DocumentCode :
687568
Title :
Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards
Author :
Radhakrishnan, Sakthi V. ; Uluagac, A. Selcuk ; Beyah, Raheem
Author_Institution :
CAP Group, Georgia Inst. of Technol., Atlanta, GA, USA
fYear :
2013
fDate :
9-13 Dec. 2013
Firstpage :
722
Lastpage :
728
Abstract :
By using covert channels, a malicious entity can hide messages within regular traffic and can thereby circumvent security mechanisms. This same method of obfuscation can be used by legitimate users to transmit messages over hostile networks. A promising area for covert channels is wireless networks employing carrier sense multiple access with collision avoidance (CSMA/CA) (e.g., 802.11 networks). These schemes introduce randomness in the network that provides good cover for a covert timing channel. Hence, by exploiting the random back-off in distributed coordination function (DCF) of 802.11, we realize a relatively high bandwidth covert timing channel for 802.11 networks, called Covert-DCF. As opposed to many works in the literature focusing on theory and simulations, Covert-DCF is the first fully implemented covert timing channel for 802.11 MAC using off-the-self wireless cards. In this paper, we introduce the design and implementation of Covert-DCF that is transparent to the users of the shared medium. We also evaluate the performance of Covert-DCF and provide discussions on the feasibility of this technique in a real world scenario.
Keywords :
carrier sense multiple access; steganography; telecommunication security; telecommunication traffic; wireless LAN; wireless channels; 802.11 MAC; 802.11 networks; 802.11-based covert timing channel; CSMA/CA; carrier sense multiple access with collision avoidance; covert-DCF; distributed coordination function; hostile networks; legitimate users; malicious entity; off-the-shelf wireless cards; random back-off; regular traffic; security mechanisms; shared medium; wireless networks; Communication system security; Hardware; IEEE 802.11 Standards; Receivers; Timing; Wireless communication; Wireless sensor networks; 802.11 Covert Channel; Covert Channels; Covert DCF; Covert Timing Channel; Network Steganography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Global Communications Conference (GLOBECOM), 2013 IEEE
Conference_Location :
Atlanta, GA
Type :
conf
DOI :
10.1109/GLOCOM.2013.6831158
Filename :
6831158
Link To Document :
بازگشت