Share Email Print

Proceedings Paper

Information hiding technique
Author(s): Michael Younger; Peter P Budulas; Stuart H. Young
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

Spread spectrum communication techniques have been recognized as a viable method to gain an advantage in interference environments. Many military-oriented systems have been initiated, and some civil systems have been attempted. Spread spectrum allows the ability to hide the signal of interest below or in the noise floor, so as not to be detected. A spread spectrum system is one in which the transmitted signal is spread over a wide frequency band, much wider, in fact, than the minimum bandwidth required to transmit the information being sent. We at Army Research Lab (ARL) are proposing using the same technique on the Internet with port hopping. The information would be transmitted in data packets over multiple ports. The port used would vary per packet or per session basis. This port hopping gives you and the recipients the ability to take datagram's and spread them out over a multitude of ports. This will hide information among the Internet noise. This will allow trusted communications between the transmitter and receiver because of the port coding sequence. There are 64K possible ports to span datagram. Jamming of transmission would be limiting the ability of the sniffer/listener. Also, the listener will find it difficult to use a man in the middle attach, since the data will be spread over multiple ports and only the receiver and transmitter will know the specific port sequencing for the datagram.

Paper Details

Date Published: 6 August 2002
PDF: 8 pages
Proc. SPIE 4741, Battlespace Digitization and Network-Centric Warfare II, (6 August 2002); doi: 10.1117/12.478734
Show Author Affiliations
Michael Younger, Army Research Lab. (United States)
Peter P Budulas, Army Research Lab. (United States)
Stuart H. Young, Army Research Lab. (United States)

Published in SPIE Proceedings Vol. 4741:
Battlespace Digitization and Network-Centric Warfare II
Raja Suresh; William E. Roper; William E. Roper, Editor(s)

© SPIE. Terms of Use
Back to Top