Blockchain Meets Covert Communication: A Survey

被引:14
作者
Chen, Zhuo [1 ]
Zhu, Liehuang [1 ]
Jiang, Peng [1 ]
Zhang, Can [1 ]
Gao, Feng [1 ]
He, Jialing [2 ]
Xu, Dawei [3 ,4 ]
Zhang, Yan [5 ,6 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[3] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[4] Changchun Univ, Coll Cybersecur, Changchun 130022, Peoples R China
[5] Univ Oslo, Dept Informat, N-0315 Oslo, Norway
[6] Simula Metropolitan Ctr Digital Engn, Ctr Resilient Networks & Applicat, N-0167 Oslo, Norway
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2022年 / 24卷 / 04期
基金
中国国家自然科学基金;
关键词
Blockchain; covert communication; covert channel; Bitcoin; Ethereum; NEXT-GENERATION BOTNETS; TIMING CHANNELS; CHALLENGES; SECURITY; MODEL; INTERNET; BITCOIN; SYSTEM;
D O I
10.1109/COMST.2022.3204281
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Covert communication enables covert information transmission in an undetectable way to prevent the exposure of communication behaviors. Blockchain-based covert communication breaks through the limitations on concealment, reliability and anti-traceability, and has shown promising application prospects in both sensitive data transmission and botnets. Although there are studies on blockchain-based covert communication, it still lacks a systematic investigation. In this paper, we conduct a comprehensive study on channel building and survey its core technologies by information embedding, transaction filtering, and transaction obfuscation. We also summarize evaluation metrics to better analyze blockchain-based covert channels. Privacy aspects are also discussed. Finally, we suggest seven future directions to stir research efforts into this area.
引用
收藏
页码:2163 / 2192
页数:30
相关论文
共 204 条
  • [41] Cabuk Serdar, 2004, P 11 ACM C COMP COMM, P178, DOI DOI 10.1145/1030083.1030108
  • [42] Chain-Based Covert Data Embedding Schemes in Blockchain
    Cao, Haotian
    Yin, Hao
    Gao, Feng
    Zhang, Zijian
    Khoussainov, Bakh
    Xu, Shubin
    Zhu, Liehuang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16): : 14699 - 14707
  • [43] Castiglione A., 2019, PROC INT C DEPEND SE, P231
  • [44] Trends and Challenges in Network Covert Channels Countermeasures
    Caviglione, Luca
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (04): : 1 - 16
  • [45] Çavusoglu IG, 2020, SIG PROCESS COMMUN
  • [46] Chainalysis, 2020, The 2020 state of crypto-crime
  • [47] When Blockchain Meets Supply Chain: A Systematic Literature Review on Current Development and Potential Applications
    Chang, Shuchih E.
    Chen, Yichian
    [J]. IEEE ACCESS, 2020, 8 : 62478 - 62494
  • [48] Chary S.U.M., 2022, ARXIV
  • [49] Chen FY, 2015, 2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P166, DOI 10.1109/ISI.2015.7165963
  • [50] Revisited-The Subliminal Channel in Blockchain and Its Application to IoT Security
    Chen, Tzung-Her
    Lee, Wei-Bin
    Chen, Hsing-Bai
    Wang, Chien-Lung
    [J]. SYMMETRY-BASEL, 2021, 13 (05):