Steganography in modern smartphones and mitigation techniques

W Mazurczyk, L Caviglione - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
By offering sophisticated services and centralizing a huge volume of personal data, modern
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …

Physical Layer Covert Communication in B5G Wireless Networks—Its Research, Applications, and Challenges

Y Jiang, L Wang, HH Chen, X Shen - Proceedings of the IEEE, 2024 - ieeexplore.ieee.org
Physical layer covert communication is a crucial secure communication technology that
enables a transmitter to convey information covertly to a recipient without being detected by …

Covert wireless communication in IoT network: From AWGN channel to THz band

Z Liu, J Liu, Y Zeng, J Ma - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Covert communication can prevent an adversary from knowing that a transmission has
occurred between two users. In this article, we consider covert wireless communications in …

Cloaklora: A covert channel over lora phy

N Hou, X Xia, Y Zheng - IEEE/ACM Transactions on …, 2022 - ieeexplore.ieee.org
This paper describes our design and implementation of a covert channel over LoRa physical
layer (PHY). LoRa adopts a unique modulation scheme (chirp spread spectrum (CSS)) to …

Practical covert channels for WiFi systems

J Classen, M Schulz, M Hollick - 2015 IEEE Conference on …, 2015 - ieeexplore.ieee.org
Wireless covert channels promise to exfiltrate information with high bandwidth by
circumventing traditional access control mechanisms. Ideally, they are only accessible by …

[HTML][HTML] An authentication scheme for FANET packet payload using data hiding

D Mallikarachchi, KS Wong, JMY Lim - Journal of Information Security and …, 2023 - Elsevier
Flying ad hoc networks (FANETs) are gaining much traction in recent years due to their wide
range of applications, resulting in the emergence of a number of studies on the facilitation of …

Leaking wireless ICs via hardware trojan-infected synchronization

AR Díaz-Rizo, H Aboushady… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We propose a Hardware Trojan (HT) attack in wireless Integrated Circuits (ICs) that aims at
leaking sensitive information within a legitimate transmission. The HT is hidden inside the …

A message verification scheme based on physical layer-enabled data hiding for flying ad hoc network

D Mallikarachchi, KS Wong, JMY Lim - Multimedia Tools and Applications, 2024 - Springer
Abstract The use of Unmanned Aerial Vehicles (UAVs) for military as well as civilian
applications such as search and rescue operations, disaster management, parcel delivery …

Hiding data in plain sight: Undetectable wireless communications through pseudo-noise asymmetric shift keying

S D'Oro, F Restuccia, T Melodia - IEEE INFOCOM 2019-IEEE …, 2019 - ieeexplore.ieee.org
Undetectable wireless transmissions are fundamental to avoid eavesdroppers or censorship
by authoritarian governments. To address this issue, wireless steganography “hides” covert …

Optimization of covert communication in multi-sensor asymmetric Noise systems

S Qiao, R Zhu, X Ji, J Zhao, H Ding - Sensors, 2024 - mdpi.com
This work investigates wireless covert communication in a multi-sensor asymmetric noise
scenario. We adopt KL (Kullback–Leibler) divergence as the covertness constraint metric …