• DocumentCode
    433644
  • Title

    A covert channel in MAC protocols based on splitting algorithms

  • Author

    Li, Song ; Ephremides, Anthony

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Maryland Univ., College Park, MD, USA
  • Volume
    2
  • fYear
    2005
  • fDate
    13-17 March 2005
  • Firstpage
    1168
  • Abstract
    We investigate a covert channel implemented on top of MAC protocols that are based on splitting algorithms. Covert information is embedded in nodes´ splitting decisions. The covert channel can operate in three modes. The conservative mode is the safest in the sense that use of the covert channel is undetectable. The aggressive mode generates best throughput, but is more vulnerable to detection. A strategic mode is also available which allows the covert users to make a tradeoff between detectability and covert capacity. Simulation shows that the covert throughput ranges from 0 to as high as 0.3 bits per slot, depending on various parameters. It is easy to implement and very difficult to detect.
  • Keywords
    access protocols; channel capacity; data encapsulation; decision trees; telecommunication security; MAC protocols; binary tree algorithm; concealed communication paths; covert capacity; covert channels; detectability; node splitting decision embedded information; splitting algorithms; throughput; undetectable information; Bit rate; Computer networks; Educational institutions; Feedback; Laboratories; Media Access Protocol; Protection; Telecommunication traffic; Throughput; Traffic control;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Wireless Communications and Networking Conference, 2005 IEEE
  • ISSN
    1525-3511
  • Print_ISBN
    0-7803-8966-2
  • Type

    conf

  • DOI
    10.1109/WCNC.2005.1424674
  • Filename
    1424674