Blockchain Meets Covert Communication: A Survey

被引:14
作者
Chen, Zhuo [1 ]
Zhu, Liehuang [1 ]
Jiang, Peng [1 ]
Zhang, Can [1 ]
Gao, Feng [1 ]
He, Jialing [2 ]
Xu, Dawei [3 ,4 ]
Zhang, Yan [5 ,6 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[3] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[4] Changchun Univ, Coll Cybersecur, Changchun 130022, Peoples R China
[5] Univ Oslo, Dept Informat, N-0315 Oslo, Norway
[6] Simula Metropolitan Ctr Digital Engn, Ctr Resilient Networks & Applicat, N-0167 Oslo, Norway
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2022年 / 24卷 / 04期
基金
中国国家自然科学基金;
关键词
Blockchain; covert communication; covert channel; Bitcoin; Ethereum; NEXT-GENERATION BOTNETS; TIMING CHANNELS; CHALLENGES; SECURITY; MODEL; INTERNET; BITCOIN; SYSTEM;
D O I
10.1109/COMST.2022.3204281
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Covert communication enables covert information transmission in an undetectable way to prevent the exposure of communication behaviors. Blockchain-based covert communication breaks through the limitations on concealment, reliability and anti-traceability, and has shown promising application prospects in both sensitive data transmission and botnets. Although there are studies on blockchain-based covert communication, it still lacks a systematic investigation. In this paper, we conduct a comprehensive study on channel building and survey its core technologies by information embedding, transaction filtering, and transaction obfuscation. We also summarize evaluation metrics to better analyze blockchain-based covert channels. Privacy aspects are also discussed. Finally, we suggest seven future directions to stir research efforts into this area.
引用
收藏
页码:2163 / 2192
页数:30
相关论文
共 204 条
  • [1] Adair S., 2010, SHADOWS CLOUD INVEST
  • [2] Ali J., 2021, INT J COMPUT DIGIT S, V11, P20
  • [3] Applications of Blockchains in the Internet of Things: A Comprehensive Survey
    Ali, Muhammad Salek
    Vecchio, Massimo
    Pincheira, Miguel
    Dolui, Koustabh
    Antonelli, Fabio
    Rehmani, Mubashir Husain
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1676 - 1717
  • [4] Ali M, 2016, PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, P181
  • [5] A Comparative Study: Blockchain Technology Utilization Benefits, Challenges and Functionalities
    Ali, Omar
    Jaradat, Ashraf
    Kulakli, Atik
    Abuhalimeh, Ahmed
    [J]. IEEE ACCESS, 2021, 9 : 12730 - 12749
  • [6] ZombieCoin 2.0: managing next-generation botnets using Bitcoin
    Ali, Syed Taha
    McCorry, Patrick
    Lee, Peter Hyun-Jeen
    Hao, Feng
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (04) : 411 - 422
  • [7] ZombieCoin: Powering Next-Generation Botnets with Bitcoin
    Ali, Syed Taha
    McCorry, Patrick
    Lee, Peter Hyun-Jeen
    Hao, Feng
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8976 : 34 - 48
  • [8] Alsalami N., 2019, 2019 IEEE C DEPENDAB, P1
  • [9] Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activity
    Alsalami, Nasser
    Zhang, Bingsheng
    [J]. 2020 IEEE/ACM 28TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2020,
  • [10] Ameri A., 2017, P 2017 INT C CRYPT W, P62