Multipoint communication by hierarchically encoded data
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 3)
Proceedings of the First International Workshop on Information Hiding
Steganography in Compressed Video Stream
ICICIC '06 Proceedings of the First International Conference on Innovative Computing, Information and Control - Volume 1
WLAN steganography: a first practical review
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Wireless device identification with radiometric signatures
Proceedings of the 14th ACM international conference on Mobile computing and networking
An intelligent physical layer for cognitive radio networks
Proceedings of the 4th Annual International Conference on Wireless Internet
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Minimizing the Peak-to-Average Power Ratio of OFDM Signals Using Convex Optimization
IEEE Transactions on Signal Processing
A Survey of Covert Channels and Countermeasures in Computer Network Protocols
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
In this paper we propose a novel approach to implement high capacity, covert channel by encoding covert information in the physical layer of common wireless communication protocols. We call our technique Dirty Constellation because we hide the covert messages within a "dirty" constellation that mimics noise commonly imposed by hardware imperfections and channel conditions. The cover traffic in this method is the baseband modulation constellation. We leverage the variability in the wireless channel and hardware conditions to encode the covert channel. Packet sharing techniques and pre-distortion of the modulated symbols of a decoy packet allows the transmission of a secondary covert message while making it statistically undetectable to an adversary. We demonstrate the technique by implementing it in hardware, on top of an 802.11a/g PHY layer, using a software defined radio and analyze the undetectability of the scheme through a variety of common radio measurements and statistical tests.