2023
DOI: 10.3390/app13148000
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Covert Channel for IEEE 802.11 Networks Utilizing MAC Address Randomization

Geovani Teca,
Marek Natkaniec

Abstract: Vendors implement the MAC address randomization technique to prevent IEEE 802.11 client station devices from being tracked. Although it conceals device identity, it cannot hide its occurring data transmission. This paper presents a novel covert channel that leverages the MAC address randomization technique to create a covert channel to hide data transmission inside IEEE 802.11 networks. The secret data are a disposable random MAC address generated by the IEEE 802.11 station as part of the probe request frame w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…One effective approach is leveraging fields that permit the use of custom values. The study [18] introduces an innovative covert channel that exploits the MAC address randomization technique for concealing data transmissions within IEEE 802.11 networks. In this covert communication method, disposable random MAC addresses are employed, generated by the IEEE 802.11 station as an integral part of the probe request frame during the network scanning phase.…”
Section: Related Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…One effective approach is leveraging fields that permit the use of custom values. The study [18] introduces an innovative covert channel that exploits the MAC address randomization technique for concealing data transmissions within IEEE 802.11 networks. In this covert communication method, disposable random MAC addresses are employed, generated by the IEEE 802.11 station as an integral part of the probe request frame during the network scanning phase.…”
Section: Related Studiesmentioning
confidence: 99%
“…Medium Medium [18] The hidden information consists of a one-time-use random MAC address created by the IEEE 802.11 station during the network scanning process within the probe request frame.…”
Section: Ns-3 Macmentioning
confidence: 99%
“…For downlink communication, the gateway follows the asynchronous downlink mode for communication as described below. There are time parameters in the protocol such as DIFS, SIFS, SlotTime [5] . The size of these parameters depends on the LoRa physical layer parameters.…”
Section: Introductionmentioning
confidence: 99%