{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:38:30Z","timestamp":1762004310069},"reference-count":17,"publisher":"Wiley","issue":"2","license":[{"start":{"date-parts":[[2011,3,29]],"date-time":"2011-03-29T00:00:00Z","timestamp":1301356800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2016,1,25]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This paper presents a new steganographic method called wireless padding (WiPad). It is based on the insertion of hidden data into the padding of frames at the physical layer of wireless local area networks (WLANs). A performance analysis based on a Markov model, previously introduced and validated by the authors, is provided for the method in relation to the IEEE 802.11 a\/g standards. Its results prove that maximum steganographic bandwidth for WiPad is as high as 1.1\u2009Mbit\/s for data frames and 0.44\u2009Mbit\/s for acknowledgment frames. To the authors' best knowledge this is the most capacious of all the known steganographic network channels. Copyright \u00a9 2011 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.306","type":"journal-article","created":{"date-parts":[[2011,3,29]],"date-time":"2011-03-29T07:52:23Z","timestamp":1301385143000},"page":"118-129","source":"Crossref","is-referenced-by-count":28,"title":["Steganography in IEEE 802.11 OFDM symbols"],"prefix":"10.1002","volume":"9","author":[{"given":"Krzysztof","family":"Szczypiorski","sequence":"first","affiliation":[]},{"given":"Wojciech","family":"Mazurczyk","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2011,3,29]]},"reference":[{"key":"e_1_2_7_2_2","unstructured":"BBC News.FBI allegations against \u2018Russian spies\u2019in US.http:\/\/www.bbc.co.uk\/news\/10442869[29 June 2010]."},{"key":"e_1_2_7_3_2","unstructured":"SzczypiorskiK LubaczJ.Performance Evaluation of IEEE 802.11 DCF Networks. In20th International Teleraffic Congress (ITC\u201020) Ottawa Canada June 2007; Lecture Notes in Computer Science (LNCS) 4516 Springer\u2010Verlag Berlin Heidelberg 2007;1082\u20131093."},{"key":"e_1_2_7_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/49.840210"},{"key":"e_1_2_7_5_2","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.358"},{"key":"e_1_2_7_6_2","doi-asserted-by":"crossref","unstructured":"WolfM.Covert Channels in LAN Protocols. InProceedings of the Workshop of Local Area Network Security (LANSEC) 1989;91\u2013101.","DOI":"10.1007\/3-540-51754-5_33"},{"key":"e_1_2_7_7_2","doi-asserted-by":"crossref","unstructured":"G Fisk M Fisk C Papadopoulos J. Neil 2003 Springer\u2010Verlag Heidelberg Germany 18 35","DOI":"10.1007\/3-540-36415-3_2"},{"key":"e_1_2_7_8_2","doi-asserted-by":"crossref","unstructured":"JankowskiB MazurczykW SzczypiorskiK.Information hiding using improper frame padding. InProceedings of the 14th International Telecommunications Network Strategy and Planning Symposium \u2013 Networks 2010 September 2010 Warsaw Poland.","DOI":"10.1109\/NETWKS.2010.5624901"},{"key":"e_1_2_7_9_2","doi-asserted-by":"crossref","unstructured":"LucenaNB LewandowskiG ChapinSJ.Covert channels in IPv6. InProceedings of the Privacy Enhancing Technologies (PET) May 2005;147\u2013166.","DOI":"10.1007\/11767831_10"},{"key":"e_1_2_7_10_2","unstructured":"SzczypiorskiK.HICCUPS: hidden communication system for coruppted networks. InProceedings of the Tenth International Multi\u2010Conference on Advanced Computer Systems ACS'2003.Miedzyzdroje October 2003; 31\u201340."},{"key":"e_1_2_7_11_2","doi-asserted-by":"crossref","unstructured":"SzczypiorskiK.A performance analysis of HICCUPS \u2013 a steganographic system for WLAN. InProceedings of the 2009 International Conference on Multimedia Information NEtworking and Security (MINES 2009) \u2013 First International Workshop on Network Steganography (IWNS'09) Vol. I Wuhan Hubei China November 2009; 569\u2013572.","DOI":"10.1109\/MINES.2009.248"},{"key":"e_1_2_7_12_2","doi-asserted-by":"crossref","unstructured":"Kr\u00e4tzerC DittmannJ LangA KuhneT.WLAN steganography: a first practical review. InProceedings of the 8th ACM Multimedia and Security Workshop. Geneve (Switzerland) September 2006.","DOI":"10.1145\/1161366.1161371"},{"key":"e_1_2_7_13_2","doi-asserted-by":"crossref","unstructured":"Kr\u00e4tzerC DittmannJ MerkelR.WLAN steganography revisited. InProceedings of the SPIE Electronic Imaging 2008 San Jose CA 2008.","DOI":"10.1117\/12.764557"},{"key":"e_1_2_7_14_2","unstructured":"IEEE 802.11 2007 Edition IEEE Standard for Information Technology \u2013 Telecommunications and Information Exchange between Systems \u2013 Local and Metropolitan Area Network \u2013 Specific Requirements \u2013 Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (2007)."},{"key":"e_1_2_7_15_2","unstructured":"KochutA VasanA ShankarA AgrawalaA.Sniffing out the correct physical layer capture model in 802.11b. InProceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004) Berlin2004."},{"key":"e_1_2_7_16_2","doi-asserted-by":"crossref","unstructured":"JohnW TafvelinS.Analysis of Internet backbone traffic and header anomalies observed. InProceedings of the Internet Measurement Conference IMC'07 San Diego CA August 2007.","DOI":"10.1145\/1298306.1298321"},{"key":"e_1_2_7_17_2","volume-title":"Internet Packet Size Distributions: Some Observations","author":"Sinha R"},{"key":"e_1_2_7_18_2","doi-asserted-by":"crossref","unstructured":"OdorM BabakN SalmanianM MasonP MartinM LiscanoR.A frame handler module for a side\u2010channel in mobile ad hoc networks. InProceedings of the 5th LCN Workshop on Security in Communications Networks (SICK 2009) Z\u00fcrich2009;930\u2013936.","DOI":"10.1109\/LCN.2009.5355042"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.306","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T04:09:47Z","timestamp":1696478987000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.306"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,29]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,1,25]]}},"alternative-id":["10.1002\/sec.306"],"URL":"https:\/\/doi.org\/10.1002\/sec.306","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,3,29]]}}}