Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3531536.3532959acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
short-paper

Covert Communications through Imperfect Cancellation

Published: 23 June 2022 Publication History

Abstract

We propose a method for covert communications using an IEEE 802.11 OFDM/QAM packet as a carrier. We show how to hide the covert message so that the transmitted signal does not violate the spectral mask specified by the standard, and we determine its impact on the OFDM packet error rate (PER). We show conditions under which the hidden signal is not usable and those under which it can be retrieved with a usable bit error rate (BER). The hidden signal is extracted by cancellation of the OFDM signal in the covert receiver. We explore the effects of the hidden signal on OFDM parameter estimation and the covert signal BER. We test the detectability of the covert signal with and without cancellation. We conclude with an experiment where we inject the hidden signal into Over-The-Air (OTA) recordings of 802.11 packets and demonstrate the effectiveness of the technique using that real-world OTA data.

References

[1]
2021. IEEE Standard for Information Technology--Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Networks-- Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802.11--2020 (Revision of IEEE Std 802.11--2016) (2021), 1--4379.
[2]
J.G. Andrews. 2005. Interference cancellation for cellular systems: a contemporary overview. IEEE Wireless Communications 12, 2 (2005), 19--29.
[3]
Paulo Cardieri. 2010. Modeling Interference in Wireless Ad Hoc Networks. IEEE Communications Surveys Tutorials 12, 4 (2010), 551--572.
[4]
Jiska Classen, Matthias Schulz, and Matthias Hollick. 2015. Practical covert channels for WiFi systems. In 2015 IEEE Conference on Communications and Network Security (CNS). 209--217.
[5]
Aveek Dutta, Dola Saha, Dirk Grunwald, and Douglas Sicker. 2013. Secret Agent Radio: Covert Communication through Dirty Constellations. In Information Hiding, Matthias Kirchner and Dipak Ghosal (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 160--175.
[6]
Salvatore D'Oro, Francesco Restuccia, and Tommaso Melodia. 2019. Hiding Data in Plain Sight: Undetectable Wireless Communications Through Pseudo-Noise Asymmetric Shift Keying. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. 1585--1593.
[7]
Szymon Grabski and Krzysztof Szczypiorski. 2013. Steganography in OFDM Symbols of Fast IEEE 802.11n Networks. In 2013 IEEE Security and Privacy Workshops. 158--164.
[8]
Zaid Hijaz and Victor S. Frost. 2010. Exploiting OFDM systems for covert communication. In 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE. 2149--2155.
[9]
Negar Kiyavash, Farinaz Koushanfar, Todd P. Coleman, and Mavis Rodrigues. 2013. A Timing Channel Spyware for the CSMA/CA Protocol. IEEE Transactions on Information Forensics and Security 8, 3 (2013), 477--487.
[10]
Józef Lubacz, Wojciech Mazurczyk, and Krzysztof Szczypiorski. 2014. Principles and overview of network steganography. IEEE Communications Magazine 52, 5 (2014), 225--229.
[11]
Kunal Sankhe, Francesco Restuccia, Salvatore D'Oro, Tong Jian, Zifeng Wang, Amani Al-Shawabka, Jennifer Dy, Tommaso Melodia, Stratis Ioannidis, and Kaushik Chowdhury. 2019. Impairment Shift Keying: Covert Signaling by Deep Learning of Controlled Radio Imperfections. In MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM). 598--603.
[12]
Matthias Schulz, Jakob Link, Francesco Gringoli, and Matthias Hollick. 2018. Shadow Wi-Fi: Teaching Smartphones to Transmit Raw Signals and to Extract Channel State Information to Implement Practical Covert Channels over Wi-Fi. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services. 256--268.
[13]
C.M. Spooner and W.A. Gardner. 1994. The cumulant theory of cyclostationary time-series. II. Development and applications. IEEE Transactions on Signal Processing 42, 12 (1994), 3409--3429.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IH&MMSec '22: Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security
June 2022
177 pages
ISBN:9781450393553
DOI:10.1145/3531536
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 June 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. OFDM
  2. covert communications
  3. interference cancellation

Qualifiers

  • Short-paper

Conference

IH&MMSec '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 72
    Total Downloads
  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Nov 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media