Affiliation:
1. Institute of Telecommunications, AGH University of Science and Technology, al. Mickiewicza 30, 30-059 Krakow, Poland
Abstract
Vendors implement the MAC address randomization technique to prevent IEEE 802.11 client station devices from being tracked. Although it conceals device identity, it cannot hide its occurring data transmission. This paper presents a novel covert channel that leverages the MAC address randomization technique to create a covert channel to hide data transmission inside IEEE 802.11 networks. The secret data are a disposable random MAC address generated by the IEEE 802.11 station as part of the probe request frame while scanning the network. The paper presents the concept of the covert channel, its implementation, and performance metrics. The study covers diverse scenarios, including the adaptation of the modified Selective Repeat ARQ protocol to alleviate the impact of the number of client stations and their offered loads on the covert channel. The results show that with the appropriate parameter selections, we can adapt the covert channel to produce excellent throughput, efficiency, delay, and jitter according to the environment in which it is installed.
Funder
Polish Ministry of Science and Higher Education
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference47 articles.
1. (2023, June 06). Cisco Annual Internet Report (2018–2023). Available online: https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html.
2. (2021). IEEE Standard for Information Technology–Telecommunications and Information Exchange between Systems—Local and Metropolitan Area Networks–Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications—Redline (Standard No. IEEE Std 802.11-2020).
3. Ryan, F., and Schukat, M. (2019, January 17–18). Wi-Fi User Profiling via Access Point Honeynets. Proceedings of the 2019 30th Irish Signals and Systems Conference (ISSC), Maynooth, Ireland.
4. I know your MAC address: Targeted tracking of individual using Wi-Fi;Cunche;J. Comput. Virol. Hacking Tech.,2014
5. Uszko, K., Kasprzyk, M., Natkaniec, M., and Chołda, P. (2023). Rule-Based System with Machine Learning Support for Detecting Anomalies in 5G WLANs. Electronics, 12.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献