Abstract
To conceal the very existence of communication, the noise-based wireless covert channel modulates secret messages into artificial noise, which is added to the normal wireless signal. Although the state-of-the-art work based on constellation modulation has made the composite and legitimate signal undistinguishable, there exists an imperfection on reliability due to the dense distribution of covert constellation points. In this study, the authors design a wireless covert channel based on dither analog chaotic code to improve the reliability without damaging the undetectability. The dither analog chaotic code (DACC) plays the role as the error correcting code. In the modulation, the analog variables converted from secret messages are encode into joint codewords by chaotic mapping and dither derivation of DACC. The joint codewords are mapped to artificial noise later. Simulation results show that the proposed scheme can achieve better reliability than the state-of-the-art scheme while maintaining the similar performance on undetectability.
Highlights
Covert channel is a specific branch of data hiding which aims to deliver secret messages to the potential receivers without causing the attentions of the third parties(Zander, Armitage, & Branch, 2007)
The authors design a wireless covert channel based on dither analog chaotic code to improve the reliability without damaging the undetectability
A wireless covert channel based on dither analog chaotic code (WCC-DACC) is proposed to improve the reliability of covert communication
Summary
Covert channel is a specific branch of data hiding which aims to deliver secret messages to the potential receivers without causing the attentions of the third parties(Zander, Armitage, & Branch, 2007). To conceal the very existence of communication, the noise-based wireless covert channel modulates secret messages into artificial noise, which is added to the normal wireless signal. The authors design a wireless covert channel based on dither analog chaotic code to improve the reliability without damaging the undetectability.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Digital Crime and Forensics
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.