Middleman covert channel establishment based on MORE routing protocol using network coding in ad hoc networks
Summary Covert channels have been recently the subject of the study in both creation and countermeasure aspects. There are many different ways to embed the covert data in network standards and protocols, especially in wireless networks. MORE (MAC‐independent opportunistic routing) is an opportunisti...
Uloženo v:
| Vydáno v: | International journal of communication systems Ročník 33; číslo 7 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Chichester
Wiley Subscription Services, Inc
10.05.2020
|
| Témata: | |
| ISSN: | 1074-5351, 1099-1131 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Summary
Covert channels have been recently the subject of the study in both creation and countermeasure aspects. There are many different ways to embed the covert data in network standards and protocols, especially in wireless networks. MORE (MAC‐independent opportunistic routing) is an opportunistic routing protocol which uses networks coding to enhance routing performance by reducing the repetitions. This protocol can be a suitable medium for covert channel establishment. A middleman covert channel establishment method is proposed in this paper over MORE routing protocol and with the use of network coding. Hidden data are transferred through packet's payload bytes. Covert sender manipulates coding mechanism by calculating packets' coefficients instead of random selection. The proposed covert channel provides the average throughput of 218 and 231 bps, using two different data length approaches which is relatively a good comparing to the previous network layer covert channels. The proposed covert channel is also a covert storage channel and cannot be removed or restricted. Effect of different network characteristics on the proposed method's capacity and security is investigated by a simulation study, and the results are discussed.
In this paper, a middleman covert channel establishment method is proposed over MORE routing protocol. Hidden data are transferred through the packets' payload and by calculating the packets' coefficients instead of random selection. The proposed covert channel provides the average throughput of 218 and 231 bps in two different data length approaches, which is a good performance comparing with the previous network layer covert channels. The proposed covert channel is a covert storage channel and cannot be removed or restricted. |
|---|---|
| AbstractList | Covert channels have been recently the subject of the study in both creation and countermeasure aspects. There are many different ways to embed the covert data in network standards and protocols, especially in wireless networks. MORE (MAC‐independent opportunistic routing) is an opportunistic routing protocol which uses networks coding to enhance routing performance by reducing the repetitions. This protocol can be a suitable medium for covert channel establishment. A middleman covert channel establishment method is proposed in this paper over MORE routing protocol and with the use of network coding. Hidden data are transferred through packet's payload bytes. Covert sender manipulates coding mechanism by calculating packets' coefficients instead of random selection. The proposed covert channel provides the average throughput of 218 and 231 bps, using two different data length approaches which is relatively a good comparing to the previous network layer covert channels. The proposed covert channel is also a covert storage channel and cannot be removed or restricted. Effect of different network characteristics on the proposed method's capacity and security is investigated by a simulation study, and the results are discussed. Summary Covert channels have been recently the subject of the study in both creation and countermeasure aspects. There are many different ways to embed the covert data in network standards and protocols, especially in wireless networks. MORE (MAC‐independent opportunistic routing) is an opportunistic routing protocol which uses networks coding to enhance routing performance by reducing the repetitions. This protocol can be a suitable medium for covert channel establishment. A middleman covert channel establishment method is proposed in this paper over MORE routing protocol and with the use of network coding. Hidden data are transferred through packet's payload bytes. Covert sender manipulates coding mechanism by calculating packets' coefficients instead of random selection. The proposed covert channel provides the average throughput of 218 and 231 bps, using two different data length approaches which is relatively a good comparing to the previous network layer covert channels. The proposed covert channel is also a covert storage channel and cannot be removed or restricted. Effect of different network characteristics on the proposed method's capacity and security is investigated by a simulation study, and the results are discussed. In this paper, a middleman covert channel establishment method is proposed over MORE routing protocol. Hidden data are transferred through the packets' payload and by calculating the packets' coefficients instead of random selection. The proposed covert channel provides the average throughput of 218 and 231 bps in two different data length approaches, which is a good performance comparing with the previous network layer covert channels. The proposed covert channel is a covert storage channel and cannot be removed or restricted. |
| Author | Akhtari, Sara Moghim, Neda Mahdavi, Mojtaba |
| Author_xml | – sequence: 1 givenname: Sara orcidid: 0000-0001-9186-9315 surname: Akhtari fullname: Akhtari, Sara organization: University of Isfahan – sequence: 2 givenname: Neda surname: Moghim fullname: Moghim, Neda email: n.moghim@eng.ui.ac.ir organization: University of Isfahan – sequence: 3 givenname: Mojtaba surname: Mahdavi fullname: Mahdavi, Mojtaba organization: University of Isfahan |
| BookMark | eNp1kE1PwzAMhiM0JLaBxE-IxIVLh5O0dDlOY3xIm5AQnKs0TVlGm4wkZdq_J2VwQXCyLT9-bb8jNDDWKITOCUwIAL2qhJykjMIRGhLgPCGEkUGf52mSsYycoJH3GwCY0utsiNqVrqpGtcJgaT-UC1iuhTGqwcoHUTbar1tlAi6FVxW2Bq8enxbY2S5o84q3zgYrbYM735dGhZ11b1Gp6kttsKjw2sqfhj9Fx7VovDr7jmP0crt4nt8ny8e7h_lsmUjKGSQ8l3mdS6ZASCBQM5IKSmlFCJQ8NmgMjBNZ8TxlKeWClRlwIShLZQolZWN0cdCNB7538ZNiYztn4sqCsmlGKKQ8j9TlgZLOeu9UXWydboXbFwSK3swimln0ZkZ08guVOoigrQlO6OavgeQwsNON2v8rXNzM5l_8J5WShrs |
| CitedBy_id | crossref_primary_10_3390_info12050184 |
| Cites_doi | 10.1145/1282427.1282400 10.1145/362375.362389 10.1145/1282380.1282400 10.1155/2014/120626 10.1002/sec.306 10.1109/MASS.2011.60 10.1109/MILCOM.2013.106 10.1007/s11235-018-0429-1 10.1145/2909827.2930800 10.1007/978-3-642-31909-9_8 10.1109/SPW.2013.20 10.1109/COMST.2007.4317620 10.1109/INFCOM.2007.315 10.1109/TDSC.2017.2656078 10.1109/INFCOM.2009.5062145 10.1007/978-1-4684-4730-9_5 10.1109/IranianCEE.2017.7985274 10.1145/1090191.1080108 10.1109/COMST.2015.2411335 10.1017/CBO9780511754623 |
| ContentType | Journal Article |
| Copyright | 2020 John Wiley & Sons, Ltd. |
| Copyright_xml | – notice: 2020 John Wiley & Sons, Ltd. |
| DBID | AAYXX CITATION 7SP 8FD JQ2 L7M |
| DOI | 10.1002/dac.4320 |
| DatabaseName | CrossRef Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace |
| DatabaseTitle | CrossRef Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts ProQuest Computer Science Collection |
| DatabaseTitleList | Technology Research Database CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1099-1131 |
| EndPage | n/a |
| ExternalDocumentID | 10_1002_dac_4320 DAC4320 |
| Genre | article |
| GroupedDBID | .3N .GA 05W 0R~ 10A 1L6 1OB 1OC 33P 3SF 3WU 4.4 50Y 50Z 51W 51X 52M 52N 52O 52P 52S 52T 52U 52W 52X 5GY 5VS 66C 702 7PT 8-0 8-1 8-3 8-4 8-5 8UM 930 A03 AAESR AAEVG AAHHS AAHQN AAMNL AANLZ AAONW AASGY AAXRX AAYCA AAZKR ABCQN ABCUV ABDBF ABIJN ABPVW ACAHQ ACCFJ ACCZN ACGFS ACIWK ACPOU ACUHS ACXBN ACXQS ADBBV ADEOM ADIZJ ADKYN ADMGS ADOZA ADXAS ADZMN ADZOD AEEZP AEIGN AEIMD AENEX AEQDE AEUQT AEUYR AFBPY AFFPM AFGKR AFPWT AFWVQ AHBTC AITYG AIURR AIWBW AJBDE AJXKR ALAGY ALMA_UNASSIGNED_HOLDINGS ALUQN ALVPJ AMBMR AMYDB ATUGU AUFTA AZBYB AZVAB BAFTC BFHJK BHBCM BMNLL BMXJE BNHUX BROTX BRXPI BY8 CS3 D-E D-F DCZOG DPXWK DR2 DRFUL DRSTM DU5 EBS ESX F00 F01 F04 G-S G.N GNP GODZA H.T H.X HGLYW HHY HZ~ I-F IX1 J0M JPC KQQ LATKE LAW LC2 LC3 LEEKS LITHE LOXES LP6 LP7 LUTES LYRES MEWTI MK4 MK~ ML~ MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM N04 N05 N9A NF~ O66 O9- OIG P2W P2X P4D Q.N Q11 QB0 QRW R.K ROL RWI RX1 RYL SUPJJ TUS UB1 V2E W8V W99 WBKPD WIH WIK WLBEL WOHZO WQJ WRC WWI WXSBR WYISQ XG1 XV2 ZZTAW ~IA ~WT AAMMB AAYXX AEFGJ AEYWJ AGHNM AGXDD AGYGG AIDQK AIDYY CITATION O8X 7SP 8FD JQ2 L7M |
| ID | FETCH-LOGICAL-c2930-97c7f7c3e0ac010f314a222d110b9f7c20b9391cd9743429a3b509aa234c40b23 |
| IEDL.DBID | DRFUL |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000508795400001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1074-5351 |
| IngestDate | Fri Jul 25 12:08:18 EDT 2025 Sat Nov 29 03:54:53 EST 2025 Tue Nov 18 21:01:43 EST 2025 Wed Jan 22 16:36:18 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 7 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2930-97c7f7c3e0ac010f314a222d110b9f7c20b9391cd9743429a3b509aa234c40b23 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-9186-9315 |
| PQID | 2385120497 |
| PQPubID | 996367 |
| PageCount | 14 |
| ParticipantIDs | proquest_journals_2385120497 crossref_primary_10_1002_dac_4320 crossref_citationtrail_10_1002_dac_4320 wiley_primary_10_1002_dac_4320_DAC4320 |
| PublicationCentury | 2000 |
| PublicationDate | 10 May 2020 |
| PublicationDateYYYYMMDD | 2020-05-10 |
| PublicationDate_xml | – month: 05 year: 2020 text: 10 May 2020 day: 10 |
| PublicationDecade | 2020 |
| PublicationPlace | Chichester |
| PublicationPlace_xml | – name: Chichester |
| PublicationTitle | International journal of communication systems |
| PublicationYear | 2020 |
| Publisher | Wiley Subscription Services, Inc |
| Publisher_xml | – name: Wiley Subscription Services, Inc |
| References | 2015; 17 2012 2017; 14 2011 1973; 16 2009 2007; 9 2008 2007 2017 1983 2016 2005 2004 2003 2014 2013 2012; 5 2016; 9 2014; 10 2018; 69 2005; 35 2007; 37 e_1_2_7_6_1 e_1_2_7_5_1 Gonçalves R (e_1_2_7_7_1) 2012; 5 e_1_2_7_4_1 e_1_2_7_3_1 e_1_2_7_9_1 e_1_2_7_8_1 e_1_2_7_19_1 e_1_2_7_18_1 e_1_2_7_17_1 e_1_2_7_16_1 e_1_2_7_2_1 e_1_2_7_15_1 e_1_2_7_14_1 e_1_2_7_13_1 e_1_2_7_12_1 Szczypiorski K (e_1_2_7_11_1) 2003 e_1_2_7_10_1 e_1_2_7_26_1 e_1_2_7_27_1 e_1_2_7_25_1 e_1_2_7_24_1 e_1_2_7_23_1 e_1_2_7_22_1 e_1_2_7_21_1 e_1_2_7_20_1 |
| References_xml | – year: 2011 – year: 1983 – year: 2009 – volume: 14 start-page: 249 issue: 3 year: 2017 end-page: 264 article-title: sharif H. Towards a Reliable detection of covert timing channels over real‐time network traffic publication-title: IEEE Transactions on Dependable and Secure Computing. – year: 2005 – volume: 69 start-page: 415 issue: 4 year: 2018 end-page: 429 article-title: A dynamic timing‐storage covert channel in vehicular ad hoc networks publication-title: Telecommunication Systems. – volume: 37 start-page: 169 issue: 4 year: 2007 end-page: 180 article-title: Trading structure for randomness in wireless opportunistic routing publication-title: SIGCOMM Comput. Commun. Rev. – volume: 16 start-page: 613 issue: 10 year: 1973 end-page: 615 article-title: A note on the confinement problem publication-title: Communications of the ACM. – year: 2007 – year: 2008 – start-page: 31 year: 2003 end-page: 40 article-title: hidden communication system for corrupted networks publication-title: 10th International Multi‐Conference on Advanced Computer Systems – volume: 9 start-page: 44 issue: 3 year: 2007 end-page: 57 article-title: A survey of covert channels and countermeasures in computer network protocols publication-title: IEEE Communications Surveys & Tutorials. – year: 2004 – year: 2003 – volume: 5 start-page: 131 issue: 3 year: 2012 end-page: 140 article-title: Analysis of a MAC layer covert channel in 802.11 networks publication-title: International Journal on Advances in Telecommunications. – volume: 17 start-page: 2214 issue: 4 year: 2015 end-page: 2241 article-title: A survey on opportunistic routing in wireless communication networks publication-title: IEEE Communications Surveys & Tutorials. – volume: 35 start-page: 133 issue: 4 year: 2005 end-page: 144 article-title: ExOR: opportunistic multi‐hop routing for wireless networks publication-title: SIGCOMM Comput. Commun. Rev. – year: 2017 – year: 2016 – volume: 9 start-page: 118 issue: 2 year: 2016 end-page: 129 article-title: Steganography in IEEE 802.11 OFDM symbols publication-title: Security and Communication Networks. – year: 2014 – year: 2013 – volume: 10 start-page: 1 issue: 2 year: 2014 end-page: 15 article-title: Applying information hiding in VANETs to covertly report misbehaving vehicles publication-title: International Journal of Distributed Sensor Networks – year: 2012 – start-page: 31 year: 2003 ident: e_1_2_7_11_1 article-title: hidden communication system for corrupted networks publication-title: 10th International Multi‐Conference on Advanced Computer Systems – ident: e_1_2_7_24_1 doi: 10.1145/1282427.1282400 – ident: e_1_2_7_2_1 doi: 10.1145/362375.362389 – ident: e_1_2_7_26_1 doi: 10.1145/1282380.1282400 – ident: e_1_2_7_18_1 doi: 10.1155/2014/120626 – ident: e_1_2_7_20_1 doi: 10.1002/sec.306 – ident: e_1_2_7_12_1 doi: 10.1109/MASS.2011.60 – ident: e_1_2_7_14_1 doi: 10.1109/MILCOM.2013.106 – ident: e_1_2_7_19_1 doi: 10.1007/s11235-018-0429-1 – ident: e_1_2_7_6_1 doi: 10.1145/2909827.2930800 – ident: e_1_2_7_27_1 doi: 10.1007/978-3-642-31909-9_8 – ident: e_1_2_7_21_1 doi: 10.1109/SPW.2013.20 – ident: e_1_2_7_3_1 doi: 10.1109/COMST.2007.4317620 – ident: e_1_2_7_16_1 – ident: e_1_2_7_10_1 doi: 10.1109/INFCOM.2007.315 – ident: e_1_2_7_13_1 – ident: e_1_2_7_5_1 doi: 10.1109/TDSC.2017.2656078 – ident: e_1_2_7_8_1 doi: 10.1109/INFCOM.2009.5062145 – ident: e_1_2_7_4_1 doi: 10.1007/978-1-4684-4730-9_5 – ident: e_1_2_7_17_1 doi: 10.1109/IranianCEE.2017.7985274 – volume: 5 start-page: 131 issue: 3 year: 2012 ident: e_1_2_7_7_1 article-title: Analysis of a MAC layer covert channel in 802.11 networks publication-title: International Journal on Advances in Telecommunications. – ident: e_1_2_7_9_1 – ident: e_1_2_7_22_1 doi: 10.1145/1090191.1080108 – ident: e_1_2_7_23_1 doi: 10.1109/COMST.2015.2411335 – ident: e_1_2_7_15_1 – ident: e_1_2_7_25_1 doi: 10.1017/CBO9780511754623 |
| SSID | ssj0008265 |
| Score | 2.206429 |
| Snippet | Summary
Covert channels have been recently the subject of the study in both creation and countermeasure aspects. There are many different ways to embed the... Covert channels have been recently the subject of the study in both creation and countermeasure aspects. There are many different ways to embed the covert data... |
| SourceID | proquest crossref wiley |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| SubjectTerms | Ad hoc networks Channels Coding covert channel network coding network steganography opportunistic routing protocols Protocol (computers) Wireless networks |
| Title | Middleman covert channel establishment based on MORE routing protocol using network coding in ad hoc networks |
| URI | https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fdac.4320 https://www.proquest.com/docview/2385120497 |
| Volume | 33 |
| WOSCitedRecordID | wos000508795400001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library Full Collection 2020 customDbUrl: eissn: 1099-1131 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0008265 issn: 1074-5351 databaseCode: DRFUL dateStart: 19960101 isFulltext: true titleUrlDefault: https://onlinelibrary.wiley.com providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEA7SetCDb7FaJYLoaXE3yXa7x9IHHtoqxUpvSx67WrC70m39_c7so62gIHjKIU8yk8w3w-QLITcaadBCh1vCw9BNwzcW-CqhpSKmAL4yz83oi1_63nDYnEz8pyKrEt_C5PwQq4AbnozsvsYDLlV6vyYNNTCf4Azc9SoDtRUVUu2MeuP-6h4G4OyWGYcud52SetZm92Xf78ZojTA3cWpmaHr7_1niAdkr4CVt5fpwSLbC-IjsbpAOHpPZIItJzGRMNeZvLig-_oWpKCxKZkEpjBhStG-GJjEdPI66dJ4sMUGaIq9DAspDMWH-lcZ5FjmMhDaQTmMqDX1LdFmRnpBxr_vcfrCKTxcsDZbfBklpL_I0D22pwVeLuCMkYAgDMEH5UMGg4L6jDUiSgzGTXAHmkJJxoYWtGD8llTiJwzNCHUCTkYgaqgFOXiiF5EZKxZzIVk3BjKqRu3L3A10wkuPHGO9BzqXMAtjAADewRq5XLT9yFo4f2tRLAQbFOUwDACSgbOAFeTVym4nq1_5Bp9XG8vyvDS_IDkPnO6NyrZPKYr4ML8m2_lxM0_lVoY1fPpvh_w |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEB5KK6gH32J9RhA9Le4m2a7Fk1iLYltFWultSbK7WrC70oe_35l91AoKgqcc8iQzyXwzTL4AnBiiQQsdYUmPQje1emChrxJaOuIa4Sv33JS--LnldToX_X79sQSXxVuYjB9iFnCjk5He13TAKSB9_sUaGuCEUnD01ysStcgtQ6Xx1Oy1ZhcxIme3SDl0hesU3LM2Py_6frdGXxBzHqimlqa5-q81rsFKDjDZVaYR61AK4w1YnqMd3IRhO41KDFXMDGVwThg9_8W5GK5KpWEpihkysnABS2LWfni6YaNkSinSjJgdElQfRinzLyzO8shxJLKCbBAzFbDXxBQV4y3oNW-617dW_u2CZdD22ygr40WeEaGtDHprkXCkQhQRIFDQdazgWIi6YwKUpUBzpoRG1KEUF9JIW3OxDeU4icMdYA7iyUhGNV1DNy9UUolAKc2dyNYXkge6CmfF9vsm5ySnrzHe_IxNmfu4gT5tYBWOZy3fMx6OH9rsFxL085M49hGSoLqhH-RV4TSV1a_9_cbVNZW7f214BIu33XbLb9117vdgiZMrnhK77kN5MpqGB7BgPiaD8egwV81Py8rl7w |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dS8MwED_EieiD3-J0agTRp2KbpO2KT2NzKM4p4mRvJR-tDlw79uHf76UfU0FB8CkPSZqSu8v97rj8AnCqDA1a5DCL-yZ14wXawlglsmRMJcJX6rsZffFzx-926_1-8LAAl-VdmJwfYp5wM5aRndfGwKORji8-WUM1LsgZxXi9wt3AQ6ustB7bvc78IEbk7JYlhy5znZJ71qYX5dzv3ugTYn4Fqpmnaa__6x83YK0AmKSRa8QmLETJFqx-oR3chuFdlpUYioQoU8E5Jeb6L65F8K9ElpYyOUNiPJwmaULu7h-vyDidmRJpYpgdUlQfYkrmX0iS15Hjl4wXJIOECE1eU1V2THag1756al5bxbMLlkLfb6OslB_7ikW2UBitxczhAlGERqAgA-yg2LDAURplydCdCSYRdQhBGVfclpTtwmKSJtEeEAfxZMxjT3oY5kWCC6aFkNSJbVnnVMsqnJfbH6qCk9w8jfEW5mzKNMQNDM0GVuFkPnKU83D8MKZWSjAsLHESIiRBdcM4yK_CWSarX-eHrUbTtPt_HXgMyw-tdti56d4ewAo1kXjG61qDxel4Fh3CknqfDibjo0IzPwB8z-Vq |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Middleman+covert+channel+establishment+based+on+MORE+routing+protocol+using+network+coding+in+ad+hoc+networks&rft.jtitle=International+journal+of+communication+systems&rft.au=Akhtari%2C+Sara&rft.au=Moghim%2C+Neda&rft.au=Mahdavi%2C+Mojtaba&rft.date=2020-05-10&rft.issn=1074-5351&rft.eissn=1099-1131&rft.volume=33&rft.issue=7&rft_id=info:doi/10.1002%2Fdac.4320&rft.externalDBID=n%2Fa&rft.externalDocID=10_1002_dac_4320 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1074-5351&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1074-5351&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1074-5351&client=summon |