A comprehensive survey of covert communication techniques, limitations and future challenges

Publisher:
ELSEVIER ADVANCED TECHNOLOGY
Publication Type:
Journal Article
Citation:
Computers and Security, 2022, 120
Issue Date:
2022-09-01
Filename Description Size
1-s2.0-S0167404822001791-main.pdfPublished version3.86 MB
Full metadata record
Data encryption aims to protect the confidentiality of data at storage, during transmission, or while in processing. However, it is not always the optimum choice as attackers know the existence of the ciphertext. Hence, they can exploit various weaknesses in the implementation of encryption algorithms and can thus decrypt or guess the related cryptographic primitives. Moreover, in the case of proprietary applications such as online social networks, users are at the mercy of the vendor's security measures. Therefore, users are vulnerable to various security and privacy threats. Contrary to this, covert communication techniques hide the existence of communication and thus achieve security through obscurity and hidden communication channels. Over the period, there has been a significant advancement in this field. However, existing literature fails to encompass all the aspects of covert communications in a single document. This survey thus endeavors to highlight the latest trends in covert communication techniques, related challenges, and future directions.
Please use this identifier to cite or link to this item: