TY - JOUR
T1 - Detecting Wireless Steganography with Wavelet Analysis
AU - Jang, Wonwoo
AU - Lee, Wonjun
N1 - Funding Information:
Manuscript received September 11, 2020; accepted October 13, 2020. Date of publication October 19, 2020; date of current version February 9, 2021. This work was supported by the NRF of Korea grant funded by the Korea Government (MSIT) under Grant 2019R1A2C2088812. The associate editor coordinating the review of this article and approving it for publication was C. Huang. (Corresponding author: Wonjun Lee.) The authors are with the Network and Security Research Lab, School of Cybersecurity, Korea University, Seoul 02841, South Korea (e-mail: wlee@korea.ac.kr). Digital Object Identifier 10.1109/LWC.2020.3032032 Fig. 1. An example of the wireless intrusion detection system with the proposed scheme.
Publisher Copyright:
© 2012 IEEE.
PY - 2021/2
Y1 - 2021/2
N2 - In wireless communications, information is transmitted through a modulated waveform according to the associated modulation technique. However, there has been growing research to transmit information covertly by modulating waveforms further while pretending to be a normal transmission. Modulation-based wireless steganography techniques cause malicious information leakage without being aware of it by nearby devices. In this letter, we propose a detection scheme based on wavelet analysis with various well-known wavelets (e.g., Haar, Morlet, Shannon) to distinguish effectively between the primary channel and a channel created from the modulation-based technique. Practical experiments show that the proposed scheme can detect the modulation-based techniques at least with 93.25% accuracy under most circumstances.
AB - In wireless communications, information is transmitted through a modulated waveform according to the associated modulation technique. However, there has been growing research to transmit information covertly by modulating waveforms further while pretending to be a normal transmission. Modulation-based wireless steganography techniques cause malicious information leakage without being aware of it by nearby devices. In this letter, we propose a detection scheme based on wavelet analysis with various well-known wavelets (e.g., Haar, Morlet, Shannon) to distinguish effectively between the primary channel and a channel created from the modulation-based technique. Practical experiments show that the proposed scheme can detect the modulation-based techniques at least with 93.25% accuracy under most circumstances.
KW - Wireless communications
KW - physical layer security
KW - steganography
KW - wavelet analysis
UR - http://www.scopus.com/inward/record.url?scp=85101445111&partnerID=8YFLogxK
U2 - 10.1109/LWC.2020.3032032
DO - 10.1109/LWC.2020.3032032
M3 - Article
AN - SCOPUS:85101445111
SN - 2162-2337
VL - 10
SP - 383
EP - 386
JO - IEEE Wireless Communications Letters
JF - IEEE Wireless Communications Letters
IS - 2
M1 - 9229168
ER -