“…The covert channels are categorized as network covert channels and wireless covert channels (WCCs). A network covert channel is one that is built into the network layer (or upper protocol layer) [2], [3], [4], [5], [6], [7], [8], [9], [10], whereas a WCC is one that primarily exploits the MAC/physical-layer characteristics of wireless communication [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37]. Network covert channels are also divided into storage and time aspects depending on the type of resource shared in the legitimate channel [38].…”