An Analytical Survey on Covert Channels in Ad-hoc Wireless Network

Amarpreet Singh, Prof.(Dr.) Vijay Dhir

Abstract


During the past two decades people have been moving from limited access of information to ultimate access of information. To achieve ultimate access, new technology is demanded. Wired connectivity has been introduced since the beginning of computer networks, but the introduction of wireless networks creates a new era of its applications. Basically it frees the devices from hard connections such as wires and cables. Unfortunately it introduces new types of problems. Because of the nature of wireless, anyone can receive and access data as long as they are in the range of the signal. This simple feature makes the wireless system really vulnerable to some attacks. That is why a large number of researchers are interested in the field of wireless security. In this review paper, we will study about covert, techniques of covert and its applications.

Keywords


Covert, Ad-hoc wireless network, computer network, cryptography, steganography, watermarking

Full Text:

PDF


DOI: https://doi.org/10.26483/ijarcs.v8i4.3758

Refbacks

  • There are currently no refbacks.




Copyright (c) 2017 International Journal of Advanced Research in Computer Science