Secure Data Communications using Cryptography and IPv6 Steganography
DOI:
https://doi.org/10.14419/ijet.v7i4.19.27972Published:
2018-11-27Keywords:
Data Hiding, Cryptography, Steganography, Network Steganography, TCP/IP.Abstract
Security is an important topic in any communication especially if the communicating endpoints have confidential data and require utilizing special techniques to protect it. In this research paper, cryptography method was combined with steganography to enable sending confidential data by utilizing IPv6 protocol header as a cover to conceal secret messages. Flow label field is the field that will be used as a covert channel to exchange critical data between the endpoints. To generate the encryption/decryption key, a proposed pseudo-random number generator was applied. The generated numbers show good statistics when tested using standard statistical tests. In cryptography, RC6 was executed in CBC mode to encrypt/decrypt N blocks of data. For origin authentication, a proposed MAC was implemented to the encrypted data to obtain MAC value that will be sent along with the encrypted data to the receiving endpoints. After obtaining the encrypted data and the MAC, both will be embedded in IPv6 flow label field.
References
[1] P. Xue, H. Liu, J. Hu, and R. Hu, "A multi-layer steganographic method based on audio time domain segmented and network steganography," in AIP Conference Proceedings, 2018, p. 020046.
[2] P. Sharma and S. Dahiya, "Network Security with Cryptography," 2018.
[3] R. K. Yadav and M. Kushwaha, "Message Hiding Using Steganography and Cryptography," 2018.
[4] N. Singh, J. Bhardwaj, and G. Raghav, Network Steganography and its Techniques: A Survey vol. 174, 2017.
[5] E. Cauich, R. G. Cárdenas, and R. Watanabe, "Data hiding in identification and offset IP fields," in International Symposium and School on Advancex Distributed Systems, 2005, pp. 118-125.
[6] S. Zander, G. Armitage, and P. Branch, "A survey of covert channels and countermeasures in computer network protocols," IEEE Communications Surveys & Tutorials, vol. 9, pp. 44-57, 2007.
[7] T. G. Handel and M. Sandford, "Data hiding in the OSI network model," in Proceedings of Information Hiding: First International Workshop, 1996, pp. 73-93.
[8] C. H. Rowland, "Covert channels in the TCP/IP protocol suite," First Monday, vol. 2, 1997.
[9] D. Dhobale, V. Ghorpade, B. Patil, and S. Patil, "Steganography by hiding data in TCP/IP headers," in Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on, 2010, pp. V4-61-V4-65.
[10] [R. Goudar, S. Wagh, and M. Goudar, "Secure data transmission using steganography based data hiding in TCP/IP," in Proceedings of the International Conference & Workshop on Emerging Trends in Technology, 2011, pp. 974-979.
[11] M. Alaa Qasim, D. Pawar, and I. Publication, ENCRYPTION & STEGANOGRAPHY IN IPv6 SOURCE ADDRESS vol. 4, 2013.
[12] S. Bobade and R. Goudar, "Secure data communication using protocol steganography in IPv6," in Computing Communication Control and Automation (ICCUBEA), 2015 International Conference on, 2015, pp. 275-279.
[13] A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, Handbook of applied cryptography: CRC press, 1996.
[14] S.V. Manikanthan, T.Padmapriya, "United Approach in Authorized and Unauthorized Groups in LTE-A Pro", Jour of Adv Research in Dynamical & Control Systems, Vol. 10, 10-Special Issue, 2018, pp. (1137-1145).
How to Cite
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Accepted 2019-02-26
Published 2018-11-27