Data networks
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
A distributed routing algorithm for mobile wireless networks
Wireless Networks
A note on the confinement problem
Communications of the ACM
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Hiding Data in the OSI Network Model
Proceedings of the First International Workshop on Information Hiding
Covert Information Transmission through the Use of Standard Collision Resolution Algorithms
IH '99 Proceedings of the Third International Workshop on Information Hiding
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
THE ALOHA SYSTEM: another alternative for computer communications
AFIPS '70 (Fall) Proceedings of the November 17-19, 1970, fall joint computer conference
Packet switching with satellites
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
Covert messaging through TCP timestamps
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Analysis of contention tree algorithms
IEEE Transactions on Information Theory
A realistic implementation for simulating side-channel in mobile ad hoc networks
Proceedings of the Military Modeling & Simulation Symposium
Hi-index | 0.00 |
A covert channel is a concealed communication path embedded in an overt one. Existence of covert channels violates both secrecy and integrity properties of trusted systems. While past covert analysis has been mainly focused on wired networks, the wireless communication environment involves fundamentally different properties that make it vulnerable to covert attacks. In particular, nodes in ad-hoc wireless networks have to cooperate with each other in order to accomplish many networking functions as routing and channel access. We observe that covert information can be conveyed during the cooperation procedure. This paper investigates ad-hoc wireless networks' susceptibility to covert channels that can be formed through manipulating the network protocols. It is very difficult to eliminate or even detect these covert channels. Simulation results show that performance of these covert channels depends on various network characteristics. Countermeasures against the covert channel are needed and also should adapt to the network changes to take full effect.