2008 International Wireless Communications and Mobile Computing Conference 2008
DOI: 10.1109/iwcmc.2008.103
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of a Covert Channel in the 802.11 Header

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(19 citation statements)
references
References 2 publications
0
19
0
Order By: Relevance
“…Frikha et al [18] created a steganographic system based on header modification at the MAC sublayer. The authors proposed to use independently two fields of a MAC header: Sequence Control (SC) and Initial Vector (IV) for WEP (Wired Equivalent Privacy) protected frames.…”
Section: F Implementations Of Steganographic Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…Frikha et al [18] created a steganographic system based on header modification at the MAC sublayer. The authors proposed to use independently two fields of a MAC header: Sequence Control (SC) and Initial Vector (IV) for WEP (Wired Equivalent Privacy) protected frames.…”
Section: F Implementations Of Steganographic Techniquesmentioning
confidence: 99%
“…Finally, Grabski et al [20] implemented a Wi-Fi steganalyser as a tool to passively monitor the network traffic to detect hidden communication. The system was able to recognize five scenarios based on [4] and [18], including those based on the "Duration/ID" field as well as "Retry" and "More Data".…”
Section: F Implementations Of Steganographic Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…802.11) can also used for covert communication [52,63]. In [53] it is proposed to use the destination address field of unsolicited IEEE 802.11 acknowledgment frames as the medium for covert communication.…”
Section: Wireless Covert Channelsmentioning
confidence: 99%
“…Furthermore, due to the unreliability of UDP, the rate switching technique used can have a large effect on UDP traffic. A simple covert storage channel at the data link layer using the 802.11 sequence and WEP initial vector fields in the header was introduced in [17].…”
Section: Chapter 2 Related Workmentioning
confidence: 99%