WLAN steganography: a first practical review

@inproceedings{Krtzer2006WLANSA,
  title={WLAN steganography: a first practical review},
  author={Christian Kr{\"a}tzer and Jana Dittmann and Andreas Lang and Tobias K{\"u}hne},
  booktitle={MM\&Sec '06},
  year={2006}
}
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectability and capacity of a prototypical implementation of both approaches are described and discussed. 

Figures and Tables from this paper

A Performance Analysis of HICCUPS--A Steganographic System for WLAN
TLDR
The analysis relies on the original CSMA/CA 802.11 Markov chain-based model and proves that the HICCUPS is the efficient steganographic method with the reasonable cost.
A performance analysis of HICCUPS—a steganographic system for WLAN
  • K. Szczypiorski
  • Computer Science
    2009 International Conference on Multimedia Information Networking and Security
  • 2009
TLDR
The analysis relies on the original CSMA/CA 802.11 Markov chain-based model and proves that the HICCUPS is the efficient steganographic method with the reasonable cost.
WLAN steganography revisited
TLDR
The timing channel based approach SCII from 2006 is substituted by a completely new design based on the usage of WLAN Access Point addresses for the synchronization and payload transmission, which allows a comprehensive practical evaluation of the implementation and the evaluations of the scheme, which was not possible with the original SCII before.
Steganography in IEEE 802 . 11 OFDM symbols y
This paper presents a new steganographic method called wireless padding (WiPad). It is based on the insertion of hidden data into the padding of frames at the physical layer of wireless local area
Steganography in IEEE 802.11 OFDM symbols
TLDR
A performance analysis based on a Markov model, previously introduced and validated by the authors, is provided for the method in relation to the IEEE 802.11 a/g standards, and its results prove that maximum steganographic bandwidth for WiPad is as high as 1.1Mbit/s for data frames and 0.44Mbit /s for acknowledgment frames.
Steganogaphy Using Mac-Independent Opportunistic Routing and Encoding (MORE) Protocol Based Communications
TLDR
An enhanced version of the proposed steganoraphic scheme using MORE protocol is proposed, increasing its security and performances, and optimized embedding and retrieval algorithms are given leading to a 50% reduced time/computation complexity.
Code-based timing Covert channel in IEEE 802.11
TLDR
The idea of EMD method is discussed to create a covert channel in wireless networks to achieve high throughput with high degree of security.
"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography
In this paper we propose a new method for the evaluation of network steganography algorithms based on the new concept of "the moving observer". We considered three levels of undetectability named:
Hiding Information in Retransmissions
TLDR
The paper presents a new steganographic method called RSTEG (Retransmission Steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms, to not acknowledge a successfully received packet in order to intentionally invoke retransmissions.
Retransmission steganography and its detection
TLDR
The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms, to not acknowledge a successfully received packet in order to intentionally invoke retransmissions.
...
...

References

SHOWING 1-10 OF 14 REFERENCES
Practical Internet Steganography : Data Hiding in IP
TLDR
This paper investigates practical techniques and uses of Internet steganography and facilitates the interaction of fundamental steganographic principles with the existing network security environment to more generally bridge the areas of data hiding, network protocols and security.
HICCUPS : Hidden Communication System for Corrupted Networks
TLDR
All functional parts of the HICCUPS (HIdden Communication system for CorrUPted networkS), a steganographic system dedicated to shared medium networks including wireless local area networks, are discussed.
Covert Channels in the TCP/IP Protocol Suite
TLDR
This paper attempts to illustrate the weaknesses in the TCP/IP protocol suite in both theoretical and practical examples.
Embedding Covert Channels into TCP/IP
TLDR
By examining TCP/IP specifications and open source implementations, tests to detect the use of naive embedding are developed and reversible transforms that map block cipher output onto TCP ISNs are described, indistinguishable from those generated by Linux and OpenBSD.
Wireless lan medium access control (mac) and physical layer (phy) specifications
services are specified here by describing the service primitives and parameters that characterize each service. This definition is independent of any particular implementation. In particular, the
Kapazitätsmessung eines verdeckten Zeitkanals über HTTP
TLDR
Theorie eines einfachen verdeckten Zeitkanals über HTTP demonstriert erneut die Gef ährlichkeit verdeckter Kanäle auch f̈ ur Heimanwendungen.
Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set
TLDR
The overall objective of the paper is to evaluate existing audio steganography with a special focus on attacks in ad-hoc end-to-end media communications on the example of Voice over IP (VoIP) scenarios to understand operational requirements of recent steganographic techniques for VoIP applications.
Whispers on the Wire -Network Based Covert Channels
  • Proceedings of the Symposium on Security for Asia Network (SyScAN'05), 1st and 2nd of
  • 2005
phil@secdev.org, interactive packet manipulation programme
  • phil@secdev.org, interactive packet manipulation programme
...
...