Direct Sequence Spread Spectrum Steganographic Scheme for IEEE 802.15.4

  title={Direct Sequence Spread Spectrum Steganographic Scheme for IEEE 802.15.4},
  author={Elzbieta Zielinska and Krzysztof Szczypiorski},
  journal={2011 Third International Conference on Multimedia Information Networking and Security},
This work addresses the issues related to network steganography in IEEE 802.15.4 Wireless Personal Area Networks (WPAN). The proposed communication scheme employs illicit Direct Sequence Spread Spectrum code sequences for the transmission of steganographic data. The presented approach is a compromise between minimising the probability of covert channel disclosure and providing robustness against random errors and a high steganographic data rate. The conducted analyses show that it is possible… 

Figures from this paper

Network-based Steganography using Encryption in TCP/IP Header
Network steganography shelters a broad spectrum of techniques and relates to the areas like network protocols and security for practical data hiding in communication networks using Transmission Control Protocol/Internet Protocol (TCP/IP).
A Survey of Security Mechanisms with Direct Sequence Spread Spectrum Signals
This paper surveys previous research on securing a DSSS channel even further, using physical layer attributes—keyless D SSS mechanisms, and watermarked DDSS (WDSSS) schemes, and presents and evaluates an adaptive D SSSS scheme that takes both jam resistance and communication efficiency into account.
Physical Layer Watermarking of Direct Sequence Spread Spectrum Signals
Results show that, for the 11-chip PN sequence, the impact of artificial chip alteration to the content signal is quantitatively predictable, with 2 dB extra signal-to-noise ratio (SNR) required to maintain an acceptable packet error rate for one additional flipped chip.
Hiding Data in Plain Sight: Undetectable Wireless Communications Through Pseudo-Noise Asymmetric Shift Keying
A wireless system based on a pseudo-noise asymmetric shift keying (PN-ASK) modulation, where covert symbols are mapped by shifting the amplitude of primary symbols to be undetectable and improves the throughput by more than 8x with respect to prior art.
SkypeLine: Robust Hidden Data Transmission for VoIP
This paper presents SkypeLine, a censorship circumvention system that leverages Direct-Sequence Spread Spectrum (DSSS) based steganography to hide information in Voice-over-IP (VoIP) communication and demonstrates the real-world applicability of the presented system with an exemplary prototype for Skype.
SteaLTE: Private 5G Cellular Connectivity as a Service with Full-stack Wireless Steganography
This paper presents SteaLTE as the first realization of a PCCaaS-enabling system for cellular networks, and takes a full-stack approach to steganography, contributing an LTE-compliant stegano-graphic protocol stack for PCCAAS-based communications, and packet schedulers and operations to embed covert data streams on top of traditional cellular traffic.
CloakLoRa: A Covert Channel over LoRa PHY
This study reveals that the LoRa physical layer leaves sufficient room to build a covert channel by embedding covert information with a modulation scheme orthogonal to CSS, and implements CloakLoRa, which embeds covert information into a regular LoRa packet by modulating the amplitudes of LoRa chirps while keeping the frequency intact.
Image Steganography using Non Embedding and Average Technique in Transform Domain
The capacity and PSNR values are high in the case of propos ed algorithm compared to existing algorithms since non embedding and average technique is used in transform domain.


Steganography in 802.15.4 wireless communication
This paper proposes and simulates a simple steganography method to embed additional information in 802.15.4 data packets when link quality permits, with a modest increase in signal to noise ratio (SNR) required for the same error performance of the underlying 802.
Hiding Data in OFDM Symbols of IEEE 802.11 Networks
A performance analysis based on a Markov model, previously introduced and validated by the authors in [10], is provided for the method in relation to the IEEE 802.11 a/g standards, and its results prove that maximum steganographic bandwidth for WiPad is as high as 1.1 Mbit/s for data frames and 0.44 Mbit /s for acknowledgment frames.
Steganography in the 802 . 15 . 4 Physical Layer
The error correcting coding in 802.15.4 is evaluated, a steganographic system that appears standards-compliant is proposed, and the system’s properties are looked at analytically and through simulation.
Attacks with Steganography in PHY and MAC Layers of 802.15.4 Protocol
  • D. Martins, H. Guyennet
  • Computer Science
    2010 Fifth International Conference on Systems and Networks Communications
  • 2010
It is shown in this article that there is a threat in wireless sensor networks by using the 802.15.4 protocol, and it is possible to hide data in PHY and MAC layers with steganographic techniques.
Covert channels and countermeasures in computer network protocols [Reprinted from IEEE Communications Surveys and Tutorials]
An overview of the existing techniques for creating covert channels in widely deployed network protocols, and common methods for their detection, elimination, and capacity limitation are provided.
Steganography in Digital Media: Principles, Algorithms, and Applications
This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of Steganography.
Esense: communication through energy sensing
This paper builds an ``alphabet set'': a set of signature packet sizes which can be used for Esense communication, and demonstrates the ability to communicate between devices that follow two different standards: IEEE 802.11 and 802.15.4.
Wireless Communications and Networking
This book provides comprehensive coverage of mobile data networking and mobile communications under a single cover for diverse audiences including managers, practicing engineers, and students who
Wireless lan medium access control (mac) and physical layer (phy) specifications
services are specified here by describing the service primitives and parameters that characterize each service. This definition is independent of any particular implementation. In particular, the
The Internet of things.
A ski binding comprises a base and a jaw pivotally mounted on the base for engaging a ski boot and the ski binding is provided with an indicator mechanism to indicate the break away force for which the binding is set.