Advertisement

A Secure Stop and Wait Communication Protocol for Disturbed Networks

  • Varun ShuklaEmail author
  • Atul Chaturvedi
  • Neelam Srivastava
Article
  • 17 Downloads

Abstract

Secure data communication is the need of hour today specifically when the wireless communication channel is insecure. We are proposing a protocol which can be customized in variety of situations. We want to use steganography as a complementary tool for cryptography. The protocol utilizes the nature of communication protocol and it is even useful for places where data hiding and cryptography is illegal or can’t be performed because of various reasons. We are giving a name to these kinds of networks as disturbed networks. The proposed peer to peer protocol is very useful for insecure channels and disturbed networks and we provide complete analysis to validate its utility. The method is a convenient stop and wait protocol which provides unbeatable security and suitable for mobile phones as well. At the same time, for intruder’s perspective, there is no encryption involved which is a very important aspect.

Keywords

Disturbed networks Encryption Man in the middle attack (MITM) Steganography Wireless communication 

Notes

Acknowledgements

We thank copyright office, department of industrial policy and promotion under ministry of commerce and industry, government of India, for providing copyright for the paper. The registration Number is L-73429/2018 under the copyright act 1957.

References

  1. 1.
    Menezes, A., Oorschot, P., & Vanstone, S. (2001). Handbook of applied cryptography (5th ed.). Boca Raton: CRC Press Inc.zbMATHGoogle Scholar
  2. 2.
    Stallings, W. (2005). Cryptography and network security, principles and practices (4th ed.). Upper Saddle River: Prentice Hall.Google Scholar
  3. 3.
    Zadiraka, V., & Kudin, A. (2013). Cloud computing in cryptography and steganography. Cybernetics and Systems Analysis, 49(4), 584–588.CrossRefzbMATHGoogle Scholar
  4. 4.
    Szczypiorski, K. (2003). Steganography in TCP/IP networks, state of the art and proposal of a new system-HICCUPS. Retrieved from January 2018 http://krzysiek.tele.pw.edu.pl/pdf/steg-seminar-2003.pdf.
  5. 5.
    Szczypiorski, K. (2003). HICCUPS: Hidden communication system for corrupted networks. In Proceedings of the tenth international multi-conference on advanced computer systems (ACS-2003), Poland (pp. 31–40).Google Scholar
  6. 6.
    Najjar, A. (2008). The decoy: Multi-level digital multimedia steganography model. In 12th WSEAS international conference on communications, Heraklion, Greece (pp. 445–450).Google Scholar
  7. 7.
    Mazurczyk, W., & Szczypiorski, K. (2008). Steganography on VoIP streams. In OTM confederated international conferences on the move to meaningful internet systems (part of the lecture notes in computer science book series (LNCS, volume 5332)) (pp. 1001–1018).Google Scholar
  8. 8.
    Mazurczyk, W., & Lubacz, J. (2010). LACK—A VoIP steganographic method. Telecommunication Systems, 45(2–3), 153–163.CrossRefGoogle Scholar
  9. 9.
    Mazurczyk, W., Smolarczyk, M., & Szczypiorski, K. (2011). Retransmission steganography and its detection. Soft Computing, 15(3), 505–515.CrossRefGoogle Scholar
  10. 10.
    Fraczek, W., Mazurczyk, W., & Szczypiorski, K. (2010). Stream control transmission protocol steganography. In Second international workshop on network steganography (IWNS 2010) co-located with the 2010 international conference on multimedia information networking and security (MINES 2010), Nanjing, China (pp. 829–834).Google Scholar
  11. 11.
    Mazurczyk, W., Szaga, P., & Szczypiorski, K. (2011). Using transcoding for hidden communication in IP telephony. In Computing research repository (CORR), abs/1111.1250, arXiv.org E-print Achieve. Ithaca: Cornell University (pp. 1–17).Google Scholar
  12. 12.
    Lubacz, J., Mazurczyk, W., & Szczypiorski, K. (2014). Principles and overview of network steganography. IEEE Communications Magazine, 52(5), 225–229.CrossRefGoogle Scholar
  13. 13.
    Sekhar, A., Kumar, M., & Rahiman, M. (2015). A novel approach for hiding data in videos using network steganography methods. In 4th international conference on eco friendly computing and communication systems. Procedia Computer Science. Amsterdam: Elsevier (vol. 70, pp. 764–768).Google Scholar
  14. 14.
    Jankowski, B., Mazurczyk, W., & Szczypiorski, K. (2015). Padsteg: Introducing inter-protocol steganography. Telecommunication Systems, 58(1–2), 1–9.Google Scholar
  15. 15.
    Attaby, A., Ahmed, M., & Alsammak, A. (2017). Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Engineering Journal, 9, 1–10.Google Scholar
  16. 16.
    Jain, M., Kumar, A., & Choudhary, R. (2017). Improved diagonal medical image steganography using chaos theory, LFSR, and rabin cryptosystem. Brain Informatics, 4(2), 95–106.CrossRefGoogle Scholar
  17. 17.
    Denemark, T., & Fridrich, J. (2017). Steganography with multiple JPEG images of the same scene. IEEE Transactions on Information Forensics and Security, 12(10), 1–13.CrossRefGoogle Scholar
  18. 18.
    Li, J., & Zhao, Y. (2009). Resequencing analysis of stop-and-wait ARQ for parallel multichannel communications. IEEE/ACM Transactions on Networking, 17(3), 817–830.CrossRefGoogle Scholar
  19. 19.
    Saper, N. (2013). International cryptography regulation and the global information economy. Northwestern Journal of Technology and Intellectual Property, 11(7), 673–688.Google Scholar
  20. 20.
    Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.MathSciNetCrossRefzbMATHGoogle Scholar
  21. 21.
    Lin, J., Feng, K., Huang, Y., & Wang, L. (2013). Novel design and analysis of aggregated ARQ protocols for IEEE 802.11n networks. IEEE Transactions on Mobile Computing, 12(3), 556–570.CrossRefGoogle Scholar
  22. 22.
    Schneier, B. (1993). Schneier on security, The Blowfish encryption algorithm. Retrieved on January 2018, from https://www.schneier.com/academic/blowfish/.
  23. 23.
    Schneier, B. (2007). Applied cryptography: Protocols, algorithms, and source code in C (2nd ed.). New York: Wiley.zbMATHGoogle Scholar
  24. 24.
    Mirzadeh, S., Cruickshank, H., & Tafazolli, R. (2014). Secure device pairing: A survey. IEEE Communications Surveys and Tutorials, 16(1), 17–40.CrossRefGoogle Scholar
  25. 25.
    Zhao, Z., Dong, Z., & Wang, Y. (2006). Security analysis of a password-based authentication protocol proposed to IEEE 1363. Theoretical Computer Science, 352(1–3), 280–287.MathSciNetCrossRefzbMATHGoogle Scholar
  26. 26.
    Burr, W. (2003). Selecting the advanced encryption standard. IEEE Security and Privacy, 99(2), 43–52.CrossRefGoogle Scholar
  27. 27.
    Zhang, X., & Parhi, K. (2002). Implementation approaches for the advanced encryption standard algorithm. IEEE Circuits and Systems Magazine, 2(4), 24–46.CrossRefGoogle Scholar
  28. 28.
    Subramanya, A. (2001). Image compression technique. IEEE Potentials, 20(1), 19–23.CrossRefGoogle Scholar
  29. 29.
    Martin, M., & Bell, A. (2001). New image compression techniques using multiwavelets and multiwavelet packets. IEEE Transactions on Image Processing, 10(4), 500–510.CrossRefzbMATHGoogle Scholar
  30. 30.
    Bahadili, H. (2008). A novel loseless data compression scheme based on the error correcting hamming codes. Computers and Mathematics with Application, 56, 143–150.CrossRefzbMATHGoogle Scholar
  31. 31.
    Siddeq, M., & Rodrigues, M. (2014). A novel image compression algorithm for high resolution 3D reconstruction. 3D Research, 5(7), 1–17.Google Scholar
  32. 32.
    Callegati, F., Cerroni, W., & Ramilli, M. (2009). Man-in-the-middle attack to the HTTPS protocol. IEEE Security and Privacy, 7(1), 78–81.CrossRefGoogle Scholar
  33. 33.
    Conti, M., Dragoni, N., & Lesyk, V. (2016). A survey of man in the middle attacks. IEEE Communications Surveys and Tutorials, 18(3), 2027–2051.CrossRefGoogle Scholar
  34. 34.
    Wang, L. (2016). Detection of man-in-the-middle attacks using physical layer wireless security techniques. Wireless Communications & Mobile Computing, 16(4), 408–426.CrossRefGoogle Scholar
  35. 35.
    Rossi, M., & Zorzi, M. (2003). Analysis and heuristics for the characterization of selective repeat ARQ delay statistics over wireless channels. IEEE Transactions on Vehicular Technology, 52(5), 1365–1377.CrossRefGoogle Scholar
  36. 36.
    Ikegawa, T., & Takahashi, Y. (2007). Sliding window protocol with selective-repeat ARQ: Performance modeling and analysis. Telecommunication Systems, 34(3–4), 167–180.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Varun Shukla
    • 1
    Email author
  • Atul Chaturvedi
    • 2
  • Neelam Srivastava
    • 3
  1. 1.Department of Electronics and CommunicationPSITKanpurIndia
  2. 2.Department of MathematicsPSITKanpurIndia
  3. 3.Department of Electronics and CommunicationRECKannaujIndia

Personalised recommendations