Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Covert Timing Channels for IoT over Mobile Networks

Published: 01 December 2018 Publication History

Abstract

Various security threats have prompted covert timing channels to become an important alternative for the transmission of confidential information in an untrusted Internet of Things (IoT). This article aims to demonstrate the susceptibility of IoT to covert timing channels over mobile networks. It presents the system model of a covert timing channel for IoT and then analyzes whether the traditional covert timing channels based on inter-packet delays apply to IoT over 4G/5G networks. Given that there are so many covert timing channels proposed for computer networks, we investigate different kinds of construction approaches of covert timing channels to illustrate the feasibility of building covert timing channels for IoT, including packet-reordering-based, rateswitching- based, packet-loss-based, retransmission- based, and scheduling-based covert timing channels. Furthermore, this article also discusses several detection methods of revealing and preventing covert timing channels for IoT.

References

[1]
X. Du, “ A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks,” IEEE Trans. Wireless Commun., vol. Volume 8, no. Issue 3, 2009, pp. 1223–29.
[2]
X. Du, “ An Effective Key Management Scheme for Heterogeneous Sensor Networks,” Ad Hoc Networks, vol. Volume 5, no. Issue 1, 2007, pp. 24–34.
[3]
Y. Xiao, “ A Survey of Key Management Schemes in Wireless Sensor Networks,” Computer Commun., vol. Volume 30, no. pp. 11–12, 2007, pp. 2314–41.
[4]
L. Wu, X. Du, and J. Wu, “ Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms,” IEEE Trans. Vehic. Tech., vol. Volume 65, no. Issue 8, 2016, pp. 6678–91.
[5]
Y. Cheng, “ A Lightweight Live Memory Forensic Approach Based on Hardware Virtualization,” Info. Sciences, vol. Volume 379, 2016, pp. 23–41.
[6]
A. EI-Atawy, Q. Duan, and E. AI-Shaer, “ A Novel Class of Robust Covert Channels Using Out-Of-Order Packets,” IEEE Trans. Dependable and Secure Computing, vol. Volume 14, no. Issue 2, 2017, pp. 116–29.
[7]
X. Zhang, “ Building Covert Timing Channels by Packet Rearrangement over Mobile Networks,” Info. Sciences, vol. Volume 445-446, 2018, pp. 66–78.
[8]
H. Tian, “ Hiding Information into Voice-Over-IP Streams Using Adaptive Bitrate Modulation,” IEEE Commun. Letters, vol. Volume 21, no. Issue 4, 2017, pp. 749–52.
[9]
J. Liu, H. Tian, and K. Zhou, “ Frame-Bitrate-Change Based Steganography for Voice-Over-IP,” J. Central South Univ., vol. Volume 21, no. Issue 12, 2014, pp. 4544–52.
[10]
W. Mazurczyk, “ Lost Audio Packets Steganography: The First Practical Evaluation,” Security and Commun. Networks, vol. Volume 5, no. Issue 12, 2012, pp. 1394–1403.
[11]
Y. Jiang, “ Covert Voice Over Internet Protocol Communications with Packet loss Based on Fractal Interpolation,” ACM Trans. Multimedia Computing, Commun., and Applications, vol. Volume 12, no. Issue 4, 2016, pp. 54: pp. 1–20.
[12]
C. Krätzer, “ WLAN Steganography: A First Practical Review,” in Proc. 8th Wksp. Multimedia and Security, 2006, pp. 17–22.
[13]
W. Mazurczyk, M. Smolarczyk, and K. Szczypiorski, “ Retransmission Steganography and Its Detection,” Soft Computing, vol. Volume 15, no. Issue 3, 2011, pp. 505–15.
[14]
H. Hovhannisyan, K. Lu, and J. Wang, “<chapter-title>A Novel High-Speed IP-Timing Covert Channel: Design and Evaluation</chapter-title>,” 2015 IEEE ICC, 2015, pp. 7198–203.
[15]
A. Ghassami, X. Gong, and N. Kiyavash, “ Capacity Limit of Queueing Timing Channel in Shared FCFS Schedulers,” in 2015 IEEE Int'l. Symp. Info. Theory, 2015, pp. 789–93.

Cited By

View all
  • (2024)Privacy-Preserving Covert Channels in VoLTE via Inter-Frame Delay ModulationArtificial Intelligence Security and Privacy10.1007/978-981-96-1148-5_7(74-88)Online publication date: 28-Nov-2024
  • (2023)A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouseArtificial Intelligence Security and Privacy10.1007/978-981-99-9785-5_22(316-327)Online publication date: 3-Dec-2023
  • (2022)Exploring Timing Covert Channel Performance over the IEEE 802.15.42022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA)10.1109/ETFA52439.2022.9921473(1-8)Online publication date: 6-Sep-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Wireless Communications
IEEE Wireless Communications  Volume 25, Issue 6
December 2018
126 pages

Publisher

IEEE Press

Publication History

Published: 01 December 2018

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 31 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Privacy-Preserving Covert Channels in VoLTE via Inter-Frame Delay ModulationArtificial Intelligence Security and Privacy10.1007/978-981-96-1148-5_7(74-88)Online publication date: 28-Nov-2024
  • (2023)A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouseArtificial Intelligence Security and Privacy10.1007/978-981-99-9785-5_22(316-327)Online publication date: 3-Dec-2023
  • (2022)Exploring Timing Covert Channel Performance over the IEEE 802.15.42022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA)10.1109/ETFA52439.2022.9921473(1-8)Online publication date: 6-Sep-2022
  • (2022)A robust packet‐dropping covert channel for mobile intelligent terminalsInternational Journal of Intelligent Systems10.1002/int.2286837:10(6928-6950)Online publication date: 7-Mar-2022
  • (2021)Comprehensive analysis of MQTT 5.0 susceptibility to network covert channelsComputers and Security10.1016/j.cose.2021.102207104:COnline publication date: 1-May-2021
  • (2021)An Efficient Bounded Model Checking Approach for Web Service CompositionMobile Networks and Applications10.1007/s11036-019-01486-226:4(1503-1513)Online publication date: 1-Aug-2021
  • (2020)Building Undetectable Covert Channels Over Mobile Networks with Machine LearningMachine Learning for Cyber Security10.1007/978-3-030-62223-7_28(331-339)Online publication date: 8-Oct-2020

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media