2010
DOI: 10.1007/s11235-010-9363-6
|View full text |Cite
|
Sign up to set email alerts
|

A performance analysis of HICCUPS—a steganographic system for WLAN

Abstract: The paper presents an analysis of performance features of the HICCUPS (HIdden Communication system for CorrUPted networkS) including the efficiency and the cost of the system in WLANs (Wireless Local Area Networks). The analysis relies on the original CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) 802.11 Markov chain-based model and proves that the HICCUPS is the efficient steganographic method with the reasonable cost.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…Thus, [5] uses the reserved field in the TCP packet header of the TCP/IP protocol, as we can see in Figure 1, and gives the possibility to hide six bits per exchanged packet in this example. This technique can also be used to create a hidden channel in a wireless local area network as explained in [8]. This example is closer to what we can do in wireless sensor networks if we try to apply this method in the 802.15.4 protocol.…”
Section: Related Workmentioning
confidence: 93%
“…Thus, [5] uses the reserved field in the TCP packet header of the TCP/IP protocol, as we can see in Figure 1, and gives the possibility to hide six bits per exchanged packet in this example. This technique can also be used to create a hidden channel in a wireless local area network as explained in [8]. This example is closer to what we can do in wireless sensor networks if we try to apply this method in the 802.15.4 protocol.…”
Section: Related Workmentioning
confidence: 93%
“…This technique can also be used to create a hidden channel in a wireless local area network as explained in [8]. This example is closer to what we can do in wireless sensor networks if we try to apply this method in the 802.15.4 protocol.…”
Section: Fig 1 Reserved Bytes In Tcp Packet Headermentioning
confidence: 93%
“…Network steganography is a generic term that may describe all information concealment techniques used to communicate in telecommunication networks. This nomenclature was proposed for the first time in [17]. The author introduced a novel network steganography method named the Hidden Communication System for Corrupted Networks (HICCUPS) for wireless local area networks (WLANs).…”
Section: Network Steganographymentioning
confidence: 99%