Skip to main content

Secret Agent Radio: Covert Communication through Dirty Constellations

  • Conference paper
Information Hiding (IH 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7692))

Included in the following conference series:

Abstract

In this paper we propose a novel approach to implement high capacity, covert channel by encoding covert information in the physical layer of common wireless communication protocols. We call our technique Dirty Constellation because we hide the covert messages within a “dirty” constellation that mimics noise commonly imposed by hardware imperfections and channel conditions. The cover traffic in this method is the baseband modulation constellation. We leverage the variability in the wireless channel and hardware conditions to encode the covert channel. Packet sharing techniques and pre-distortion of the modulated symbols of a decoy packet allows the transmission of a secondary covert message while making it statistically undetectable to an adversary. We demonstrate the technique by implementing it in hardware, on top of an 802.11a/g PHY layer, using a software defined radio and analyze the undetectability of the scheme through a variety of common radio measurements and statistical tests.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agaian, S.S., Akopian, D., D’Souza, S.: Wireless steganography, No. 1, p. 60740G. SPIE (2006), http://link.aip.org/link/?PSI/6074/60740G/1

  2. Aggarwal, A., Meng, T.: Minimizing the peak-to-average power ratio of ofdm signals using convex optimization, vol. 54, pp. 3099–3110 (2006)

    Google Scholar 

  3. Ahsan, K., Kundur, D.: Practical data hiding in TCP/IP. In: Proc. Workshop on Multimedia Security at ACM Multimedia 2002, French Riviera (December 2002)

    Google Scholar 

  4. Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, MobiCom 2008, pp. 116–127. ACM, New York (2008), http://doi.acm.org/10.1145/1409944.1409959

    Google Scholar 

  5. Dutta, A., Fifield, J., Schelle, G., Grunwald, D., Sicker, D.: An intelligent physical layer for cognitive radio networks. In: WICON 2008: Proceedings of the 4th International Conference on Wireless Internet (2008)

    Google Scholar 

  6. Fifield, J., Kasemir, P., Grunwald, D., Sicker, D.: Experiences with a platform for frequency agile techniques. In: DYSPAN (2007)

    Google Scholar 

  7. Ganti, R., Gong, Z., Haenggi, M., Lee, C., Srinivasa, S., Tisza, D., Vanka, S., Vizi, P.: Implementation and experimental results of superposition coding on software radio. In: 2010 IEEE International Conference on Communications (ICC), pp. 1–5 (May 2010)

    Google Scholar 

  8. Gruhl, D., Bender, W., Lu, A.: Echo Hiding. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 295–315. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  9. IEEE Computer Society: LAN/MAN Standards Committee: Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, http://standards.ieee.org/getieee802/download/802.11-2007.pdf

  10. Jayalath, A., Tellambura, C.: Peak-to-average power ratio of ieee 802.11 a phy layer signals. In: Wysocki, T.A., Darnell, M., Honary, B. (eds.) Advanced Signal Processing for Communication Systems. The International Series in Engineering and Computer Science, vol. 703, pp. 83–96. Springer US (2002), http://dx.doi.org/10.1007/0-306-47791-2_7

  11. Krätzer, C., Dittmann, J., Lang, A., Kühne, T.: Wlan steganography: a first practical review. In: MM&S;Sec 2006: Proceedings of the 8th Workshop on Multimedia and Security, pp. 17–22. ACM, New York (2006)

    Google Scholar 

  12. Petitcolas, F., Anderson, R., Kuhn, M.: Information hiding-a survey. Proceedings of the IEEE 87(7), 1062–1078 (1999)

    Article  Google Scholar 

  13. Shacham, N.: Multipoint communication by hierarchically encoded data. In: INFOCOM 1992. Eleventh Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3. IEEE (May 1992)

    Google Scholar 

  14. Tsouri, G.R., Wulich, D.: Securing ofdm over wireless time-varying channels using subcarrier overloading with joint signal constellations. EURASIP J. Wirel. Commun. Netw. 2009, 2–2 (2009)

    Article  Google Scholar 

  15. Wu, M., Tang, E., Lin, B.: Data hiding in digital binary image. In: 2000 IEEE International Conference on Multimedia and Expo, ICME 2000, vol. 1, pp. 393–396 (2000)

    Google Scholar 

  16. Xu, C., Ping, X., Zhang, T.: Steganography in compressed video stream. In: First International Conference on Innovative Computing, Information and Control, ICICIC 2006, vol. 1, pp. 269–272 (2006)

    Google Scholar 

  17. Zander, S., Armitage, G., Branch, P.: A survey of covert channels and countermeasures in computer network protocols. IEEE Communications Surveys Tutorials 9(3), 44–57 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dutta, A., Saha, D., Grunwald, D., Sicker, D. (2013). Secret Agent Radio: Covert Communication through Dirty Constellations. In: Kirchner, M., Ghosal, D. (eds) Information Hiding. IH 2012. Lecture Notes in Computer Science, vol 7692. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36373-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36373-3_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36372-6

  • Online ISBN: 978-3-642-36373-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics