{"id":"https://openalex.org/W4396783576","doi":"https://doi.org/10.1109/jiot.2024.3398579","title":"A Robust Covert Channel With Self-Bit Recovery for IEEE 802.11 Networks","display_name":"A Robust Covert Channel With Self-Bit Recovery for IEEE 802.11 Networks","publication_year":2024,"publication_date":"2024-05-09","ids":{"openalex":"https://openalex.org/W4396783576","doi":"https://doi.org/10.1109/jiot.2024.3398579"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3398579","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3398579","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023803037","display_name":"Seunghwan Son","orcid":"https://orcid.org/0000-0002-3198-8467"},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Seunghwan Son","raw_affiliation_strings":["School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea"],"raw_orcid":"https://orcid.org/0000-0002-3198-8467","affiliations":[{"raw_affiliation_string":"School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea","institution_ids":["https://openalex.org/I31419693"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018787410","display_name":"Deokkyu Kwon","orcid":"https://orcid.org/0000-0003-0014-1965"},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Deokkyu Kwon","raw_affiliation_strings":["School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea"],"raw_orcid":"https://orcid.org/0000-0003-0014-1965","affiliations":[{"raw_affiliation_string":"School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea","institution_ids":["https://openalex.org/I31419693"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100704170","display_name":"Sang-Woo Lee","orcid":"https://orcid.org/0000-0002-6281-382X"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sangwoo Lee","raw_affiliation_strings":["Information Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea"],"raw_orcid":"https://orcid.org/0000-0002-6281-382X","affiliations":[{"raw_affiliation_string":"Information Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102179104","display_name":"Yong-Sung Jeon","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Yongsung Jeon","raw_affiliation_strings":["Information Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Information Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100650746","display_name":"Youngho Park","orcid":"https://orcid.org/0000-0002-0406-6547"},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Youngho Park","raw_affiliation_strings":["School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea"],"raw_orcid":"https://orcid.org/0000-0002-0406-6547","affiliations":[{"raw_affiliation_string":"School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea","institution_ids":["https://openalex.org/I31419693"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5023803037"],"corresponding_institution_ids":["https://openalex.org/I31419693"],"apc_list":null,"apc_paid":null,"fwci":0.9934,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.78852708,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"11","issue":"16","first_page":"27356","last_page":"27368"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8010057806968689},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.7916444540023804},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6920616030693054},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6791028380393982},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.578500509262085},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5564529895782471},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.403861403465271}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8010057806968689},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.7916444540023804},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6920616030693054},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6791028380393982},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.578500509262085},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5564529895782471},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.403861403465271},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3398579","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3398579","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1639716451","display_name":null,"funder_award_id":"2020R1I1A3058605","funder_id":"https://openalex.org/F4320336751","funder_display_name":"Science Foundation of Ministry of Education of China"}],"funders":[{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"},{"id":"https://openalex.org/F4320335839","display_name":"National Institute of Information and Communications Technology","ror":"https://ror.org/016bgq349"},{"id":"https://openalex.org/F4320336751","display_name":"Science Foundation of Ministry of Education of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1471507","https://openalex.org/W1588277031","https://openalex.org/W1821496928","https://openalex.org/W1981294881","https://openalex.org/W1994476536","https://openalex.org/W2045555877","https://openalex.org/W2060626729","https://openalex.org/W2098451214","https://openalex.org/W2099137371","https://openalex.org/W2101115142","https://openalex.org/W2131588610","https://openalex.org/W2134221857","https://openalex.org/W2138055875","https://openalex.org/W2150092124","https://openalex.org/W2151185692","https://openalex.org/W2157852252","https://openalex.org/W2161439181","https://openalex.org/W2166180744","https://openalex.org/W2175661655","https://openalex.org/W2579213442","https://openalex.org/W2796858339","https://openalex.org/W2806448329","https://openalex.org/W2901178374","https://openalex.org/W2945114843","https://openalex.org/W2970866913","https://openalex.org/W3034290200","https://openalex.org/W3038300587","https://openalex.org/W3047312994","https://openalex.org/W3080182059","https://openalex.org/W3102363676","https://openalex.org/W3118799686","https://openalex.org/W3128198860","https://openalex.org/W3210191162","https://openalex.org/W3215039338","https://openalex.org/W4206784086","https://openalex.org/W4226201210","https://openalex.org/W4294982793","https://openalex.org/W6606318847","https://openalex.org/W7002367823"],"related_works":["https://openalex.org/W2409612194","https://openalex.org/W4224042389","https://openalex.org/W174282171","https://openalex.org/W20460883","https://openalex.org/W1587013156","https://openalex.org/W4392755040","https://openalex.org/W4239080508","https://openalex.org/W2326198059","https://openalex.org/W4319780484","https://openalex.org/W4386088729"],"abstract_inverted_index":{"Covert":[0],"channels":[1,19,23,32],"are":[2,14,33],"commonly":[3],"perceived":[4],"as":[5,43,85],"potential":[6,41],"attack":[7],"vectors":[8],"in":[9,47,101],"wireless":[10,48],"communication":[11,88],"environments":[12],"and":[13,20,150,163,181],"categorized":[15],"into":[16],"covert":[17,21,30,74,93,124,143,161,171,187,196],"timing":[18,31,75,125,144,172,188,197],"storage":[22],"based":[24],"on":[25],"their":[26,40],"creation":[27],"method.":[28],"Although":[29],"generally":[34],"difficult":[35],"to":[36,64,70,113,116],"detect,":[37],"we":[38,155],"identified":[39],"use":[42],"secure":[44],"message":[45,98],"carriers":[46],"communication,":[49],"particularly":[50],"within":[51],"the":[52,92,102,107,114,138,157,194],"IEEE":[53,82],"802.11":[54,83],"environments.":[55],"In":[56],"this":[57],"context,":[58],"access":[59],"points":[60],"continuously":[61],"broadcast":[62,79],"packets":[63],"nearby":[65],"devices.":[66],"Our":[67],"aim":[68],"was":[69],"create":[71],"a":[72,86,123,128,151],"robust":[73],"channel":[76,126,145,162,198],"using":[77],"these":[78],"packets.":[80],"However,":[81],"operates":[84],"one-way":[87],"channel,":[89],"which":[90],"prevents":[91],"receiver":[94,108],"from":[95],"confirming":[96],"proper":[97],"reception.":[99],"Moreover,":[100],"event":[103],"of":[104,140,159,169,201],"incorrect":[105],"reception,":[106],"cannot":[109],"send":[110],"an":[111],"ACK":[112],"sender":[115],"avoid":[117],"detection":[118],"risk.":[119],"This":[120],"paper":[121],"proposes":[122],"with":[127,167,185],"self-bit":[129],"recovery":[130],"function":[131],"for":[132],"consecutive":[133,203],"two-bit":[134],"losses.":[135,205],"We":[136],"validated":[137],"practicality":[139],"our":[141,160,191],"proposed":[142],"through":[146],"simulations":[147],"involving":[148],"laptops":[149],"Zynq":[152],"board.":[153],"Furthermore,":[154],"assessed":[156],"robustness":[158],"compared":[164,184],"its":[165],"performance":[166],"that":[168],"existing":[170,186],"channels.":[173,189],"The":[174],"results":[175],"indicate":[176],"superior":[177],"covertness,":[178],"higher":[179],"capacity,":[180],"transmission":[182],"accuracy":[183],"Notably,":[190],"study":[192],"represents":[193],"first":[195],"algorithm":[199],"capable":[200],"recovering":[202],"2-bit":[204]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
