Efficiently Secure Data Communications Based on CBC-RC6 and the Overflow Field of Timestamp Option in an IPv4 Packet

Wid Akeel Awadh, Ali Salah Hashim, Alaa Khalaf Hamoud

Abstract


In recent times, many researchers have directed their research efforts towards increasing the privacy and security requirements in the wireless communication networks area. The reason for this is the inappropriateness of using traditional security processes for reliable, efficient, and robust communication over networks that are not secured. Thus, this study contributes to the enhancement of security in wireless communication networks by proposing the use of steganography combined with cryptography so that secret information can be sent using IPv4 as cover to conceal secret messages, thereby, securing the messages. Steganography is described as the process of concealing secret data in a way that it cannot be traced by an intruder. Here, the intruder is unable to detect any modifications made to the original media. Meanwhile, cryptography is referred to as the process through which plain text can be converted into ciphertext to enable the transmission of data through certain channels of communication in a format that cannot be read by a normal user. Network Steganography is a mechanism that involves the use of protocols for communication that control the path of the channel via the network. Initially, the TCP/IP protocols have been a good candidate for network steganography, due to the many benefits that can be derived from its use. One of such benefits is that allows the creation of a variety of concealed channels that can be used for secret communication. In order to enable communication over the network, the use of Cryptographically Secure Pseudo-Random Number Generator (CSPRNG) is employed in the proposed system so that the encryption/decryption key can be generated. The initial step in our study involves encrypting the secret data that needs to be protected, and this is achieved through the use of the CBC-RC6 cryptographic algorithm. After the encryption has been successfully performed, a covert channel is created for the encrypted data through the use of the Overflow field of the Timestamp option of IPv4. With this method, debugging and measurement over networks is carried out using the timestamp option, and the aim of this is to build storage-based network steganography. One of the strategies used in this work to deter the possible detection of covert communication is the deployment of legal overflow data.


Full Text:

PDF

References


O. S. Faragallah, A. Afifi, W. El-Shafai, H. S. El-Sayed, M. A. Alzain, J. F. Al-Amri, et al., "Efficiently encrypting color images with few details based on RC6 and different operation modes for cybersecurity applications," IEEE Access, vol. 8, pp. 103200-103218, 2020.

H. Al-Hashimy, A. Hamoud, and F. Hussain, "The Effect of Not Using Internet of Things in Critical life Situations in the Health Field and the Effect on Iraqi Profitability: Empirical Study in Basra," Journal of Southwest Jiaotong University, vol. 54, 2019.

S.-S. Yu, N.-R. Zhou, L.-H. Gong, and Z. Nie, "Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system," Optics and Lasers in Engineering, vol. 124, p. 105816, 2020.

W. A. Awadh, A. S. Hashim, and A. Hamoud, "A Review of Various Steganography Techniques in Cloud Computing," University of Thi-Qar Journal of Science, vol. 7, pp. 113-119, 2019.

M. I. S. Reddy and A. S. Kumar, "Secured data transmission using wavelet based steganography and cryptography by using AES algorithm," Procedia Computer Science, vol. 85, pp. 62-69, 2016.

W. A. Awadh and A. S. Hashim, "Using steganography for secure data storage in cloud computing," 2017.

A. S. Saber and W. A. Awadh, "Steganography in MS Excel Document Using Unicode System Characteristics," J. Basrah Res. Sci, vol. 39, pp. 0-19, 2013.

R. K. Yadav and M. Kushwaha, "Message Hiding Using Steganography and Cryptography," 2018.

G. D. Moody, M. Siponen, and S. Pahnila, "Toward a unified model of information security policy compliance," MIS quarterly, vol. 42, 2018.

A. Acar, H. Aksu, A. S. Uluagac, and M. Conti, "A survey on homomorphic encryption schemes: Theory and implementation," ACM Computing Surveys (CSUR), vol. 51, pp. 1-35, 2018.

M. Hashim, M. S. MOHD RAHIM, and A. A. ALWAN, "A REVIEW AND OPEN ISSUES OF MULTIFARIOUS IMAGE STEGANOGRAPHY TECHNIQUES IN SPATIAL DOMAIN," Journal of Theoretical & Applied Information Technology, vol. 96, 2018.

M. S. Taha, M. S. M. Rahim, S. A. Lafta, M. M. Hashim, and H. M. Alzuabidi, "Combination of steganography and cryptography: A short survey," in IOP conference series: materials science and engineering, 2019, p. 052003.

P. Bedi and A. Dua, "Network steganography using the overflow field of timestamp option in an IPv4 packet," Procedia Computer Science, vol. 171, pp. 1810-1818, 2020.

N. Kheshaifaty and A. Gutub, "Preventing multiple accessing attacks via efficient integration of captcha crypto hash functions," Int. J. Comput. Sci. Netw. Secur.(IJCSNS), vol. 20, pp. 16-28, 2020.

A. Gutub and F. Al-Shaarani, "Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons," Arabian Journal for Science and Engineering, vol. 45, pp. 2631-2644, 2020.

M. G. Alkhudaydi and A. A. Gutub, "Integrating light-weight cryptography with diacritics Arabic text steganography improved for practical security applications," Journal of Information Security and Cybercrimes Research, vol. 3, pp. 13-30, 2020.

A. S. S. AL-Mozani and W. A. J. Awadh, "A new text steganography method by using non-printing unicode characters and unicode system characteristics in English/Arabic documents," JOURNAL OF THI-QAR SCIENCE, vol. 3, 2012.

A. E. Ali, "A new text steganography method by using non-printing unicode characters," Eng. & Tech. Journal, vol. 28, 2010.

B. Seok, J. C. S. Sicato, T. Erzhena, C. Xuan, Y. Pan, and J. H. Park, "Secure D2D communication for 5G IoT network based on lightweight cryptography," Applied Sciences, vol. 10, p. 217, 2020.

M. Wang, W. Gu, and C. Ma, "A Multimode Network Steganography for Covert Wireless Communication Based on BitTorrent," Security and Communication Networks, vol. 2020, 2020.

K. Szczypiorski, "Steganography in TCP/IP networks," in State of the Art and a Proposal of a New System–HICCUPS, Institute of Telecommunications' seminar, Warsaw University of Technology, Poland, 2003.

B. Jankowski, W. Mazurczyk, and K. Szczypiorski, "PadSteg: Introducing inter-protocol steganography," Telecommunication Systems, vol. 52, pp. 1101-1111, 2013.

M. A. Elsadig and Y. A. Fadlalla, "Survey on covert storage channel in computer network protocols: detection and mitigation techniques," International Journal of Advances in Computer Networks and Its Security, vol. 6, pp. 11-17, 2016.

R. Sun, L. Shi, C. Yin, and J. Wang, "An improved method in deep packet inspection based on regular expression," The Journal of Supercomputing, vol. 75, pp. 3317-3333, 2019.

Y. Jiang, M. Zhao, C. Hu, L. He, H. Bai, and J. Wang, "A parallel FP-growth algorithm on World Ocean Atlas data with multi-core CPU," The journal of Supercomputing, vol. 75, pp. 732-745, 2019.

S. Cabuk, C. E. Brodley, and C. Shields, "IP covert timing channels: design and detection," in Proceedings of the 11th ACM conference on Computer and communications security, 2004, pp. 178-187.

X. Zi, L. Yao, L. Pan, and J. Li, "Implementing a passive network covert timing channel," Computers & Security, vol. 29, pp. 686-696, 2010.

T. Zhu, Y. Lin, Y. Liu, W. Zhang, and J. Zhang, "Minority oversampling for imbalanced ordinal regression," Knowledge-Based Systems, vol. 166, pp. 140-155, 2019.

S. Gianvecchio, H. Wang, D. Wijesekera, and S. Jajodia, "Model-based covert timing channels: Automated modeling and evasion," in International Workshop on Recent Advances in Intrusion Detection, 2008, pp. 211-230.

G. Liu, J. Zhai, and Y. Dai, "Network covert timing channel with distribution matching," Telecommunication Systems, vol. 49, pp. 199-205, 2012.

X. Zhang, C. Liang, Q. Zhang, Y. Li, J. Zheng, and Y.-a. Tan, "Building covert timing channels by packet rearrangement over mobile networks," Information Sciences, vol. 445, pp. 66-78, 2018.

X. Zhang, L. Zhu, X. Wang, C. Zhang, H. Zhu, and Y.-a. Tan, "A packet-reordering covert channel over VoLTE voice and video traffics," Journal of Network and Computer Applications, vol. 126, pp. 29-38, 2019.

Z. Pan, X. Yi, Y. Zhang, B. Jeon, and S. Kwong, "Efficient in-loop filtering based on enhanced deep convolutional neural networks for HEVC," IEEE Transactions on Image Processing, vol. 29, pp. 5352-5366, 2020.

A. Salih, X. Ma, and E. Peytchev, "Implementation of hybrid artificial intelligence technique to detect covert channels attack in new generation internet protocol IPv6," in Leadership, Innovation and Entrepreneurship as Driving Forces of the Global Economy, ed: Springer, 2017, pp. 173-190.

J. Fridrich, "Applications of data hiding in digital images," in ISSPA'99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No. 99EX359), 1999, p. 9 vol. 1.

W. Mazurczyk, S. Wendzel, I. Azagra Villares, and K. Szczypiorski, "On importance of steganographic cost for network steganography," Security and Communication Networks, vol. 9, pp. 781-790, 2016.

O. Goni, "IMPLEMENTATION OF LOCAL AREA NETWORK (LAN) AND BUILD A SECURE LAN SYSTEM FOR ATOMIC ENERGY RESEARCH ESTABLISHMENT (AERE)," Int. J. of Electronics Engineering and Applications, vol. 9, 2021.

N. S. Tarkaa, P. I. Iannah, and I. T. Iber, "Design and simulation of local area network using cisco packet tracer," The International Journal of Engineering and Science, vol. 6, pp. 63-77, 2017.

Z. Hamid, S. Daud, I. S. A. Razak, and N. A. Razak, "A Comparative Study between IPv4 and IPv6," ANP Journal of Social Science and Humanities, vol. 2, pp. 68-72, 2021.

A. M. Bahaa-Eldin, "Tutorial II: Network Security," in 2020 15th International Conference on Computer Engineering and Systems (ICCES), 2020, pp. i-ii.

A. M. Ra’ad and F. A. Badr, "Secure Data Communications using Cryptography and IPv6 Steganography," International Journal of Engineering & Technology, vol. 8, pp. 163-168, 2019.

E. Cauich, R. G. Cárdenas, and R. Watanabe, "Data hiding in identification and offset IP fields," in International Symposium and School on Advancex Distributed Systems, 2005, pp. 118-125.

P. Bedi and A. Dua, "Network Steganography Using Extension Headers in IPv6," Singapore, 2020, pp. 98-110.

B. A. Punam, Dua, "ARPNetSteg: Network Steganography using Address Resolution Protocol," International Journal of Electronics and Telecommunications, vol. 66, 2020.

A. Mileva, Aleksandar, VelinovDone, Stojanov, "New covert channels in Internet of Things.," p. 7, 2018.

R. Donev, A. Alsadoon, P. W. C. Prasad, A. Dawoud, S. Haddad, and A. Alrubaie, "A novel secure solution of using mixed reality in data transmission for bowel and jaw surgical telepresence: enhanced rivest cipher RC6 block cipher," Multimedia Tools and Applications, vol. 80, pp. 5021-5046, 2021/02/01 2021.




DOI: https://doi.org/10.31449/inf.v46i6.4005

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.