Abstract
In this paper we propose a novel approach to implement high capacity, covert channel by encoding covert information in the physical layer of common wireless communication protocols. We call our technique Dirty Constellation because we hide the covert messages within a “dirty” constellation that mimics noise commonly imposed by hardware imperfections and channel conditions. The cover traffic in this method is the baseband modulation constellation. We leverage the variability in the wireless channel and hardware conditions to encode the covert channel. Packet sharing techniques and pre-distortion of the modulated symbols of a decoy packet allows the transmission of a secondary covert message while making it statistically undetectable to an adversary. We demonstrate the technique by implementing it in hardware, on top of an 802.11a/g PHY layer, using a software defined radio and analyze the undetectability of the scheme through a variety of common radio measurements and statistical tests.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Agaian, S.S., Akopian, D., D’Souza, S.: Wireless steganography, No. 1, p. 60740G. SPIE (2006), http://link.aip.org/link/?PSI/6074/60740G/1
Aggarwal, A., Meng, T.: Minimizing the peak-to-average power ratio of ofdm signals using convex optimization, vol. 54, pp. 3099–3110 (2006)
Ahsan, K., Kundur, D.: Practical data hiding in TCP/IP. In: Proc. Workshop on Multimedia Security at ACM Multimedia 2002, French Riviera (December 2002)
Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, MobiCom 2008, pp. 116–127. ACM, New York (2008), http://doi.acm.org/10.1145/1409944.1409959
Dutta, A., Fifield, J., Schelle, G., Grunwald, D., Sicker, D.: An intelligent physical layer for cognitive radio networks. In: WICON 2008: Proceedings of the 4th International Conference on Wireless Internet (2008)
Fifield, J., Kasemir, P., Grunwald, D., Sicker, D.: Experiences with a platform for frequency agile techniques. In: DYSPAN (2007)
Ganti, R., Gong, Z., Haenggi, M., Lee, C., Srinivasa, S., Tisza, D., Vanka, S., Vizi, P.: Implementation and experimental results of superposition coding on software radio. In: 2010 IEEE International Conference on Communications (ICC), pp. 1–5 (May 2010)
Gruhl, D., Bender, W., Lu, A.: Echo Hiding. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 295–315. Springer, Heidelberg (1996)
IEEE Computer Society: LAN/MAN Standards Committee: Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, http://standards.ieee.org/getieee802/download/802.11-2007.pdf
Jayalath, A., Tellambura, C.: Peak-to-average power ratio of ieee 802.11 a phy layer signals. In: Wysocki, T.A., Darnell, M., Honary, B. (eds.) Advanced Signal Processing for Communication Systems. The International Series in Engineering and Computer Science, vol. 703, pp. 83–96. Springer US (2002), http://dx.doi.org/10.1007/0-306-47791-2_7
Krätzer, C., Dittmann, J., Lang, A., Kühne, T.: Wlan steganography: a first practical review. In: MM&S;Sec 2006: Proceedings of the 8th Workshop on Multimedia and Security, pp. 17–22. ACM, New York (2006)
Petitcolas, F., Anderson, R., Kuhn, M.: Information hiding-a survey. Proceedings of the IEEE 87(7), 1062–1078 (1999)
Shacham, N.: Multipoint communication by hierarchically encoded data. In: INFOCOM 1992. Eleventh Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3. IEEE (May 1992)
Tsouri, G.R., Wulich, D.: Securing ofdm over wireless time-varying channels using subcarrier overloading with joint signal constellations. EURASIP J. Wirel. Commun. Netw. 2009, 2–2 (2009)
Wu, M., Tang, E., Lin, B.: Data hiding in digital binary image. In: 2000 IEEE International Conference on Multimedia and Expo, ICME 2000, vol. 1, pp. 393–396 (2000)
Xu, C., Ping, X., Zhang, T.: Steganography in compressed video stream. In: First International Conference on Innovative Computing, Information and Control, ICICIC 2006, vol. 1, pp. 269–272 (2006)
Zander, S., Armitage, G., Branch, P.: A survey of covert channels and countermeasures in computer network protocols. IEEE Communications Surveys Tutorials 9(3), 44–57 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dutta, A., Saha, D., Grunwald, D., Sicker, D. (2013). Secret Agent Radio: Covert Communication through Dirty Constellations. In: Kirchner, M., Ghosal, D. (eds) Information Hiding. IH 2012. Lecture Notes in Computer Science, vol 7692. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36373-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-36373-3_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36372-6
Online ISBN: 978-3-642-36373-3
eBook Packages: Computer ScienceComputer Science (R0)