Skip to main content
Log in

A Secure Stop and Wait Communication Protocol for Disturbed Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Secure data communication is the need of hour today specifically when the wireless communication channel is insecure. We are proposing a protocol which can be customized in variety of situations. We want to use steganography as a complementary tool for cryptography. The protocol utilizes the nature of communication protocol and it is even useful for places where data hiding and cryptography is illegal or can’t be performed because of various reasons. We are giving a name to these kinds of networks as disturbed networks. The proposed peer to peer protocol is very useful for insecure channels and disturbed networks and we provide complete analysis to validate its utility. The method is a convenient stop and wait protocol which provides unbeatable security and suitable for mobile phones as well. At the same time, for intruder’s perspective, there is no encryption involved which is a very important aspect.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Menezes, A., Oorschot, P., & Vanstone, S. (2001). Handbook of applied cryptography (5th ed.). Boca Raton: CRC Press Inc.

    MATH  Google Scholar 

  2. Stallings, W. (2005). Cryptography and network security, principles and practices (4th ed.). Upper Saddle River: Prentice Hall.

    Google Scholar 

  3. Zadiraka, V., & Kudin, A. (2013). Cloud computing in cryptography and steganography. Cybernetics and Systems Analysis,49(4), 584–588.

    Article  Google Scholar 

  4. Szczypiorski, K. (2003). Steganography in TCP/IP networks, state of the art and proposal of a new system-HICCUPS. Retrieved from January 2018 http://krzysiek.tele.pw.edu.pl/pdf/steg-seminar-2003.pdf.

  5. Szczypiorski, K. (2003). HICCUPS: Hidden communication system for corrupted networks. In Proceedings of the tenth international multi-conference on advanced computer systems (ACS-2003), Poland (pp. 31–40).

  6. Najjar, A. (2008). The decoy: Multi-level digital multimedia steganography model. In 12th WSEAS international conference on communications, Heraklion, Greece (pp. 445–450).

  7. Mazurczyk, W., & Szczypiorski, K. (2008). Steganography on VoIP streams. In OTM confederated international conferences on the move to meaningful internet systems (part of the lecture notes in computer science book series (LNCS, volume 5332)) (pp. 1001–1018).

  8. Mazurczyk, W., & Lubacz, J. (2010). LACK—A VoIP steganographic method. Telecommunication Systems,45(2–3), 153–163.

    Article  Google Scholar 

  9. Mazurczyk, W., Smolarczyk, M., & Szczypiorski, K. (2011). Retransmission steganography and its detection. Soft Computing,15(3), 505–515.

    Article  Google Scholar 

  10. Fraczek, W., Mazurczyk, W., & Szczypiorski, K. (2010). Stream control transmission protocol steganography. In Second international workshop on network steganography (IWNS 2010) co-located with the 2010 international conference on multimedia information networking and security (MINES 2010), Nanjing, China (pp. 829–834).

  11. Mazurczyk, W., Szaga, P., & Szczypiorski, K. (2011). Using transcoding for hidden communication in IP telephony. In Computing research repository (CORR), abs/1111.1250, arXiv.org E-print Achieve. Ithaca: Cornell University (pp. 1–17).

  12. Lubacz, J., Mazurczyk, W., & Szczypiorski, K. (2014). Principles and overview of network steganography. IEEE Communications Magazine,52(5), 225–229.

    Article  Google Scholar 

  13. Sekhar, A., Kumar, M., & Rahiman, M. (2015). A novel approach for hiding data in videos using network steganography methods. In 4th international conference on eco friendly computing and communication systems. Procedia Computer Science. Amsterdam: Elsevier (vol. 70, pp. 764–768).

  14. Jankowski, B., Mazurczyk, W., & Szczypiorski, K. (2015). Padsteg: Introducing inter-protocol steganography. Telecommunication Systems,58(1–2), 1–9.

    Google Scholar 

  15. Attaby, A., Ahmed, M., & Alsammak, A. (2017). Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Engineering Journal,9, 1–10.

    Google Scholar 

  16. Jain, M., Kumar, A., & Choudhary, R. (2017). Improved diagonal medical image steganography using chaos theory, LFSR, and rabin cryptosystem. Brain Informatics,4(2), 95–106.

    Article  Google Scholar 

  17. Denemark, T., & Fridrich, J. (2017). Steganography with multiple JPEG images of the same scene. IEEE Transactions on Information Forensics and Security,12(10), 1–13.

    Article  Google Scholar 

  18. Li, J., & Zhao, Y. (2009). Resequencing analysis of stop-and-wait ARQ for parallel multichannel communications. IEEE/ACM Transactions on Networking,17(3), 817–830.

    Article  Google Scholar 

  19. Saper, N. (2013). International cryptography regulation and the global information economy. Northwestern Journal of Technology and Intellectual Property,11(7), 673–688.

    Google Scholar 

  20. Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory,22(6), 644–654.

    Article  MathSciNet  Google Scholar 

  21. Lin, J., Feng, K., Huang, Y., & Wang, L. (2013). Novel design and analysis of aggregated ARQ protocols for IEEE 802.11n networks. IEEE Transactions on Mobile Computing,12(3), 556–570.

    Article  Google Scholar 

  22. Schneier, B. (1993). Schneier on security, The Blowfish encryption algorithm. Retrieved on January 2018, from https://www.schneier.com/academic/blowfish/.

  23. Schneier, B. (2007). Applied cryptography: Protocols, algorithms, and source code in C (2nd ed.). New York: Wiley.

    MATH  Google Scholar 

  24. Mirzadeh, S., Cruickshank, H., & Tafazolli, R. (2014). Secure device pairing: A survey. IEEE Communications Surveys and Tutorials,16(1), 17–40.

    Article  Google Scholar 

  25. Zhao, Z., Dong, Z., & Wang, Y. (2006). Security analysis of a password-based authentication protocol proposed to IEEE 1363. Theoretical Computer Science,352(1–3), 280–287.

    Article  MathSciNet  Google Scholar 

  26. Burr, W. (2003). Selecting the advanced encryption standard. IEEE Security and Privacy,99(2), 43–52.

    Article  Google Scholar 

  27. Zhang, X., & Parhi, K. (2002). Implementation approaches for the advanced encryption standard algorithm. IEEE Circuits and Systems Magazine,2(4), 24–46.

    Article  Google Scholar 

  28. Subramanya, A. (2001). Image compression technique. IEEE Potentials,20(1), 19–23.

    Article  Google Scholar 

  29. Martin, M., & Bell, A. (2001). New image compression techniques using multiwavelets and multiwavelet packets. IEEE Transactions on Image Processing,10(4), 500–510.

    Article  Google Scholar 

  30. Bahadili, H. (2008). A novel loseless data compression scheme based on the error correcting hamming codes. Computers and Mathematics with Application,56, 143–150.

    Article  Google Scholar 

  31. Siddeq, M., & Rodrigues, M. (2014). A novel image compression algorithm for high resolution 3D reconstruction. 3D Research,5(7), 1–17.

    Google Scholar 

  32. Callegati, F., Cerroni, W., & Ramilli, M. (2009). Man-in-the-middle attack to the HTTPS protocol. IEEE Security and Privacy,7(1), 78–81.

    Article  Google Scholar 

  33. Conti, M., Dragoni, N., & Lesyk, V. (2016). A survey of man in the middle attacks. IEEE Communications Surveys and Tutorials,18(3), 2027–2051.

    Article  Google Scholar 

  34. Wang, L. (2016). Detection of man-in-the-middle attacks using physical layer wireless security techniques. Wireless Communications & Mobile Computing,16(4), 408–426.

    Article  Google Scholar 

  35. Rossi, M., & Zorzi, M. (2003). Analysis and heuristics for the characterization of selective repeat ARQ delay statistics over wireless channels. IEEE Transactions on Vehicular Technology,52(5), 1365–1377.

    Article  Google Scholar 

  36. Ikegawa, T., & Takahashi, Y. (2007). Sliding window protocol with selective-repeat ARQ: Performance modeling and analysis. Telecommunication Systems,34(3–4), 167–180.

    Article  Google Scholar 

Download references

Acknowledgements

We thank copyright office, department of industrial policy and promotion under ministry of commerce and industry, government of India, for providing copyright for the paper. The registration Number is L-73429/2018 under the copyright act 1957.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Varun Shukla.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shukla, V., Chaturvedi, A. & Srivastava, N. A Secure Stop and Wait Communication Protocol for Disturbed Networks. Wireless Pers Commun 110, 861–872 (2020). https://doi.org/10.1007/s11277-019-06760-w

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06760-w

Keywords

Navigation