Covert Communication in VANETS using Internet Protocol Header Bit

نویسندگان

  • Kimi Manchanda
  • Amarpreet Singh
چکیده

Moving into the VANET (Vehicular adhoc network) makes very beneficial for the vehicles to converse with each other and every node (vehicles) present in the VANET through Intelligent Transport System (ITS). In today‘s scenario, Security is a big issue in adhoc networks because adhoc are wireless as like VANETS. VANETS are more prone to attacks due to mobility of the vehicles. Privacy, security and authenticity are some of the required application that is essential before the vehicular adhoc networks are deployed. way. So, to counter such problem, this paper proposes a new scheme that makes use of Covert Channels to secure the data from third party which is also a part of that network.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Covert Channel in TTL Field of DNS Packets

Covert channels are used as a means of secretly transferring information when there is a need to hide the fact that communication is taking place. With the vast amount of traffic on the internet, network protocols have become a common vehicle for covert channels, typically hiding information in the header fields of packets. Domain name service (DNS) packets contain a 32-bit time to live (TTL) f...

متن کامل

Covert Channel in HTTP User-Agents

A subliminal covert channel establishes a nearly undetectable communication session within a pre-established data stream between two separate entities.This document explains how HTTP can be utilized to facilitate a covert channel over both local and wide area networks. The Hypertext Transfer Protocol (HTTP) accounts for a majority of the Internet’s daily web traffic and is permitted within almo...

متن کامل

Practical Data Hiding in TCP/IP

This work relates the areas of steganography, network protocols and security for practical data hiding in communication networks employing TCP/IP. Two approaches are proposed based on packet header manipulation and packet ordering within the IPSec framework. For the former the Internet protocol IPv4 header is analyzed to identify covert channels by exploiting redundancy and multiple interpretat...

متن کامل

Covert Channels in the IP Time To Live Field

Covert channels are used for the secret transfer of information. Unlike encryption, which only protects the information from unauthorised observers, covert channels aim to hide the very existence of the communication. The huge amount of data and vast number of different network protocols in the Internet makes it an ideal high-capacity vehicle for covert communication. Covert channels pose a ser...

متن کامل

An Evaluation Framework for the Analysis of Covert Channels in the TCP/IP Protocol Suite

Information hiding techniques can be used by criminals and terrorists to communicate over covert channels within the TCP/IP protocol suite and can be used to overcome firewalls and most other forms of network intrusion detection and prevention systems. In this work we describe the covert channel concept and weaknesses in the five layered TCP/IP layered model. We then present an evaluation frame...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015