A Secure Stop and Wait Communication Protocol for Disturbed Networks
- 17 Downloads
Secure data communication is the need of hour today specifically when the wireless communication channel is insecure. We are proposing a protocol which can be customized in variety of situations. We want to use steganography as a complementary tool for cryptography. The protocol utilizes the nature of communication protocol and it is even useful for places where data hiding and cryptography is illegal or can’t be performed because of various reasons. We are giving a name to these kinds of networks as disturbed networks. The proposed peer to peer protocol is very useful for insecure channels and disturbed networks and we provide complete analysis to validate its utility. The method is a convenient stop and wait protocol which provides unbeatable security and suitable for mobile phones as well. At the same time, for intruder’s perspective, there is no encryption involved which is a very important aspect.
KeywordsDisturbed networks Encryption Man in the middle attack (MITM) Steganography Wireless communication
We thank copyright office, department of industrial policy and promotion under ministry of commerce and industry, government of India, for providing copyright for the paper. The registration Number is L-73429/2018 under the copyright act 1957.
- 2.Stallings, W. (2005). Cryptography and network security, principles and practices (4th ed.). Upper Saddle River: Prentice Hall.Google Scholar
- 4.Szczypiorski, K. (2003). Steganography in TCP/IP networks, state of the art and proposal of a new system-HICCUPS. Retrieved from January 2018 http://krzysiek.tele.pw.edu.pl/pdf/steg-seminar-2003.pdf.
- 5.Szczypiorski, K. (2003). HICCUPS: Hidden communication system for corrupted networks. In Proceedings of the tenth international multi-conference on advanced computer systems (ACS-2003), Poland (pp. 31–40).Google Scholar
- 6.Najjar, A. (2008). The decoy: Multi-level digital multimedia steganography model. In 12th WSEAS international conference on communications, Heraklion, Greece (pp. 445–450).Google Scholar
- 7.Mazurczyk, W., & Szczypiorski, K. (2008). Steganography on VoIP streams. In OTM confederated international conferences on the move to meaningful internet systems (part of the lecture notes in computer science book series (LNCS, volume 5332)) (pp. 1001–1018).Google Scholar
- 10.Fraczek, W., Mazurczyk, W., & Szczypiorski, K. (2010). Stream control transmission protocol steganography. In Second international workshop on network steganography (IWNS 2010) co-located with the 2010 international conference on multimedia information networking and security (MINES 2010), Nanjing, China (pp. 829–834).Google Scholar
- 11.Mazurczyk, W., Szaga, P., & Szczypiorski, K. (2011). Using transcoding for hidden communication in IP telephony. In Computing research repository (CORR), abs/1111.1250, arXiv.org E-print Achieve. Ithaca: Cornell University (pp. 1–17).Google Scholar
- 13.Sekhar, A., Kumar, M., & Rahiman, M. (2015). A novel approach for hiding data in videos using network steganography methods. In 4th international conference on eco friendly computing and communication systems. Procedia Computer Science. Amsterdam: Elsevier (vol. 70, pp. 764–768).Google Scholar
- 14.Jankowski, B., Mazurczyk, W., & Szczypiorski, K. (2015). Padsteg: Introducing inter-protocol steganography. Telecommunication Systems, 58(1–2), 1–9.Google Scholar
- 15.Attaby, A., Ahmed, M., & Alsammak, A. (2017). Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Engineering Journal, 9, 1–10.Google Scholar
- 19.Saper, N. (2013). International cryptography regulation and the global information economy. Northwestern Journal of Technology and Intellectual Property, 11(7), 673–688.Google Scholar
- 22.Schneier, B. (1993). Schneier on security, The Blowfish encryption algorithm. Retrieved on January 2018, from https://www.schneier.com/academic/blowfish/.
- 31.Siddeq, M., & Rodrigues, M. (2014). A novel image compression algorithm for high resolution 3D reconstruction. 3D Research, 5(7), 1–17.Google Scholar