"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography

@article{Szczypiorski2015TheGT,
  title={"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography},
  author={Krzysztof Szczypiorski and Artur Janicki and Steffen Wendzel},
  journal={J. Commun.},
  year={2015},
  volume={10},
  pages={747-752}
}
In this paper we propose a new method for the evaluation of network steganography algorithms based on the new concept of "the moving observer". We considered three levels of undetectability named: "good", "bad", and "ugly". To illustrate this method we chose Wi-Fi steganography as a solid family of information hiding protocols. We present the state of the art in this area covering well-known hiding techniques for 802.11 networks. "The moving observer" approach could help not only in the… 

Figures and Tables from this paper

Steganography in VLC Systems
TLDR
New steganographic techniques for VLC are introduced: hiding data in dimming patterns and color visibility dimming frames, and methods previously proposed for radio networks, such as using unused header bits and pseudo-corrupted frames to hide data are adapted.
LuxSteg: First Practical Implementation of Steganography in VLC
TLDR
This paper describes (for the first time, to the best of the knowledge) the implementation of steganographic data transmission in a VLC system called LuxSteg, and analyzes the influence of the spreading factor, spreading code type, number of hidden data streams, and the amplitude on the achievable transmission rate, undetectability, and robustness.
MoveSteg: A Method of Network Steganography Detection
TLDR
A new method for detecting a source point of time based network steganography - MoveSteg is presented, which allows finding the source of Steganography stream in network that is under the authors' management.
A Wireless Covert Channel Based on Dirty Constellation with Phase Drift
TLDR
A novel method of steganographic transmission which is based on phase drift in phase-shift keying or quadrature amplitude modulation (QAM) and is included in the so-called dirty constellation techniques.
Yet Another Network Steganography Technique Basedon TCP Retransmissions
TLDR
A new technique of network steganography using the TCP protocol retransmission mechanism that can use any user-generated network traffic as hidden transmission channel and utilizes overwriting TCP segments payload without recalculating checksums.
A hybrid technique for data embedding over wireless sensor networks based on cover generation through variance
  • Reetika Sodhi, Anshu Sharma
  • Computer Science
    2016 2nd International Conference on Next Generation Computing Technologies (NGCT)
  • 2016
TLDR
Two state of the art steganography techniques are studied which have been applied over speech data and image data respectively, and modified them in order to use them in network Steganography for wireless sensor networks and the hybrid technique performed well and have potential to be applied over wireless Sensor networks for military application.
Methods for Information Hiding in Open Social Networks
TLDR
SocialStegDisc provides the basic set of operations for files, such as creation, reading or deletion, by implementing the mechanism of a linked list, which establishes a new kind of mass-storage characterized by unlimited data space, but limited address space.
StegIbiza: New method for information hiding in club music
  • K. Szczypiorski
  • Computer Science
    2016 2nd International Conference on Frontiers of Signal Processing (ICFSP)
  • 2016
TLDR
The evaluation of the system was performed for several music samples (with and without StegIbiza enabled) on a selected group of testers who had a music background, and none of them could identify any differences in the audio with a 1% margin of changed tempo.
New method for information hiding in open social networks
  • Jędrzej Bieniasz, K. Szczypiorski
  • Computer Science
    Symposium on Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments (WILGA)
  • 2018
TLDR
A new method for information hiding in Open Social Networks named SocialStegDisc was designed as an application of the StegHash method by applying the theory of filesystems to establish a new kind of mass-storage characterized by unlimited data space.
...
...

References

SHOWING 1-10 OF 31 REFERENCES
Steg Blocks: Ensuring Perfect Undetectability of Network Steganography
TLDR
The paper presents StegBlocks, which defines a new concept for performing undetectable hidden communication and presents the approach to perfect undetECTability of network steganography, which was developed based on the rules of undetectability for general Steganography.
Network steganalysis: Detection of steganography in IEEE 802.11 wireless networks
  • S. Grabski, K. Szczypiorski
  • Computer Science
    2013 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)
  • 2013
TLDR
A detector of some selected hidden channels that are based on IEEE 802.11 Medium Access Control (MAC) sublayer is created to observe shortcomings and strengths of studied steganographic channels.
Steganography in IEEE 802.11 OFDM symbols
TLDR
A performance analysis based on a Markov model, previously introduced and validated by the authors, is provided for the method in relation to the IEEE 802.11 a/g standards, and its results prove that maximum steganographic bandwidth for WiPad is as high as 1.1Mbit/s for data frames and 0.44Mbit /s for acknowledgment frames.
On importance of steganographic cost for network steganography
TLDR
Steganographic cost can be an important characteristic that allows to express hidden data carrier degradation - similarly as MSE (Mean-Square Error) or PSNR (Peak Signal-to-Noise Ratio) are utilized for digital media steganography.
Steganography in WiMAX networks
  • Iwona Grabska, K. Szczypiorski
  • Computer Science
    2013 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)
  • 2013
TLDR
The main subject of this work is to propose and analyze steganographic systems using WiMAX networks physical layer (PHY), and SIMULINK, which is the part of MATLAB, proved to be the best solution.
WLAN steganography revisited
TLDR
The timing channel based approach SCII from 2006 is substituted by a completely new design based on the usage of WLAN Access Point addresses for the synchronization and payload transmission, which allows a comprehensive practical evaluation of the implementation and the evaluations of the scheme, which was not possible with the original SCII before.
Steganography in Long Term Evolution Systems
TLDR
This paper contains a description and analysis of a new steganographic method, called LaTEsteg, designed for LTE (Long Term Evolution) systems, that allows users to gain additional data transfer that is invisible to unauthorized parties that are unaware of hidden communication.
Capacity is the wrong paradigm
TLDR
A new paradigm called "capability" is proposed which gauges the effectiveness of a steganographic method and includes payload carrying ability, detectability, and robustness components.
A performance analysis of HICCUPS—a steganographic system for WLAN
  • K. Szczypiorski
  • Computer Science
    2009 International Conference on Multimedia Information Networking and Security
  • 2009
TLDR
The analysis relies on the original CSMA/CA 802.11 Markov chain-based model and proves that the HICCUPS is the efficient steganographic method with the reasonable cost.
Implementation of a Covert Channel in the 802.11 Header
TLDR
A novel covert channel in the data link layer dedicated to wireless local area networks is discussed, which uses either sequence control or initial vector fields, or both of them, depending on the configuration of the network.
...
...