HICCUPS: Hidden Communication System for Corrupted Networks From: The Tenth International MultiConference on Advanced Computer Systems ACS'2003. Midzyzdroje.

Slides:



Advertisements
Similar presentations
Bandwidth Estimation for IEEE Based Ad Hoc Networks.
Advertisements

Doc.: IEEE /0204r2 Submission March 2010 David Halasz, AclaraSlide 1 Comments on Sub 1 GHz license-exempt operation Date: Authors:
Doc.: IEEE /0527r0 Submission March 2010 Slide 1 A Periodic 5 MHz Measurement Pilot for Channel Scan Date: Authors:
Doc.: IEEE /0071r1 Submission January 2004 Aleksandar Purkovic, Nortel NetworksSlide 1 LDPC vs. Convolutional Codes for n Applications:
Doc.: IEEE /0342r0 SubmissionLiwen Chu Etc.Slide 1 Power Efficient PS Poll Date: Authors: Date: March, 2012.
By, Shah Ankur Vasant. WIMAX stands for Worldwide Interoperability for Microwave Access The original IEEE standard (now called "Fixed WiMAX") was.
Layer 1 of the TCP/IP protocol stack: Network Access Layer (NAL). Functions, performed on the layer. МАС address in Ethernet networks. Layer 1 of the TCP/IP.
Chapter 7 Data Link Layer
Voice over IP: A growing cadre of criminals is hiding secret messages in voice data. From: "Voice Over IP: The VoIP Steganography Threat". IEEE Spectrum.
WiMAX Introduction Worldwide Interoperability for Microwave Access
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
Wireless Local Area Networks By Edmund Gean August 2, 2000.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
& WEP Tzachy Reinman System and Network Security Course
Introduction to the Gigabit-Ethernet by Yun Qi Source : Rivier College, CS699 Professional Seminar.
Wireless Local Area Networks (WLAN)
LECTURE 2 CT1303 LAN. STANDARD MODELS: OSI Model : Open system Interconnection. is a conceptual model that characterizes and standardizes the internal.
The OSI Model and the TCP/IP Protocol Suite
Wireless Local Area Technology.  Garikayi Brasington Madzudzo  Edmund Nartey  Ismeil Ahamed  Jakub Gieryn  Arnaud Fogno.
Basic Networking Components
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
The IEEE Specification By Matthew Ruston November 25, 2007.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
GSC: Standardization Advancing Global Communications For Information and Discussion Standardization development in the IEEE is carried out under the oversight.
KARTIK DABBIRU Roll # EE
Wired LANs and Ethernet
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Implementations  Ethernet Networks  Wireless Networks.
Computer Networks. Introduction Computer Network2 A History Lesson of Networking 1969 – ARPANET, first packet switched network consist of UCLA, Stanford,
Wireless LAN Overview Sunggeun Jin Outline  IEEE MAC  IEEE MAC.
HNC COMPUTING - Network Concepts 1 Network Concepts Devices Introduction into Network Devices.
25-Oct-15Network Layer Connecting Devices Networks do not normally operate in isolation.They are connected to one another using connecting devices. The.
Internetworking Concept and Architectural Model
CS 447 Networks and Data Communication ARP (Address Resolution Protocol) for the Internet Department of Computer Science Southern Illinois University Edwardsville.
Doc.: IEEE /0498r0 Submission April 2008 Eldad Perahia, Intel CorporationSlide 1 Modifications to the 60GHz PAR & 5 C’s Proposal Date:
Efficient Mobility Management for Vertical Handoff between WWAN and WLAN IEEE Communications Magazine November 2003.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
© Sarvesh 25 November 2015Cross-layer optimization for VoIP over WLAN125 November Cross Layer optimization for VoIP over WLAN [Yuan Liu Zhu] A Presentation.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
3.2 Software Fundamentals. A protocol is a formal description of digital message formats and the rules for exchanging those messages in or between computing.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
1 Chap. 2 Protocol. 2 Communication model Simplified communication model  source node  gather data from sensor or switch using ADC (analog-to-digital.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Exam structure S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Exam structure 1. Ten true/false type questions (10 p) 2. Ten.
WLAN.
Chang-Yeong Oh and Tae-Jin Lee JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 13, NO. 5, OCTOBER 2011 Cooperative MAC Protocol Using Active Relays for Multi-Rate.
Communication Architecture and Network Protocol Layering Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by:
September 2002 doc.: IEEE /568r0 David Skellern, Cisco SystemsSlide 1Submission RRM Architectural Framework David Skellern Wireless Networking.
Networking Components
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
WLAN Introduction of WLAN b Application. WLAN Introduction  What is a Wireless LAN (WLAN)? A wireless LAN is a LAN which accommodates wireless.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
IEEE Wireless LAN Standard
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
WIRELESS NETWORKS. Wireless?  A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier.  The last link with the.
Chapter 13 Wired LANs: Ethernet
Wireless Security By: Bryan M Keller.
Data Networking via LANs Packets and Frames
The Network Beacon Announcement scanning method
network interface card (NIC)
IEEE ah Use Case – Outdoor Wi-Fi for cellular traffic offloading
Layer 1 of the TCP/IP protocol stack: Network Access Layer (NAL)
Network Protocol Layers
Networks and the Internet
IEEE ah Use Case – Outdoor Wi-Fi for cellular traffic offloading
Power Efficient PS Poll
Comments on Sub 1 GHz license-exempt operation
Network Research Center Tsinghua Univ. Beijing, P.R.China
Chapter 13 Wired LANs: Ethernet
Presentation transcript:

HICCUPS: Hidden Communication System for Corrupted Networks From: The Tenth International MultiConference on Advanced Computer Systems ACS'2003. Midzyzdroje October pp Author: KRZYSZTOF SZCZYPIORSKI 1

Outline What is HICCUPS? IEEE LAN RM vs. TCP/IP Protocol Suite HICCUPS OPERATION Functional Parts of HICCUPS Performance of HICCUPS Conclusion Reference 2

What is HICCUPS? Hidden Communication System for Corrupted Networks Work on wireless local area networks. Use checksum to verify which frame has steganogram. Must have special hardware which do not discard the frame with wrong checksum. 3

IEEE LAN RM vs. TCP/IP Protocol Suite 4

HICCUPS OPERATION It is possible to create three hidden data channels (HDC) in MAC frame in networks HDC1: channel based on cipher’s initialization vectors. HDC2: channel based on MAC network addresses (for example destination and source). HDC3: channel based on integrity mechanism values (for example frame checksums). 5

HICCUPS OPERATION(Cont.) 6

layer_embedded&v=OWmZBwoI0o0 layer_embedded&v=OWmZBwoI0o0 7

Functional Parts of HICCUPS FP1: network cards dedicated. Network cards should have possibility to control HDC1-HDC3 and data payload in MAC frame. FP2: management system to control HDC1-HDC3 and data payload in MAC frame 8

Functional Parts of HICCUPS (Cont.) The management system (P2) may be produced in software or hardware and should perform functions mentioned below: · joining hidden group, · leaving hidden group, · providing interface to upper network layer to control HDC1-HDC3 and data payload in MAC frame,with cryptographic extension: · key agreement/key exchange, · key refresh, · encryption/decryption. 9

Performance of HICCUPS assuming that real FER is 1.5%, stations may pretend that FER is 2.5%. For 11 Mbit/s IEEE b network [5] with 40% usage of bandwidth we have: 11 Mbit/s· 40%· (2.5%-1.5%) = 44 kbit/s for steganographic system. For 54 Mbit/s IEEE g network [6] we have: 216 kbit/s. 10

Conclusion HICCUPS is a new network steganographic systemdedicated to shared medium networks especially to WLAN Advantage:Very fast(200 Kbs/sec) Disadvantage: – There are too many corrupted frame. – Must have special hardware which do not discard the frame with wrong checksum. 11

Reference [1] Szczypiorski, K.: HICCUPS: Hidden Communication System for Coruppted Networks. In Proc: The Tenth International MultiConference on Advanced Computer Systems ACS'2003. Midzyzdroje October pp [2] [3] Krzysztof Szczypiorski (4 November 2003). "Steganography in TCP/IP Networks. State of the Art and a Proposal of a New System - HICCUPS". Institute of Telecommunications Seminar. Retrieved 17 June 2010."Steganography in TCP/IP Networks. State of the Art and a Proposal of a New System - HICCUPS" [4] [5] IEEE b-1999 Supplement to , Wireless LAN MAC and PHY specifications: Higher speed Physical Layer (PHY) extension in the 2.4 GHz band [6] IEEE b-1999 Supplement to , Wireless LAN MAC and PHY specifications: Higher speed Physical Layer (PHY) extension in the 2.4 GHz band 12

Q & A 13