A Novel Covert Channel for IEEE 802.11 Networks Utilizing MAC Address Randomization

G Teca, M Natkaniec - Applied Sciences, 2023 - mdpi.com
Vendors implement the MAC address randomization technique to prevent IEEE 802.11
client station devices from being tracked. Although it conceals device identity, it cannot hide …

StegoBackoff: Creating a Covert Channel in Smart Grids Using the Backoff Procedure of IEEE 802.11 Networks

G Teca, M Natkaniec - Energies, 2024 - mdpi.com
A smart grid constitutes an electrical infrastructure that integrates communication
technologies to optimize electricity production, distribution, and consumption. Within the …

Stegoframeorder—mac layer covert network channel for wireless ieee 802.11 networks

K Sawicki, G Bieszczad, Z Piotrowski - Sensors, 2021 - mdpi.com
The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in
wireless computer networks exploiting non-deterministic algorithms of medium access (such …

[HTML][HTML] StegoEDCA: An Efficient Covert Channel for Smart Grids Based on IEEE 802.11 e Standard

M Natkaniec, P Kępowicz - Energies, 2025 - mdpi.com
Smart grids are continuously evolving, incorporating modern technologies such as Wi-Fi,
Zigbee, LoRaWAN or BLE. Wi-Fi are commonly used to transmit data from measurement …

A dynamic timing-storage covert channel in vehicular ad hoc networks

S Taheri, M Mahdavi, N Moghim - Telecommunication Systems, 2018 - Springer
Abstract Vehicular Ad hoc Network (VANET) enables high speed vehicles to communicate
with each other. This kind of communication can provide road safety and passengers' …

ThermoSteg—Covert Channel for Microbolometer Thermographic Cameras

K Sawicki, G Bieszczad, T Sosnowski - Sensors, 2021 - mdpi.com
The article presents a new concept—steganography in thermography. Steganography is a
technique of hiding information in a non-obvious way and belongs to sciences related to …

Exploração de Covert Channels de Rede Sobre Comunicações IEEE 802.15. 4

JTB Rodrigues - 2022 - search.proquest.com
The advancements in information and communication technology in the past decades have
been converging into a new communication paradigm in which everything is expected to be …

Information Processing and Security Analysis of Shared System Resource Based Architectures

K Anjaria, A Mishra - International Journal of Cooperative …, 2018 - World Scientific
Background: Nowadays, service-oriented architectures and cloud-based infrastructures are
widely used in manufacturing industries and IT organizations. These architectures and …

Binary middleman covert channel in ExOR protocol

S Akhtari, N Moghim, M Mahdavi - 2017 Iranian conference on …, 2017 - ieeexplore.ieee.org
Covert channels have attracted serious attention in network and computer security since
their first presentation by Lampson in 1973. Designing such channels can be seen either as …

Explorando Oportunidades Esteganográficas sobre o IEEE 802.15. 4

MAO Pereira - 2022 - recipp.ipp.pt
The advancements in information and communication technology in the past decades have
been converging into a new communication paradigm in which everything is expected to be …