Skip to main content

Multicast Steganography Using Routing Protocols

  • Conference paper
  • First Online:
Multimedia Communications, Services and Security (MCSS 2017)

Abstract

The strengthening of security solutions for computer networks increases the interests in new methods for the transfer of hidden information. In this paper, we considered the use of routing protocols for transmission of steganographic messages. We evaluated such approach using proactive and reactive routing protocols by analyzing the amount of sent data, the number of generated routing packets, the average size of routing packets, and the packet delivery ratio using the NS-3 simulator. Simulations included random network topologies with a various number of nodes and mobility settings. The obtained results showed that reactive routing protocols exchange a large amount of routing packets which can be suitable for steganographic purposes due to network flooding mechanism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lampson, B.W.: A note on the confinement problem. Commun. ACM 16(10), 613–615 (1973)

    Article  Google Scholar 

  2. Artz, D.: Digital steganography: hiding data within data. IEEE Internet Comput. 5(3), 75–80 (2001)

    Article  Google Scholar 

  3. Mehic, M., Slachta, J., Voznak, M.: Hiding data in SIP session. In: 2015 38th International Conference on Telecommunications and Signal Processing (TSP), pp. 1–5. IEEE, July 2015

    Google Scholar 

  4. Mazurczyk, W., Smolarczyk, M., Szczypiorski, K.: Retransmission steganography applied. In: 2010 International Conference on Multimedia Information Networking and Security, pp. 846–850 (2010)

    Google Scholar 

  5. Mehić, M., Mikulec, M., Voznak, M., Kapicak, L.: Creating covert channel using SIP. In: Dziech, A., Czyżewski, A. (eds.) MCSS 2014. CCIS, vol. 429, pp. 182–192. Springer, Cham (2014). doi:10.1007/978-3-319-07569-3_15

    Chapter  Google Scholar 

  6. Mileva, A., Panajotov, B.: Covert channels in TCP/IP protocol stack-extended version. Cent. Eur. J. Comput. Sci. 2, 45–66 (2014)

    Google Scholar 

  7. Berk, V., Giani, A., Cybenko, G.: Detection of Covert Channel Encoding in Network Packet Delays. Technical report TR536 Darthmouth College (2005)

    Google Scholar 

  8. Mazurczyk, W., Lubacz, J.: LACK-a VoIP steganographic method. Telecommun. Syst. 45, 153–163 (2010)

    Article  Google Scholar 

  9. Yargicoglu, A.U., Ilk, H.G.: Hidden data transmission in MELP coded speech signal using quantization index modulation. In: 2007 IEEE 15th Signal Processing and Communications Applications, pp. 1–4. IEEE, June 2007

    Google Scholar 

  10. Mazurczyk, W., Smolarczyk, M.M.M., Szczypiorski, K.: Hiding information in retransmissions. arXiv preprint arXiv:0905.0363 (2009)

  11. Mazurczyk, W., Karas, M., Szczypiorski, K.: SkyDe: a Skype-based Steganographic Method. p. 7, January 2013

    Google Scholar 

  12. Mehic, M., Voznak, M., Safarik, J., Partila, P., Mikulec, M.: Using DNS amplification DDoS attack for hiding data. In: SPIE Sensing Technology+ Applications, pp. 9120 91200R. International Society for Optics and Photonics, May 2014

    Google Scholar 

  13. Voznak, M., Zbranek, I., Mehic, M., Komosny, D., Toral-Cruz, H., Lin, J.C.W.: Covert channel in RTP payload using a pointer in sip header. Komunikacie 18(1), 40–47 (2016)

    Google Scholar 

  14. Kamesh, S.P.N.: Security enhancement of authenticated RFID generation. Int. J. Appl. Eng. Res. 9(22), 5968–5974 (2014)

    Google Scholar 

  15. Perkins, C., Belding-Royer, E., Das, S.: Ad-hoc On-Demand Distance Vector Routing (2003)

    Google Scholar 

  16. Fazio, P., De Rango, F., Sottile, C.: An on demand interference aware routing protocol for VANETS. J. Netw. 7, 1728–1738 (2012)

    Google Scholar 

  17. Perkins, C.E., Bhagwat, P.: Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Comput. Commun. Rev. 24(4), 234–244 (1994)

    Article  Google Scholar 

  18. Mehic, M., Fazio, P., Voznak, M., Partila, P., Komosny, D., Tovarek, J., Chmelikova, Z.: On using multiple routing metrics with destination sequenced distance vector protocol for multihop wireless ad hoc networks, p. 98480F. International Society for Optics and Photonics, May 2016

    Google Scholar 

  19. Sarkar, K.S., Basavaraju, T., Puttamadappa, C.: Ad Hoc Mobile Wireless Networks, vol. 1. Auerbach Publications (2007). https://doi.org/10.1201/9781420062229

  20. Das, S.R., Castaneda, R., Yan, J.: Simulation based performance evaluation of routing protocols for mobile ad hoc networks. Mob. Netw. Appl. 5(3), 179–189 (2000)

    Article  MATH  Google Scholar 

  21. Ilyas, M.: The Handbook of Ad Hoc Wireless Networks. Electrical Engineering Handbook, vol. 20021643. CRC Press (2002). https://doi.org/10.1201/9781420040401

  22. Conti, M., Giordano, S.: Multihop ad hoc networking: the theory. IEEE Commun. Mag. 45(4), 78–86 (2007)

    Article  Google Scholar 

  23. Barbeau, M., Kranakis, E.: Principles of Ad Hoc Networking. Wiley, Chichester (2007). doi:10.1002/9780470512494

    Book  Google Scholar 

  24. Szigeti, T., Hattingh, C.: End-to-End QoS Network Design, 1st edn. Networking Technology Series. Cisco Press (2005). 734 pages

    Google Scholar 

  25. Apostolopoulos, G., Guerin, R., Kamat, S.: Implementation and performance measurements of QoS routing extensions to OSPF. In: IEEE INFOCOM 1999 Conference on Computer Communications Proceedings, Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320). vol. 2, pp. 680–688. IEEE (1999)

    Google Scholar 

  26. Moy, J.T.: OSPF version 2. Internet Req. Comment RFC 1247, 1–124 (1991)

    Google Scholar 

  27. Parkhurst, W.R.: Cisco OSPF Command and Configuration Handbook, 1st edn. Pearson Education (2002). 528 pages

    Google Scholar 

  28. Chakeres, I., Belding-Royer, E.: AODV routing protocol implementation design. In: 24th International Conference on Distributed Computing Systems Workshops, 2004 Proceedings, pp. 698–703. IEEE (2004)

    Google Scholar 

  29. Barakovic, S., Barakovic, J.: Comparative Performance Evaluation of Mobile Ad Hoc Routing Protocols. In: Proceedings of the 33rd International Convention MIPRO 2010, pp. 518–523 (2010)

    Google Scholar 

  30. Henderson, T.R., Riley, G.F.: Network Simulations with the ns-3 Simulator. In: Proceedings of SIGCOMM, p. 527 (2006)

    Google Scholar 

  31. Riley, G.F., Henderson, T.R.: The ns-3 network simulator. In: Wehrle, K., Güneş, M., Gross, J. (eds.) Modeling and Tools for Network Simulation, pp. 15–34. Springer, Heidelberg (2010). doi:10.1007/978-3-642-12331-3_2

    Chapter  Google Scholar 

  32. Medina, A., Lakhina, A., Matta, I., Byers, J.: BRITE: an approach to universal topology generation. In: MASCOTS 2001 Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 346–353. IEEE Computer Society (2001)

    Google Scholar 

  33. He, G.: Destination-sequenced distance vector (DSDV) protocol, pp. 1–9. Networking Laboratory, Helsinki University of Technology (2002)

    Google Scholar 

  34. Liu, F.: Routing in Multi Hop Wireless Infrastructures. Master thesis, University of Twente, Master Thesis (2004)

    Google Scholar 

  35. Moy, J.T.: OSPF: Anatomy of an Internet Routing Protocol. Addison-Wesley Professional, Reading (1998)

    Google Scholar 

Download references

Acknowledgments

The research received a financial support from the SGS grant No. SP2017/174, VSB - Technical University of Ostrava, Czech Republic.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Miralem Mehic .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Mehic, M., Voznak, M., Fazio, P. (2017). Multicast Steganography Using Routing Protocols. In: Dziech, A., Czyżewski, A. (eds) Multimedia Communications, Services and Security. MCSS 2017. Communications in Computer and Information Science, vol 785. Springer, Cham. https://doi.org/10.1007/978-3-319-69911-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69911-0_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69910-3

  • Online ISBN: 978-3-319-69911-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics