2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC) 2015
DOI: 10.1109/iscisc.2015.7387901
|View full text |Cite
|
Sign up to set email alerts
|

Ternary timing covert channel in wireless 802.11

Abstract: Covert channel is one of the most interesting topics in the computer networks security. Covert channel designers are seeking to discover weaknesses in the communications algorithms to use them as the medium for covert transmission. Broadcast nature of wireless channels has provided a favorable environment for the design of the hidden channels. CSMA/CA is used to control channel access in IEEE 802.11 network. Random features of this algorithm can be used to create timing covert channel. The statistical distribu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Typical timing solutions for IEEE 802.11 networks that take advantage of their properties (e.g., non-deterministic media access) are also available. An example of such a method has been described in [ 36 ]. Another solution for the timing covert channel has been presented in [ 37 ].…”
Section: Related Workmentioning
confidence: 99%
“…Typical timing solutions for IEEE 802.11 networks that take advantage of their properties (e.g., non-deterministic media access) are also available. An example of such a method has been described in [ 36 ]. Another solution for the timing covert channel has been presented in [ 37 ].…”
Section: Related Workmentioning
confidence: 99%
“…One of the most exploited fields is computer network steganography, where two types of covert channels can be distinguished—timing covert channels and storage covert channels. The first type uses the modulation of the interval between two network events, such as the beginning of packet transmissions in wireless channels [ 9 ] or adjusting silence periods in VoLTE transmission [ 10 ]. The other type, storage channels, exploits unused or partially used fields in network protocols, such as the Timestamp field in IEEE 802.11 Beacon frames [ 11 ].…”
Section: Introductionmentioning
confidence: 99%