Network steganography is a relatively new discipline which studies different steganographic techniques that utilize network protocols for data hiding. Internet of Things (IoT) is a concept which integrates billions of embedded devices that communicate to each other. To the best of our knowledge, there are not many attempts that utilize existing network steganographic techniques in protocols specifically created for IoT. Therefore, in this paper, we present several new covert channels that utilize the Constrained Application Protocol (CoAP), which is a specialized Web transfer protocol used for constrained devices and networks. This protocol can be used regardless of its transport carrier (Datagram Transport Layer Security - DTLS or clear U...
Steganography is a technology used since years for the communication of messages secretly. These sec...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Steganography is one of the major techniques used to hide the existence of communication that lies b...
This paper presents several novel covert channels in the Constrained Application Protocol (CoAP) - a...
Steganography, as a subfield of information hiding, is an art of hiding a message in a legitimate ca...
Network Steganography describes all the methods used for transmitting data over a network without it...
Network Steganography describes all the methods used for transmitting data over a network without it...
Network covert channels are a part of the information hiding research area that deals with the secre...
Network steganography consists of different steganographic technics that utilize network protocols f...
In order to protect user privacy or guarantee free access to the Internet, the network covert channe...
Covert channels are communication channels that can be exploited by a process to transfer informatio...
In the context of modern telecommunications effects leading, on one hand, to the increase of law enf...
Recently, the Internet-of-Things (IoT) provides new challenges to security and privacy. Security of ...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Steganography is a technology used since years for the communication of messages secretly. These sec...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Steganography is one of the major techniques used to hide the existence of communication that lies b...
This paper presents several novel covert channels in the Constrained Application Protocol (CoAP) - a...
Steganography, as a subfield of information hiding, is an art of hiding a message in a legitimate ca...
Network Steganography describes all the methods used for transmitting data over a network without it...
Network Steganography describes all the methods used for transmitting data over a network without it...
Network covert channels are a part of the information hiding research area that deals with the secre...
Network steganography consists of different steganographic technics that utilize network protocols f...
In order to protect user privacy or guarantee free access to the Internet, the network covert channe...
Covert channels are communication channels that can be exploited by a process to transfer informatio...
In the context of modern telecommunications effects leading, on one hand, to the increase of law enf...
Recently, the Internet-of-Things (IoT) provides new challenges to security and privacy. Security of ...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Steganography is a technology used since years for the communication of messages secretly. These sec...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Steganography is one of the major techniques used to hide the existence of communication that lies b...