI F , XU S Y , SHEN H ,et al. Extended dissipativity-based control for hidden Markov jump singularly perturbed systems subject to general probabilities[J]. IEEE Transactions on Systems,Man,and Cybernetics:Systems, 2021,51(9): 5752-5761. |
[23] | 康慧娴, 易标, 吴汉舟 . 文本隐写及隐写分析综述[J]. 应用科学学报, 2021,39(6): 923-938. |
KANG H X , YI B , WU H Z . Recent advances in text steganography and steganalysis[J]. Journal of Applied Sciences, 2021,39(6): 923-938. | |
[24] | ARSHAD R , SALEEM A , KHAN D . Performance comparison of huffman coding and double huffman coding[C]// Proceedings of Sixth International Conference on Innovative Computing Technology (INTECH). Piscataway:IEEE Press, 2016: 361-364. |
[25] | GO A , BHAYANI R , HUANG L . Twitter sentiment classification using distant supervision[R]. CS224N Project Report, 2009. |
[26] | HOUMANSADR A , BORISOV N . CoCo:coding-based covert timing channels for network flows[C]// Proceedings of the Information Hiding. Berlin:Springer, 2011: 314-328. |
[1] | 张海波, 曹钰坤, 刘开健, 王汝言. 车联网中基于区块链的分布式信任管理方案[J]. 通信学报, 2023, 44(5): 148-157. |
[2] | 刘雪娇, 钟强, 夏莹杰. 基于双层分片区块链的车联网跨信任域高效认证方案[J]. 通信学报, 2023, 44(5): 213-223. |
[3] | 冯涛, 陈李秋, 方君丽, 石建明. 基于本地化差分隐私和属性基可搜索加密的区块链数据共享方案[J]. 通信学报, 2023, 44(5): 224-233. |
[4] | 夏莹杰, 朱思雨, 刘雪娇. 区块链架构下具有条件隐私的车辆编队跨信任域高效群组认证研究[J]. 通信学报, 2023, 44(4): 111-123. |
[5] | 刘玉玲, 王翠林, 付章杰. 语义空间下基于情感表达的生成式文本隐写方法[J]. 通信学报, 2023, 44(4): 176-186. |
[6] | 蒋丽, 谢胜利, 田辉. 面向数字孪生边缘网络的区块链分片及资源自适应优化机制[J]. 通信学报, 2023, 44(3): 12-23. |
[7] | 戴千一, 张斌, 郭松, 徐开勇. 基于多分类器集成的区块链网络层异常流量检测方法[J]. 通信学报, 2023, 44(3): 66-80. |
[8] | 经普杰, 王良民, 董学文, 张玉书, 王骞, Muhammad Sohail. 分层跨链结构:一种面向区块链系统监管的可行架构[J]. 通信学报, 2023, 44(3): 93-104. |
[9] | 刘雪娇, 曹天聪, 夏莹杰. 区块链架构下高效的车联网跨域数据安全共享研究[J]. 通信学报, 2023, 44(3): 186-197. |
[10] | 康海燕, 龙墨澜. 基于吸收马尔可夫链攻击图的网络攻击分析方法研究[J]. 通信学报, 2023, 44(2): 122-135. |
[11] | 黄冬艳, 李琨. 多地址的时间型区块链隐蔽通信方法研究[J]. 通信学报, 2023, 44(2): 148-159. |
[12] | 杨亚涛, 刘德莉, 刘培鹤, 曾萍, 肖嵩. BFV-Blockchainvoting:支持BFV全同态加密的区块链电子投票系统[J]. 通信学报, 2022, 43(9): 100-111. |
[13] | 冯霞, 崔凯平, 谢晴晴, 王良民. VANET中基于区块链的分布式匿名认证方案[J]. 通信学报, 2022, 43(9): 134-147. |
[14] | 李雷孝, 杜金泽, 林浩, 高昊昱, 杨艳艳, 高静. 区块链网络隐蔽信道研究进展[J]. 通信学报, 2022, 43(9): 209-223. |
[15] | 熊礼治, 朱蓉, 付章杰. 基于交易构造和转发机制的区块链网络隐蔽通信方法[J]. 通信学报, 2022, 43(8): 176-187. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|