Practical covert wireless unidirectional communication in IEEE 802.11 environment
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Seong, H. | - |
dc.contributor.author | Kim, I. | - |
dc.contributor.author | Jeon, Y. | - |
dc.contributor.author | Oh, M. | - |
dc.contributor.author | Lee, S. | - |
dc.contributor.author | Choi, D. | - |
dc.date.accessioned | 2022-10-06T21:42:09Z | - |
dc.date.available | 2022-10-06T21:42:09Z | - |
dc.date.created | 2022-10-06 | - |
dc.date.issued | 2022 | - |
dc.identifier.issn | 2327-4662 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/144164 | - |
dc.description.abstract | Covert communications, or covert channels, are commonly exploited to establish a data exfiltration channel from an insider on a trusted network to a malicious receiver outside the network without using normal communication of the network. It is because the malicious receiver is an unauthorized user of the communication network and so he cannot communicate with any entity in the network. In this study, we construct a new covert wireless unidirectional communication mechanism in an IEEE 802.11 environment. Our covert communication is based on a covert timing channel exploiting the beacon interval of a given commercial-like AP. Because the wireless covert channel we proposed can be implemented only with firmware modification to the WLAN MAC protocol, it is very suitable for application in a real public AP environment. In order to dramatically reduce the chance of covert signals being detected by others, a new and simple covert data encoding scheme, called PPCTC, is proposed, and we show that the covertness of the PPCTC is excellent compared to the previous timing-based covert channels. Although this wireless covert communication is unidirectional communication, since PPCTC has recovery characteristics against consecutive 2-bit errors, stable communication is guaranteed. Furthermore, a covert frame structure is presented for providing the confidentiality and integrity of the information transmitted via our covert channel. To the best of our knowledge, this is the first attempt. Author | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | Practical covert wireless unidirectional communication in IEEE 802.11 environment | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Choi, D. | - |
dc.identifier.doi | 10.1109/JIOT.2022.3204987 | - |
dc.identifier.scopusid | 2-s2.0-85137869547 | - |
dc.identifier.bibliographicCitation | IEEE Internet of Things Journal, pp.1 - 1 | - |
dc.relation.isPartOf | IEEE Internet of Things Journal | - |
dc.citation.title | IEEE Internet of Things Journal | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 1 | - |
dc.type.rims | ART | - |
dc.type.docType | Article in Press | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordAuthor | Communication system security | - |
dc.subject.keywordAuthor | Covert AP | - |
dc.subject.keywordAuthor | Covert frame structure | - |
dc.subject.keywordAuthor | Covert timing channel | - |
dc.subject.keywordAuthor | IPD CTC | - |
dc.subject.keywordAuthor | Internet of Things | - |
dc.subject.keywordAuthor | Packet loss recovery | - |
dc.subject.keywordAuthor | Receivers | - |
dc.subject.keywordAuthor | Robustness | - |
dc.subject.keywordAuthor | Timing | - |
dc.subject.keywordAuthor | Wireless LAN | - |
dc.subject.keywordAuthor | Wireless communication | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.