Skip to main content
Erschienen in: Wireless Personal Communications 2/2020

13.09.2019

A Secure Stop and Wait Communication Protocol for Disturbed Networks

verfasst von: Varun Shukla, Atul Chaturvedi, Neelam Srivastava

Erschienen in: Wireless Personal Communications | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Secure data communication is the need of hour today specifically when the wireless communication channel is insecure. We are proposing a protocol which can be customized in variety of situations. We want to use steganography as a complementary tool for cryptography. The protocol utilizes the nature of communication protocol and it is even useful for places where data hiding and cryptography is illegal or can’t be performed because of various reasons. We are giving a name to these kinds of networks as disturbed networks. The proposed peer to peer protocol is very useful for insecure channels and disturbed networks and we provide complete analysis to validate its utility. The method is a convenient stop and wait protocol which provides unbeatable security and suitable for mobile phones as well. At the same time, for intruder’s perspective, there is no encryption involved which is a very important aspect.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Menezes, A., Oorschot, P., & Vanstone, S. (2001). Handbook of applied cryptography (5th ed.). Boca Raton: CRC Press Inc.MATH Menezes, A., Oorschot, P., & Vanstone, S. (2001). Handbook of applied cryptography (5th ed.). Boca Raton: CRC Press Inc.MATH
2.
Zurück zum Zitat Stallings, W. (2005). Cryptography and network security, principles and practices (4th ed.). Upper Saddle River: Prentice Hall. Stallings, W. (2005). Cryptography and network security, principles and practices (4th ed.). Upper Saddle River: Prentice Hall.
3.
Zurück zum Zitat Zadiraka, V., & Kudin, A. (2013). Cloud computing in cryptography and steganography. Cybernetics and Systems Analysis,49(4), 584–588.CrossRef Zadiraka, V., & Kudin, A. (2013). Cloud computing in cryptography and steganography. Cybernetics and Systems Analysis,49(4), 584–588.CrossRef
5.
Zurück zum Zitat Szczypiorski, K. (2003). HICCUPS: Hidden communication system for corrupted networks. In Proceedings of the tenth international multi-conference on advanced computer systems (ACS-2003), Poland (pp. 31–40). Szczypiorski, K. (2003). HICCUPS: Hidden communication system for corrupted networks. In Proceedings of the tenth international multi-conference on advanced computer systems (ACS-2003), Poland (pp. 31–40).
6.
Zurück zum Zitat Najjar, A. (2008). The decoy: Multi-level digital multimedia steganography model. In 12th WSEAS international conference on communications, Heraklion, Greece (pp. 445–450). Najjar, A. (2008). The decoy: Multi-level digital multimedia steganography model. In 12th WSEAS international conference on communications, Heraklion, Greece (pp. 445–450).
7.
Zurück zum Zitat Mazurczyk, W., & Szczypiorski, K. (2008). Steganography on VoIP streams. In OTM confederated international conferences on the move to meaningful internet systems (part of the lecture notes in computer science book series (LNCS, volume 5332)) (pp. 1001–1018). Mazurczyk, W., & Szczypiorski, K. (2008). Steganography on VoIP streams. In OTM confederated international conferences on the move to meaningful internet systems (part of the lecture notes in computer science book series (LNCS, volume 5332)) (pp. 1001–1018).
8.
Zurück zum Zitat Mazurczyk, W., & Lubacz, J. (2010). LACK—A VoIP steganographic method. Telecommunication Systems,45(2–3), 153–163.CrossRef Mazurczyk, W., & Lubacz, J. (2010). LACK—A VoIP steganographic method. Telecommunication Systems,45(2–3), 153–163.CrossRef
9.
Zurück zum Zitat Mazurczyk, W., Smolarczyk, M., & Szczypiorski, K. (2011). Retransmission steganography and its detection. Soft Computing,15(3), 505–515.CrossRef Mazurczyk, W., Smolarczyk, M., & Szczypiorski, K. (2011). Retransmission steganography and its detection. Soft Computing,15(3), 505–515.CrossRef
10.
Zurück zum Zitat Fraczek, W., Mazurczyk, W., & Szczypiorski, K. (2010). Stream control transmission protocol steganography. In Second international workshop on network steganography (IWNS 2010) co-located with the 2010 international conference on multimedia information networking and security (MINES 2010), Nanjing, China (pp. 829–834). Fraczek, W., Mazurczyk, W., & Szczypiorski, K. (2010). Stream control transmission protocol steganography. In Second international workshop on network steganography (IWNS 2010) co-located with the 2010 international conference on multimedia information networking and security (MINES 2010), Nanjing, China (pp. 829–834).
11.
Zurück zum Zitat Mazurczyk, W., Szaga, P., & Szczypiorski, K. (2011). Using transcoding for hidden communication in IP telephony. In Computing research repository (CORR), abs/1111.1250, arXiv.org E-print Achieve. Ithaca: Cornell University (pp. 1–17). Mazurczyk, W., Szaga, P., & Szczypiorski, K. (2011). Using transcoding for hidden communication in IP telephony. In Computing research repository (CORR), abs/1111.1250, arXiv.org E-print Achieve. Ithaca: Cornell University (pp. 1–17).
12.
Zurück zum Zitat Lubacz, J., Mazurczyk, W., & Szczypiorski, K. (2014). Principles and overview of network steganography. IEEE Communications Magazine,52(5), 225–229.CrossRef Lubacz, J., Mazurczyk, W., & Szczypiorski, K. (2014). Principles and overview of network steganography. IEEE Communications Magazine,52(5), 225–229.CrossRef
13.
Zurück zum Zitat Sekhar, A., Kumar, M., & Rahiman, M. (2015). A novel approach for hiding data in videos using network steganography methods. In 4th international conference on eco friendly computing and communication systems. Procedia Computer Science. Amsterdam: Elsevier (vol. 70, pp. 764–768). Sekhar, A., Kumar, M., & Rahiman, M. (2015). A novel approach for hiding data in videos using network steganography methods. In 4th international conference on eco friendly computing and communication systems. Procedia Computer Science. Amsterdam: Elsevier (vol. 70, pp. 764–768).
14.
Zurück zum Zitat Jankowski, B., Mazurczyk, W., & Szczypiorski, K. (2015). Padsteg: Introducing inter-protocol steganography. Telecommunication Systems,58(1–2), 1–9. Jankowski, B., Mazurczyk, W., & Szczypiorski, K. (2015). Padsteg: Introducing inter-protocol steganography. Telecommunication Systems,58(1–2), 1–9.
15.
Zurück zum Zitat Attaby, A., Ahmed, M., & Alsammak, A. (2017). Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Engineering Journal,9, 1–10. Attaby, A., Ahmed, M., & Alsammak, A. (2017). Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Engineering Journal,9, 1–10.
16.
Zurück zum Zitat Jain, M., Kumar, A., & Choudhary, R. (2017). Improved diagonal medical image steganography using chaos theory, LFSR, and rabin cryptosystem. Brain Informatics,4(2), 95–106.CrossRef Jain, M., Kumar, A., & Choudhary, R. (2017). Improved diagonal medical image steganography using chaos theory, LFSR, and rabin cryptosystem. Brain Informatics,4(2), 95–106.CrossRef
17.
Zurück zum Zitat Denemark, T., & Fridrich, J. (2017). Steganography with multiple JPEG images of the same scene. IEEE Transactions on Information Forensics and Security,12(10), 1–13.CrossRef Denemark, T., & Fridrich, J. (2017). Steganography with multiple JPEG images of the same scene. IEEE Transactions on Information Forensics and Security,12(10), 1–13.CrossRef
18.
Zurück zum Zitat Li, J., & Zhao, Y. (2009). Resequencing analysis of stop-and-wait ARQ for parallel multichannel communications. IEEE/ACM Transactions on Networking,17(3), 817–830.CrossRef Li, J., & Zhao, Y. (2009). Resequencing analysis of stop-and-wait ARQ for parallel multichannel communications. IEEE/ACM Transactions on Networking,17(3), 817–830.CrossRef
19.
Zurück zum Zitat Saper, N. (2013). International cryptography regulation and the global information economy. Northwestern Journal of Technology and Intellectual Property,11(7), 673–688. Saper, N. (2013). International cryptography regulation and the global information economy. Northwestern Journal of Technology and Intellectual Property,11(7), 673–688.
20.
Zurück zum Zitat Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory,22(6), 644–654.MathSciNetCrossRef Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory,22(6), 644–654.MathSciNetCrossRef
21.
Zurück zum Zitat Lin, J., Feng, K., Huang, Y., & Wang, L. (2013). Novel design and analysis of aggregated ARQ protocols for IEEE 802.11n networks. IEEE Transactions on Mobile Computing,12(3), 556–570.CrossRef Lin, J., Feng, K., Huang, Y., & Wang, L. (2013). Novel design and analysis of aggregated ARQ protocols for IEEE 802.11n networks. IEEE Transactions on Mobile Computing,12(3), 556–570.CrossRef
23.
Zurück zum Zitat Schneier, B. (2007). Applied cryptography: Protocols, algorithms, and source code in C (2nd ed.). New York: Wiley.MATH Schneier, B. (2007). Applied cryptography: Protocols, algorithms, and source code in C (2nd ed.). New York: Wiley.MATH
24.
Zurück zum Zitat Mirzadeh, S., Cruickshank, H., & Tafazolli, R. (2014). Secure device pairing: A survey. IEEE Communications Surveys and Tutorials,16(1), 17–40.CrossRef Mirzadeh, S., Cruickshank, H., & Tafazolli, R. (2014). Secure device pairing: A survey. IEEE Communications Surveys and Tutorials,16(1), 17–40.CrossRef
25.
Zurück zum Zitat Zhao, Z., Dong, Z., & Wang, Y. (2006). Security analysis of a password-based authentication protocol proposed to IEEE 1363. Theoretical Computer Science,352(1–3), 280–287.MathSciNetCrossRef Zhao, Z., Dong, Z., & Wang, Y. (2006). Security analysis of a password-based authentication protocol proposed to IEEE 1363. Theoretical Computer Science,352(1–3), 280–287.MathSciNetCrossRef
26.
Zurück zum Zitat Burr, W. (2003). Selecting the advanced encryption standard. IEEE Security and Privacy,99(2), 43–52.CrossRef Burr, W. (2003). Selecting the advanced encryption standard. IEEE Security and Privacy,99(2), 43–52.CrossRef
27.
Zurück zum Zitat Zhang, X., & Parhi, K. (2002). Implementation approaches for the advanced encryption standard algorithm. IEEE Circuits and Systems Magazine,2(4), 24–46.CrossRef Zhang, X., & Parhi, K. (2002). Implementation approaches for the advanced encryption standard algorithm. IEEE Circuits and Systems Magazine,2(4), 24–46.CrossRef
28.
Zurück zum Zitat Subramanya, A. (2001). Image compression technique. IEEE Potentials,20(1), 19–23.CrossRef Subramanya, A. (2001). Image compression technique. IEEE Potentials,20(1), 19–23.CrossRef
29.
Zurück zum Zitat Martin, M., & Bell, A. (2001). New image compression techniques using multiwavelets and multiwavelet packets. IEEE Transactions on Image Processing,10(4), 500–510.CrossRef Martin, M., & Bell, A. (2001). New image compression techniques using multiwavelets and multiwavelet packets. IEEE Transactions on Image Processing,10(4), 500–510.CrossRef
30.
Zurück zum Zitat Bahadili, H. (2008). A novel loseless data compression scheme based on the error correcting hamming codes. Computers and Mathematics with Application,56, 143–150.CrossRef Bahadili, H. (2008). A novel loseless data compression scheme based on the error correcting hamming codes. Computers and Mathematics with Application,56, 143–150.CrossRef
31.
Zurück zum Zitat Siddeq, M., & Rodrigues, M. (2014). A novel image compression algorithm for high resolution 3D reconstruction. 3D Research,5(7), 1–17. Siddeq, M., & Rodrigues, M. (2014). A novel image compression algorithm for high resolution 3D reconstruction. 3D Research,5(7), 1–17.
32.
Zurück zum Zitat Callegati, F., Cerroni, W., & Ramilli, M. (2009). Man-in-the-middle attack to the HTTPS protocol. IEEE Security and Privacy,7(1), 78–81.CrossRef Callegati, F., Cerroni, W., & Ramilli, M. (2009). Man-in-the-middle attack to the HTTPS protocol. IEEE Security and Privacy,7(1), 78–81.CrossRef
33.
Zurück zum Zitat Conti, M., Dragoni, N., & Lesyk, V. (2016). A survey of man in the middle attacks. IEEE Communications Surveys and Tutorials,18(3), 2027–2051.CrossRef Conti, M., Dragoni, N., & Lesyk, V. (2016). A survey of man in the middle attacks. IEEE Communications Surveys and Tutorials,18(3), 2027–2051.CrossRef
34.
Zurück zum Zitat Wang, L. (2016). Detection of man-in-the-middle attacks using physical layer wireless security techniques. Wireless Communications & Mobile Computing,16(4), 408–426.CrossRef Wang, L. (2016). Detection of man-in-the-middle attacks using physical layer wireless security techniques. Wireless Communications & Mobile Computing,16(4), 408–426.CrossRef
35.
Zurück zum Zitat Rossi, M., & Zorzi, M. (2003). Analysis and heuristics for the characterization of selective repeat ARQ delay statistics over wireless channels. IEEE Transactions on Vehicular Technology,52(5), 1365–1377.CrossRef Rossi, M., & Zorzi, M. (2003). Analysis and heuristics for the characterization of selective repeat ARQ delay statistics over wireless channels. IEEE Transactions on Vehicular Technology,52(5), 1365–1377.CrossRef
36.
Zurück zum Zitat Ikegawa, T., & Takahashi, Y. (2007). Sliding window protocol with selective-repeat ARQ: Performance modeling and analysis. Telecommunication Systems,34(3–4), 167–180.CrossRef Ikegawa, T., & Takahashi, Y. (2007). Sliding window protocol with selective-repeat ARQ: Performance modeling and analysis. Telecommunication Systems,34(3–4), 167–180.CrossRef
Metadaten
Titel
A Secure Stop and Wait Communication Protocol for Disturbed Networks
verfasst von
Varun Shukla
Atul Chaturvedi
Neelam Srivastava
Publikationsdatum
13.09.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06760-w

Weitere Artikel der Ausgabe 2/2020

Wireless Personal Communications 2/2020 Zur Ausgabe

Neuer Inhalt