2012 19th International Conference on Microwaves, Radar &Amp; Wireless Communications 2012
DOI: 10.1109/mikon.2012.6233587
|View full text |Cite
|
Sign up to set email alerts
|

The proposal of IEEE 802.11 network access point authentication mechanism using a covert channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0
2

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(17 citation statements)
references
References 11 publications
0
15
0
2
Order By: Relevance
“…Other hiding techniques developed for Wi-Fi networks used CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) [15], controlling the rate of transmission [16], or a beacon mechanism [17].…”
Section: E Other Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Other hiding techniques developed for Wi-Fi networks used CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) [15], controlling the rate of transmission [16], or a beacon mechanism [17].…”
Section: E Other Methodsmentioning
confidence: 99%
“…The authors suggested two applications for this channel: covert authentication and covert Wi-Fi botnets. The covert authentication proposed by Calhoun et al [16] was further developed by Sawicki and Piotrowski [17] to authenticate access points by using beacon frames and timestamp fields.…”
Section: E Other Methodsmentioning
confidence: 99%
“…This constraint means that practically only five or six bits in the TTL field can be used for covert transmission, with regular IP transmission still operational. Another interesting method, which can be applied in wireless networks, is the altering of the Timestamp field in Beacon frames broadcasted by IEEE 802.11 access points [ 29 ]. This method modifies the least significant bits of that field to embed covert data.…”
Section: Related Workmentioning
confidence: 99%
“…Covert channel uses the unused bandwidth [12] and do not add any overhead. If the authentication string sent by Access Point (AP) matches with that of the client then only client connects with AP else it disconnects [13]. It has been shown in fig.…”
Section: ) Covert Channelmentioning
confidence: 99%