Abstract
The strengthening of security solutions for computer networks increases the interests in new methods for the transfer of hidden information. In this paper, we considered the use of routing protocols for transmission of steganographic messages. We evaluated such approach using proactive and reactive routing protocols by analyzing the amount of sent data, the number of generated routing packets, the average size of routing packets, and the packet delivery ratio using the NS-3 simulator. Simulations included random network topologies with a various number of nodes and mobility settings. The obtained results showed that reactive routing protocols exchange a large amount of routing packets which can be suitable for steganographic purposes due to network flooding mechanism.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lampson, B.W.: A note on the confinement problem. Commun. ACM 16(10), 613–615 (1973)
Artz, D.: Digital steganography: hiding data within data. IEEE Internet Comput. 5(3), 75–80 (2001)
Mehic, M., Slachta, J., Voznak, M.: Hiding data in SIP session. In: 2015 38th International Conference on Telecommunications and Signal Processing (TSP), pp. 1–5. IEEE, July 2015
Mazurczyk, W., Smolarczyk, M., Szczypiorski, K.: Retransmission steganography applied. In: 2010 International Conference on Multimedia Information Networking and Security, pp. 846–850 (2010)
Mehić, M., Mikulec, M., Voznak, M., Kapicak, L.: Creating covert channel using SIP. In: Dziech, A., Czyżewski, A. (eds.) MCSS 2014. CCIS, vol. 429, pp. 182–192. Springer, Cham (2014). doi:10.1007/978-3-319-07569-3_15
Mileva, A., Panajotov, B.: Covert channels in TCP/IP protocol stack-extended version. Cent. Eur. J. Comput. Sci. 2, 45–66 (2014)
Berk, V., Giani, A., Cybenko, G.: Detection of Covert Channel Encoding in Network Packet Delays. Technical report TR536 Darthmouth College (2005)
Mazurczyk, W., Lubacz, J.: LACK-a VoIP steganographic method. Telecommun. Syst. 45, 153–163 (2010)
Yargicoglu, A.U., Ilk, H.G.: Hidden data transmission in MELP coded speech signal using quantization index modulation. In: 2007 IEEE 15th Signal Processing and Communications Applications, pp. 1–4. IEEE, June 2007
Mazurczyk, W., Smolarczyk, M.M.M., Szczypiorski, K.: Hiding information in retransmissions. arXiv preprint arXiv:0905.0363 (2009)
Mazurczyk, W., Karas, M., Szczypiorski, K.: SkyDe: a Skype-based Steganographic Method. p. 7, January 2013
Mehic, M., Voznak, M., Safarik, J., Partila, P., Mikulec, M.: Using DNS amplification DDoS attack for hiding data. In: SPIE Sensing Technology+ Applications, pp. 9120 91200R. International Society for Optics and Photonics, May 2014
Voznak, M., Zbranek, I., Mehic, M., Komosny, D., Toral-Cruz, H., Lin, J.C.W.: Covert channel in RTP payload using a pointer in sip header. Komunikacie 18(1), 40–47 (2016)
Kamesh, S.P.N.: Security enhancement of authenticated RFID generation. Int. J. Appl. Eng. Res. 9(22), 5968–5974 (2014)
Perkins, C., Belding-Royer, E., Das, S.: Ad-hoc On-Demand Distance Vector Routing (2003)
Fazio, P., De Rango, F., Sottile, C.: An on demand interference aware routing protocol for VANETS. J. Netw. 7, 1728–1738 (2012)
Perkins, C.E., Bhagwat, P.: Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Comput. Commun. Rev. 24(4), 234–244 (1994)
Mehic, M., Fazio, P., Voznak, M., Partila, P., Komosny, D., Tovarek, J., Chmelikova, Z.: On using multiple routing metrics with destination sequenced distance vector protocol for multihop wireless ad hoc networks, p. 98480F. International Society for Optics and Photonics, May 2016
Sarkar, K.S., Basavaraju, T., Puttamadappa, C.: Ad Hoc Mobile Wireless Networks, vol. 1. Auerbach Publications (2007). https://doi.org/10.1201/9781420062229
Das, S.R., Castaneda, R., Yan, J.: Simulation based performance evaluation of routing protocols for mobile ad hoc networks. Mob. Netw. Appl. 5(3), 179–189 (2000)
Ilyas, M.: The Handbook of Ad Hoc Wireless Networks. Electrical Engineering Handbook, vol. 20021643. CRC Press (2002). https://doi.org/10.1201/9781420040401
Conti, M., Giordano, S.: Multihop ad hoc networking: the theory. IEEE Commun. Mag. 45(4), 78–86 (2007)
Barbeau, M., Kranakis, E.: Principles of Ad Hoc Networking. Wiley, Chichester (2007). doi:10.1002/9780470512494
Szigeti, T., Hattingh, C.: End-to-End QoS Network Design, 1st edn. Networking Technology Series. Cisco Press (2005). 734 pages
Apostolopoulos, G., Guerin, R., Kamat, S.: Implementation and performance measurements of QoS routing extensions to OSPF. In: IEEE INFOCOM 1999 Conference on Computer Communications Proceedings, Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320). vol. 2, pp. 680–688. IEEE (1999)
Moy, J.T.: OSPF version 2. Internet Req. Comment RFC 1247, 1–124 (1991)
Parkhurst, W.R.: Cisco OSPF Command and Configuration Handbook, 1st edn. Pearson Education (2002). 528 pages
Chakeres, I., Belding-Royer, E.: AODV routing protocol implementation design. In: 24th International Conference on Distributed Computing Systems Workshops, 2004 Proceedings, pp. 698–703. IEEE (2004)
Barakovic, S., Barakovic, J.: Comparative Performance Evaluation of Mobile Ad Hoc Routing Protocols. In: Proceedings of the 33rd International Convention MIPRO 2010, pp. 518–523 (2010)
Henderson, T.R., Riley, G.F.: Network Simulations with the ns-3 Simulator. In: Proceedings of SIGCOMM, p. 527 (2006)
Riley, G.F., Henderson, T.R.: The ns-3 network simulator. In: Wehrle, K., Güneş, M., Gross, J. (eds.) Modeling and Tools for Network Simulation, pp. 15–34. Springer, Heidelberg (2010). doi:10.1007/978-3-642-12331-3_2
Medina, A., Lakhina, A., Matta, I., Byers, J.: BRITE: an approach to universal topology generation. In: MASCOTS 2001 Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 346–353. IEEE Computer Society (2001)
He, G.: Destination-sequenced distance vector (DSDV) protocol, pp. 1–9. Networking Laboratory, Helsinki University of Technology (2002)
Liu, F.: Routing in Multi Hop Wireless Infrastructures. Master thesis, University of Twente, Master Thesis (2004)
Moy, J.T.: OSPF: Anatomy of an Internet Routing Protocol. Addison-Wesley Professional, Reading (1998)
Acknowledgments
The research received a financial support from the SGS grant No. SP2017/174, VSB - Technical University of Ostrava, Czech Republic.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Mehic, M., Voznak, M., Fazio, P. (2017). Multicast Steganography Using Routing Protocols. In: Dziech, A., Czyżewski, A. (eds) Multimedia Communications, Services and Security. MCSS 2017. Communications in Computer and Information Science, vol 785. Springer, Cham. https://doi.org/10.1007/978-3-319-69911-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-69911-0_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69910-3
Online ISBN: 978-3-319-69911-0
eBook Packages: Computer ScienceComputer Science (R0)