Middleman covert channel establishment based on MORE routing protocol using network coding in ad hoc networks

Summary Covert channels have been recently the subject of the study in both creation and countermeasure aspects. There are many different ways to embed the covert data in network standards and protocols, especially in wireless networks. MORE (MAC‐independent opportunistic routing) is an opportunisti...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:International journal of communication systems Ročník 33; číslo 7
Hlavní autoři: Akhtari, Sara, Moghim, Neda, Mahdavi, Mojtaba
Médium: Journal Article
Jazyk:angličtina
Vydáno: Chichester Wiley Subscription Services, Inc 10.05.2020
Témata:
ISSN:1074-5351, 1099-1131
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Summary Covert channels have been recently the subject of the study in both creation and countermeasure aspects. There are many different ways to embed the covert data in network standards and protocols, especially in wireless networks. MORE (MAC‐independent opportunistic routing) is an opportunistic routing protocol which uses networks coding to enhance routing performance by reducing the repetitions. This protocol can be a suitable medium for covert channel establishment. A middleman covert channel establishment method is proposed in this paper over MORE routing protocol and with the use of network coding. Hidden data are transferred through packet's payload bytes. Covert sender manipulates coding mechanism by calculating packets' coefficients instead of random selection. The proposed covert channel provides the average throughput of 218 and 231 bps, using two different data length approaches which is relatively a good comparing to the previous network layer covert channels. The proposed covert channel is also a covert storage channel and cannot be removed or restricted. Effect of different network characteristics on the proposed method's capacity and security is investigated by a simulation study, and the results are discussed. In this paper, a middleman covert channel establishment method is proposed over MORE routing protocol. Hidden data are transferred through the packets' payload and by calculating the packets' coefficients instead of random selection. The proposed covert channel provides the average throughput of 218 and 231 bps in two different data length approaches, which is a good performance comparing with the previous network layer covert channels. The proposed covert channel is a covert storage channel and cannot be removed or restricted.
AbstractList Covert channels have been recently the subject of the study in both creation and countermeasure aspects. There are many different ways to embed the covert data in network standards and protocols, especially in wireless networks. MORE (MAC‐independent opportunistic routing) is an opportunistic routing protocol which uses networks coding to enhance routing performance by reducing the repetitions. This protocol can be a suitable medium for covert channel establishment. A middleman covert channel establishment method is proposed in this paper over MORE routing protocol and with the use of network coding. Hidden data are transferred through packet's payload bytes. Covert sender manipulates coding mechanism by calculating packets' coefficients instead of random selection. The proposed covert channel provides the average throughput of 218 and 231 bps, using two different data length approaches which is relatively a good comparing to the previous network layer covert channels. The proposed covert channel is also a covert storage channel and cannot be removed or restricted. Effect of different network characteristics on the proposed method's capacity and security is investigated by a simulation study, and the results are discussed.
Summary Covert channels have been recently the subject of the study in both creation and countermeasure aspects. There are many different ways to embed the covert data in network standards and protocols, especially in wireless networks. MORE (MAC‐independent opportunistic routing) is an opportunistic routing protocol which uses networks coding to enhance routing performance by reducing the repetitions. This protocol can be a suitable medium for covert channel establishment. A middleman covert channel establishment method is proposed in this paper over MORE routing protocol and with the use of network coding. Hidden data are transferred through packet's payload bytes. Covert sender manipulates coding mechanism by calculating packets' coefficients instead of random selection. The proposed covert channel provides the average throughput of 218 and 231 bps, using two different data length approaches which is relatively a good comparing to the previous network layer covert channels. The proposed covert channel is also a covert storage channel and cannot be removed or restricted. Effect of different network characteristics on the proposed method's capacity and security is investigated by a simulation study, and the results are discussed. In this paper, a middleman covert channel establishment method is proposed over MORE routing protocol. Hidden data are transferred through the packets' payload and by calculating the packets' coefficients instead of random selection. The proposed covert channel provides the average throughput of 218 and 231 bps in two different data length approaches, which is a good performance comparing with the previous network layer covert channels. The proposed covert channel is a covert storage channel and cannot be removed or restricted.
Author Akhtari, Sara
Moghim, Neda
Mahdavi, Mojtaba
Author_xml – sequence: 1
  givenname: Sara
  orcidid: 0000-0001-9186-9315
  surname: Akhtari
  fullname: Akhtari, Sara
  organization: University of Isfahan
– sequence: 2
  givenname: Neda
  surname: Moghim
  fullname: Moghim, Neda
  email: n.moghim@eng.ui.ac.ir
  organization: University of Isfahan
– sequence: 3
  givenname: Mojtaba
  surname: Mahdavi
  fullname: Mahdavi, Mojtaba
  organization: University of Isfahan
BookMark eNp1kE1PwzAMhiM0JLaBxE-IxIVLh5O0dDlOY3xIm5AQnKs0TVlGm4wkZdq_J2VwQXCyLT9-bb8jNDDWKITOCUwIAL2qhJykjMIRGhLgPCGEkUGf52mSsYycoJH3GwCY0utsiNqVrqpGtcJgaT-UC1iuhTGqwcoHUTbar1tlAi6FVxW2Bq8enxbY2S5o84q3zgYrbYM735dGhZ11b1Gp6kttsKjw2sqfhj9Fx7VovDr7jmP0crt4nt8ny8e7h_lsmUjKGSQ8l3mdS6ZASCBQM5IKSmlFCJQ8NmgMjBNZ8TxlKeWClRlwIShLZQolZWN0cdCNB7538ZNiYztn4sqCsmlGKKQ8j9TlgZLOeu9UXWydboXbFwSK3swimln0ZkZ08guVOoigrQlO6OavgeQwsNON2v8rXNzM5l_8J5WShrs
CitedBy_id crossref_primary_10_3390_info12050184
Cites_doi 10.1145/1282427.1282400
10.1145/362375.362389
10.1145/1282380.1282400
10.1155/2014/120626
10.1002/sec.306
10.1109/MASS.2011.60
10.1109/MILCOM.2013.106
10.1007/s11235-018-0429-1
10.1145/2909827.2930800
10.1007/978-3-642-31909-9_8
10.1109/SPW.2013.20
10.1109/COMST.2007.4317620
10.1109/INFCOM.2007.315
10.1109/TDSC.2017.2656078
10.1109/INFCOM.2009.5062145
10.1007/978-1-4684-4730-9_5
10.1109/IranianCEE.2017.7985274
10.1145/1090191.1080108
10.1109/COMST.2015.2411335
10.1017/CBO9780511754623
ContentType Journal Article
Copyright 2020 John Wiley & Sons, Ltd.
Copyright_xml – notice: 2020 John Wiley & Sons, Ltd.
DBID AAYXX
CITATION
7SP
8FD
JQ2
L7M
DOI 10.1002/dac.4320
DatabaseName CrossRef
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Technology Research Database
Advanced Technologies Database with Aerospace
Electronics & Communications Abstracts
ProQuest Computer Science Collection
DatabaseTitleList Technology Research Database

CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1099-1131
EndPage n/a
ExternalDocumentID 10_1002_dac_4320
DAC4320
Genre article
GroupedDBID .3N
.GA
05W
0R~
10A
1L6
1OB
1OC
33P
3SF
3WU
4.4
50Y
50Z
51W
51X
52M
52N
52O
52P
52S
52T
52U
52W
52X
5GY
5VS
66C
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAEVG
AAHHS
AAHQN
AAMNL
AANLZ
AAONW
AASGY
AAXRX
AAYCA
AAZKR
ABCQN
ABCUV
ABDBF
ABIJN
ABPVW
ACAHQ
ACCFJ
ACCZN
ACGFS
ACIWK
ACPOU
ACUHS
ACXBN
ACXQS
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADOZA
ADXAS
ADZMN
ADZOD
AEEZP
AEIGN
AEIMD
AENEX
AEQDE
AEUQT
AEUYR
AFBPY
AFFPM
AFGKR
AFPWT
AFWVQ
AHBTC
AITYG
AIURR
AIWBW
AJBDE
AJXKR
ALAGY
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ALVPJ
AMBMR
AMYDB
ATUGU
AUFTA
AZBYB
AZVAB
BAFTC
BFHJK
BHBCM
BMNLL
BMXJE
BNHUX
BROTX
BRXPI
BY8
CS3
D-E
D-F
DCZOG
DPXWK
DR2
DRFUL
DRSTM
DU5
EBS
ESX
F00
F01
F04
G-S
G.N
GNP
GODZA
H.T
H.X
HGLYW
HHY
HZ~
I-F
IX1
J0M
JPC
KQQ
LATKE
LAW
LC2
LC3
LEEKS
LITHE
LOXES
LP6
LP7
LUTES
LYRES
MEWTI
MK4
MK~
ML~
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
N04
N05
N9A
NF~
O66
O9-
OIG
P2W
P2X
P4D
Q.N
Q11
QB0
QRW
R.K
ROL
RWI
RX1
RYL
SUPJJ
TUS
UB1
V2E
W8V
W99
WBKPD
WIH
WIK
WLBEL
WOHZO
WQJ
WRC
WWI
WXSBR
WYISQ
XG1
XV2
ZZTAW
~IA
~WT
AAMMB
AAYXX
AEFGJ
AEYWJ
AGHNM
AGXDD
AGYGG
AIDQK
AIDYY
CITATION
O8X
7SP
8FD
JQ2
L7M
ID FETCH-LOGICAL-c2930-97c7f7c3e0ac010f314a222d110b9f7c20b9391cd9743429a3b509aa234c40b23
IEDL.DBID DRFUL
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000508795400001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1074-5351
IngestDate Fri Jul 25 12:08:18 EDT 2025
Sat Nov 29 03:54:53 EST 2025
Tue Nov 18 21:01:43 EST 2025
Wed Jan 22 16:36:18 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 7
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2930-97c7f7c3e0ac010f314a222d110b9f7c20b9391cd9743429a3b509aa234c40b23
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-9186-9315
PQID 2385120497
PQPubID 996367
PageCount 14
ParticipantIDs proquest_journals_2385120497
crossref_primary_10_1002_dac_4320
crossref_citationtrail_10_1002_dac_4320
wiley_primary_10_1002_dac_4320_DAC4320
PublicationCentury 2000
PublicationDate 10 May 2020
PublicationDateYYYYMMDD 2020-05-10
PublicationDate_xml – month: 05
  year: 2020
  text: 10 May 2020
  day: 10
PublicationDecade 2020
PublicationPlace Chichester
PublicationPlace_xml – name: Chichester
PublicationTitle International journal of communication systems
PublicationYear 2020
Publisher Wiley Subscription Services, Inc
Publisher_xml – name: Wiley Subscription Services, Inc
References 2015; 17
2012
2017; 14
2011
1973; 16
2009
2007; 9
2008
2007
2017
1983
2016
2005
2004
2003
2014
2013
2012; 5
2016; 9
2014; 10
2018; 69
2005; 35
2007; 37
e_1_2_7_6_1
e_1_2_7_5_1
Gonçalves R (e_1_2_7_7_1) 2012; 5
e_1_2_7_4_1
e_1_2_7_3_1
e_1_2_7_9_1
e_1_2_7_8_1
e_1_2_7_19_1
e_1_2_7_18_1
e_1_2_7_17_1
e_1_2_7_16_1
e_1_2_7_2_1
e_1_2_7_15_1
e_1_2_7_14_1
e_1_2_7_13_1
e_1_2_7_12_1
Szczypiorski K (e_1_2_7_11_1) 2003
e_1_2_7_10_1
e_1_2_7_26_1
e_1_2_7_27_1
e_1_2_7_25_1
e_1_2_7_24_1
e_1_2_7_23_1
e_1_2_7_22_1
e_1_2_7_21_1
e_1_2_7_20_1
References_xml – year: 2011
– year: 1983
– year: 2009
– volume: 14
  start-page: 249
  issue: 3
  year: 2017
  end-page: 264
  article-title: sharif H. Towards a Reliable detection of covert timing channels over real‐time network traffic
  publication-title: IEEE Transactions on Dependable and Secure Computing.
– year: 2005
– volume: 69
  start-page: 415
  issue: 4
  year: 2018
  end-page: 429
  article-title: A dynamic timing‐storage covert channel in vehicular ad hoc networks
  publication-title: Telecommunication Systems.
– volume: 37
  start-page: 169
  issue: 4
  year: 2007
  end-page: 180
  article-title: Trading structure for randomness in wireless opportunistic routing
  publication-title: SIGCOMM Comput. Commun. Rev.
– volume: 16
  start-page: 613
  issue: 10
  year: 1973
  end-page: 615
  article-title: A note on the confinement problem
  publication-title: Communications of the ACM.
– year: 2007
– year: 2008
– start-page: 31
  year: 2003
  end-page: 40
  article-title: hidden communication system for corrupted networks
  publication-title: 10th International Multi‐Conference on Advanced Computer Systems
– volume: 9
  start-page: 44
  issue: 3
  year: 2007
  end-page: 57
  article-title: A survey of covert channels and countermeasures in computer network protocols
  publication-title: IEEE Communications Surveys & Tutorials.
– year: 2004
– year: 2003
– volume: 5
  start-page: 131
  issue: 3
  year: 2012
  end-page: 140
  article-title: Analysis of a MAC layer covert channel in 802.11 networks
  publication-title: International Journal on Advances in Telecommunications.
– volume: 17
  start-page: 2214
  issue: 4
  year: 2015
  end-page: 2241
  article-title: A survey on opportunistic routing in wireless communication networks
  publication-title: IEEE Communications Surveys & Tutorials.
– volume: 35
  start-page: 133
  issue: 4
  year: 2005
  end-page: 144
  article-title: ExOR: opportunistic multi‐hop routing for wireless networks
  publication-title: SIGCOMM Comput. Commun. Rev.
– year: 2017
– year: 2016
– volume: 9
  start-page: 118
  issue: 2
  year: 2016
  end-page: 129
  article-title: Steganography in IEEE 802.11 OFDM symbols
  publication-title: Security and Communication Networks.
– year: 2014
– year: 2013
– volume: 10
  start-page: 1
  issue: 2
  year: 2014
  end-page: 15
  article-title: Applying information hiding in VANETs to covertly report misbehaving vehicles
  publication-title: International Journal of Distributed Sensor Networks
– year: 2012
– start-page: 31
  year: 2003
  ident: e_1_2_7_11_1
  article-title: hidden communication system for corrupted networks
  publication-title: 10th International Multi‐Conference on Advanced Computer Systems
– ident: e_1_2_7_24_1
  doi: 10.1145/1282427.1282400
– ident: e_1_2_7_2_1
  doi: 10.1145/362375.362389
– ident: e_1_2_7_26_1
  doi: 10.1145/1282380.1282400
– ident: e_1_2_7_18_1
  doi: 10.1155/2014/120626
– ident: e_1_2_7_20_1
  doi: 10.1002/sec.306
– ident: e_1_2_7_12_1
  doi: 10.1109/MASS.2011.60
– ident: e_1_2_7_14_1
  doi: 10.1109/MILCOM.2013.106
– ident: e_1_2_7_19_1
  doi: 10.1007/s11235-018-0429-1
– ident: e_1_2_7_6_1
  doi: 10.1145/2909827.2930800
– ident: e_1_2_7_27_1
  doi: 10.1007/978-3-642-31909-9_8
– ident: e_1_2_7_21_1
  doi: 10.1109/SPW.2013.20
– ident: e_1_2_7_3_1
  doi: 10.1109/COMST.2007.4317620
– ident: e_1_2_7_16_1
– ident: e_1_2_7_10_1
  doi: 10.1109/INFCOM.2007.315
– ident: e_1_2_7_13_1
– ident: e_1_2_7_5_1
  doi: 10.1109/TDSC.2017.2656078
– ident: e_1_2_7_8_1
  doi: 10.1109/INFCOM.2009.5062145
– ident: e_1_2_7_4_1
  doi: 10.1007/978-1-4684-4730-9_5
– ident: e_1_2_7_17_1
  doi: 10.1109/IranianCEE.2017.7985274
– volume: 5
  start-page: 131
  issue: 3
  year: 2012
  ident: e_1_2_7_7_1
  article-title: Analysis of a MAC layer covert channel in 802.11 networks
  publication-title: International Journal on Advances in Telecommunications.
– ident: e_1_2_7_9_1
– ident: e_1_2_7_22_1
  doi: 10.1145/1090191.1080108
– ident: e_1_2_7_23_1
  doi: 10.1109/COMST.2015.2411335
– ident: e_1_2_7_15_1
– ident: e_1_2_7_25_1
  doi: 10.1017/CBO9780511754623
SSID ssj0008265
Score 2.206429
Snippet Summary Covert channels have been recently the subject of the study in both creation and countermeasure aspects. There are many different ways to embed the...
Covert channels have been recently the subject of the study in both creation and countermeasure aspects. There are many different ways to embed the covert data...
SourceID proquest
crossref
wiley
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
SubjectTerms Ad hoc networks
Channels
Coding
covert channel
network coding
network steganography
opportunistic routing protocols
Protocol (computers)
Wireless networks
Title Middleman covert channel establishment based on MORE routing protocol using network coding in ad hoc networks
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fdac.4320
https://www.proquest.com/docview/2385120497
Volume 33
WOSCitedRecordID wos000508795400001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library Full Collection 2020
  customDbUrl:
  eissn: 1099-1131
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0008265
  issn: 1074-5351
  databaseCode: DRFUL
  dateStart: 19960101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEA7SetCDb7FaJYLoaXE3yXa7x9IHHtoqxUpvSx67WrC70m39_c7so62gIHjKIU8yk8w3w-QLITcaadBCh1vCw9BNwzcW-CqhpSKmAL4yz83oi1_63nDYnEz8pyKrEt_C5PwQq4AbnozsvsYDLlV6vyYNNTCf4Azc9SoDtRUVUu2MeuP-6h4G4OyWGYcud52SetZm92Xf78ZojTA3cWpmaHr7_1niAdkr4CVt5fpwSLbC-IjsbpAOHpPZIItJzGRMNeZvLig-_oWpKCxKZkEpjBhStG-GJjEdPI66dJ4sMUGaIq9DAspDMWH-lcZ5FjmMhDaQTmMqDX1LdFmRnpBxr_vcfrCKTxcsDZbfBklpL_I0D22pwVeLuCMkYAgDMEH5UMGg4L6jDUiSgzGTXAHmkJJxoYWtGD8llTiJwzNCHUCTkYgaqgFOXiiF5EZKxZzIVk3BjKqRu3L3A10wkuPHGO9BzqXMAtjAADewRq5XLT9yFo4f2tRLAQbFOUwDACSgbOAFeTVym4nq1_5Bp9XG8vyvDS_IDkPnO6NyrZPKYr4ML8m2_lxM0_lVoY1fPpvh_w
linkProvider Wiley-Blackwell
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEB5KK6gH32J9RhA9Le4m2a7Fk1iLYltFWultSbK7WrC70oe_35l91AoKgqcc8iQzyXwzTL4AnBiiQQsdYUmPQje1emChrxJaOuIa4Sv33JS--LnldToX_X79sQSXxVuYjB9iFnCjk5He13TAKSB9_sUaGuCEUnD01ysStcgtQ6Xx1Oy1ZhcxIme3SDl0hesU3LM2Py_6frdGXxBzHqimlqa5-q81rsFKDjDZVaYR61AK4w1YnqMd3IRhO41KDFXMDGVwThg9_8W5GK5KpWEpihkysnABS2LWfni6YaNkSinSjJgdElQfRinzLyzO8shxJLKCbBAzFbDXxBQV4y3oNW-617dW_u2CZdD22ygr40WeEaGtDHprkXCkQhQRIFDQdazgWIi6YwKUpUBzpoRG1KEUF9JIW3OxDeU4icMdYA7iyUhGNV1DNy9UUolAKc2dyNYXkge6CmfF9vsm5ySnrzHe_IxNmfu4gT5tYBWOZy3fMx6OH9rsFxL085M49hGSoLqhH-RV4TSV1a_9_cbVNZW7f214BIu33XbLb9117vdgiZMrnhK77kN5MpqGB7BgPiaD8egwV81Py8rl7w
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dS8MwED_EieiD3-J0agTRp2KbpO2KT2NzKM4p4mRvJR-tDlw79uHf76UfU0FB8CkPSZqSu8v97rj8AnCqDA1a5DCL-yZ14wXawlglsmRMJcJX6rsZffFzx-926_1-8LAAl-VdmJwfYp5wM5aRndfGwKORji8-WUM1LsgZxXi9wt3AQ6ustB7bvc78IEbk7JYlhy5znZJ71qYX5dzv3ugTYn4Fqpmnaa__6x83YK0AmKSRa8QmLETJFqx-oR3chuFdlpUYioQoU8E5Jeb6L65F8K9ElpYyOUNiPJwmaULu7h-vyDidmRJpYpgdUlQfYkrmX0iS15Hjl4wXJIOECE1eU1V2THag1756al5bxbMLlkLfb6OslB_7ikW2UBitxczhAlGERqAgA-yg2LDAURplydCdCSYRdQhBGVfclpTtwmKSJtEeEAfxZMxjT3oY5kWCC6aFkNSJbVnnVMsqnJfbH6qCk9w8jfEW5mzKNMQNDM0GVuFkPnKU83D8MKZWSjAsLHESIiRBdcM4yK_CWSarX-eHrUbTtPt_HXgMyw-tdti56d4ewAo1kXjG61qDxel4Fh3CknqfDibjo0IzPwB8z-Vq
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Middleman+covert+channel+establishment+based+on+MORE+routing+protocol+using+network+coding+in+ad+hoc+networks&rft.jtitle=International+journal+of+communication+systems&rft.au=Akhtari%2C+Sara&rft.au=Moghim%2C+Neda&rft.au=Mahdavi%2C+Mojtaba&rft.date=2020-05-10&rft.issn=1074-5351&rft.eissn=1099-1131&rft.volume=33&rft.issue=7&rft_id=info:doi/10.1002%2Fdac.4320&rft.externalDBID=n%2Fa&rft.externalDocID=10_1002_dac_4320
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1074-5351&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1074-5351&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1074-5351&client=summon