Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018 (2018), Article ID 1214681, 15 pages
https://doi.org/10.1155/2018/1214681
Research Article

A Wireless Covert Channel Based on Constellation Shaping Modulation

1The School of Automation, Nanjing University of Science and Technology, Nanjing 210094, China
2The School of Electrical and Computer Engineering, Jiangsu University of Science and Technology, Zhenjiang 212003, China

Correspondence should be addressed to Guangjie Liu

Received 29 September 2017; Accepted 4 December 2017; Published 8 January 2018

Academic Editor: Rémi Cogranne

Copyright © 2018 Pengcheng Cao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Gianvecchio, H. Wang, D. Wijesekera, and S. Jajodia, “Model-Based Covert Timing Channels: Automated Modeling and Evasion,” in International Symposium on Recent Advances in Intrusion Detection, pp. 211–230, 2008. View at Google Scholar
  2. K. Kothari and M. Wright, “Mimic: An active covert channel that evades regularity-based detection,” Computer Networks the International Journal of Computer & Telecommunications Networking, vol. 57, pp. 647–657, 2010. View at Google Scholar
  3. R. J. Walls, K. Kothari, and M. Wright, “Liquid: A detection-resistant covert timing channel based on IPD shaping,” Computer Networks, vol. 55, no. 6, pp. 1217–1228, 2011. View at Publisher · View at Google Scholar · View at Scopus
  4. G. Liu, J. Zhai, and Y. Dai, “Network covert timing channel with distribution matching,” Telecommunication Systems, vol. 49, no. 2, pp. 199–205, 2012. View at Publisher · View at Google Scholar · View at Scopus
  5. A. Mileva and B. Panajotov, “Covert channels in TCP/IP protocol stack - extended version,” Central European Journal of Computer Science, vol. 4, no. 2, pp. 45–66, 2014. View at Publisher · View at Google Scholar
  6. A. Dutta, D. Saha, D. Grunwald, and D. Sicker, “Secret agent radio: Covert communication through dirty constellations,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 7692, pp. 160–175, 2013. View at Publisher · View at Google Scholar · View at Scopus
  7. I. Grabska and K. Szczypiorski, “Steganography in long term evolution systems,” in Proceedings of the 2014 IEEE Computer Society's Security and Privacy Workshops, SPW 2014, pp. 92–99, May 2014. View at Publisher · View at Google Scholar · View at Scopus
  8. Z. Hijaz and V. S. Frost, “Exploiting OFDM systems for covert communication,” in Proceedings of the 2010 IEEE Military Communications Conference, MILCOM 2010, pp. 2149–2155, November 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. T. Kitano, H. Iwai, and H. Sasaoka, “A wireless Steganography technique by embedding DS-SS signal in digital mobile communication systems,” Science Engineering Review of Doshisha University, vol. 52, pp. 127–134, 2011. View at Google Scholar
  10. T. Yucek and H. Arslan, Covert OFDM transmission using cyclic prefix, 2012.
  11. K. Hokai, H. Sasaoka, and H. Iwai, “Wireless steganography using MIMO system,” in Proceedings of the 5th IEEE International Conference on Communications and Electronics, IEEE ICCE 2014, pp. 560–565, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. J. Classen, M. Schulz, and M. Hollick, “Practical covert channels for WiFi systems,” in Proceedings of the 3rd IEEE International Conference on Communications and Network Security, CNS 2015, pp. 209–217, September 2015. View at Publisher · View at Google Scholar · View at Scopus
  13. K. Szczypiorski and W. Mazurczyk, “Hiding data in OFDM symbols of IEEE 802.11 networks,” in Proceedings of the 2010 2nd International Conference on Multimedia Information Networking and Security, MINES 2010, pp. 835–840, November 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. J. Hu, S. Yan, X. Zhou, F. Shu, J. Li, and J. Wang, “Covert communication achieved by a greedy relay in wireless networks,” Information Theory, 2017. View at Google Scholar
  15. J. Hu, S. Yan, X. Zhou, F. Shu, and J. Wang, “Covert communication in wireless relay networks,” Information Theory, 2017. View at Google Scholar
  16. X. Wang, Y. Liu, X. Lu, S. Lv, Z. Shi, and L. Sun, “CovertMIMO: A covert uplink transmission scheme for MIMO systems,” in Proceedings of the ICC 2017 - 2017 IEEE International Conference on Communications, pp. 1–6, Paris, France, May 2017. View at Publisher · View at Google Scholar
  17. K. Szczypiorski, A. Janicki, and S. Wendzel, ““The good, the bad and the ugly”: Evaluation of Wi-Fi steganography,” Journal of Communications, vol. 10, no. 10, pp. 747–752, 2015. View at Publisher · View at Google Scholar · View at Scopus
  18. P. Peng, P. Ning, and D. S. Reeves, “On the secrecy of timing-based active watermarking trace-back techniques,” in Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp. 334–348, May 2006. View at Publisher · View at Google Scholar · View at Scopus
  19. S. Cabuk, C. E. Brodley, and C. Shields, “IP covert timing channels: Design and detection,” in Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 178–187, October 2004. View at Scopus
  20. S. Gianvecchio and H. Wang, “An Entropy-Based Approach to Detecting Covert Timing Channels,” IEEE Transactions on Dependable & Secure Computing, vol. 8, pp. 307–316, 2011. View at Google Scholar
  21. E. Perahia and R. Stacey, Next generation wireless LANs, Cambridge University Press, 2008. View at Publisher · View at Google Scholar · View at Scopus
  22. IEEE, “Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) Specifications,” in The 5-Ghz Band, pp. C1–C1184, IEEE, 2003. View at Google Scholar