Blockchain Meets Covert Communication: A Survey

被引:14
作者
Chen, Zhuo [1 ]
Zhu, Liehuang [1 ]
Jiang, Peng [1 ]
Zhang, Can [1 ]
Gao, Feng [1 ]
He, Jialing [2 ]
Xu, Dawei [3 ,4 ]
Zhang, Yan [5 ,6 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[3] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[4] Changchun Univ, Coll Cybersecur, Changchun 130022, Peoples R China
[5] Univ Oslo, Dept Informat, N-0315 Oslo, Norway
[6] Simula Metropolitan Ctr Digital Engn, Ctr Resilient Networks & Applicat, N-0167 Oslo, Norway
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2022年 / 24卷 / 04期
基金
中国国家自然科学基金;
关键词
Blockchain; covert communication; covert channel; Bitcoin; Ethereum; NEXT-GENERATION BOTNETS; TIMING CHANNELS; CHALLENGES; SECURITY; MODEL; INTERNET; BITCOIN; SYSTEM;
D O I
10.1109/COMST.2022.3204281
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Covert communication enables covert information transmission in an undetectable way to prevent the exposure of communication behaviors. Blockchain-based covert communication breaks through the limitations on concealment, reliability and anti-traceability, and has shown promising application prospects in both sensitive data transmission and botnets. Although there are studies on blockchain-based covert communication, it still lacks a systematic investigation. In this paper, we conduct a comprehensive study on channel building and survey its core technologies by information embedding, transaction filtering, and transaction obfuscation. We also summarize evaluation metrics to better analyze blockchain-based covert channels. Privacy aspects are also discussed. Finally, we suggest seven future directions to stir research efforts into this area.
引用
收藏
页码:2163 / 2192
页数:30
相关论文
共 204 条
  • [11] [Anonymous], BITCOIN T
  • [12] [Anonymous], ANAL PONY C C SERVER
  • [13] [Anonymous], 2016, P 2016 ACM SIGSAC C
  • [14] [Anonymous], BITCOIN AVERAGE T FE
  • [15] [Anonymous], ONE INPUT 2 OUTPUT T
  • [16] Design and performance evaluation of a covert timing channel
    Archibald, Rennie
    Ghosal, Dipak
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (08) : 755 - 770
  • [17] A reliable and efficient micro-protocol for data transmission over an RTP-based covert channel
    Azadmanesh, Maryam
    Mahdavi, Mojtaba
    Ghahfarokhi, Behrouz Shahgholi
    [J]. MULTIMEDIA SYSTEMS, 2020, 26 (02) : 173 - 190
  • [18] Baden M, 2019, 2019 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT 2019), P77, DOI [10.1109/CVCBT.2019.00009, 10.1109/CVCBT.2019.00014]
  • [19] Bartoletti Massimo, 2017, Financial Cryptography and Data Security. FC 2017 International Workshops WAHC, BITCOIN, VOTING, WTSC, and TA. Revised Selected Papers: LNCS 10323, P218, DOI 10.1007/978-3-319-70278-0_14
  • [20] Basuki AI, 2019, 2019 INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL, INFORMATICS AND ITS APPLICATIONS (IC3INA), P41, DOI [10.1109/IC3INA48034.2019.8949606, 10.1109/ic3ina48034.2019.8949606]