An 802.11 MAC layer covert channel

نویسندگان

  • Telvis E. Calhoun
  • Xiaojun Cao
  • Yingshu Li
  • Raheem A. Beyah
چکیده

For extremely sensitive applications, it may be advantageous for users to transmit certain types of data covertly over the network. This provides an additional layer of security to that provided by the different layers of the protocol stack. In this paper we present a covert side channel that uses the 802.11 MAC rate switching protocol. The covert channel provides a general method to hide communications within currently deployed 802.11 LANs. The technique uses a one-time password (OTP) algorithm to ensure high-entropy randomness of the covert messages. We investigate how the covert side channel affects network throughput under various rate-switching conditions with UDP-based and TCP-based application traffic. We also investigate the covertness of the covert side channel using standardized entropy. The theoretical analysis shows that the maximum covert channel bandwidth is 60 bps. The simulation results show that the impact on network throughput is minimal and increases slightly as the covert channel bandwidth increases. We further show that the channel has 100% accuracy with minimal impact on rate switching entropy for scenarios where rate switching normally occurs. Finally, we present two applications for the covert channel: covert authentication and covert WiFi botnets. Copyright © 2010 John Wiley & Sons, Ltd.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

802.11 Fingerprinting to Detect Wireless Stealth Attacks

We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as a solution for three critical stealth attacks in wireless networks. We focus on extracting traces of the 802.11 medium access control (MAC) protocol from the temporal arrival patterns of incoming traffic streams as seen on the wired side, to identify attacker behavior. Attacks addressed include ...

متن کامل

Saturation throughput analysis of error-prone 802.11 wireless networks

It is well known that the medium access control (MAC) layer is the main bottleneck for the IEEE 802.11 wireless LANs. Much work has been done on performance analysis of the 802.11 MAC. However, most of them assume that the wireless channel is error-free. In this paper, we investigate the saturation throughput performance achieved at the MAC layer, in both congested and errorprone channels. We p...

متن کامل

An Adaptive MAC 802.11 Protocol for MANET Using Exponential Algorithm

A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. They have undergone rapid growth in the past several years because of their application in military and rescue services, disaster recovery operations, mobile conferencing and ma...

متن کامل

Achievable performance gain of IEEE 802.11 multi-rate link adaptation algorithm with cross-layer design

Link quality based rate adaptation which aims at link throughput optimization has been used widely for IEEE 802.11 networks. However, from system perspective network performance is affected by not only link quality but also random channel access at the MAC layer. Selection of transmit mode for optimal link throughput can cause performance loss of MAC throughput. In this paper we investigate thi...

متن کامل

Diagnosing and Penalizing MAC Layer Misbehavior in Wireless Networks

Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel. In this environment, selfish hosts that fail to adhere to the MAC protocol may obtain an unfair share of the channel bandwidth. For example, IEEE 802.11 requires nodes competing for access to the channel to wait for a “backoff” interval, randomly ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Wireless Communications and Mobile Computing

دوره 12  شماره 

صفحات  -

تاریخ انتشار 2012