7-days of FREE Audio papers, translation & more with Prime
7-days of FREE Prime access
7-days of FREE Audio papers, translation & more with Prime
7-days of FREE Prime access
https://doi.org/10.1002/sec.1545
Copy DOIJournal: Security and Communication Networks | Publication Date: Jul 7, 2016 |
Citations: 7 | License type: cc-by-nc-nd |
Covert channel is one of the most interesting topics in the computer networks security. Covert channel designers are seeking to discover weaknesses in the communications algorithms to use them as the medium for covert transmission. Broadcast nature of wireless channels has provided a favorable environment for the design of the hidden channels. CSMA/CA is used to control channel access in IEEE 802.11 network. Random features of this algorithm can be used to create timing covert channel. The statistical distribution of the free time intervals' duration is used in this paper for covert channel establishment. Hidden messages are sent via manipulating the timing of the overt packets' transmission. Hidden transceiver senses the wireless channel continuously to be adapted to the dynamic network condition and to be less detectable. To increase the covert channel's accuracy, some free interval durations are not used that leads to security degradation. This problem is also covered by a gap covering method that is based on the summation of the channel sensed free time interval distribution and a normal one. Hidden nodes also estimate the number of active nodes and adapt their behavior accordingly to keep their compatibility with the network. The statistical Kolmogorov-Smirnov and regularity tests are used to assess the security of the covert channel. Simulation results show that the proposed covert channel have a high bit rate along with high security. © 2016 The Authors Security and Communication Networks published by John Wiley & Sons Ltd
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.