Behavioral mimicry covert communication

5Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, the use of structural behavior of communication protocols (e.g., CSMA) in designing new covert channels is investigated. In this way, the covert transmitter adopts the communication protocol architecture to control its overt traffic flow yet with different parameters that give it enough freedom to embed the covert message in its overt traffic. A salient feature of this scheme is that its rate increases in proportion with the overt capacity of the system. In addition, the paper presents a new covert channel for the wireless environment that mimics the structural behavior of CSMA protocol. The parameters of the proposed scheme are optimized in order to maximize the channel rate, stealthiness and robustness. Finally, the performance of the proposed scheme is analyzed from security, reliability and communication rate point of view. © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.

Cite

CITATION STYLE

APA

Ahmadzadeh, S. A., & Agnew, G. (2012). Behavioral mimicry covert communication. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (Vol. 96 LNICST, pp. 134–153). https://doi.org/10.1007/978-3-642-31909-9_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free