Open Access iconOpen Access

ARTICLE

crossmark

Cost and Efficiency Analysis of Steganography in the IEEE 802.11ah IoT Protocol

Akram A. Almohammedi1,2,*, Vladimir Shepelev1, Sam Darshi3, Mohammed Balfaqih4, Fayad Ghawbar5

1 Automobile Transportation Department, South Ural State University, Chelyabinsk, 454080, Russia
2 Electrical and Electronics Engineering Department Karabük University, Karabük, 78050, Turkey
3 Department of Electrical Engineering, Indian Institute of Technology Ropar, Punjab, 140001, India
4 Department of Computer and Network Engineering, University of Jeddah, Jeddah, 23218, Saudi Arabia
5 Faculty of Engineering Technology, University Tun Hussein Onn Malaysia, Pagoh Campus, 86400, Malaysia

* Corresponding Author: Akram A. Almohammedi. Email: email

Computers, Materials & Continua 2022, 72(2), 3929-3943. https://doi.org/10.32604/cmc.2022.026307

Abstract

The widespread use of the Internet of Things (IoT) applications has enormously increased the danger level of data leakage and theft in IoT as data transmission occurs through a public channel. As a result, the security of the IoT has become a serious challenge in the field of information security. Steganography on the network is a critical tool for preventing the leakage of private information and enabling secure and encrypted communication. The primary purpose of steganography is to conceal sensitive information in any form of media such as audio, video, text, or photos, and securely transfer it through wireless networks. In this paper, we analyse the performance characteristics of one of the steganography techniques called Hidden Communication System for Corrupted Networks (HCCNETs) for hiding sensitive data. This performance analysis includes the efficiency and the cost of the system in Wireless Local Area Networks (WLANs), specifically in the IEEE 802.11ah IoT protocol. The analysis is mainly based on a two-dimensional Markov chain model in the presence of an error channel. Additionally, the model considers packet arrival rate, back-off timer freezing, back-off stages, and short retry limit to ensure compliance with IEEE 802.11ah requirements. It stresses the importance of taking these elements into consideration while modeling the efficiency and cost of the steganographic channel system. These parameters often result in a high precise channel access estimation, a more accurate and efficient accuracy measurements system, efficient channel utilisation, avoidance of throughput saturation overestimation, and ensuring that no packet is served endlessly. Evaluated results demonstrate that HCCNETs is an effective approach at low cost.

Keywords


Cite This Article

APA Style
Almohammedi, A.A., Shepelev, V., Darshi, S., Balfaqih, M., Ghawbar, F. (2022). Cost and efficiency analysis of steganography in the IEEE 802.11ah iot protocol. Computers, Materials & Continua, 72(2), 3929-3943. https://doi.org/10.32604/cmc.2022.026307
Vancouver Style
Almohammedi AA, Shepelev V, Darshi S, Balfaqih M, Ghawbar F. Cost and efficiency analysis of steganography in the IEEE 802.11ah iot protocol. Comput Mater Contin. 2022;72(2):3929-3943 https://doi.org/10.32604/cmc.2022.026307
IEEE Style
A.A. Almohammedi, V. Shepelev, S. Darshi, M. Balfaqih, and F. Ghawbar, “Cost and Efficiency Analysis of Steganography in the IEEE 802.11ah IoT Protocol,” Comput. Mater. Contin., vol. 72, no. 2, pp. 3929-3943, 2022. https://doi.org/10.32604/cmc.2022.026307



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1431

    View

  • 794

    Download

  • 0

    Like

Share Link