Multicast Steganography Using Routing Protocols

Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 785)

Abstract

The strengthening of security solutions for computer networks increases the interests in new methods for the transfer of hidden information. In this paper, we considered the use of routing protocols for transmission of steganographic messages. We evaluated such approach using proactive and reactive routing protocols by analyzing the amount of sent data, the number of generated routing packets, the average size of routing packets, and the packet delivery ratio using the NS-3 simulator. Simulations included random network topologies with a various number of nodes and mobility settings. The obtained results showed that reactive routing protocols exchange a large amount of routing packets which can be suitable for steganographic purposes due to network flooding mechanism.

Keywords

Steganography Information hiding Ad-hoc networks Routing protocols 

Notes

Acknowledgments

The research received a financial support from the SGS grant No. SP2017/174, VSB - Technical University of Ostrava, Czech Republic.

References

  1. 1.
    Lampson, B.W.: A note on the confinement problem. Commun. ACM 16(10), 613–615 (1973)CrossRefGoogle Scholar
  2. 2.
    Artz, D.: Digital steganography: hiding data within data. IEEE Internet Comput. 5(3), 75–80 (2001)CrossRefGoogle Scholar
  3. 3.
    Mehic, M., Slachta, J., Voznak, M.: Hiding data in SIP session. In: 2015 38th International Conference on Telecommunications and Signal Processing (TSP), pp. 1–5. IEEE, July 2015Google Scholar
  4. 4.
    Mazurczyk, W., Smolarczyk, M., Szczypiorski, K.: Retransmission steganography applied. In: 2010 International Conference on Multimedia Information Networking and Security, pp. 846–850 (2010)Google Scholar
  5. 5.
    Mehić, M., Mikulec, M., Voznak, M., Kapicak, L.: Creating covert channel using SIP. In: Dziech, A., Czyżewski, A. (eds.) MCSS 2014. CCIS, vol. 429, pp. 182–192. Springer, Cham (2014). doi: 10.1007/978-3-319-07569-3_15 CrossRefGoogle Scholar
  6. 6.
    Mileva, A., Panajotov, B.: Covert channels in TCP/IP protocol stack-extended version. Cent. Eur. J. Comput. Sci. 2, 45–66 (2014)Google Scholar
  7. 7.
    Berk, V., Giani, A., Cybenko, G.: Detection of Covert Channel Encoding in Network Packet Delays. Technical report TR536 Darthmouth College (2005)Google Scholar
  8. 8.
    Mazurczyk, W., Lubacz, J.: LACK-a VoIP steganographic method. Telecommun. Syst. 45, 153–163 (2010)CrossRefGoogle Scholar
  9. 9.
    Yargicoglu, A.U., Ilk, H.G.: Hidden data transmission in MELP coded speech signal using quantization index modulation. In: 2007 IEEE 15th Signal Processing and Communications Applications, pp. 1–4. IEEE, June 2007Google Scholar
  10. 10.
    Mazurczyk, W., Smolarczyk, M.M.M., Szczypiorski, K.: Hiding information in retransmissions. arXiv preprint arXiv:0905.0363 (2009)
  11. 11.
    Mazurczyk, W., Karas, M., Szczypiorski, K.: SkyDe: a Skype-based Steganographic Method. p. 7, January 2013Google Scholar
  12. 12.
    Mehic, M., Voznak, M., Safarik, J., Partila, P., Mikulec, M.: Using DNS amplification DDoS attack for hiding data. In: SPIE Sensing Technology+ Applications, pp. 9120 91200R. International Society for Optics and Photonics, May 2014Google Scholar
  13. 13.
    Voznak, M., Zbranek, I., Mehic, M., Komosny, D., Toral-Cruz, H., Lin, J.C.W.: Covert channel in RTP payload using a pointer in sip header. Komunikacie 18(1), 40–47 (2016)Google Scholar
  14. 14.
    Kamesh, S.P.N.: Security enhancement of authenticated RFID generation. Int. J. Appl. Eng. Res. 9(22), 5968–5974 (2014)Google Scholar
  15. 15.
    Perkins, C., Belding-Royer, E., Das, S.: Ad-hoc On-Demand Distance Vector Routing (2003)Google Scholar
  16. 16.
    Fazio, P., De Rango, F., Sottile, C.: An on demand interference aware routing protocol for VANETS. J. Netw. 7, 1728–1738 (2012)Google Scholar
  17. 17.
    Perkins, C.E., Bhagwat, P.: Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Comput. Commun. Rev. 24(4), 234–244 (1994)CrossRefGoogle Scholar
  18. 18.
    Mehic, M., Fazio, P., Voznak, M., Partila, P., Komosny, D., Tovarek, J., Chmelikova, Z.: On using multiple routing metrics with destination sequenced distance vector protocol for multihop wireless ad hoc networks, p. 98480F. International Society for Optics and Photonics, May 2016Google Scholar
  19. 19.
    Sarkar, K.S., Basavaraju, T., Puttamadappa, C.: Ad Hoc Mobile Wireless Networks, vol. 1. Auerbach Publications (2007). https://doi.org/10.1201/9781420062229
  20. 20.
    Das, S.R., Castaneda, R., Yan, J.: Simulation based performance evaluation of routing protocols for mobile ad hoc networks. Mob. Netw. Appl. 5(3), 179–189 (2000)CrossRefMATHGoogle Scholar
  21. 21.
    Ilyas, M.: The Handbook of Ad Hoc Wireless Networks. Electrical Engineering Handbook, vol. 20021643. CRC Press (2002). https://doi.org/10.1201/9781420040401
  22. 22.
    Conti, M., Giordano, S.: Multihop ad hoc networking: the theory. IEEE Commun. Mag. 45(4), 78–86 (2007)CrossRefGoogle Scholar
  23. 23.
    Barbeau, M., Kranakis, E.: Principles of Ad Hoc Networking. Wiley, Chichester (2007). doi: 10.1002/9780470512494 CrossRefGoogle Scholar
  24. 24.
    Szigeti, T., Hattingh, C.: End-to-End QoS Network Design, 1st edn. Networking Technology Series. Cisco Press (2005). 734 pagesGoogle Scholar
  25. 25.
    Apostolopoulos, G., Guerin, R., Kamat, S.: Implementation and performance measurements of QoS routing extensions to OSPF. In: IEEE INFOCOM 1999 Conference on Computer Communications Proceedings, Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320). vol. 2, pp. 680–688. IEEE (1999)Google Scholar
  26. 26.
    Moy, J.T.: OSPF version 2. Internet Req. Comment RFC 1247, 1–124 (1991)Google Scholar
  27. 27.
    Parkhurst, W.R.: Cisco OSPF Command and Configuration Handbook, 1st edn. Pearson Education (2002). 528 pagesGoogle Scholar
  28. 28.
    Chakeres, I., Belding-Royer, E.: AODV routing protocol implementation design. In: 24th International Conference on Distributed Computing Systems Workshops, 2004 Proceedings, pp. 698–703. IEEE (2004)Google Scholar
  29. 29.
    Barakovic, S., Barakovic, J.: Comparative Performance Evaluation of Mobile Ad Hoc Routing Protocols. In: Proceedings of the 33rd International Convention MIPRO 2010, pp. 518–523 (2010)Google Scholar
  30. 30.
    Henderson, T.R., Riley, G.F.: Network Simulations with the ns-3 Simulator. In: Proceedings of SIGCOMM, p. 527 (2006)Google Scholar
  31. 31.
    Riley, G.F., Henderson, T.R.: The ns-3 network simulator. In: Wehrle, K., Güneş, M., Gross, J. (eds.) Modeling and Tools for Network Simulation, pp. 15–34. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-12331-3_2 CrossRefGoogle Scholar
  32. 32.
    Medina, A., Lakhina, A., Matta, I., Byers, J.: BRITE: an approach to universal topology generation. In: MASCOTS 2001 Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 346–353. IEEE Computer Society (2001)Google Scholar
  33. 33.
    He, G.: Destination-sequenced distance vector (DSDV) protocol, pp. 1–9. Networking Laboratory, Helsinki University of Technology (2002)Google Scholar
  34. 34.
    Liu, F.: Routing in Multi Hop Wireless Infrastructures. Master thesis, University of Twente, Master Thesis (2004)Google Scholar
  35. 35.
    Moy, J.T.: OSPF: Anatomy of an Internet Routing Protocol. Addison-Wesley Professional, Reading (1998)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Department of TelecommunicationsVSB-Technical University of OstravaOstrava-porubaCzech Republic
  2. 2.Department DIMESUniversity of CalabriaArcavacata di RendeItaly

Personalised recommendations