A Robust Covert Channel With Self-Bit Recovery for IEEE 802.11 Networks

被引:0
作者
Son, Seunghwan [1 ]
Kwon, Deokkyu [1 ]
Lee, Sangwoo [2 ]
Jeon, Yongsung [2 ]
Park, Youngho [1 ]
机构
[1] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
[2] Elect & Telecommun Res Inst, Informat Secur Res Div, Daejeon 34129, South Korea
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 16期
基金
新加坡国家研究基金会;
关键词
Receivers; Wireless communication; Timing; IEEE; 802.11; Standard; Packet loss; Internet of Things; Communication system security; Covert storage channel (CSC); covert timing channel (CTC); self-bit recovery; Wi-Fi; Zynq board; STORAGE; ATTACKS;
D O I
10.1109/JIOT.2024.3398579
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Covert channels are commonly perceived as potential attack vectors in wireless communication environments and are categorized into covert timing channels (CTCs) and covert storage channels based on their creation method. Although CTCs are generally difficult to detect, we identified their potential use as secure message carriers in wireless communication, particularly within the IEEE 802.11 environments. In this context, access points continuously broadcast packets to nearby devices. Our aim was to create a robust CTC using these broadcast packets. However, IEEE 802.11 operates as a one-way communication channel, which prevents the covert receiver from confirming proper message reception. Moreover, in the event of incorrect reception, the receiver cannot send an ACK to the sender to avoid detection risk. This article proposes a CTC with a self-bit recovery function for consecutive two-bit losses. We validated the practicality of our proposed CTC through simulations involving laptops and a Zynq board. Furthermore, we assessed the robustness of our covert channel and compared its performance with that of existing CTCs. The results indicate superior covertness, higher capacity, and transmission accuracy compared with existing CTCs. Notably, our study represents the first CTC algorithm capable of recovering consecutive 2-bit losses.
引用
收藏
页码:27356 / 27368
页数:13
相关论文
共 40 条
  • [1] Covert Channels-Based Stealth Attacks in Industry 4.0
    Alcaraz, Cristina
    Bernieri, Giuseppe
    Pascucci, Federica
    Lopez, Javier
    Setola, Roberto
    [J]. IEEE SYSTEMS JOURNAL, 2019, 13 (04): : 3980 - 3988
  • [2] On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System
    Bagga, Palak
    Das, Ashok Kumar
    Wazid, Mohammad
    Rodrigues, Joel J. P. C.
    Choo, Kim-Kwang Raymond
    Park, YoungHo
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (02) : 1736 - 1751
  • [3] Banerji S, 2014, Arxiv, DOI arXiv:1307.2661
  • [4] Logic of authentication
    Burrows, Michael
    Abadi, Martin
    Needham, Roger
    [J]. Operating Systems Review (ACM), 1989, 23 (05): : 1 - 13
  • [5] Cabuk S., 2004, P 11 ACM C COMP COMM, P178
  • [6] Cabuk S., 2006, Network covert channels: Design, analysis, detection, andelimination
  • [7] An information-theoretic model for steganography
    Cachin, C
    [J]. INFORMATION AND COMPUTATION, 2004, 192 (01) : 41 - 56
  • [8] Conover W.J., 1991, Practical Non-parametric Statistics, V3rd
  • [9] Building Covert Channels over the Packet Reordering Phenomenon
    El-Atawy, Adel
    Al-Shaer, Ehab
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2186 - 2194
  • [10] Forouzan B. A., 2002, TCPIP PROTOCOL SUITE