A performance analysis of HICCUPS—a steganographic system for WLAN

@article{Szczypiorski2009APA,
  title={A performance analysis of HICCUPS—a steganographic system for WLAN},
  author={Krzysztof Szczypiorski},
  journal={Telecommunication Systems},
  year={2009},
  volume={49},
  pages={255-259}
}
  • K. Szczypiorski
  • Published 23 June 2009
  • Computer Science
  • Telecommunication Systems
The paper presents an analysis of performance features of the HICCUPS (HIdden Communication system for CorrUPted networkS) including the efficiency and the cost of the system in WLANs (Wireless Local Area Networks). The analysis relies on the original CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) 802.11 Markov chain-based model and proves that the HICCUPS is the efficient steganographic method with the reasonable cost. 
Steganography in OFDM Symbols of Fast IEEE 802.11n Networks
TLDR
Theoretical analysis and simulation results of the presented steganographic system performance are included, which provides the highest hidden transmission known in the state of the art.
Hiding Data in OFDM Symbols of IEEE 802.11 Networks
TLDR
A performance analysis based on a Markov model, previously introduced and validated by the authors in [10], is provided for the method in relation to the IEEE 802.11 a/g standards, and its results prove that maximum steganographic bandwidth for WiPad is as high as 1.1 Mbit/s for data frames and 0.44 Mbit /s for acknowledgment frames.
Network steganalysis: Detection of steganography in IEEE 802.11 wireless networks
  • S. Grabski, K. Szczypiorski
  • Computer Science
    2013 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)
  • 2013
TLDR
A detector of some selected hidden channels that are based on IEEE 802.11 Medium Access Control (MAC) sublayer is created to observe shortcomings and strengths of studied steganographic channels.
Saturation Throughput Analysis of Steganography in the IEEE 802.11p Protocol in the Presence of Non-Ideal Transmission Channel
TLDR
Analytical and simulation results stated that the values of the system throughput of the steganographic channel based on data and control frames are low as the vehicles number, traffic arrival rate, packet size, and the value of Bit Error Rate increase.
Packet Length Based Steganography Detection in Transport Layer
TLDR
A proposed detection scheme has been proposed which can detect the presence of steganographic content by modifying length of UDP datagrams based on packet length with efficient accuracy.
Steganography in MAC Layers of 802.15.4 Protocol for Securing Wireless Sensor Networks
  • D. Martins, H. Guyennet
  • Computer Science
    2010 International Conference on Multimedia Information Networking and Security
  • 2010
TLDR
It is shown that this solution can be an energy-efficient way with a good latency to hide data in a wireless sensor network by using steganography, specifically by hiding data in the MAC layer of the 802.15.4 protocol.
Detection of Packet Length Based Network Steganography
TLDR
Experimental results show that proposed detection scheme can detect packet length based network steganography with considerable accuracy.
Length based network steganography using UDP protocol
TLDR
The steganographic security of an existing network length based embedding algorithm has been analyzed and a new scheme has been proposed to overcome the limitation of the existing scheme.
Concealed in the Internet: A Novel Covert Channel with Normal Traffic Imitating
  • Xiaorong Lu, Liusheng Huang, Wei Yang, Yao Shen
  • Computer Science
    2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)
  • 2016
TLDR
A novel network steganography scheme based on IP address, UDP packet length is proposed in order to overcome the drawbacks of existing schemes and ensures more security than that of the existing algorithms.
"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography
In this paper we propose a new method for the evaluation of network steganography algorithms based on the new concept of "the moving observer". We considered three levels of undetectability named:
...
...

References

SHOWING 1-8 OF 8 REFERENCES
HICCUPS : Hidden Communication System for Corrupted Networks
TLDR
All functional parts of the HICCUPS (HIdden Communication system for CorrUPted networkS), a steganographic system dedicated to shared medium networks including wireless local area networks, are discussed.
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectability and capacity
Saturation throughput analysis of IEEE 802.11g (ERP-OFDM) networks
TLDR
The saturation throughput analysis of IEEE 802.11g (ERP-OFDM) networks is presented based on the Markov model previously introduced and validated by the authors in Szczypiorski and Lubacz.
Performance Evaluation of IEEE 802.11 DCF Networks
TLDR
A new analytical saturation throughput model of IEEE 802.11 DCF (Distributed Coordination Function) with basic access in ad-hoc mode is presented, which takes into account freezing of the backoff timer when a station senses a busy channel.
Performance analysis of IEEE 802.11 DCF networks
TLDR
An analytical saturation throughput model of IEEE 802.11 DCF (distributed coordination function) with basic access in ad hoc mode is presented, showing that taking into account freezing of the backoff timer when a station senses busy channel is important in modeling saturation throughput.
Saturation Throughput Analysis of IEEE 802ERP-OFDM) Networks. Telecommunication Systems: Modelling, Analysis, Design and Management
  • Saturation Throughput Analysis of IEEE 802ERP-OFDM) Networks. Telecommunication Systems: Modelling, Analysis, Design and Management
  • 2008
Steganography in Wireless Local Area Networks
  • PhD thesis (in Polish),
  • 2006
Performance Analysis of IEEE 802.11 DCF Networks. Journal of Zhejiang University - Science A, Zhejiang University Press, co-published with Springer-Verlag GmbH
  • 2008