A network steganographic approach to overlay cognitive radio systems utilizing systematic coding

被引:2
作者
Ghane, Amir Hossein [1 ]
Harsini, Jalil Seifali [1 ]
机构
[1] Univ Guilan, Dept Elect Engn, Rasht 4199613769, Iran
关键词
Overlay cognitive radio network; Systematic coding; Covert communication; Network steganography; INFORMATION;
D O I
10.1016/j.phycom.2018.01.008
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network steganography is an information hiding technique that utilizes network protocols to facilitate hidden communication. The aim is to embed secret information bits into regular network traffic (as a carrier) so that confidential data can be transmitted covertly between two communicating parties. In this paper, the concept of network steganography is extended for overlay cognitive radio networks utilizing cooperative relaying protocols with systematic channel codes. In the considered model, the cognitive node relays the primary data according to a time-slotted decode-and-forward cooperative protocol with maximum-ratio combining (MRC) at the primary destination. We propose a steganographic approach in which the cognitive node embeds confidential cognitive data at the wavelet transform domain into primary data code words. In this approach, the embedding operation is designed to preserve the statistical properties of the cover data in terms of decoded BER after MRC decoding of code words at the destination node which includes both the effect of wireless channel errors and errors due to embedding distortion. From this point of view, the proposed scheme may be seen as a lossless steganography scheme that embeds secret data into coded data strings. We provided implementation examples using both systematic BCH and turbo channel coding. The results show that the proposed scheme can provide diversity gain using stego-based MRC at the primary receiver and covert confidential cognitive data communications simultaneously. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:63 / 73
页数:11
相关论文
共 25 条
[1]   Walsh-Hadamard-Based 3-D Steganography for Protecting Sensitive Information in Point-of-Care [J].
Abuadbba, Alsharif ;
Khalil, Ibrahim .
IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, 2017, 64 (09) :2186-2195
[2]   Robust privacy preservation and authenticity of the collected data in cognitive radio network-Walsh-Hadamard based steganographic approach [J].
Abuadbba, Alsharif ;
Khalil, Ibrahim ;
Atiquzzaman, Mohammed .
PERVASIVE AND MOBILE COMPUTING, 2015, 22 :58-70
[3]  
[Anonymous], FCC FREQ ALL CHART
[4]  
[Anonymous], IEEE J SEL AREAS COM
[5]  
Bodik P., 2004, SENSOR DATASET
[6]   Reversible steganography for VQ-compressed images using side matching and relocation [J].
Chang, Chin-Chen ;
Lin, Chih-Yang .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (04) :493-501
[7]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[8]   A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks [J].
Fragkiadakis, Alexandros G. ;
Tragos, Elias Z. ;
Askoxylakis, Ioannis G. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01) :428-445
[9]   Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective [J].
Goldsmith, Andrea ;
Jafar, Syed Ali ;
Maric, Ivana ;
Srinivasa, Sudhir .
PROCEEDINGS OF THE IEEE, 2009, 97 (05) :894-914
[10]   Transmission Strategy Design in Cognitive Radio Systems With Primary ARQ Control and QoS Provisioning [J].
Harsini, Jalil Seifali ;
Zorzi, Michele .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2014, 62 (06) :1790-1802