Cost and Efficiency Analysis of Steganography in the IEEE 802.11ah IoT Protocol

2022-08-24 07:03AkramAlmohammediVladimirShepelevSamDarshiMohammedBalfaqihandFayadGhawbar
Computers Materials&Continua 2022年8期

Akram A.Almohammedi,Vladimir Shepelev,Sam Darshi,Mohammed Balfaqih and Fayad Ghawbar

1Automobile Transportation Department,South Ural State University,Chelyabinsk,454080,Russia

2Electrical and Electronics Engineering Department Karabük University,Karabük,78050,Turkey

3Department of Electrical Engineering,Indian Institute of Technology Ropar,Punjab,140001,India

4Department of Computer and Network Engineering,University of Jeddah,Jeddah,23218,Saudi Arabia

5Faculty of Engineering Technology,University Tun Hussein Onn Malaysia,Pagoh Campus,86400,Malaysia

Abstract: The widespread use of the Internet of Things(IoT)applications has enormously increased the danger level of data leakage and theft in IoT as data transmission occurs through a public channel.As a result,the security of the IoT has become a serious challenge in the field of information security.Steganography on the network is a critical tool for preventing the leakage of private information and enabling secure and encrypted communication.The primary purpose of steganography is to conceal sensitive information in any form of media such as audio,video,text,or photos,and securely transfer it through wireless networks.In this paper,we analyse the performance characteristics of one of the steganography techniques called Hidden Communication System for Corrupted Networks(HCCNETs)for hiding sensitive data.This performance analysis includes the efficiency and the cost of the system in Wireless Local Area Networks(WLANs),specifically in the IEEE 802.11ah IoT protocol.The analysis is mainly based on a two-dimensional Markov chain model in the presence of an error channel.Additionally,the model considers packet arrival rate,back-off timer freezing,back-off stages,and short retry limit to ensure compliance with IEEE 802.11ah requirements.It stresses the importance of taking these elements into consideration while modeling the efficiency and cost of the steganographic channel system.These parameters often result in a high precise channel access estimation,a more accurate and efficient accuracy measurements system,efficient channel utilisation,avoidance of throughput saturation overestimation,and ensuring that no packet is served endlessly.Evaluated results demonstrate that HCCNETs is an effective approach at low cost.

Keywords: IoT;HCCNETs;steganography;markov chain model

1 Introduction

Nowadays,Internet of Things (IoT) technologies are widely used in a variety of applications such as healthcare,industrial control,identification technology,ubiquitous computing and military investigation,etc[1,2].The IoT architecture broadly contains three elements:cloud,device terminal,and mobile terminal.By establishing a link between a mobile terminal and the cloud,an instruction is given to a device terminal via the cloud,resulting in the realisation of the connectivity between entities and the network[3].Thereby,high-performance servers are often expected continue providing public-service computing[3],which is a costly proposition.Meanwhile,to properly manage network congestion in the IoT,emergency packets are employed and upgraded [4-6].Due to the presence of many cloud platforms and terminal devices,there will be a large amount of service quality data,which may lead to sensitive information leakage [7].Furthermore,because IoT devices,such as video surveillance,car localisation,smart bracelets,and other similar devices,are so near to users’lives,the majority of the data is related to user privacy.Sensitive data is likely more prone to exposure and monitoring than non-sensitive data.So,data protection is a big issue for many people[8-10],and the privacy-preserving challenges posed by IoT systems are serious problems that must be addressed.Information concealing methods can be used to protect communication between a machine and the server or application programmes,in addition to encrypting the transmitted message.Secret communication is desperately required in order to ensure the privacy or crucial data protection while also resisting the possibility of being disclosure.The term “steganography scheme” refers to a secret communication manner in which confidential data is invisibly integrated into a carrier and then broadcast publicly.It is possible to generate the secret carrier known as stego by concealing confidential information in the common communication medium such as images,text,video,and audio,etc.It is difficult to detect anomalies by the monitoring device in the stego transmission process,so that confidential information can be delivered secretly.As a result,researchers are using steganography techniques to the IoT in an effort to protect communications.In [11],the authors developed a novel approach for securing data in fog cloud IoT.Within the architecture,a user embeds important data in one area using the suggested quantum steganography protocol and uploads the covered data to the fog cloud.The intended receiver,located at a different location,retrieves the data in the fog cloud and extracts the desired content using the suggested extraction technique.Additionally,the authors provide a unique quantum steganography technique based on the hash function and quantum entangled states.The authors in[1]proposed a unique steganography method based on image-to-image translation by incorporating a steganography and steganalysis module into CycleGAN,which is suited for the secret communication and privacy preservation requirements of the Internet of Things.The purpose of the steganalysis network is to enhance the stego image’s antidetection capability.Additionally,CycleGAN’s cycle consistency ensures the resulting image’s quality.

The authors in[12]proposed a steganography approach for IEEE 802.11 via using intentionally corrupted checksums frames to set up hidden communications.However,the authors in[12]assumed saturated condition and such assumption leads to unstable network.The steganography in IEEE 802.11 OFDM symbols was analysed in [13,14].The authors in [13,14]proposed a model based on 2-D Markov chain to analyse the network throughput of steganographic method of IEEE 802.11 a/g standards within a non-ideal channel.Nevertheless,the authors in [13,14]considered saturated situations and analysed it within basic access method.In [15],the authors presented and described the elliptic Galois cryptography scheme.A cryptography approach was employed in this study to secure private data obtained from a variety of medical sources.Following that the encrypted data was embedded into a low complexity picture using a Matrix XOR encoding steganography approach.Additionally,the suggested work in [15]used an optimization approach called Adaptive Firefly to improve the image’s cover block selection.In[16],the authors described a method for concealing secret messages by mapping numerous steganographic methods to complicated texture objects.To begin,complicated texture patches are chosen using an object recognition technique.Second,three distinct steganographic techniques were utilised to conceal a hidden message inside the block area chosen.The authors in [17]developed a novel approach for detecting steganography in network protocols.The technique was developed using machine learning algorithms and was based on a multilayer approach for the selective examination of derived and aggregated metrics.The primary purpose was to enable steganalysis on networks with a high density of devices and connections.The authors in[18]introduced a large-capacity secure authenticated quantum video steganography scheme.This approach allows for the embedding of secret quantum information into carrier quantum video,significantly increasing the embedding capacity.Additionally,it accomplishes quantum information steganography via the use of video’s unique properties,as well as an authentication system for increased security.In [19],the authors presented CloudSteg,a steganographic technique that establishes a covert channel between two cloud instances that share a physical computer through hard disc contention.In[20],the authors offered a coverless information concealing approach in which original pictures with traits capable of expressing hidden information are employed directly as stegoimages.Additionally,the authors developed a revolutionary coverless information concealment technique for images utilising Faster Region-based Convolutional Neural Networks (Faster-RCNN).The authors used Faster-RCNN to recognise and locate objects in pictures and to convey hidden information through the labels of these things.The authors of [21]also employed deep neural network to conceal numerous speech signals under a single cover using multiple decoders or a single conditional decoder.Three distinct networks were used in[21].The encoder network takes as inputs a carrier and a message and creates a combined latent network for both signals.This is subsequently passed via a carrier decoder network,which outputs the carrier embedded with the message.Finally,the message decoder network reconstructs the concealed message signal from the embedded signal.They discovered that the decoded signals are indistinguishable,however this approach has the disadvantage of not operating in other audio domains outside speech.

The work presented in this paper focuses on one of steganography techniques,called the Hidden Communication System for Corrupted Networks (HCCNETs) for hidden sensitive data.The significance of HCCNETs lies on the use of a protected communications network equipped with cryptographic techniques to offer a steganography system and suggestion of new protocol with bandwidth allocation on the basis of corrupted frames.The system’s primary innovation is the use of frames with intentionally erroneous checksums to create concealed communication.This study is an extension of the existing study in[12],by adding an idle state to the model to reflect the empty queue at the MAC layer when no packet is available for transmission.The important contributions of this work are as follows:1)An analytical model based on a two-dimensional Markov chain under unsaturated situations is developed.The primary advantages of using unsaturated circumstances in this model are that(i)real networks are predominantly non-saturated,(ii)saturated circumstances often result in an unstable network,and(iii)it allows for the consideration of inter-arriving time and burstiness in the network[22,23].2)An error-prone channel is modelled in this work in order to avoid overestimating saturated throughputs.The model also considers packet arrival rate,back-off counter freezing,backoff stages,and short retry limit to ensure compliance with IEEE 802.11ah IoT protocol requirements.It stresses the importance of taking these elements into consideration while modeling the efficiency and cost of the steganographic channel system.These parameters often result in a high precise channel access estimation,a more accurate and efficient accuracy measurements system,efficient channel utilisation,and ensuring that no packet is served endlessly.3)Derivation of transmission probability,successful transmission probability,and collision probability is performed to express and compute the performance characteristics of the HICCUPS,such as the system’s throughput,efficiency and cost of WLAN usage in the network.The system usage cost (κ) is defined as the reduction of WLAN throughput caused by HICCUPS functioning in corrupted frame mode.The efficiency of a system(ε)is described as the throughput of the system in corrupt frame state.

The rest of the paper is arranged as follows:Section 2 presents the model analysis including the frame transmission probability in the corrupted frame mode as well as the data transmission time analysis.Section 3 describes the cost analysisκ.Section 4 discusses efficiency analysisε.Section 5 concludes the paper.

2 The Model

In this section,the medium access procedure for nodes is formulated using two-dimension Markov Chain,then the system’s throughput,efficiency and cost of IEEE 802.11ah communication are derived.In Fig.1,the Markov Chain model of the 802.11ah backoff mechanism within a Restricted Access Window(RAW)slot is shown in corrupted frame mode.This Markov Chain is adopted from[23-25]for unsaturated circumstances in the presence of error-prone channel.From the HCCNET’s WLAN viewpoint,communication is always unsuccessful due to a lack of valid checksums.Thus,steganogram transmission occurs at each stage of the backoff operation which allows us to predict the HCCNETs behaviour using the Markov chain-based model with probability of failurepf=1,which means it always fails.An idle state is added to the model to reflect the empty queue at the MAC layer when no packet is available for transmission.The primary advantages of using unsaturated circumstances in this model are that(i)real networks are predominantly non-saturated,(ii)saturated circumstances often result in an unstable network,and(iii)it allows for the consideration of inter-arriving time and burstiness in the network [22,23].Contention-based medium access control is used by the nodes to compete for channel access.An imperfect transmission channel is assumed in the model to avoid an overestimation of saturated throughput.The worst-case frame error rate-FER scenario is investigated,in which errors are randomly distributed in the transmission channel.Therefore,a Gaussian wireless error channel is considered,where a Bit Error Rate (BER) of the channel is given and each bit has the same probability of encountering a bit error.Additionally,the freezing of the back-off timer and packet arrival rate are considered in order to offer an accurate channel access estimation and efficiently use the channel.The model also considers back-off stages and short retry limit for packet transmission to comply with the IEEE 802.11ah standard and to guarantee that no packet remains served forever.Nodes communicate in ad hoc mode.The transmission range is shared with all nodes,and there are no hidden terminals on the network.Tab.1 displays the important notations and variables utilised in the study for simplicity.

Figure 1:The packets transmission process using Markov chain model

Table 1:Symbols used in the mathematical model

Table 1:Continued

2.1 Frame Transmission Probability in the Corrupted Frame Mode τcf

As seen in Fig.1,the 2-D Markov chain model is used to determine the probability of frame transmission in the corrupted frame modeτcf.Lets(t)andb(t)be random variables denoting the back-off stages (0,1,2,...,m) and the value of the back-off counter (0,1,2,...,W i-1) for every provided station at time slot t,respectively.The highest value of the back-off counter typically depends on the back-off stages.As a result,these random variables are not self-contained.

W0specifies the starting size of the contention window,W0=(CWmin+1),whereasm′specifies the maximum number of times the contention window may rise based on the followings,Wm′=2m′W0=(CWmax+1).In this model,them’value is set to 5.Letmbe the highest number of possible back-off stages.The two-dimensionals(t),b(t)processes,on the other hand,are assessed using a discrete-time Markov chain in which the channel state changes.Assume that the state process is denoted by(i,k).The state transition diagram of a two-dimensional Markov chain is shown in Fig.1,and the non-zero transition probabilities are represented by Eq.(2).

The first case in Eq.(2)indicates that the back-off counter reduces when the channel is detected idle.The second case in Eq.(2)indicates that when the channel is noticed busy,the back-off counter is frozen.If a packet is not successfully transmitted,the back-off phase moves fromi-1 toiand also doubles the CW value,as shown in the third case of Eq.(2).Maximum CWs size and back-off phase values are reset to the minimum levels when the repeat limit is reached,as shown in case 4 of Eq.(2).If there is still a packet in the queue for transmission,the node commences the back-off process from the first phase.

The non-null transition probabilities in this case represent the absence of packet transmission in the buffer that is forwarded to the idle state(I)after successful transmission.

Whenever the repeat limit is reached,the maximum back-off phase m and CW size value are reset to the minimum levels as shown in the first case of Eq.(3).Then,the node goes into idle mode if there are no more packets in the transmission queue.The second case in Eq.(3)denotes that the node stays in the idle mode if no new packets are received at the queue for transmission.The third case in Eq.(3)represents that the node goes from the idle mode to the back-off statekby uniformly selecting a back-off counter value in the range[0,W0-1].

Assume thatbi,k=limt→∞P{s(t)=i,b(t)=k} denotes the stationary distribution of Markov Chain,wheni∈(0,m)andk∈(1,Wi-1).We observe that Fig.1 representing Markov Chain Model is different from the model in[23-25]for 802.11p Carrier-Sense Multiple Access with Collision Avoidance(CSMA/CA)in terms of back to states(0,k)for 0 ≤k ≤W0-1 and(i,0)for 0 ≤i ≤m.Value one is a graphical representation of“permanently failure”from the WLAN perspective.

Due to the chain regularities,for eachk∈(1,Wi-1),the stationary distribution’s idle and backoff phases of data transmission are denoted bybIandbi,kand are expressed by Eqs.(5) and (6),respectively.

From Eq.(6),we get Eq.(7):

Since

Therefore,by applying the condition of stationary distribution normalisation,

We obtain Eq.(10)from Eq.(9),which is dependent on the values ofmandm′

where:

And:

Since we haveb0,0,we are now able to determine the probability of a node transmitting a frame in the corrupted frame modeτcf,where a node can send a packet in a randomly chosen time slot.The node can only send a packet whenever the back-off time counter is zero(bi,0),regardless of the back-off stage,as in Eq.(13).

Eq.(13)demonstrates that theτcfvalue is dependent on the conditional collision probabilitypcolland the probability of at least one packet being available in bufferq.There is a chance of a collision occurring,when at least two nodes send packets in the same time slot.

During transmission,the error frame probabilityperris given by:

wherepdata_erris the Frame Error Rate(FERs) for DATA frame that has been corrupted.This error probability is determined by computing the bit error probability(i.e.,BER)pBERby Eq.(15):

where the bit error rate(pBER)could be calculated by dividing the bit energy by the noise.In this study we use QPSK modulation,then thepBERfor QPSK modulation could be calculated as follows by Eq.(16)

The probability of transmitting packets colliding is defined as follows:

We can calculate the packet transmission from Eqs.(13) and (18) by numerically solving the unknown variableτcf.

2.2 Data Transmission Time Analysis

In this subsection,the system throughput of HCCNETs in the corrupted frame mode(Scf)is analysed.Fig.2 depicts the four channel states that may happen during the corrupted frame manner.In this mode,all 802.11ah packets contain an intentionally erroneous CRC-32 code value entered into the Frame Checksum Control(FCS)field.As a result,there are no ACKnowledgement(ACK)frames used to provide positive feedback,and thereby the ACK error status is neglected.Successful transmission in the HCCNETs,which is not defined in the same manner as in the 802.11ah network,indicates that there are no collisions or data errors during transmission.The HICCUPS frame integrity mechanism is separated from the 802.11ah FCS.Throughout the contention-based MAC method,the channel state will be one of the following during each time slot:idle,successful transmission,collision transmission,or failure transmission due to frame error.As a consequence,the channel state probability is expressed as Eq.(19).

Figure 2:Time slots length for the packet process of transmission

Fig.2 illustrates the time slot lengths for the packet process of transmission using the contentionbased MAC for DATA frames.Thus,as in Eq.(20),the transmission time is calculated using the unicast mode.

whereTdata=Lpld/R,Lpldindicates the payload of the data frame with FCS field and R is the data transmission rate.Tdatais PHY-layer dependent and the transmission of a frame in terms of Orthogonal Frequency-Division Multiplexing(OFDM)symbols is represented as Eq.(21):

Thus,the duration of the logical time slotsTslot802.11ah per state on the channel is computed by Eq.(22)in order to calculate the network throughput,which is defined as follows:

Eventually,the system throughput of HCCNETs in the corrupted frame mode(Scf)is expressed by Eq.(23)

3 Cost Analysis κ

The costκ,as defined in the first section of this study,is the difference between S,in the presence of frame error rate without HCCNETs,and S,with frame error rate resulting from HCCNETs in the corrupted frame manner.Simply,it is a drop of WLAN throughput caused by HCCNETs hidden channels.

Assume that frame error rate increases with the fixed value △FERwhen applying HCCNETs as shown in Fig.3.The frame error rate for networks without HCCNETs is equal to FER’.It can be seen that △FER≤1-FER′.Thus,we may represent the cost as follows:

Then,it is normalised toR as:

Since the cost curves are derived onS(FER)and appear to be nearly linear,so,we may apply the following approximation formula for small values of △FER,as shown in Fig.4:

Figure 3:Interpretation of ΔFER[12]

Figure 4:Illustration of the cost κ [12]

The cost values for IEEE 802.11ah(ERP-OFDM)are shown in Tabs.2 and 3,whenn=10,20,and R=6.5 Mbps.These values,whenL=1000 bytes,are obtained from Eq.(26),and are computed forFER′∈{0;0.0769;0.5507}.TheseFER′values correspond to the following threeBER=0,10-5,10-4.Five typical values of △FERare considered under these scenarios(0.01;0.02;0.03;0.04;0.05).

Table 2:The cost κ normalized values,(in parentheses,Measured in Mbps),when N=10 and L=1000 bytes

Table 3:The cost κ normalized values,(in parentheses,Measured in Mbps),when N=20 and L=1000 bytes

4 Efficiency Analysis ε

The efficiency is defined as theScfin situations caused by the physical channel (particularly BER) and the number of frames consumed by the HCCNETs in the corrupted frame manner.These situations provide a different view of FER from the perspective of the HCCNETs such as the appropriate frames in the HCCNETs are bad for a WLAN,and certainly the ideal frames for a WLAN in the presence of the HCCNETs are considered incorrect.As a result,we will useFERcfto emphasise this distinction and expressεas follows:

Scf,analysed in the previous section of the work,is used to compute the upper limit of the system throughput for HCCNETs.Corrupted frame mode happens seldom during typical operation of the HCCNETs.Two scenarios are used to validate the efficiency.In the first scenario,all stations operate exclusively in damaged frame manner(the HCCNETs is on at all times).

SinceS(1)equals 0,thenS=0in the FER function;andScf=Scf (FER′)in the FER function.Since 0 ≤△FER≤1-FER′,△FER=1-FER′.The HCCNETs is off at all times in the second scenario(△FER=0,just typical transmission is executed,

ThereforeScf=0 (sinceScf (1)equals 0),Sis equal toS(FER′).Based on the two scenarios discussed previously,we can evaluate the hypothetic point of operation of HCCNETs for (FER′+△FER)as a mix of reflection and translation,as shown in Fig.5.TheScfcurve is reflected and then translated into the FER domain in order to maintain the relationship betweenS(1)=0 andScf (FER′),as well as betweenS(FER′)andScf (1)=0.Following these procedures,we can see thatFERcf=1-△FER.

Eventuallyεis given by Eq.(28)as follows:

And then normalize it toRas follows:

Figure 5:The efficiency ε illustration[12]

As cost analysis,we analyse an IEEE 802.11ah(ERP-OFDM)when R=6.5 Mbps,L=1000 bytes frames,n=10,20,and the same values of △FER(0.01;0.02;0.03;0.04;0.05).Tab.4 shows the findings of the experiment.

Table 4:The efficiency ε normalized values(in parentheses,Measured in Mbps),when n=10,20 and L=1000 bytes

The cost relies on the frame error rate,while the efficiency relies only on the △FER.For instance,in IEEE 802.11ah (ERP-OFDM),when n=10 stations,and △FER=0.05 with R=6.5 Mbps,the efficiencyε=0.289 Mbps and the costε=0.294 Mbps.Moreover,when n=20 stations and △FER=0.05 with R=6.5 Mbps,the efficiencyε=0.296 Mbps and the costκ=0.299 Mbps.The work shows that HICCUPS is a significant method as it results in a reasonable cost and highly efficient steganographic technology.

5 Conclusion and Future Work

This paper introduces one of the steganographic techniques called HCCNETs to evaluate the performance efficiency and the cost of system usage of the steganographic channel over IEEE 802.11ah IoT protocol.We begin by analysing the IEEE 802.11ah protocol using a two-dimensional Markov chain model under unsaturated situations with an imperfect transmission channel.The analysis of the 802.11ah IoT protocol is used to determine the transmission probability,successful transmission probability,and collision probability.Then,using these derivatives formulas,performance metrics for throughput,efficiency,and cost of system usage in the network are expressed and calculated.The influence of the channel conditions and node number is examined in order to evaluate and understand the efficiency and the cost of system usage in HICCUPS over 802.11ah IoT protocol.The analytical findings indicate that HICCUPS steganographic technique is significantly efficient with reasonable cost.

Future study will concentrate on simulation analysis of HCCNETs over IoT scheme in order to analyse HCCNETs characteristics in a variety of situations and to provide a comprehensive evaluation of the security of HCCNETs.

Funding Statement:The authors received no specific funding for this study.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.