Implementation of a covert channel in the 802.11 header

Lilia Frikha, Zouheir Trabelsi, Wassim El-Hajj

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Citations (Scopus)

Abstract

Covert channels are an immense cause of security concern because they can be used to pass malicious messages. The messages could be in form of computer virus, spy programs, terrorist messages, etc. Most available techniques proposed covert channels that use the upper layers of the OSI model. In this paper, we discuss a novel covert channel in the data link layer dedicated to wireless local area networks. Depending on the configuration of the network, the covert channel uses either sequence control or initial vector fields, or both of them. We present also some measurements to protect the proposed covert channel against steganalysis processes and sniffing attack. Finally, the performance of proposed covert channel is compared with the available common TCP/IP covert channels regarding the offered bandwidth and the imperceptibility.

Original languageEnglish
Title of host publicationIWCMC 2008 - International Wireless Communications and Mobile Computing Conference
Pages594-599
Number of pages6
DOIs
Publication statusPublished - 2008
EventInternational Wireless Communications and Mobile Computing Conference, IWCMC 2008 - Crete, Greece
Duration: Aug 6 2008Aug 8 2008

Publication series

NameIWCMC 2008 - International Wireless Communications and Mobile Computing Conference

Other

OtherInternational Wireless Communications and Mobile Computing Conference, IWCMC 2008
Country/TerritoryGreece
CityCrete
Period8/6/088/8/08

Keywords

  • Covert channel
  • IEEE 802.11 MAC frame
  • Initial vector
  • Sequence control field
  • Wireless local area networks

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Implementation of a covert channel in the 802.11 header'. Together they form a unique fingerprint.

Cite this