In this paper, the use of structural behavior of communication protocols (e.g., CSMA) in designing new covert channels is investigated. In this way, the covert transmitter adopts the communication protocol architecture to control its overt traffic flow yet with different parameters that give it enough freedom to embed the covert message in its overt traffic. A salient feature of this scheme is that its rate increases in proportion with the overt capacity of the system. In addition, the paper presents a new covert channel for the wireless environment that mimics the structural behavior of CSMA protocol. The parameters of the proposed scheme are optimized in order to maximize the channel rate, stealthiness and robustness. Finally, the performance of the proposed scheme is analyzed from security, reliability and communication rate point of view. © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.
CITATION STYLE
Ahmadzadeh, S. A., & Agnew, G. (2012). Behavioral mimicry covert communication. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (Vol. 96 LNICST, pp. 134–153). https://doi.org/10.1007/978-3-642-31909-9_8
Mendeley helps you to discover research relevant for your work.