Covert channel attacks in pervasive computing 6 years ago For IEEE to continue sending you helpful information on our products and services, please consent to our updated Privacy Policy. Accept & Sign In Forgot Password?