
ACKNOWLEDGEMENTS
This research was supported by the Cluster of Excel-
lence Cognitive Internet Technologies CCIT and the
Center of Excellence Logistics and IT, funded by the
Fraunhofer-Gesellschaft.
REFERENCES
Ahvanooey, M. T., Zhu, M. X., Mazurczyk, W., and Ben-
dechache, M. (2022). Information hiding in digital
textual contents: Techniques and current challenges.
Computer, 55(6):56–65.
Akaichi, I. and Kirrane, S. (2025). A comprehensive re-
view of usage control frameworks. Computer Science
Review, 56:100698.
Bedi, P. and Dua, A. (2020a). Network steganography using
extension headers in ipv6. In International Confer-
ence on Information, Communication and Computing
Technology, pages 98–110. Springer, Singapore.
Bedi, P. and Dua, A. (2020b). Network steganography us-
ing the overflow field of timestamp option in an ipv4
packet. Procedia Computer Science, 171:1810–1818.
Benhabbour, I. and Dacier, M. (2025). Endemic: End-to-
end network disruptions - examining middleboxes, is-
sues, and countermeasures - a survey. ACM Comput-
ing Surveys.
Bhushan, B., Sahoo, G., and Rai, A. K. (2017). Man-in-the-
middle attack in wireless and computer networking —
a review. In 2017 3rd International Conference on Ad-
vances in Computing, Communication & Automation
(ICACCA) (Fall), pages 1–6, Piscataway, NJ. IEEE.
Carpenter, B. and Brim, S. (2002). RFC 3234 - middle-
boxes: Taxonomy and issues.
Carpenter, B and Jiang, S (2024). RFC 7045: Transmission
and processing of ipv6 extension headers.
Deering, S. and Hinden, R. (1998). RFC 2460 - internet
protocol, version 6 (IPv6) specification.
Gamilla, A. P. and Naagas, M. A. (2022). Header of death:
security implications of IPv6 extension headers to the
open-source firewall. Bulletin of Electrical Engineer-
ing and Informatics, 11(1):319–326.
Hagen, S. (2014). IPv6 essentials: Integrating IPv6 into
Your IPv4 Network. O’Reilly, Beijing, 3rd ed. edition.
Hellmeier, M. and von Scherenberg, F. (2023). A delimita-
tion of data sovereignty from digital and technological
sovereignty. ECIS 2023 Research Papers, 306.
Iurman, J., Vyncke, E., and Donnet, B. (2023). Using eBPF
to inject IPv6 extension headers. In Netdev 0x17. Net-
dev.
Jarke, M., Otto, B., and Ram, S. (2019). Data sovereignty
and data space ecosystems. Business & Information
Systems Engineering, 61(5):549–550.
Jung, C. and D
¨
orr, J. (2022). Data usage control. In Otto, B.,
ten Hompel, M., and Wrobel, S., editors, Designing
Data Spaces, pages 129–146. Springer Cham.
Kahn, D. (1996). The history of steganography. Interna-
tional Workshop on Information Hiding.
Kelbert, F. and Pretschner, A. (2013). Data usage control
enforcement in distributed systems. In Bertino, E.,
editor, Proceedings of the third ACM conference on
Data and application security and privacy, ACM Dig-
ital Library, pages 71–82, New York, NY. ACM.
Krishnan, R. B., Thandra, P. K., and Baba, M. S. (2017). An
overview of text steganography. In 2017 Fourth Inter-
national Conference on Signal Processing, Communi-
cation and Networking (ICSCN), pages 1–6. IEEE.
Kundur, D. and Ahsan, K. (2003). Practical internet
steganography: Data hiding in IP. Proc. Texas wksp.
security of information systems.
L
´
eas, R., Iurman, J., Vyncke,
´
E., and Donnet, B. (2022).
Measuring IPv6 extension headers survivability with
james. In Proceedings of the 22nd ACM Internet Mea-
surement Conference, New York, NY, USA. ACM.
Mazurczyk, W., Pow
´
ojski, K., and Caviglione, L. (2019).
IPv6 covert channels in the wild. In Proceed-
ings of the Third Central European Cybersecurity
Conference, ACM Digital Library, pages 1–6, New
York,NY,United States. Association for Computing
Machinery.
Otto, B., ten Hompel, M., and Wrobel, S., editors (2022).
Designing Data Spaces. Springer Cham, 1 edition.
Postel, J. (1981). RFC 791: Internet protocol.
Seo, J. O., Manoharan, S., and Mahanti, A. (2016). Net-
work steganography and steganalysis - a concise re-
view. In 2016 2nd International Conference on Ap-
plied and Theoretical Computing and Communication
Technology (iCATccT), pages 368–371. IEEE.
von Scherenberg, F., Hellmeier, M., and Otto, B. (2024).
Data sovereignty in information systems. Electronic
Markets, 34(1).
Wagner, P. G., Birnstill, P., and Beyerer, J. (2018). Dis-
tributed usage control enforcement through trusted
platform modules and sgx enclaves. In Bertino, E.,
Lin, D., and Lobo, J., editors, Proceedings of the 23nd
ACM on Symposium on Access Control Models and
Technologies, pages 85–91. ACM.
Wang, X., Yong, Q., Dai, Y., Ren, J., and Hang, Z. (2013).
Protecting outsourced data privacy with lifelong pol-
icy carrying. In HPCC and EUC 2013, pages 896–
905, Los Alamitos, California and Washington and
Tokyo. Conference Publishing Services, IEEE Com-
puter Society.
Wobst, R. (2007). Cryptology unlocked. John Wiley &
Sons, Chichester and Hoboken, NJ.
Zrenner, J., M
¨
oller, F. O., Jung, C., Eitel, A., and Otto, B.
(2019). Usage control architecture options for data
sovereignty in business ecosystems. Journal of Enter-
prise Information Management, 32(3):477–495.
Facilitating Data Usage Control Through IPv6 Extension Headers
535