The proliferation of Internet of Things has propelled the popularization of IEEE 802.15.4 standard. For the secure transmission of confidential data over 802.15.4, multiple encryption-based security techniques have been proposed in the literature. But these techniques do not ensure undetectable communication which is crucial in multiple scenarios like covert military operations. It is not sufficient enough to maintain the secrecy of the data using these techniques as it can arouse suspicion and even the encryption might be defeated by the adversary using advanced methods. For covert data communication, some steganographic techniques have been studied for 802.15.4 but unreliability makes it difficult to use for practical applications. In thi...
Abstract: This paper is a combined contribution to the field of steganography and ad-hoc networks. ...
Cryptograpy and steganography are the two popular methods available to provide security. One hides t...
Covert communication aims to shield the very existence of wireless transmissions in order to guarant...
Network steganography is a relatively new discipline which studies different steganographic techniq...
International audienceIn many applications, wireless sensor networks need to secure information. Act...
Abstract. In this paper we propose a novel approach to implement high ca-pacity, covert channel by e...
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network ...
The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in wireless comput...
Communication through wireless medium is widely used in today’s world. Orthogonal frequency-division...
Adding network connectivity to any “thing” can certainly provide great value, but it also brings alo...
Steganography, as a subfield of information hiding, is an art of hiding a message in a legitimate ca...
The broadcast nature of wireless communications makes it more vulnerable to eavesdropping. As the ap...
Recently, the Internet-of-Things (IoT) provides new challenges to security and privacy. Security of ...
Includes bibliographical references (pages 29-30).Covert channels encompass a group of methods desig...
Network Steganography describes all the methods used for transmitting data over a network without it...
Abstract: This paper is a combined contribution to the field of steganography and ad-hoc networks. ...
Cryptograpy and steganography are the two popular methods available to provide security. One hides t...
Covert communication aims to shield the very existence of wireless transmissions in order to guarant...
Network steganography is a relatively new discipline which studies different steganographic techniq...
International audienceIn many applications, wireless sensor networks need to secure information. Act...
Abstract. In this paper we propose a novel approach to implement high ca-pacity, covert channel by e...
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network ...
The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in wireless comput...
Communication through wireless medium is widely used in today’s world. Orthogonal frequency-division...
Adding network connectivity to any “thing” can certainly provide great value, but it also brings alo...
Steganography, as a subfield of information hiding, is an art of hiding a message in a legitimate ca...
The broadcast nature of wireless communications makes it more vulnerable to eavesdropping. As the ap...
Recently, the Internet-of-Things (IoT) provides new challenges to security and privacy. Security of ...
Includes bibliographical references (pages 29-30).Covert channels encompass a group of methods desig...
Network Steganography describes all the methods used for transmitting data over a network without it...
Abstract: This paper is a combined contribution to the field of steganography and ad-hoc networks. ...
Cryptograpy and steganography are the two popular methods available to provide security. One hides t...
Covert communication aims to shield the very existence of wireless transmissions in order to guarant...