2010 International Conference on Multimedia Information Networking and Security 2010
DOI: 10.1109/mines.2010.175
|View full text |Cite
|
Sign up to set email alerts
|

Steganography in MAC Layers of 802.15.4 Protocol for Securing Wireless Sensor Networks

Abstract: Abstract-In many applications, wireless sensor networks need to secure information. Actual researchs found efficient solutions for this kind of network, principally by using cryptography to secure the data transfer. However an encrypted information send by the network can be sufficient to prevent an attacker, who eavesdrops the network, that something important has been detected. To avoid this situation, we propose another way to secure wireless sensor networks by using steganography, specifically by hiding da… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…The average energy per symbol under PN-ASK can be computed as E c S = s∈Sc x · s 2 · Pr{s sent} (16) Recall that all symbols on the primary channel lies on the unit circle of the constellation diagram, thus x 2 = E s for any x ∈ S p . Furthermore, since s · x = s x and all symbols in S c are equiprobable, (16) can be rewritten as…”
Section: Energy Per Symbolmentioning
confidence: 99%
See 1 more Smart Citation
“…The average energy per symbol under PN-ASK can be computed as E c S = s∈Sc x · s 2 · Pr{s sent} (16) Recall that all symbols on the primary channel lies on the unit circle of the constellation diagram, thus x 2 = E s for any x ∈ S p . Furthermore, since s · x = s x and all symbols in S c are equiprobable, (16) can be rewritten as…”
Section: Energy Per Symbolmentioning
confidence: 99%
“…II. RELATED WORK The application of steganography to design covert wireless communication systems has received some attention over the last few years [13][14][15][16][17]. However, only few works have focused on the design of general-purpose, efficient and undetectable covert wireless communication systems.…”
Section: Introductionmentioning
confidence: 99%
“…RELATED WORK Wireless steganography has been frequently used for covert communications among parties. Differently from approaches where covert data are embedded in the packet control fields (e.g., checksum [32], flags [33,34], and padding fields [35], among others [36,37]), wireless steganography introduces displacements in the I/Q constellation plane that be controlled to encode information. Typical methods include frequency/phase shifts [17,23], I/Q imbalance [38], superimposing noisy constellations [16,24,39,40] or training and preamble sequences manipulations [23,41].…”
Section: B Experimental Resultsmentioning
confidence: 99%
“…We have showed too that there are numerous possibilities to hide data in the MAC layer of the 802.15.4 protocol by using some specific fields of MAC frames (Martins and Guyennet, 2010b). We found that steganography in the MAC layer of the 802.15.4 is energy-efficient, but the size capacity of sent messages are limited and if the attacker knows the method to hide data, the data is no more protected (in the case where the data is not encrypted).…”
Section: Steganographymentioning
confidence: 99%