1. Introduction
The smart grid (SG) [
1] leverages advanced communication technologies to enhance the efficiency, reliability, and sustainability of energy delivery systems. By integrating various communication technologies, SGs enable real-time monitoring, control, and optimization of electricity generation, transmission, distribution, and consumption. The internationally acknowledged SG standard, IEC 61850 [
2], has formalized the seamless exchange of data across local area networks (LANs), ensuring interoperability among different systems. With appealing features such as cost-effectiveness in installation, high-speed data transfer capabilities, and ease of implementation, wireless local area network (WLAN) technologies are increasingly capturing the interest of power utilities. Wi-Fi can serve as a communication medium for SG devices, such as smart meters, sensors, and control systems. By leveraging existing WLAN networks or deploying dedicated Wi-Fi-enabled devices, utilities can establish robust communication channels for real-time data exchange, enabling better monitoring and control of grid operations. As SGs rely heavily on data exchange and remote control, robust cybersecurity measures are essential to protect against cyber threats and ensure the integrity and privacy of grid data. Advanced encryption, authentication mechanisms, and intrusion detection systems are deployed to safeguard critical infrastructure and sensitive information. While Wi-Fi offers convenience and connectivity, security remains a critical concern, especially in mission-critical SG applications. Utilities must implement robust security measures to safeguard Wi-Fi-enabled devices and prevent unauthorized access or tampering with grid infrastructure. Future applications used in SGs will also require support for the transmission of data with appropriate quality of service (QoS) provided.
A covert channel is a communication channel that allows data to be conveyed using the structure of another, already existing medium in a way that is normally undetectable. Transmitting messages through a covert channel is related to steganography and serves as an alternative to cryptography for securing communication. Cryptographically secured messages, no matter the cryptosystem chosen, and no matter how unbreakable, will arouse interest and may cause trouble for the communicating parties. On the other hand, steganography (from Greek ‘steganographia’, with ‘steganos’ meaning covered or concealed and ‘graphia’ meaning writing) is the practice of embedding hidden information within another message or physical object. Its primary goal is to remain undetected. There are two distinct types of covert channels—timing-based and storage-based channels. Timing-based channels send information by modulating some observable aspect of system behavior over time, while storage-based channels convey information by editing specific bits in the overt message to camouflage another in it.
In this paper, we present a novel covert communication channel, leveraging the IEEE 802.11 [
3] DCF. The proposed covert channel and its modifications are of a hybrid variety, containing elements of both storage- and timing-based approaches. Its efficiency is four times higher than our previous covert channel expounded on in [
4]. This covert channel serves to enhance communication within the SG network, specifically between smart meters and data collectors, with the primary objective of bolstering security and privacy. It also enables the provision of services that require real-time frame delivery.
In this paper, we present the following contributions:
Proposal of a new covert channel—we propose a new covert channel mechanism that uses the ‘Duration’ field of the MAC frame header to hide covert data. We also modify the method presented in [
4] to make it resistant to stego-analysis.
Proposal of a new hybrid solution—we propose an unprecedented solution, where information is hidden in two independent locations of the DCF, which increases its resistance to stego-analysis.
Proposal of the enhanced cover channel with QoS support—we propose the world’s first covert channel, which is capable of transmitting data with varying priorities.
Evaluation of the covert channel’s performance—we assess the covert channel’s performance by evaluating its behavior with the UDP transport protocol.
Assessment of the covert channel’s performance across varied IEEE 802.11 parameters—we delve into the performance evaluation of the covert channel, considering variations in duration/ID bits, frame length, and QoS classes.
Analysis of the covert channel’s performance under saturation conditions—we conduct a critical analysis of the covert channel’s performance under saturation conditions.
Examination of loads offered by other stations—our performance studies include an examination of the load imposed by neighboring stations on the covert station while operating under saturation conditions.
Analysis of covert station signaling—we conduct a thorough analysis of the covert station’s signaling required to transmit data with QoS support on the overall channel throughput.
This article presents a pioneering effort that introduces the application of an IEEE 802.11 covert channel to enhance security within the SG network. Our contribution is distinguished by its innovative approach, which leverages the randomness of the IEEE 802.11 backoff mechanism and the operation of the ‘Duration’ field of the MAC frame transmitted with the DCF to maintain covert channel concealment. By implementing a covert channel within the IEEE 802.11 network, we not only enhance the security and confidentiality of communications in SGs but also improve resilience against potential threats. Moreover, our work paves the way for further exploration of covert communication mechanisms and QoS aspects in SG networks.
The remainder of the paper is organized as follows. First, we provide an overview of the literature in
Section 2. Then, in
Section 3, we provide an overview of IEEE 802.11 architecture. In
Section 4, we depict the proposed algorithm. A comprehensive presentation of the simulation results, including different scenarios, is presented in
Section 5. Next, we present an enhanced covert channel mechanism with a virtually enhanced distributed channel access (EDCA) function;
Section 7 evaluates its performance. We discuss the results in
Section 8. Finally, we summarize the paper and outline future work in
Section 9. We hope that this paper will facilitate further development and performance improvements of covert channel solutions for SG.
2. State of the Art
A critical aspect of SGs is in ensuring robust transmission security and cyber resilience. In [
5], the authors propose a communication compensation block to bolster the resilience of distributed secondary control against communication impairments in the microgrids operated at the higher bandwidth. The proposed method aims to alleviate malicious time delays and communication imperfections within distributed networked controls utilized in the secondary layer of microgrids. This is achieved through prediction, estimation, and ultimately making decisions on transmitted data. Consequently, the proposed modification elevates the dynamic performance of the microgrids, enhancing system speed and robustness.
In [
6], an analysis of the threats and potential solutions related to IoT-based SGs was conducted. The authors delved into various cyberattack types and offered a comprehensive overview of the cyber-security landscape concerning SGs. They specifically concentrated on discussing and examining network vulnerabilities, proposing attack countermeasures, and outlining security requirements. Furthermore, the paper elucidated on cyber-security vulnerabilities and corresponding solutions. Additionally, the authors provided guidance on future research directions concerning cyber-security in SG applications.
In [
7], a review of the impact of cyberattacks on the entire SG ecosystem was provided. The authors analyzed the vulnerabilities of all components of the smart grid, including software, hardware, and data transmission. They also explored vulnerabilities related to data management, services, applications, and running environments. Reference also discussed attack strategies, consequences, and detection methods. The potential solutions for cyberattacks on SGs were analyzed in terms of blockchain technology and AI techniques. Reference also reviewed cyberattacks on SGs, documenting events recorded from 2010 to July 2022, including their impacts and consequences. The authors also provided future research directions for the robust cybersecurity of SGs against more sophisticated cyberattacks.
The researchers in [
8] explored the application of AI techniques in microgrids with a focus on cybersecurity concerning physical devices and communication networks. Security vulnerabilities were examined under various cyberattacks that targeted sensor measurements, control signals, and information exchange. Their paper also summarized AI-based techniques for detecting and mitigating cyberattacks in microgrids. The authors paid special attention to learning-based AI techniques. Reference also included a case study of a test microgrid where the effectiveness of AI-based cyberattack mitigation in a distributed alternating current microgrid control was demonstrated. Future research directions were also outlined, including the application of AI techniques to enhance trust in AI-based models in microgrids.
The idea of classifying traffic with a minimum amount of information about the source and destination inspired the authors in reference [
9]. The work was related to the analysis of threat detection in SGs based on network traffic analysis. They examined various datasets with different frequencies of the occurrence of threats. Long short-term memory, isolation forest, and support vector machine were considered in the study as machine learning techniques. Eight series of results were compared with other studies. The findings revealed notable variations among the techniques, dataset sizes, and the balance of datasets. The authors also showed that more accurate classification could be obtained by increasing the number of analyzed features.
An optimal method for feature selection and comparative techniques for results between different studies in the context of imbalanced datasets and threat identification in SGs were presented in [
10]. The authors presented the state of the data science discipline and the most frequently employed methods of data analysis. They also revealed the most common errors and shortcomings in data analysis. The authors proposed new feature sets for training machine learning algorithms on the CSE CIC IDS2018 dataset and suggested effective techniques for feature selection. They also proposed several solutions that merit consideration for future research endeavors, focusing on the analysis of threats and trends in SGs.
In [
11], the authors presented an overview of the SG, along with its main components, namely information technology (IT), operational technology (OT), and advanced metering infrastructure (AMI). Various vulnerable devices across IT, OT, and AMI were identified, and a concise description of each was provided. The authors proposed security measures that effectively mitigated the known threats of cyberattacks. The current architecture of the SG, the characteristics of SG devices, and cyberattacks were described. The limitations of current studies for advanced SG security were also explored. Additionally, the authors pinpointed novel research challenges and delved into prospective avenues for future research.
Several covert channels were proposed over the years for IEEE 802.11 networks. The first theoretical hidden channel was described and evaluated in [
12,
13]. The author proposed three channels—the first two were covert, but had low bandwidth, based on the cipher initialization vector (IV) field and medium access control (MAC) addresses in the MAC frame header, to be used for the configuration of the third one. The third channel used intentionally corrupted frames to more overtly transmit large amounts of data. The researchers in [
14] analyzed the potential of hiding data in the frame control field of a MAC header and provided a partial implementation and analysis of the reliability, undetectability, and capacity of their proposed channels. They proposed two hidden channels using their analyzed method of encoding data. The first method relied on packet modification and the second one relied on the duplication of specific packets. Reference [
15] proposed two hidden channels and a proposed communication protocol for them. One of the channels was based on modifying the sequence control data of a frame, while the other one was based on sending plain text or encrypted messages, three bytes at a time, using the IV field of a MAC header. Furthermore, in [
16], the researchers implemented the proposed communication protocols in a user-friendly way, and proposed modifications to strengthen the channels against steganalysis. In [
17], the authors updated the channels proposed in [
14]. They also included a very in-depth analysis of the original implementation and their updates, which proved that the updates improved capacity, reliability, and non-detectability of the channels in question.
An innovative technique was proposed in [
18], seeking to protect against replay attacks. The proposed covert channel used the IEEE 802.11b rate-switching algorithm as a cover for transmitting a one-time password, which authenticated the client to the access point. Reference also showed the minimal performance impact of the technique on the wireless network. The authors of [
19] explored the possibility of using an interference channel in IEEE 802.11 networks to transmit hidden data. They demonstrated that it would be practical to have a covert sender, parallel to legitimate, authenticated senders in a network using this technique. The first OFDM (orthogonal frequency-division multiplexing)-based hidden channel was proposed in [
20]. The scheme was based on the insertion of data into the padding of frames at the physical layer of IEEE 802.11a/g standards. The method offered very low detectability and bandwidths up to 1.1 Mbps or 0.44 Mbps, depending on the frame type used. Another innovative work [
21] proposed hiding communication by dynamically switching from infrastructure mode to ad hoc mode, while simultaneously scrambling data at the MAC layer with optional data encryption using the VMPC algorithm. This proposal was primarily intended for military networks, although it also has potential for civilian covert communication. The channel provided great bandwidth without over-complicating the protocol structure, although, while the messages would be hard to read as an adversary, they would not be hard to detect.
Reference [
22] sought to design a new timing covert channel by exploiting the random backoff in the distributed coordinated function (DCF). The result was a relatively high-throughput covert channel that maintained 99% accuracy and could adapt to various network conditions. The researchers in [
23] analyzed the viability of a hidden channel dependent on the modification of the protocol version field in the MAC header of clear-to-send (CTS) and acknowledgment (ACK) frames, as well as its robustness to errors. They conducted tests on the proposed channel, including measurements of the available data rate, channel errors, and channel detectability, as well as proposed techniques not used previously in similar channels, such as forward error correction and interleaving. To protect against rogue access points, the authors of [
24] proposed a system based on sending access point authentication using the least significant bits of the timestamp field and beacon frames. The proposed mechanism had two modes of operation. The first one was based on writing information directly in the four least significant bits of the timestamp field. The second one was based on the modulation of the time difference between timestamps and the beacon interval. The authors noted the possibility of the general use of the proposed covert channel, but advised against it as it was a one-way method of communication.
The authors of [
25] created an extensible application, which allowed detecting previously proposed MAC layer steganographic channels, as well as manual packet inspection for better clarity, minimizing false positives to prevent cluttering the output with duplicate or false warnings. As the detector application was entirely passive, it remained entirely undetectable to other network users. Covert channels remained largely unavailable to the general public, either because of difficult implementation or hardware costs. Reference [
26] proposed a software radio implementation of systems proposed in [
22]. The study also included tests of the viability of such a system on off-the-shelf hardware. Although only half of the simulated throughput of the implemented system could be achieved on real hardware, the work further proved that practical implementations allowed for a better judgment of the feasibility of proposed covert channel communication systems.
In [
27], the authors proposed a novel high-capacity, covert channel through the use of simulated noise in the physical layer of IEEE 802.11a/g networks. The work also included a hardware implementation and a series of tests that confirmed the high degree of undetectability and high throughput of the proposed system. In time, new schemes for higher throughput channels were created, such as the one proposed in [
28]. The researchers decided to modify cyclic prefixes in OFDM symbols, which when simulated was the fastest proposed covert channel at the time of publication while having a very high degree of undetectability. Reference [
29] proposed the exploitation of IEEE 802.11e to create two new covert channels, which were low bandwidth but could be used with no disruption to the network traffic pattern, thus avoiding detection. The proposed channels use previously unused quality of service (QoS) bits in the header and also provide signaling to improve reliability.
The researchers in [
30] analyzed the benefits of using multiple-input, multiple-output (MIMO) technology over single-input, single-output (SISO) for covert channels and proposed a new MIMO-exclusive covert channel using eigenbeam-space division multiplexing. The MIMO channel was superior to the SISO in terms of both lower bit error rates and higher undetectability. Inspired by the exploiting modification direction (EMD) method used in Joint Photographic Experts Group (JPEG) steganography, the authors of [
31] proposed a new timing channel for the distributed coordination function (DCF). Their goal was to increase embedding efficiency and achieve higher throughput without compromising security. The idea was based on free time intervals in the network. Reference [
32] analyzes further possibilities of OFDM-based physical channels for IEEE 802.11a/g networks and provides an analysis of the proposed channels in contrast to the previously described ones.
The researchers in [
33] proposed a new covert channel with the goals of very low detectability and very high ease of implementation on off-the-shelf hardware. The included analysis concluded that while the proposed channel was feasible, it had a rather high error rate and very low bandwidth compared to alternatives, but accomplished goals of being very hard to detect and having a very simple implementation, requiring a change in the configuration of the adapter. To further research into MIMO-based covert channels, the authors of [
34] proposed two new methods of transmitting hidden data in the uplink. They rely on modifying the control and data channels of regular communication. Their work also discusses how to determine the parameters of proposed channels and validates the effectiveness of proposed schemes through implementation. Reference [
35] described a novel wireless covert channel, based on intentionally causing errors in constellation shaping to transmit data. The proposed method was highly undetectable but lacked reliability to become viable.
The idea of a covert channel that does not decrease the signal-to-noise ratio of the primary channel inspired reference [
36], which proposed a novel method that optimized the use of phase-shifting modulations to create a covert channel. The proposed mechanism encoded information by changing the amplitudes of primary symbols while keeping their phase intact. The covert channel was also readable with off-the-shelf hardware in testing. With the development of the IEEE 802.11ad standard, a new high-throughput covert channel was proposed in [
37]. The authors proposed a channel that leveraged modulation and coding schemes along with link adaptation mechanisms to achieve a throughput of up to 150 Mbps over the covert channel, while only slightly degrading the quality of primary channel communication. In [
38], K. Sawicki proposed a couple of mechanisms to covertly send control information to devices on the network, mostly using previously described methods with slight modifications.
The authors of [
39] set out to improve the undetectability of MIMO-based covert channels compared to the state of the art at the time. Their proposed channel used generated artificial noise, modulated into the signaling of the primary channel to deliver a low error rate and hard-to-detect messaging. In [
40], the researchers analyzed how to improve the covertness of OFDM-based physical layer hidden channels by using a cover signal to decrease the SNR of a warden. Successfully masking the signal had a measurable impact on the warden’s awareness and ability to detect the covert message. The impact on the legitimate receiver was not measured. In [
41], the authors proposed a more robust, adaptable dirty constellation-based system for high-speed covert communication. The proposed method was inspired by the usage of a drift correction modulation approach previously used to watermark audio.
The researchers in [
42] conducted a mathematical analysis on the use of cover signals in OFDM to reduce the detectability of a hidden channel with minimal impact on the actual channel’s performance. To do this, the authors analyzed the bit error rate (BER) and the codeword error rate (CER) at the warden. With the advent of internet-connected cars and the increasing presence of the IEEE 802.11p standard, the authors of [
43] analyzed and simulated the viability of hiding data in the physical layer using wireless padding for cross-vehicle communication in non-ideal conditions. Their analysis revealed that throughput decreases as traffic rate, number of vehicles, and packet size increase, alongside BER. To further research into the usage of cover signals in OFDM-based wireless steganography for IoT, reference [
44] analyzed the performance of such systems using simulations in varying parameters. The work also evaluated the secrecy of the proposed channel in the case of eavesdropping. The simulations confirmed that the proposed system was viable as information rates and CER guaranteed successful decoding of embedded data and the system’s secrecy was within expectations.
In [
45], a covert channel that used the MAC address randomization technique to create a covert channel was proposed. Researchers introduced the concept of the covert channel, its implementation, and performance evaluation. The authors analyzed different scenarios, including the adaptation of the modified selective repeat ARQ protocol to alleviate the impact of the number of stations and their offered loads on the covert channel. The results showed that with the appropriate parameter selections, the covert channel could be adapted to produce excellent throughput, high efficiency, low delay, and low jitter values.
A completely new approach was proposed in [
4]. It exploits the same random backoff mechanism as in [
22], but in a completely new, more covert way. It is more covert as it does not cause the covert sender to access the channel in an unfair way, which might draw suspicion. The main mechanism that was proposed and analyzed uses the parity of the backoff time of a station to broadcast information bit by bit. The method is obviously slow when transmitting large frames, but it inspired the authors of this contribution. This work aims to expand the proposed mechanism with a throughput that is four times higher. Furthermore, we propose a solution to provide QoS support in covert channels, a feature that is currently lacking in the literature.
3. Background
To properly apply steganographic techniques, the cover chosen for embedding must be thoroughly investigated in advance. The characteristic selected as the cover should not disrupt the normal operation of the network when tampered with. This section begins with a brief paragraph, discussing mechanisms employed to secure data transmission in the production environment, utilizing Wi-Fi networks. Then, we go over the relevant parts of normal IEEE 802.11 network operations and how regular packets and their distribution can be tampered with to create a hidden message of our choice.
The standard security mechanisms used in the context of data transmission protection over Wi-Fi networks includes the following: Wi-Fi-protected access (WPA), WPA2, and WPA3. WPA was introduced as an improvement over the older and less secure wired equivalent privacy (WEP) protocol. It uses the temporal key integrity protocol (TKIP) for encryption. TKIP dynamically generates encryption keys for each data frame, enhancing security. However, WPA still has vulnerabilities, especially when used with older devices. It provides better security than WEP but is not as robust as WPA2 or WPA3. WPA2 employs the advanced encryption standard (AES) for encryption, which is more secure than TKIP. It offers two modes: WPA2-Personal, which uses a pre-shared key (PSK) for authentication and is suitable for home networks, and WPA2-Enterprise, which requires a central authentication server (such as RADIUS) for user authentication. The second solution is more common in business environments. WPA2 is widely adopted and provides robust security against most attacks. However, it is not immune to vulnerabilities, such as the key reinstallation attack (KRACK), which targets the handshake process. WPA3 is the latest solution, designed to address WPA2’s limitations. It uses a stronger encryption algorithm called GCM (Galois/Counter Mode). The other main key differences include the following: the 192-256 bit encryption key, simultaneous authentication of equals (SAE), which provides stronger protection against brute-force attacks during the initial handshake, and forward secrecy, which ensures that compromising one session key does not affect others. WPA3 is recommended for enhanced security, but not all devices support it yet. While WPA2 remains a solid choice for most networks, transitioning to WPA3 as devices become compatible is advisable for better protection against emerging threats. However, it should be noted that the infrastructure based on WPA2 will likely survive for many more years. Despite the development of security mechanisms in IEEE 802.11 networks, hiding additional information in the form of implementing steganographic channels is considered a solution that increases the confidentiality of transmitted data despite limitations usually resulting from the reduced bandwidth of the covert channel.
The first element that the proposed algorithm will utilize differently from its intended purpose is the DCF. DCF provides the logic for access to the shared medium that all stations (STAs) within a given basic service set (BSS) use for communication. To contend for access, all STAs desiring to initiate the transfer of data frames or management frames invoke the carrier sense (CS) mechanism to determine whether the medium is in a busy or idle state. If the medium is busy, the STA should defer until the medium is determined to be idle, with no interruptions for a period equal to the extended inter-frame space (EIFS) if the last transmission is not received correctly or DCF inter-frame space (DIFS) otherwise. After that idle period, the STA must generate a random backoff count for additional deferral time before transmitting. If the backoff counter already contains a non-zero value, it should continue using the previously established count. The random value is an integer drawn from an inclusive interval between 0 and the contention window (CW). The CW parameter starts at CWmin and increases in a predetermined manner until it reaches CWmax or a frame is successfully transmitted.
The second and final element that the proposed algorithm will utilize differently from its intended use is the duration/ID field in the MAC frame header, as described in [
3], Section 9.2.4.2 (see
Table 1). The contents of the duration/ID field vary depending on the frame type and subtype, as well as the QoS capabilities of the sending station STA. The contents of the field are defined in three groups:
In the control frames of the subtype PS-Poll (power save polling) other than PS-Poll+BDT (bi-directional transmit opportunity) frames, and for broadcast transmissions in S1G PPDUs (sub 1 GHz physical layer protocol data units), the duration/ID field carries the association identifier (AID) of the STA that transmits the frame in the 14 least significant bits (LSBs), and the 2 most significant bits (MSBs), both set to “1”.
In all other frames sent by non-QoS STAs and other control frames sent by QoS STAs, the duration/ID field contains a duration value as defined individually for each frame type in the standard (described more in-depth below).
In data and management frames sent by QoS STAs and extension frames, the duration/ID field contains a duration value, but it is not relevant to this paper’s contents.
Within all non-QoS data frames, the ‘Duration’ field is set according to the following rules:
If the ‘Address 1’ field contains a group address, the ‘Duration’ field is set to 0.
If the ‘More Fragments’ bit is 0 in the frame control field of a frame and the ‘Address 1’ field contains an individual address, the ‘Duration’ field is set to the time, in microseconds, required to transmit one ACK frame, plus one short inter-frame Space (SIFS).
If the ‘More Fragments’ bit is 1 in the frame control field of a frame and the ‘Address 1’ field contains an individual address, the ‘Duration’ field is set to the time, in microseconds, required to transmit the next fragment of this data frame, plus two ACK frames, plus three SIFSs.
The ‘Duration’ field calculation depends on the data rate at which control frames are transmitted. If the calculated duration includes a fractional microsecond value, it is rounded up to the nearest integer. All STAs process the value of the ‘Duration’ field—as long as it fits within the range of 0–32,767—of all valid data frames (not regarding the receiver address (RA), destination address (DA), and/or basic service set identifier (BSSID) address values that might be present in these frames) to upgrade the network allocation vector (NAV) settings, depending on the coordination function rules.
Table 1.
Duration/ID field encoding (taken from [
3], page 767, Table 9-9).
Table 1.
Duration/ID field encoding (taken from [
3], page 767, Table 9-9).
Bits 0-13 | Bit 14 | Bit 15 | Usage |
---|
0–32,767 | 0 | Duration value (in microseconds) within all frames except PS-Poll frames that are not PS-Poll+BDT. |
0–16,383 | 0 | 1 | Reserved |
0 | 1 | 1 | AID 0 is used for broadcast transmission in S1G PPDU, reserved if not in S1G PPDU. |
1–2007 | 1 | 1 | AID in PS-Poll frames other than PS-Poll+BDT. |
2008–8191 | 1 | 1 | Additional AIDs in S1G PS-Poll frames other than PS-Poll+BDT. Reserved if not in S1G PS-Poll frames. |
8192–16,383 | 1 | 1 | Reserved |
4. Proposal for a StegoDCF Covert Channel
The proposed covert channel uses both the CW and the duration/ID field to send a hidden transmission of 4 bits per MAC frame. The CW approach is possible thanks to the random nature of CSMA/CA used in IEEE 802.11 networks. This method was taken with some modifications from [
4] and is used to send the first secret bit per frame (see
Figure 1). To send a “1” or a “0”, the receiving STA reads the backoff time of the sender. A backoff of an even number of slot times since the last transmission translates to a “0” in a message and an odd number of slot times translates to a “1”. What is new in the proposed mechanism is the method of determining backoff slots, depending on the number of frame retransmission attempts, which makes it resistant to stego-analysis. To modulate the backoff time and, thus, the sent data, the transmitter manipulates the number of slots. If the sender is nearing the end of their backoff period and the number of waited slots is less than expected, the sender will delay broadcasting by waiting an additional slot, unless this delay is due to a third or subsequent attempt to transmit following collisions. In that situation, the sender decrements the backoff counter to give themselves an unfair advantage in an effort to balance out the transmission delays that backoff time manipulation has caused.
The proposed algorithm used for creating a covert channel will not interfere with the regular operation of this network as the covertly transmitting STA will manipulate its random backoff value mostly against its own interests (by increasing it), thus allowing other clients to—at times—assume the preferred position in the contention queue. To avoid being infinitely delayed, the random backoff may be reduced by the covertly transmitting STA, but only after two consecutive transmission failures, to prevent placing it at too much of a disadvantage.
Our new proposed mechanism for encoding the next three bits of the message uses the three least significant bits of the duration/ID field (not counting bit 15 as it is always 0 if the field describes duration) in the MAC header of the frame, as shown in
Figure 2. They are read as-is by the receiver. This allows for increasing the efficiency of the entire mechanism by another 300%. However, it must be admitted that this mechanism has the side effect of causing a slight timing deviation in the network. The choice of the three least significant bits in the ‘Duration’ field is deliberate as the maximum timing deviation it may cause is 7
, which is less than the shortest xIFS time (SIFS) for the analyzed IEEE 802.11ax network (see
Table 2). Using 4 bits would cause it to cause deviations of up to 15
, so to reduce the risks of making the network unstable it was forgone. In
Section 5.2, we present a study on the impact of the number of duration/ID field bits on the covert channel performance.
The algorithm creating a covert channel, as proposed, will not interfere with the normal operation of the IEEE 802.11 network, because the only bits manipulated for the purpose of concealing data are the 3 least significant bits (bits 12–14, not counting bit 15 as it is always set to 0), which allows the duration to be shortened or lengthened by up to 7 , which is an insignificant amount of time in almost all IEEE 802.11 standards as it is shorter than the SIFS time. With the only exception being IEEE 802.11ad (operating at 60 GHz) with an SIFS time of 3, all other standards such as IEEE 802.11b/g/n (operating at 2.4 GHz) with a SIFS of 10 , IEEE 802.11a/n/ac/ax (operating at 5 GHz) with a SIFS of 16 , or IEEE 802.11ah (operating at 900 MHz) with a SIFS of 160 will work without issues with this scheme.
The pseudocode in Algorithms 1 and 2 illustrates how the sender encodes and transmits a message:
Algorithm 1 Encoding a message bit in CW. |
procedure EncodeBitInCW(m, d, r) if then if d is odd then if then Increment the number of slots left in the backoff else Decrement the number of slots left in the backoff end if end if else if then if d is even then if then Increment the number of slots left in the backoff else Decrement the number of slots left in the backoff end if end if end if end procedure
|
Algorithm 2 Encoding a fragment in the duration/ID field. |
procedure EncodeBitInDuration(m, d) if then ▹ zero-fill all fields with no relevant data Zero-fill the m array end if end procedure
|
8. Discussion
Unfortunately, like any protocol, the proposed covert channel also comes with certain limitations. When only one covert station is transmitting traffic without any background traffic, the throughput is determined by the frame size and offered load—smaller frame sizes help achieve higher throughput of the covert channel, but in turn, have a moderately negative impact on channel efficiency. Additionally, increasing the offered load increases the channel capacity up to a certain point, beyond which, it has an adverse effect on the network as a whole.
Table 6 summarizes the result for a single covert station, and
Table 7 collects the results for a single covert STA working when additional background STAs saturate the wireless channel.
To quote specific numbers, for a single STA, the maximum achieved throughput is 144.81 Kbps with 512 B frames and 160 Mbps of offered load, with further increases in the offered load impacting the throughput marginally while moderately decreasing efficiency—from 92.68% for 160 Mbps down to 74.14% for 200 Mbps. The decreased efficiency goes hand in hand with the increased network delays. Below 160 Mbps, the maximum measured delay is 1.33 ms, while at a 160 Mbps offered load, the delay increases to 257.57 ms. Changing the frame size to 1024 B decreases the maximum throughput to just 81.19 kbps with an offered load of 180 Mbps while keeping the efficiency at 92.37%, causing the delays to reach 398.37 ms. Similarly, further increasing the offered load does not change the throughput, while harming the network performance and latency.
Table 6 contains sample values and describes the impact of the frame size and offered load on the covert channel throughput and delay.
For a covert STA with a variable number of background STAs and variable offered background loads, both have a drastic impact on throughput and efficiency. The increase in background stations has a more significant impact on channel throughput than the total load they generate. Unlike throughput, efficiency is not as sensitive to the transmitted frame size. With a greater number of stations generating background traffic, the effectiveness of the covert channel decreases for a given offered load. While longer data frames transmitted by the covert station lead to higher efficiency, the differences are not substantial.
For example, 20 background STAs offering a combined load of 20 Mbps result in a covert channel throughput of 41.07 kbps and an efficiency of 42%. Conversely, 2 background STAs offering 80 Mbps lead to a covert throughput of 38.59 kbps and a channel efficiency of 40%. Moreover, 20 STAs providing a background load of just 80 Mbps result in half the performance of a covert channel impacted by 2 STAs generating 200 Mbps of background load. In this scenario, the 20 STAs lead the channel to have a throughput of 10.00 kbps and an efficiency of 10%, while 2 STAs achieve 20% efficiency and a covert throughput of 19.35 kbps.
Table 7 contains sample values and describes the impact of background loads and the number of background stations on covert channel throughput, jitter, and efficiency.
It is worth noting that the simulation conditions were rather more extreme than the usual real-world scenarios, especially the network load offered. Such conditions were deliberately chosen to test the operation of the covert channel under the most adverse conditions and to prove that it worked under such conditions.