Direct Sequence Spread Spectrum Steganographic Scheme for IEEE 802.15.4
@article{Zielinska2011DirectSS, title={Direct Sequence Spread Spectrum Steganographic Scheme for IEEE 802.15.4}, author={Elzbieta Zielinska and Krzysztof Szczypiorski}, journal={2011 Third International Conference on Multimedia Information Networking and Security}, year={2011}, pages={586-590} }
This work addresses the issues related to network steganography in IEEE 802.15.4 Wireless Personal Area Networks (WPAN). The proposed communication scheme employs illicit Direct Sequence Spread Spectrum code sequences for the transmission of steganographic data. The presented approach is a compromise between minimising the probability of covert channel disclosure and providing robustness against random errors and a high steganographic data rate. The conducted analyses show that it is possible…
11 Citations
Network-based Steganography using Encryption in TCP/IP Header
- Computer Science
- 2013
Network steganography shelters a broad spectrum of techniques and relates to the areas like network protocols and security for practical data hiding in communication networks using Transmission Control Protocol/Internet Protocol (TCP/IP).
A Survey of Security Mechanisms with Direct Sequence Spread Spectrum Signals
- Computer ScienceJ. Comput. Sci. Eng.
- 2013
This paper surveys previous research on securing a DSSS channel even further, using physical layer attributes—keyless D SSS mechanisms, and watermarked DDSS (WDSSS) schemes, and presents and evaluates an adaptive D SSSS scheme that takes both jam resistance and communication efficiency into account.
Physical Layer Watermarking of Direct Sequence Spread Spectrum Signals
- Computer ScienceMILCOM 2013 - 2013 IEEE Military Communications Conference
- 2013
Results show that, for the 11-chip PN sequence, the impact of artificial chip alteration to the content signal is quantitatively predictable, with 2 dB extra signal-to-noise ratio (SNR) required to maintain an acceptable packet error rate for one additional flipped chip.
Hiding Data in Plain Sight: Undetectable Wireless Communications Through Pseudo-Noise Asymmetric Shift Keying
- Computer ScienceIEEE INFOCOM 2019 - IEEE Conference on Computer Communications
- 2019
A wireless system based on a pseudo-noise asymmetric shift keying (PN-ASK) modulation, where covert symbols are mapped by shifting the amplitude of primary symbols to be undetectable and improves the throughput by more than 8x with respect to prior art.
SkypeLine: Robust Hidden Data Transmission for VoIP
- Computer ScienceAsiaCCS
- 2016
This paper presents SkypeLine, a censorship circumvention system that leverages Direct-Sequence Spread Spectrum (DSSS) based steganography to hide information in Voice-over-IP (VoIP) communication and demonstrates the real-world applicability of the presented system with an exemplary prototype for Skype.
SteaLTE: Private 5G Cellular Connectivity as a Service with Full-stack Wireless Steganography
- Computer ScienceIEEE INFOCOM 2021 - IEEE Conference on Computer Communications
- 2021
This paper presents SteaLTE as the first realization of a PCCaaS-enabling system for cellular networks, and takes a full-stack approach to steganography, contributing an LTE-compliant stegano-graphic protocol stack for PCCAAS-based communications, and packet schedulers and operations to embed covert data streams on top of traditional cellular traffic.
CloakLoRa: A Covert Channel over LoRa PHY
- Computer Science2020 IEEE 28th International Conference on Network Protocols (ICNP)
- 2020
This study reveals that the LoRa physical layer leaves sufficient room to build a covert channel by embedding covert information with a modulation scheme orthogonal to CSS, and implements CloakLoRa, which embeds covert information into a regular LoRa packet by modulating the amplitudes of LoRa chirps while keeping the frequency intact.
Image Steganography using Non Embedding and Average Technique in Transform Domain
- Computer Science
- 2015
The capacity and PSNR values are high in the case of propos ed algorithm compared to existing algorithms since non embedding and average technique is used in transform domain.
A Coding Layer Robust Reversible Watermarking Algorithm for Digital Image in Multi-antenna System
- Computer ScienceSignal Processing
- 2022
References
SHOWING 1-10 OF 18 REFERENCES
Steganography in 802.15.4 wireless communication
- Computer Science2008 2nd International Symposium on Advanced Networks and Telecommunication Systems
- 2008
This paper proposes and simulates a simple steganography method to embed additional information in 802.15.4 data packets when link quality permits, with a modest increase in signal to noise ratio (SNR) required for the same error performance of the underlying 802.
Hiding Data in OFDM Symbols of IEEE 802.11 Networks
- Computer Science2010 International Conference on Multimedia Information Networking and Security
- 2010
A performance analysis based on a Markov model, previously introduced and validated by the authors in [10], is provided for the method in relation to the IEEE 802.11 a/g standards, and its results prove that maximum steganographic bandwidth for WiPad is as high as 1.1 Mbit/s for data frames and 0.44 Mbit /s for acknowledgment frames.
Steganography in the 802 . 15 . 4 Physical Layer
- Computer Science
- 2007
The error correcting coding in 802.15.4 is evaluated, a steganographic system that appears standards-compliant is proposed, and the system’s properties are looked at analytically and through simulation.
Attacks with Steganography in PHY and MAC Layers of 802.15.4 Protocol
- Computer Science2010 Fifth International Conference on Systems and Networks Communications
- 2010
It is shown in this article that there is a threat in wireless sensor networks by using the 802.15.4 protocol, and it is possible to hide data in PHY and MAC layers with steganographic techniques.
Covert channels and countermeasures in computer network protocols [Reprinted from IEEE Communications Surveys and Tutorials]
- Computer ScienceIEEE Communications Magazine
- 2007
An overview of the existing techniques for creating covert channels in widely deployed network protocols, and common methods for their detection, elimination, and capacity limitation are provided.
Steganography in Digital Media: Principles, Algorithms, and Applications
- Computer Science
- 2009
This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of Steganography.
Esense: communication through energy sensing
- Computer ScienceMobiCom '09
- 2009
This paper builds an ``alphabet set'': a set of signature packet sizes which can be used for Esense communication, and demonstrates the ability to communicate between devices that follow two different standards: IEEE 802.11 and 802.15.4.
Wireless Communications and Networking
- Business
- 2008
This book provides comprehensive coverage of mobile data networking and mobile communications under a single cover for diverse audiences including managers, practicing engineers, and students who…
Wireless lan medium access control (mac) and physical layer (phy) specifications
- Computer Science
- 1997
services are specified here by describing the service primitives and parameters that characterize each service. This definition is independent of any particular implementation. In particular, the…
The Internet of things.
- PhysicsScientific American
- 2004
A ski binding comprises a base and a jaw pivotally mounted on the base for engaging a ski boot and the ski binding is provided with an indicator mechanism to indicate the break away force for which the binding is set.