CFP last date
20 January 2025
Reseach Article

Covert Communication in VANETS using Internet Protocol Header Bit

by Kimi Manchanda, Amarpreet Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 17
Year of Publication: 2015
Authors: Kimi Manchanda, Amarpreet Singh
10.5120/ijca2015905768

Kimi Manchanda, Amarpreet Singh . Covert Communication in VANETS using Internet Protocol Header Bit. International Journal of Computer Applications. 123, 17 ( August 2015), 10-14. DOI=10.5120/ijca2015905768

@article{ 10.5120/ijca2015905768,
author = { Kimi Manchanda, Amarpreet Singh },
title = { Covert Communication in VANETS using Internet Protocol Header Bit },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 17 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 10-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number17/22050-2015905768/ },
doi = { 10.5120/ijca2015905768 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:12:57.291176+05:30
%A Kimi Manchanda
%A Amarpreet Singh
%T Covert Communication in VANETS using Internet Protocol Header Bit
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 17
%P 10-14
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Moving into the VANET (Vehicular adhoc network) makes very beneficial for the vehicles to converse with each other and every node (vehicles) present in the VANET through Intelligent Transport System (ITS). In today‘s scenario, Security is a big issue in adhoc networks because adhoc are wireless as like VANETS. VANETS are more prone to attacks due to mobility of the vehicles. Privacy, security and authenticity are some of the required application that is essential before the vehicular adhoc networks are deployed. way. So, to counter such problem, this paper proposes a new scheme that makes use of Covert Channels to secure the data from third party which is also a part of that network.

References
  1. Fuentes J, Blasco Jeorge , Isabel A., and Manzano L.,” Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles”, International Journal of Distributed Sensor Networks Volume 2014, Article ID 120626, 15 pages
  2. Jose Maria de Fuentes, Jorge Blasco, Ana Isabel González-Tablas, and Lorena González-Manzano,’’ Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles’’, International Journal of Distributed Sensor Networks Volume 2014 (2014), Article ID 120626, 15 pages.
  3. Ahmed Al-Haiqi, Mahamod Ismail, and Rosdiadee Nordin,” A New Sensors-Based Covert Channel on Android”, Department of Electrical, Electronic and Systems Engineering, National University of Malaysia (UKM), 43600 Bangi, Malaysia, Article ID 969628, 14 pages, Hindawi 2014.
  4. Vibhor Kumar Vishnoi, Sunil Kumar,” Detection of TCP/IP Covert Channel based on Naïve-Bayesian Classifier”, International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume - 3 Page No. 8312-8316,ICES 2014.
  5. Esther Palomar, Jose M. De Fuentes, Almudena Alcaide,” Hindering false event dissemination with VANETS with proof-of-work mechanisms”, Department of Computer Science, Elsevier 2014.
  6. Albert Wasef and Xuemin (Sherman) Shen,” EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks”, IEEE Transactions on Mobile Computing, vol. 12, no. 1, January 2013, IEEE 2013.
  7. Alexandre Viejo, Qianhong Wu, Josep Domingo-Ferrer,”Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios”,Information Fusion ,Elsevier 2013.
  8. Andreas Tomandl, Florian Scheuer and Hannes Federrath,” Simulation-based evaluation of techniques for privacy protection in VANETs”, 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE 2012.
  9. Gadkari Mushtak Y, Sambre Nitin B. ,”Routing Protocols, Security Issues”, ISSN: 2278-0661 Volume 3, Issue 3 (July-Aug. 2012), PP 28-38.
  10. Syeda Khairunnesa Samantha, Nusrat Nur Afrose Shoma, K. M. Azharul Hasan ,”An Approach for Alleviating the Starvation Problem in Road Side Units (RSUs)-based Vehicular Ad Hoc Networks (VANETs)”, ISSN 2223-4985 Volume 2 No. 2, February 2012.
  11. Marco Di Felice , Luca Bedogni, Luciano Bononi,” Group communication on highways: An evaluation study of geocast protocols and applications”, Department of Computer Science, University of Bologna, Italy 1570-8705 , Elsevier 2012
  12. Huaqun Wang, Yuqing Zhan,” On the Security of an Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in VANETs” International Workshop on Information and Electronics Engineering (IWIEE), 1735 – 1739, Elsevier 2012.
  13. Osama Abumansoor and Azzedine Boukerche,” A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET”, IEEE Transactions on Vehicular Technology, Vol. 61, no. 1, January 2012, IEEE 2012.
  14. Paul Bijan, Ibrahim Md., Naser Bikas Md. Abu,” VANET Routing Protocols.”, International Journal of Computer Applications (0975 – 8887) Volume 20– No.3, April 2011.
  15. Khaleel Mershad and Hassan Artail,” REACT: Secure and Efficient Data Acquisition in VANETs”, 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE 2011
  16. Luca Anchora, Luca Cason, Giovanni Ciccarese, Mario De Blasi, Pierluigi Marra, Cosimo Palazzo’’ An Optimal Setting For The Parameters Of An Intelligent Flodding Scheme In VANETS’’, European wireless Conference 2010 .
  17. Kumar Maurya Prashant, SharmaVaishali , Sahu Gaurav, Roberts Ashish, Srivatava Mahendra ,”An Overview of AODV Routing Protocol”, International Journal Of Engineering And Computer Science, IJES 2009
  18. Steven J. Murdoch,’’ Covert channel vulnerabilities in anonymity systems’’, Cambridge University, December 2007.
  19. S. Zander, G. Armitage, and P. Branch, “Covert Channels in the IP Time To Live Field,” Proc. Australian Telecommunication Networks and Applications Conf. (ATNAC), Dec. 2006.
  20. E. Cauich, R. Gómez Cárdenas, and R. Watanabe, “Data Hiding in Identification and Offset IP Fields,” Proc. 5th Int’l. School and Symp. Advanced Distributed Systems (ISSADS), Jan. 2005, pp. 118–25.
  21. S. J. Murdoch and S. Lewis, “Embedding Covert Channels into TCP/IP,” Proc. 7th Information Hiding Wksp., June 2005.
  22. M. C. Perkins, “Hiding out in Plaintext: Covert Messaging with Bitwise Summations,” Master’s thesis, Iowa State University, 2005.
  23. Ankita Agrawal1, Aditi Garg2, NiharikaChaudhiri3,Shivanshu Gupta4,DevesPandey5,TumpaRoy,” Security onVehicularAd Hoc Networks (VANET)”
  24. A. Galatenko et al., “Statistical Covert Channels through PROXY Server,” Proc. 3d Int’l. Wksp. Mathematical Methods, Models, and Architectures for Computer Network Security, Sept. 2005, pp. 424–29.
  25. J. Rutkowska, “The Implementation of Passive Covert Chan- nels in the Linux Kernel,” Proc. Chaos Communication Congress, Dec. 2004.
  26. H. Qu, P. Su, and D. Feng, “A Typical Noisy Covert Channel in the IP Protocol,” Proc. 38th Annual Int’l. Carnahan Conf. Security Technology, pp. 189–92,Oct. 2004.
  27. S. Cabuk, C. E. Brodley, and C. Shields, “IP Covert Timing Channels: Design and Detection,” Proc. 11th ACM Conf. Com- puter and Communications Security (CCS), Oct. 25–29, pp. 178–87, 2004.
  28. S. Bhadra, S. Shakkottai, and S. Vishwanath, “Communication Through Jamming Over a Slotted ALOHA Channel,” Proc. 42nd Allerton Conf. Commun., Control, and Computing, Oct. 2004.
  29. K. Szczypiorski, “HICCUPS: Hidden Communication System for Corrupted Networks,” Proc. 10th Int’l. Multi- Conf. Advanced Computer Systems, Oct. 2003, pp. 31–40.
  30. B. Lampson,”A note on Confinement problem”, Communication pf the ACM, Vol. 16,no.10, Oct. 1973,pp. 613-615
  31. National Conference Security Center, US DoD, ” Trusted Computer System Evaluation Criteria ”,Tech. Rep. DOD 5200.28-STD, National Computer Security Center,Dec.1985, http://csrc.nist.gov/publications/history/dod85.pdf
  32. http://www.cs.ucf.edu
  33. http://www.it.ecei.tohoku.ac.jp
Index Terms

Computer Science
Information Sciences

Keywords

Covert Channel VANET ITS Adhoc Overt Subliminal Channel Steganography.