An Analytical Survey on Covert Channels in Ad-hoc Wireless Network

Amarpreet Singh, Prof.(Dr.) Vijay Dhir


During the past two decades people have been moving from limited access of information to ultimate access of information. To achieve ultimate access, new technology is demanded. Wired connectivity has been introduced since the beginning of computer networks, but the introduction of wireless networks creates a new era of its applications. Basically it frees the devices from hard connections such as wires and cables. Unfortunately it introduces new types of problems. Because of the nature of wireless, anyone can receive and access data as long as they are in the range of the signal. This simple feature makes the wireless system really vulnerable to some attacks. That is why a large number of researchers are interested in the field of wireless security. In this review paper, we will study about covert, techniques of covert and its applications.


Covert, Ad-hoc wireless network, computer network, cryptography, steganography, watermarking

Full Text:




  • There are currently no refbacks.

Copyright (c) 2017 International Journal of Advanced Research in Computer Science