Practical covert channels for WiFi systems

  title={Practical covert channels for WiFi systems},
  author={J. Classen and M. Schulz and M. Hollick},
  journal={2015 IEEE Conference on Communications and Network Security (CNS)},
  • J. Classen, M. Schulz, M. Hollick
  • Published 2015
  • Computer Science
  • 2015 IEEE Conference on Communications and Network Security (CNS)
  • Wireless covert channels promise to exfiltrate information with high bandwidth by circumventing traditional access control mechanisms. Ideally, they are only accessible by the intended recipient and-for regular system users/operators-indistinguishable from normal operation. While a number of theoretical and simulation studies exist in literature, the practical aspects of WiFi covert channels are not well understood. Yet, it is particularly the practical design and implementation aspect of… CONTINUE READING
    CovertMIMO: A covert uplink transmission scheme for MIMO systems
    • 2
    • Highly Influenced
    CloakLoRa: A Covert Channel over LoRa PHY
    A Wireless Covert Channel Based on Constellation Shaping Modulation
    • 3
    • PDF
    Impairment Shift Keying: Covert Signaling by Deep Learning of Controlled Radio Imperfections
    • 1
    • Highly Influenced
    • PDF
    Covert Wireless Communication in IoT Network: From AWGN Channel to THz Band
    • 2
    • Highly Influenced


    Publications referenced by this paper.
    Secret Agent Radio: Covert Communication through Dirty Constellations
    • 26
    • PDF
    Exploiting OFDM systems for covert communication
    • 24
    • PDF
    A new covert channel in WIFI networks
    • 8
    A survey of covert channels and countermeasures in computer network protocols
    • 417
    • PDF
    WLAN steganography revisited
    • 5
    • PDF
    Physical-Layer Authentication
    • 167
    • PDF
    Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
    • 48
    • PDF