Cost and Efficiency Analysis of Steganography in the IEEE 802.11ah IoT Protocol

dc.authoridAlmohammedi, Akram A./0000-0001-8476-0813
dc.contributor.authorAlmohammedi, Akram A.
dc.contributor.authorShepelev, Vladimir
dc.contributor.authorDarshi, Sam
dc.contributor.authorBalfaqih, Mohammed
dc.contributor.authorGhawbar, Fayad
dc.date.accessioned2024-09-29T16:07:59Z
dc.date.available2024-09-29T16:07:59Z
dc.date.issued2022
dc.departmentKarabük Üniversitesien_US
dc.description.abstractThe widespread use of the Internet of Things (IoT) applications has enormously increased the danger level of data leakage and theft in IoT as data transmission occurs through a public channel. As a result, the security of the IoT has become a serious challenge in the field of information security. Steganography on the network is a critical tool for preventing the leakage of private information and enabling secure and encrypted communication. The primary purpose of steganography is to conceal sensitive information in any form of media such as audio, video, text, or photos, and securely transfer it through wireless networks. In this paper, we analyse the performance characteristics of one of the steganography techniques called Hidden Communication System for Corrupted Networks (HCCNETs) for hiding sensitive data. This performance analysis includes the efficiency and the cost of the system in Wireless Local Area Networks (WLANs), specifically in the IEEE 802.11ah IoT protocol. The analysis is mainly based on a two-dimensional Markov chain model in the presence of an error channel. Additionally, the model considers packet arrival rate, back-off timer freezing, back-off stages, and short retry limit to ensure compliance with IEEE 802.11ah requirements. It stresses the importance of taking these elements into consideration while modeling the efficiency and cost of the steganographic channel system. These parameters often result in a high precise channel access estimation, a more accurate and efficient accuracy measurements system, efficient channel utilisation, avoidance of throughput saturation overestimation, and ensuring that no packet is served endlessly. Evaluated results demonstrate that HCCNETs is an effective approach at low cost.en_US
dc.identifier.doi10.32604/cmc.2022.026307
dc.identifier.endpage3943en_US
dc.identifier.issn1546-2218
dc.identifier.issn1546-2226
dc.identifier.issue2en_US
dc.identifier.scopus2-s2.0-85127357445en_US
dc.identifier.scopusqualityQ2en_US
dc.identifier.startpage3929en_US
dc.identifier.urihttps://doi.org/10.32604/cmc.2022.026307
dc.identifier.urihttps://hdl.handle.net/20.500.14619/7295
dc.identifier.volume72en_US
dc.identifier.wosWOS:000779567700031en_US
dc.identifier.wosqualityQ3en_US
dc.indekslendigikaynakWeb of Scienceen_US
dc.indekslendigikaynakScopusen_US
dc.language.isoenen_US
dc.publisherTech Science Pressen_US
dc.relation.ispartofCmc-Computers Materials & Continuaen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectIoTen_US
dc.subjectHCCNETsen_US
dc.subjectsteganographyen_US
dc.subjectmarkov chain modelen_US
dc.titleCost and Efficiency Analysis of Steganography in the IEEE 802.11ah IoT Protocolen_US
dc.typeArticleen_US

Dosyalar