CFP last date
20 May 2024
Reseach Article

Survey and Design Approach of Protocol Steganography in IPv6

by Sandip Bobade, R. M. Goudar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 7
Year of Publication: 2013
Authors: Sandip Bobade, R. M. Goudar
10.5120/11856-7623

Sandip Bobade, R. M. Goudar . Survey and Design Approach of Protocol Steganography in IPv6. International Journal of Computer Applications. 69, 7 ( May 2013), 31-34. DOI=10.5120/11856-7623

@article{ 10.5120/11856-7623,
author = { Sandip Bobade, R. M. Goudar },
title = { Survey and Design Approach of Protocol Steganography in IPv6 },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 7 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 31-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number7/11856-7623/ },
doi = { 10.5120/11856-7623 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:29:36.633545+05:30
%A Sandip Bobade
%A R. M. Goudar
%T Survey and Design Approach of Protocol Steganography in IPv6
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 7
%P 31-34
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the process of hiding message in another cover medium such that it is difficult to detect. Cover medium is used as a carrier. this carrier can be Image,video, text or IP packet. Covert Channel is implemented in different header Fields of IPv4 header to send secrete message. A covert channel is the medium that is used to transmit the information such as message, image or file. The fields flow label, traffic class and IPV6 source address of IPV6 header are selected as covert channel in this project. The more se- curity in IPV6 header steganography can be achieved by apply- ing cryptography ie Encryption. Public key algorithm i. e. RSA is selected for cryptography. Message is at first encrypted using RSA algorithm. The ciphertext is embedded in selected fields. The- ses covert channels could be used for a Exploiting the Security rules so hidden Communication can be possible. this can be used for purpose such as pinching encryption key,login information or other secrets from in a way that should not easily detectable, but it could also be used for a good reason such as secret message can be passed under the watchful eyes of passive attacker. The demonstration of covert channel increases information security.

References
  1. Rowland, C. (1997). Covert channels in the TCP/IP protocol suite, first Monday. Peer viewed Journal on the Internet, July 1997.
  2. Zander, S. , Armitage, G Branch, P. (2007). A survey of covert channels and untermeasures in computer network protocols. IEEE Communications Surveys Tutorials
  3. Petitcolas, F. , Anderson, R. , Kuhn, M. (1999). Information hidinga survey. IEEE Special Issue on Protection of Multime- dia Content, July 1999.
  4. S. J. Murdoch and S. Lewis, "Embedding covert channels into TCP/IP," in 7th Information Hiding Workshop, June 2005.
  5. Request for Comments: 6437 IPv6 Flow Label Specification
  6. S. Deering, R. Hinden, RFC::2460,Internet Protocol, Version 6 (IPv6) Specification.
  7. Neil Johnson, Stefan Katzenbeisser, A survey of stegano- graphic techniques, Information hiding techniques for informa- tion hiding and digital steganography.
  8. K. Ahsan and D. Kundur, "Practical Data Hiding in TCP/IP," in Proceedings of the Multimedia and Security Workshop at ACMMultimedia, Dec. 2002.
  9. Wojciech Mazurczyk, Miosz Smolarczyk Retransmission steganography applied 2010 International Conference on Multimedia Information Networking and Security
  10. Wojciech Mazurczyk,Krzysztof Szczypiorski, Evaluation of steganographic methods for oversized IP packets Telecommu- nication Systems,2012
  11. Miller, Steganography in IPv6 If Eva determine what Alice sent. Then all probabilities are 0 or 1
  12. Thomas Narten, Neighbor discovery and stateless auto recon- figuration in IPv6 IEEE, 1999.
  13. Mohit Wadhwa, Manju Khari, Velnurability of IPv6 Type 0 routing header and its prevention algorithm International journel of advanced engineering science and technologies, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

IPv6 Covert Channel Steganography