Practical covert wireless unidirectional communication in IEEE 802.11 environment

H Seong, I Kim, Y Jeon, MK Oh, S Lee… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Covert communications, or covert channels, are commonly exploited to establish a data
exfiltration channel from an insider on a trusted network to a malicious receiver outside the …

[HTML][HTML] A wireless covert channel based on dirty constellation with phase drift

K Grzesiak, Z Piotrowski, JM Kelner - Electronics, 2021 - mdpi.com
Modern telecommunications systems require the use of various transmission techniques,
which are either open or hidden. The open transmission system uses various security …

Three-layer hybrid intrusion detection model for smart home malicious attacks

L Shi, L Wu, Z Guan - Computers & Electrical Engineering, 2021 - Elsevier
With the development of Internet of Things and the increasingly rampant malicious network
activities, higher requirements are put forward for security to detect malicious behavior and …

Building covert timing channel of the IoT-enabled MTS based on multi-stage verification

C Liang, T Baker, Y Li, R Nawaz… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Although the global shipping industry is experiencing a productivity revolution due to the
adoption of IoTs (Internet of Things), the dependence on complex data transmission and …

A Robust Covert Channel With Self-Bit Recovery for IEEE 802.11 Networks

S Son, D Kwon, S Lee, Y Jeon… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Covert channels are commonly perceived as potential attack vectors in wireless
communication environments and are categorized into covert timing channels and covert …

Covert channel detection and generation techniques: A survey

NA AL-Khulaidi, AT Zahary… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
The use of covert communications has become more widespread recently as a solution to
the information security issue. Information security can be partially solved by the discovery …

ZM-CTC: Covert timing channel construction method based on zigzag matrix

J Zheng, S Li, S Hao, Y Li, Y Zhang - Computer Communications, 2022 - Elsevier
Abstract VoLTE (Voice over Long-Term Evolution) is a widely used, high-performance, and
end-to-end transmission solution in 4G and 5G. However, it also provides a new foundation …

A Reliable Covert Channel for Stealthy Data Transmission for Internet-of-Underwater-Things

T Baker, C Liang, Y Li - IEEE Internet of Things Magazine, 2022 - ieeexplore.ieee.org
The Internet-of-Underwater-Things (IoUTs) assembles underwater devices to be connected
to each other in a wide range of applications, and it has become an important security issue …

Covert Communication by Exploiting Error-Correcting Codes

A Marzin, M Schwartz, M Segal - 2024 20th International …, 2024 - ieeexplore.ieee.org
Covert channels, enabling concealed communication within seemingly innocuous data
streams, pose significant chal-lenges to traditional information security measures. This …

[PDF][PDF] Implementation and Analysis of Covert Channel Using iBeacon.

YS Oh, YJ Lee, J Jang, H Choi, IG Lee - ICISSP, 2024 - scitepress.org
Covert channels are typically employed to transmit information and bypass security policies
and controls simultaneously to maintain undetected communication. Various techniques …