A performance analysis of HICCUPS—a steganographic system for WLAN
@article{Szczypiorski2009APA, title={A performance analysis of HICCUPS—a steganographic system for WLAN}, author={Krzysztof Szczypiorski}, journal={Telecommunication Systems}, year={2009}, volume={49}, pages={255-259} }
The paper presents an analysis of performance features of the HICCUPS (HIdden Communication system for CorrUPted networkS) including the efficiency and the cost of the system in WLANs (Wireless Local Area Networks). The analysis relies on the original CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) 802.11 Markov chain-based model and proves that the HICCUPS is the efficient steganographic method with the reasonable cost.
21 Citations
Steganography in OFDM Symbols of Fast IEEE 802.11n Networks
- Business2013 IEEE Security and Privacy Workshops
- 2013
Theoretical analysis and simulation results of the presented steganographic system performance are included, which provides the highest hidden transmission known in the state of the art.
Hiding Data in OFDM Symbols of IEEE 802.11 Networks
- Computer Science2010 International Conference on Multimedia Information Networking and Security
- 2010
A performance analysis based on a Markov model, previously introduced and validated by the authors in [10], is provided for the method in relation to the IEEE 802.11 a/g standards, and its results prove that maximum steganographic bandwidth for WiPad is as high as 1.1 Mbit/s for data frames and 0.44 Mbit /s for acknowledgment frames.
Network steganalysis: Detection of steganography in IEEE 802.11 wireless networks
- Computer Science2013 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)
- 2013
A detector of some selected hidden channels that are based on IEEE 802.11 Medium Access Control (MAC) sublayer is created to observe shortcomings and strengths of studied steganographic channels.
Saturation Throughput Analysis of Steganography in the IEEE 802.11p Protocol in the Presence of Non-Ideal Transmission Channel
- Business, Computer ScienceIEEE Access
- 2021
Analytical and simulation results stated that the values of the system throughput of the steganographic channel based on data and control frames are low as the vehicles number, traffic arrival rate, packet size, and the value of Bit Error Rate increase.
Packet Length Based Steganography Detection in Transport Layer
- Computer Science
- 2012
A proposed detection scheme has been proposed which can detect the presence of steganographic content by modifying length of UDP datagrams based on packet length with efficient accuracy.
Steganography in MAC Layers of 802.15.4 Protocol for Securing Wireless Sensor Networks
- Computer Science2010 International Conference on Multimedia Information Networking and Security
- 2010
It is shown that this solution can be an energy-efficient way with a good latency to hide data in a wireless sensor network by using steganography, specifically by hiding data in the MAC layer of the 802.15.4 protocol.
Detection of Packet Length Based Network Steganography
- Computer Science2010 International Conference on Multimedia Information Networking and Security
- 2010
Experimental results show that proposed detection scheme can detect packet length based network steganography with considerable accuracy.
Length based network steganography using UDP protocol
- Computer Science2011 IEEE 3rd International Conference on Communication Software and Networks
- 2011
The steganographic security of an existing network length based embedding algorithm has been analyzed and a new scheme has been proposed to overcome the limitation of the existing scheme.
Concealed in the Internet: A Novel Covert Channel with Normal Traffic Imitating
- Computer Science2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)
- 2016
A novel network steganography scheme based on IP address, UDP packet length is proposed in order to overcome the drawbacks of existing schemes and ensures more security than that of the existing algorithms.
"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography
- Computer ScienceJ. Commun.
- 2015
In this paper we propose a new method for the evaluation of network steganography algorithms based on the new concept of "the moving observer". We considered three levels of undetectability named:…
References
SHOWING 1-8 OF 8 REFERENCES
HICCUPS : Hidden Communication System for Corrupted Networks
- Computer Science
- 2003
All functional parts of the HICCUPS (HIdden Communication system for CorrUPted networkS), a steganographic system dedicated to shared medium networks including wireless local area networks, are discussed.
WLAN steganography: a first practical review
- Computer ScienceMM&Sec '06
- 2006
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectability and capacity…
Saturation throughput analysis of IEEE 802.11g (ERP-OFDM) networks
- BusinessPWC
- 2007
The saturation throughput analysis of IEEE 802.11g (ERP-OFDM) networks is presented based on the Markov model previously introduced and validated by the authors in Szczypiorski and Lubacz.
Performance Evaluation of IEEE 802.11 DCF Networks
- BusinessInternational Teletraffic Congress
- 2007
A new analytical saturation throughput model of IEEE 802.11 DCF (Distributed Coordination Function) with basic access in ad-hoc mode is presented, which takes into account freezing of the backoff timer when a station senses a busy channel.
Performance analysis of IEEE 802.11 DCF networks
- Business
- 2008
An analytical saturation throughput model of IEEE 802.11 DCF (distributed coordination function) with basic access in ad hoc mode is presented, showing that taking into account freezing of the backoff timer when a station senses busy channel is important in modeling saturation throughput.
Saturation Throughput Analysis of IEEE 802ERP-OFDM) Networks. Telecommunication Systems: Modelling, Analysis, Design and Management
- Saturation Throughput Analysis of IEEE 802ERP-OFDM) Networks. Telecommunication Systems: Modelling, Analysis, Design and Management
- 2008
Steganography in Wireless Local Area Networks
- PhD thesis (in Polish),
- 2006
Performance Analysis of IEEE 802.11 DCF Networks. Journal of Zhejiang University - Science A, Zhejiang University Press, co-published with Springer-Verlag GmbH
- 2008