2021
DOI: 10.3390/s21186268
|View full text |Cite
|
Sign up to set email alerts
|

StegoFrameOrder—MAC Layer Covert Network Channel for Wireless IEEE 802.11 Networks

Abstract: The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in wireless computer networks exploiting non-deterministic algorithms of medium access (such as the distributed coordination function), especially in IEEE 802.11 networks. Such a covert channel enables the possibility of leaking crucial information outside secured network in a manner that is difficult to detect. The SFO method embeds hidden bits of information in the relative order of frames transmitted by wireless terminals oper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(12 citation statements)
references
References 33 publications
0
12
0
Order By: Relevance
“…Exploitation of non-terrestrial wireless infrastructure can significantly amplify the operational range of SPARROW covert channels. The general vulnerability framework in Section II can be readily extended to covert channels schemes using other passively measurable aspects of the cell radio that can be controlled by one SPARROW device and detected by another one, such as the examples discussed in [13] for the limited range WLAN standards.…”
Section: Discussionmentioning
confidence: 99%
“…Exploitation of non-terrestrial wireless infrastructure can significantly amplify the operational range of SPARROW covert channels. The general vulnerability framework in Section II can be readily extended to covert channels schemes using other passively measurable aspects of the cell radio that can be controlled by one SPARROW device and detected by another one, such as the examples discussed in [13] for the limited range WLAN standards.…”
Section: Discussionmentioning
confidence: 99%
“…Exploitation of non-terrestrial wireless infrastructure can significantly amplify the operational range of SPARROW covert channels. The general vulnerability framework in Section II can be readily extended to covert channels schemes using other passively measurable aspects of the cell radio that can be exploited for a covert channel complementing the examples discussed in [16] Revisiting Proposition 2, the random obfuscation in EL-ISHA scheme turns the exploited channel into a typical erasure channel such that the receiver cannot decode the messages mapped to the same broadcast output, as if they were erased. Thus, the capacity of the exploited channel is given by…”
Section: Discussionmentioning
confidence: 99%
“…It can be categorized into two types. One is a type to exploit the upper layer, including MAC layer protocol, such as in mobile network [11], [12], [13], [14], [15], [16], in IEEE 802.11 WLAN [17], [18], [19], [20], [21], [22], in IoT covert channel [24], [25], [26], [27], [28]. And, the other type is based on the physical layer which is commonly used in radio frequency (RF) signal characteristics.…”
Section: Related Workmentioning
confidence: 99%
“…The covert channels are categorized as network covert channels and wireless covert channels (WCCs). A network covert channel is one that is built into the network layer (or upper protocol layer) [2], [3], [4], [5], [6], [7], [8], [9], [10], whereas a WCC is one that primarily exploits the MAC/physical-layer characteristics of wireless communication [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37]. Network covert channels are also divided into storage and time aspects depending on the type of resource shared in the legitimate channel [38].…”
mentioning
confidence: 99%
See 1 more Smart Citation