Saturation Throughput Analysis of Steganography in the IEEE 802.11p Protocol in the Presence of Non-Ideal Transmission Channel

@article{Almohammedi2021SaturationTA,
  title={Saturation Throughput Analysis of Steganography in the IEEE 802.11p Protocol in the Presence of Non-Ideal Transmission Channel},
  author={Akram A. Almohammedi and Vladimir D. Shepelev},
  journal={IEEE Access},
  year={2021},
  volume={9},
  pages={14459-14469}
}
Vehicular network is a communication technology designed to provide comfort and improve life safety and driving efficiency on the road. In vehicular network, trustworthy communication is very important as fake applications may lead to disastrous road accidents. Several information hiding methods are used to enable vehicles to communicate secretly or to covertly report a misbehaving vehicle. The work in this paper focuses on a performance analysis based on 2-D Markov chain model for the system… 
Analytical Models of the Performance of IEEE 802.11p Vehicle to Vehicle Communications
TLDR
New analytical models that accurately model the performance of vehicle-to-vehicle communications based on the IEEE 802.11p standard are presented, including the first analytical model capable to accurately estimate the Channel Busy Ratio (CBR) metric even under high channel load levels.
Slotted Tree-Shaped Microstrip Patch Antenna Using SSRR for Wide-band Applications
This paper presents a new design of a multiband antenna for multiband applications. To enhance the bandwidth and return loss characteristics, three Square split ring resonators (SSRRs) and two
A Novel Stochastic Fuzzy Time Series Forecasting Model Based on a New Partition Method
TLDR
This study demonstrates that the proposed FTS forecasting model based on a new tree partitioning method (TPM) and Markov chain (MC) is more suitable for the accurate prediction of air pollution events as well as for forecasting any type of random time series.
Cooperation and radio silence strategy in Mix Zone to Protect Location Privacy of Vehicle in VANET
TLDR
The simulation results show that CRSMZ is an efficient strategy to protect location information of vehicle drivers and outperforms the existing strategies in terms of mean of the number tracker confusion, continuous tracking period and max of the entropy.
Time-Dependent Performance Modeling for Platooning Communications at Intersection
TLDR
The time-dependent model to evaluate the platooning communication performance at the intersection based on the initial movement characteristics is constructed and the accuracy of the proposed model is verified by comparing the simulation results with analytical results.

References

SHOWING 1-10 OF 27 REFERENCES
Hiding Data in OFDM Symbols of IEEE 802.11 Networks
TLDR
A performance analysis based on a Markov model, previously introduced and validated by the authors in [10], is provided for the method in relation to the IEEE 802.11 a/g standards, and its results prove that maximum steganographic bandwidth for WiPad is as high as 1.1 Mbit/s for data frames and 0.44 Mbit /s for acknowledgment frames.
Steganography in IEEE 802.11 OFDM symbols
TLDR
A performance analysis based on a Markov model, previously introduced and validated by the authors, is provided for the method in relation to the IEEE 802.11 a/g standards, and its results prove that maximum steganographic bandwidth for WiPad is as high as 1.1Mbit/s for data frames and 0.44Mbit /s for acknowledgment frames.
Performance and Reliability Analysis of Prioritized Safety Messages Broadcasting in DSRC With Hidden Terminals
TLDR
A more accurate semi-Markov process (SMP) model is introduced to portray the channel contention among multiple types of safety messages and their backoff behavior in DSRC based vehicular ad hoc networks (VANets) with the influence of hidden terminals.
Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles
TLDR
Two mechanisms for vehicle reporting are proposed based on two information hiding techniques—subliminal channels and steganography, which show that the proposal is computationally feasible for current vehicular devices and that it is possible to configure the system to operate in highways, secondary roads, and urban maps.
A performance analysis of HICCUPS—a steganographic system for WLAN
  • K. Szczypiorski
  • Computer Science
    2009 International Conference on Multimedia Information Networking and Security
  • 2009
TLDR
The analysis relies on the original CSMA/CA 802.11 Markov chain-based model and proves that the HICCUPS is the efficient steganographic method with the reasonable cost.
Performance Analysis of DSRC-Based Vehicular Safety Communication in Imperfect Channels
TLDR
An analytical model is developed where the impacts of various incoming traffic loads, packet length distribution, hidden terminal effects, node mobility, the MAC layer queuing system, and the faulty radio channels are all included which no one has done before.
Eliminating Steganography in Internet Traffic with Active Wardens
TLDR
This paper examines the techniques and challenges of a high-bandwidth, unattended, real-time, active warden in the context of a network firewall, and introduces the concept of Minimal Requisite Fidelity (MRF) as a measure of the degree of signal fidelity that is both acceptable to end users and destructive to covert communications.
Performance Evaluation of IEEE 802.11 DCF in Single Hop Ad Hoc Networks
TLDR
A new analytical model for performance evaluation of IEEE 802.11 single hop networks takes into consideration the presence of first order memory buffer along with the effect of traffic arrival which obeys Poisson distribution and is proved that it predicts the behaviour more accurately.
Network Steganography and its Techniques: A Survey
TLDR
This paper is on network steganography depicting all the proposed methods available for the network Steganography along with the process of concealing the secret information in the desired communication protocol.
Trust-Based Distributed Authentication Method for Collision Attack Avoidance in VANETs
TLDR
A trust-based distributed authentication (TDA) method that relies on a global trust server and vehicle behavior for avoiding collision attacks is proposed and a channel state routing protocol (CSRP) is proposed to improve the communication reliability among the vehicles.
...
...