
Adaptive ternary timing covert channel in IEEE 802.11
Author(s) -
Tahmasbi Fatemeh,
Moghim Neda,
Mahdavi Mojtaba
Publication year - 2016
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0122
pISSN - 1939-0114
DOI - 10.1002/sec.1545
Subject(s) - covert channel , computer science , computer network , covert , channel (broadcasting) , network packet , cloud computing , security information and event management , linguistics , philosophy , cloud computing security , operating system
Covert channel is one of the most interesting topics in the computer networks security. Covert channel designers are seeking to discover weaknesses in the communications algorithms to use them as the medium for covert transmission. Broadcast nature of wireless channels has provided a favorable environment for the design of the hidden channels. CSMA/CA is used to control channel access in IEEE 802.11 network. Random features of this algorithm can be used to create timing covert channel. The statistical distribution of the free time intervals' duration is used in this paper for covert channel establishment. Hidden messages are sent via manipulating the timing of the overt packets' transmission. Hidden transceiver senses the wireless channel continuously to be adapted to the dynamic network condition and to be less detectable. To increase the covert channel's accuracy, some free interval durations are not used that leads to security degradation. This problem is also covered by a gap covering method that is based on the summation of the channel sensed free time interval distribution and a normal one. Hidden nodes also estimate the number of active nodes and adapt their behavior accordingly to keep their compatibility with the network. The statistical Kolmogorov–Smirnov and regularity tests are used to assess the security of the covert channel. Simulation results show that the proposed covert channel have a high bit rate along with high security. © 2016 The Authors Security and Communication Networks published by John Wiley & Sons Ltd