Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A robust packet‐dropping covert channel for mobile intelligent terminals

Published: 25 August 2022 Publication History

Abstract

Covert communication in this regard has been widely used for protecting the secrecy of communication. Voice over Long Term Evolution (VoLTE) is a packet‐switched core network solution for high‐speed and high‐quality end‐to‐end services which usually applied to the communication between intelligent systems. However, covert channels using inter‐packet delays and packet order in VoLTE services are limited by specific rules. Since minor modifications to overt traffic can be detected, existing covert channel solutions cannot be directly applied to VoLTE. Therefore, this study presents a robust packet loss covert timing channel by cascade hash coding with intelligent system. To ensure robustness and undetectability, we design hash‐based inter‐codeword verification, codeword self‐verification based on cyclic redundancy check, and adaptive mapping matrix. The sender modulates the covert messages according to the sequence number of the actively dropped packets, and the receiver can retrieve the covert messages using a specialized verification method. To evaluate undetectability, robustness, throughput, and construction costs, a large number of experiments in mobile intelligent terminals have been conducted. The experimental results prove that the proposed scheme is feasible for VoLTE communication, as the covert message is shown to be transmitted secretly, and the bit error and throughput are within acceptable ranges.

References

[1]
Li T, Chen Y, Wang Y, et al. Rational protocols and attacks in blockchain system. Security Commun Networks. 2020;2020(44):1‐11. doi:10.1155/2020/8839047
[2]
Zhang Q, Zhu L, Wang R, et al. Group key agreement protocol among terminals of the intelligent information system for mobile edge computing. Int J Intell Syst. doi:10.1002/int.22544
[3]
Li Y, Yao S, Zhang R, Yang C. Analyzing host security using D‐S evidence theory and multisource information fusion. Int J Intell Syst. 2021;36(2):1053‐1068. doi:10.1002/int.22330
[4]
Aloqaily M, Kantarci B, Mouftah HT. On the impact of quality of experience (QoE) in a vehicular cloud with various providers. In: 2014 11th Annual High‐capacity Optical Networks and Emerging/Enabling Technologies (HONET); 2014.
[5]
Tsaramirsis G, Papoutsidakis M, Derbali M, Khan FQ, Michailidis F. Towards smart gaming Olfactory displays. Sensors. 2020;20(4):4. doi:10.3390/s20041002
[6]
Mustaqeem, Kwon S. Optimal feature selection based speech emotion recognition using two‐stream deep convolutional neural network. Int J Intell Syst. 2021;36(9):5116‐5135. doi:10.1002/int.22505
[7]
Zhang X, Zhu L, Wang X, Zhang C, Zhu H, Tan Y. A packet‐reordering covert channel over VoLTE voice and video traffics. J Network Comput Appl. 2019;126(8):29‐38. doi:10.1016/j.jnca.2018.11.001
[8]
Yuan Y, Huo L, Wang Z, Hogrefe D. Secure APIT localization scheme against sybil attacks in distributed wireless sensor networks. IEEE Access. 2018;6:27629‐27636. doi:10.1109/ACCESS.2018.2836898
[9]
Qingtang S, Xueting Z, Huanying W. A blind colour image watermarking algorithm combined spatial domain and SVD. Int J Intell Syst. 2021. doi:10.1002/int.22738
[10]
Zhang X, Liang C, Zhang Q, Li Y, Zheng J, Tan Y. Building covert timing channels by packet rearrangement over mobile networks. Inform Sci. 2018;445‐446(4):66‐78. doi:10.1016/j.ins.2018.03.007
[11]
Zhang Q, Gong H, Zhang X, Liang C, Tan Y. A sensitive network jitter measurement for covert timing channels over interactive traffic. Multimedia Tools Appl. 2019;78(3):3493‐3509.
[12]
Zhang N, Xue J, Ma Y, Zhang R, Liang T, Ya T. Hybrid sequence‐based Android malware detection using natural language processing. Int J Intell Syst. 2021;36(10):5770‐5784. doi:10.1002/int.22529
[13]
Fu X, Yang R, Du X, Luo B, Guizani M. Timing channel in IaaS: how to identify and investigate. IEEE Access. 2019;7:1‐11. doi:10.1109/ACCESS.2018.2876146
[14]
Aloqaily M, Kantarci B, Mouftah H. Provisioning delay effect of partaking a trusted third party in a vehicular cloud. In: 2014 Global Information Infrastructure and Networking Symposium, GIIS 2014; 2014. doi:10.1109/GIIS.2014.6934269
[15]
Li Y, Wang X, Shi Z, Zhang R, Xue J, Wang Z. Boosting training for PDF malware classifier via active learning. Int J Intell Syst. doi:10.1002/int.22451
[16]
Lin G, Wen S, Han QL, Zhang J, Xiang Y. Software vulnerability detection using deep neural networks: a survey. Proc IEEE. 2020;108(10):1825‐1848. doi:10.1109/JPROC.2020.2993293
[17]
Cabuk S, Brodley CE, Shields C. IP covert timing channels: design and detection. In: CCS'04. ACM; 2004:178‐187.
[18]
Gianvecchio S, Wang H, Wijesekera D, Jajodia S. Model‐based covert timing channels: Automated modeling and evasion. In: Lippmann R, Kirda E, Trachtenberg A, eds. Recent Advances in Intrusion Detection. Springer; 2008:211‐230.
[19]
Gianvecchio S, Wang H. An entropy‐based approach to detecting covert timing channels. IEEE Trans Depend Secure Comput. 2011;8(6):785‐797. doi:10.1109/TDSC.2010.46
[20]
Guan Z, Zhang Y, Zhu L, Wu L, Yu S. EFFECT: an efficient flexible privacy‐preserving data aggregation scheme with authentication in smart grid. Sci China Inform Sci. 2019;62(3):032103.
[21]
Tan Y, Xu X, Liang C, Zhang X, Zhang Q, Li Y. An end‐to‐end covert channel via packet dropout for mobile networks. Int J Distributed Sensor Networks. 2018;14(5):1‐14. doi:10.1177/1550147718779568
[22]
Ozturk O, Vajapeyam M. Performance of VoLTE and data traffic in LTE heterogeneous networks. In: IEEE Global Communications Conference (GLOBECOM); 2013:1595‐1601.
[23]
Tan Y, Zhang X, Sharif K, Liang C, Zhang Q, Li Y. Covert timing channels for IoT over mobile networks. IEEE Wireless Commun. 2018;25(6):38‐44. doi:10.1109/MWC.2017.1800062
[24]
Guan Z, Liu X, Wu L, et al. Cross‐lingual multi‐keyword rank search with semantic extension over encrypted data. Inform Sci. 2020;514(4):523‐540. doi:10.1016/j.ins.2019.11.013
[25]
Naz A, Asif HM, Umer T, Ayub S, Al‐Turjman F. Trilateration‐based indoor localization engineering technique for visible light communication system. Software Pract Exp. 2020;51(1). doi:10.1002/spe.2823
[26]
Liu Z, Li B, Huang Y, Li J, Xiang Y, Pedrycz W. NewMCOS: Towards a practical multi‐cloud oblivious storage scheme. IEEE Trans Knowl Data Eng. 2020;32(4):714‐727doi:10.1109/TKDE.69.
[27]
Li J, Huang Y, Wei Y, et al. Searchable symmetric encryption with forward search privacy. IEEE Trans Depend Secure Comput. 2019:​1.
[28]
Choo K, Yan Z, Meng W. Editorial: blockchain in industrial IoT applications: security and privacy advances, challenges, and opportunities. IEEE Trans Industr Inform. 2020;16(6):4119‐4121. doi:10.1109/TII.9424
[29]
Archibald R, Ghosal D. Design and analysis of a model‐based covert timing channel for skype traffic. In: 2015 IEEE Conference on Communications and Network Security (CNS); 2015:236‐244.
[30]
Liang C, Tan Y, Zhang X, Wang X, Zheng J, Zhang Q. Building packet length covert channel over mobile VoIP traffics. J Network Comput Appl. 2018;118(8):144‐153. doi:10.1016/j.jnca.2018.06.012
[31]
Liang C, Wang X, Zhang X, Zhang Y, Sharif K, Tan Y. A payload‐dependent packet rearranging covert channel for mobile VoIP traffic. Inform Sci. 2018;465(8):162‐173. doi:10.1016/j.ins.2018.07.011
[32]
Singh S, Oyman O, Papathanassiou A, Chatterjee D, Andrews JG. Video capacity and QoE enhancements over LTE. In: 2012 IEEE International Conference on Communications (ICC); 2012:7071‐7076.
[33]
Alraddadi S, Alqurashi F, Tsaramirsis G, Luhaybi A, Buhari S. Aroma release of Olfactory displays based on audio‐visual content. Appl Sci. 2019;9(22):4866. doi:10.3390/app9224866
[34]
Atti V, Sinder DJ, Subasingha S, et al. Improved error resilience for volte and VoIP with 3GPP EVS channel aware coding. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP); 2015:5713‐5717.
[35]
Hyun J, Li J, Im C, Yoo J, Hong JW. A VoLTE traffic classification method in LTE network. In: The 16th Asia‐Pacific Network Operations and Management Symposium; 2014:1‐6
[36]
Ko AE, Park S, Kim S, Son K, Kim H. SIP amplification attack analysis and detection in VoLTE service network. In: 2016 International Conference on Information Networking (ICOIN); 2016:334‐336.
[37]
Tomoskozi M, Seeling P, Ekler P, Fitzek FHP. Regression model building and efficiency prediction of RoHCv2 compressor implementations for VoIP. In: 2016 IEEE Global Communications Conference (GLOBECOM); 2016:1‐6.
[38]
Fuentes F, Kar DC. Ethereal vs. Tcpdump: A comparative study on packet sniffing tools for educational purpose. J Comput Sci Colleges. 2005;20(4):169‐176.
[39]
Gianvecchio S, Wang H. Detecting covert timing channels: an entropy‐based approach. In: CCS'07. ACM; 2007:307‐316.
[40]
Rezaei F, Hempel M, Shrestha PL, Rakshit SM, Sharif H. Detecting covert timing channels using non‐parametric statistical approaches. In: 2015 International Wireless Communications and Mobile Computing Conference (IWCMC); 2015:102‐107.
[41]
van Erven T, Harremos P. Rényi divergence and Kullback‐Leibler divergence. IEEE Trans Inform Theory. 2014;60(7):3797‐3820. doi:10.1109/TIT.2014.2320500
[42]
Rezaei F, Hempel M, Sharif H. Towards a reliable detection of covert timing channels over real‐time network traffic. IEEE Trans Depend Secure Comput. 2017;14(3):249‐264. doi:10.1109/TDSC.2017.2656078
[43]
Zhu X, Chen CW. A joint source‐channel adaptive scheme for wireless H.264/AVC video authentication. IEEE Trans Inform Forensics Security. 2016;11(1):141‐153. doi:10.1109/TIFS.2015.2481366
[44]
Bezerra C, Carvalho AD, Borges D, Barbosa N, Pontes J, Tavares E. QoE and energy consumption evaluation of adaptive video streaming on mobile device. In: 2017 14th IEEE Annual Consumer Communications Networking Conference (CCNC); 2017:1‐6.
[45]
Anegekuh L, Sun L, Jammeh E, Mkwawa I, Ifeachor E. Content‐based video quality prediction for HEVC encoded videos streamed over packet networks. IEEE Transactions on Multimedia. 2015;17(8):1323‐1334. doi:10.1109/TMM.2015.2444098
[46]
Zhang L, Zhang L, Mou X, Zhang D. FSIM: A feature similarity index for image quality assessment. IEEE Trans Image Process. 2011;20(8):2378‐2386. doi:10.1109/TIP.2011.2109730
[47]
Sheikh HR, Sabir MF, Bovik AC. A statistical evaluation of recent full reference image quality assessment algorithms. IEEE Trans Image Process. 2006;15(11):3440‐3451. doi:10.1109/TIP.2006.881959
[48]
Laka P, Mazurczyk W. User perspective and security of a new mobile authentication method. Telecommun Syst. 2018;69(3):365‐379. doi:10.1007/s11235-018-0437-1
[49]
Zhang J, Pan L, Han QL, Chen C, Wen S, Xiang Y. Deep learning based attack detection for cyber‐physical system cybersecurity: a survey. IEEE/CAA J Autom Sinica. 2021;9(3):1‐15. doi:10.1109/JAS.2021.1004261
[50]
Qiu S, Wang D, Xu G, Kumari S. Practical and provably secure three‐factor authentication protocol based on extended chaotic‐maps for mobile lightweight devices. IEEE Trans Depend Secure Comput. 2020. doi:10.1109/TDSC.2020.3022797
[51]
Li Y, Yao S, Yang K, Tan Y, Zhang Q. A high‐imperceptibility and histogram‐shifting data hiding scheme for JPEG images. IEEE Access. 2019;7(1):73573‐73582. doi:10.1109/ACCESS.2019.2920178
[52]
Tan Y, Xue Y, Liang C, et al. A root privilege management scheme with revocable authorization for Android devices. J Network Comput Appl. 2018;107(4):69‐82.
[53]
Zhu L, Zhang C, Xu C, et al. PRIF: A privacy‐preserving interest‐based forwarding scheme for social internet of vehicles. IEEE Internet Things J. 2018;5(3):2457‐2466. doi:10.1109/JIOT.2018.2846653
[54]
Guan Z, Zhang Y, Zhu L, Wu L, Yu S. Effect: an efficient flexible privacy‐preserving data aggregation scheme with authentication in smart grid. Sci China Inform Sci. 2019;62(3):1‐14. doi:10.1007/s11432-018-9451-y
[55]
Zhang Y, Huang X, Chen X, Zhang LY, Zhang J, Xiang Y. A hybrid key agreement scheme for smart homes using the merkle puzzle. IEEE Internet Things J. 2020;7(2):1061‐1071. doi:10.1109/JIoT.6488907
[56]
Wang Z, Cheng D, Kumar A, Cai, Almakhadmeh, Tolba A. Securing cryptographic chips against scan‐based attacks in wireless sensor network applications. Sensors. 2019;19(20):4598. doi:10.3390/s19204598
[57]
Caviglione L, Podolski M, Mazurczyk W, Ianigro M. Covert channels in personal cloud storage services: the case of dropbox. IEEE Trans Industr Inform. 2017;13(4):1921‐1931. doi:10.1109/TII.2016.2627503
[58]
Wang C, Wang D, Xu G, He D. Efficient privacy‐preserving user authentication scheme with forward secrecy for industry 4.0. Sci China‐Inform Sci. 2022; 65(1)​. doi:10.1007/s11432-020-2975-6
[59]
Luo X, Chan EWW, Chang RKC. TCP covert timing channels: Design and detection. In: 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN); 2008:420‐429.
[60]
Sellke SH, Wang C, Bagchi S, Shroff N. TCP/IP timing channels: Theory to implementation. In: IEEE International Conference on Computer Communications (INFOCOM); 2009:2204‐2212
[61]
Archibald R, Ghosal D. A covert timing channel based on fountain codes. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications; 2012: 970‐977.
[62]
Ahmadzadeh SA, Agnew G. Turbo covert channel: an iterative framework for covert communication over data networks. In: 2013 Proceedings IEEE International Conference on Computer Communications (INFOCOM); 2013:2031‐2039.
[63]
Wu J, Wang Y, Ding L, Liao X. Improving performance of network covert timing channel through Huffman coding. Math Comput Modell. 2012;55(1):69‐79. doi:10.1016/j.mcm.2011.01.051
[64]
Houmansadr A, Borisov N. CoCo: Coding‐based covert timing channels for network flows. In: Filler T, Pevný T, Craver S, Ker A, eds. Information Hiding. Springer; 2011:314‐328.
[65]
Li CY, Tu GH, Peng C, et al. Insecurity of voice solution VoLTE in LTE mobile networks. CCS'15. ACM; 2015:316‐327.
[66]
Elnashar A, El‐Saidny MA, Yehia M. Performance evaluation of VoLTE based on field measurement data. arXiv. 2018. doi:10.48550/arXiv.1810.02968
[67]
Xue Y, Tan Y, Liang C, Li Y, Zheng J, Zhang Q. RootAgency: a digital signature‐based root privilege management agency for cloud terminal devices. Inform Sci. 2018;444(3):36‐50. doi:10.1016/j.ins.2018.02.069

Cited By

View all
  • (2024)Gaming the system: tetromino-based covert channel and its impact on mobile securityInternational Journal of Information Security10.1007/s10207-024-00875-323:4(3007-3027)Online publication date: 1-Aug-2024
  • (2024)Privacy-Preserving Covert Channels in VoLTE via Inter-Frame Delay ModulationArtificial Intelligence Security and Privacy10.1007/978-981-96-1148-5_7(74-88)Online publication date: 28-Nov-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image International Journal of Intelligent Systems
International Journal of Intelligent Systems  Volume 37, Issue 10
October 2022
1589 pages
ISSN:0884-8173
DOI:10.1002/int.v37.10
Issue’s Table of Contents

Publisher

John Wiley and Sons Ltd.

United Kingdom

Publication History

Published: 25 August 2022

Author Tags

  1. cascade hash coding
  2. covert timing channel
  3. intelligent terminals
  4. packet dropout
  5. robustness

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Gaming the system: tetromino-based covert channel and its impact on mobile securityInternational Journal of Information Security10.1007/s10207-024-00875-323:4(3007-3027)Online publication date: 1-Aug-2024
  • (2024)Privacy-Preserving Covert Channels in VoLTE via Inter-Frame Delay ModulationArtificial Intelligence Security and Privacy10.1007/978-981-96-1148-5_7(74-88)Online publication date: 28-Nov-2024

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media