Hiding Data in OFDM Symbols of IEEE 802.11 Networks

  title={Hiding Data in OFDM Symbols of IEEE 802.11 Networks},
  author={Krzysztof Szczypiorski and Wojciech Mazurczyk},
  journal={2010 International Conference on Multimedia Information Networking and Security},
  • K. Szczypiorski, W. Mazurczyk
  • Published 2 June 2010
  • Computer Science
  • 2010 International Conference on Multimedia Information Networking and Security
This paper presents a new steganographic method called WiPad (Wireless Padding). It is based on the insertion of hidden data into the padding of frames at the physical layer of WLANs (Wireless Local Area Networks). A performance analysis based on a Markov model, previously introduced and validated by the authors in [10], is provided for the method in relation to the IEEE 802.11 a/g standards . Its results prove that maximum steganographic bandwidth for WiPad is as high as 1.1 Mbit/s for data… 

Figures and Tables from this paper

Steganography in OFDM Symbols of Fast IEEE 802.11n Networks
Theoretical analysis and simulation results of the presented steganographic system performance are included, which provides the highest hidden transmission known in the state of the art.
Saturation Throughput Analysis of Steganography in the IEEE 802.11p Protocol in the Presence of Non-Ideal Transmission Channel
Analytical and simulation results stated that the values of the system throughput of the steganographic channel based on data and control frames are low as the vehicles number, traffic arrival rate, packet size, and the value of Bit Error Rate increase.
Steganography in WiMAX networks
  • Iwona Grabska, K. Szczypiorski
  • Computer Science
    2013 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)
  • 2013
The main subject of this work is to propose and analyze steganographic systems using WiMAX networks physical layer (PHY), and SIMULINK, which is the part of MATLAB, proved to be the best solution.
Exploring cyclic prefix for secret data transmission over LTE networks
A new FFT based method for secret data transmission by exploring cyclic prefix is proposed and the proposed method is suitable for a realistic fading channel.
Expanding the Role of Preambles to Support User-defined Functionality in MIMO-based WLANs
This paper develops a scheme called extensible preamble modulation (ePMod) for the MIMO-based 802.11ac protocol, which enables several promising PHY-layer services, such as PHy-layer encryption and channel/device authentication, PHYlayer signaling, etc.
Steganography in Long Term Evolution Systems
This paper contains a description and analysis of a new steganographic method, called LaTEsteg, designed for LTE (Long Term Evolution) systems, that allows users to gain additional data transfer that is invisible to unauthorized parties that are unaware of hidden communication.
Proof of proximity with 802.11 wireless LAN
  • Till Wollenberg, T. Mundt
  • Computer Science
    SoftCOM 2011, 19th International Conference on Software, Telecommunications and Computer Networks
  • 2011
While two of the methods show weaknesses which allow an attacker to reduce the accuracy of positioning, the 3rd proposed method is immune and the achievable accuracy is sufficient to restrict network access to company's premises or large buildings.
Exploiting Cantor Expansion for Covert Channels over LTE-Advanced
A novel class of covert channel based on Cantor Expansion and its inverse operation (for encoding) is proposed and designed for this mobile network and it is difficult to be detected.
A Wireless Covert Channel Based on Constellation Shaping Modulation
The traditional KS test and regularity test in covert timing channel detection is extended into wireless covert channel, which can be used to reveal the very existence of secret data in Wireless covert channel from the aspect of multiorder statistics and the communication reliability under typical interference is proved.


WLAN steganography revisited
The timing channel based approach SCII from 2006 is substituted by a completely new design based on the usage of WLAN Access Point addresses for the synchronization and payload transmission, which allows a comprehensive practical evaluation of the implementation and the evaluations of the scheme, which was not possible with the original SCII before.
A performance analysis of HICCUPS—a steganographic system for WLAN
  • K. Szczypiorski
  • Computer Science
    2009 International Conference on Multimedia Information Networking and Security
  • 2009
The analysis relies on the original CSMA/CA 802.11 Markov chain-based model and proves that the HICCUPS is the efficient steganographic method with the reasonable cost.
Information Hiding Using Improper frame padding
Basing on real network traces, it is confirmed that PadSteg is feasible in today's networks and it is estimated what steganographic bandwidth is achievable while limiting the chance of disclosure.
Covert Channels in LAN Protocols
There is a potential of unused bandwidth in commonly used LAN protocols, which might be exploitable as covert channel and the key point is, that exploitation of this potential is not a question of a LAN's architecture, but is strongly dependent on the design of its internal interfaces and on its implementations.
Saturation throughput analysis of error-prone 802.11 wireless networks
This paper investigates the saturation throughput performance achieved at the MAC layer, in both congested and error prone channels, and provides a simple and accurate analytical model to calculate the MAC throughput.
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectability and capacity
Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement
This paper proposes a scheme named DCF+, which is compatible with DCF, to enhance the performance of reliable transport protocol over WLAN and introduces an analytical model to compute the saturated throughput of WLAN.
Sniffing out the correct physical layer capture model in 802.11b
It is shown empirically that in reality PLC occurs even if the stronger frame arrives later (but within the physical layer preamble of the first frame), which means throughput unfairness in reality can be significantly (up to 15%) higher than with the former PLC model.
Eliminating Steganography in Internet Traffic with Active Wardens
This paper examines the techniques and challenges of a high-bandwidth, unattended, real-time, active warden in the context of a network firewall, and introduces the concept of Minimal Requisite Fidelity (MRF) as a measure of the degree of signal fidelity that is both acceptable to end users and destructive to covert communications.
Performance Evaluation of IEEE 802.11 DCF Networks
A new analytical saturation throughput model of IEEE 802.11 DCF (Distributed Coordination Function) with basic access in ad-hoc mode is presented, which takes into account freezing of the backoff timer when a station senses a busy channel.