A Covert Channel Over VoLTE via Adjusting Silence Periods

被引:87
|
作者
Zhang, Xiaosong [1 ,2 ]
Tan, Yu-An [1 ]
Liang, Chen [1 ]
Li, Yuanzhang [1 ,3 ]
Li, Jin [4 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[2] Tangshan Univ, Dept Comp Sci & Technol, Tangshan 063000, Peoples R China
[3] Res Ctr Mass Language Informat Proc & Cloud Comp, Beijing 100081, Peoples R China
[4] Guangzhou Univ, Sch Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Covert channel; VoLTE; voice activity detection; silence period; SCHEME;
D O I
10.1109/ACCESS.2018.2802783
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Covert channels represent unforeseen communication methods that exploit authorized overt communication as the carrier medium for covert messages. Covert channels can be a secure and effective means of transmitting confidential information hidden in overt traffic. For covert timing channel, the covert message is usually modulated into inter-packet delays (IPDs) of legitimate traffic, which is not suitable for voice over LTE (VoLTE) since the IPDs of VoLTE traffic are fixed to lose the possibility of being modulated. For this reason, we propose a covert channel via adjusting silence periods, which modulates covert message by the postponing or extending silence periods in VoLTE traffic. To keep the robustness, we employ the Gray code to encode the covert message to reduce the impact of packet loss. Moreover, the proposed covert channel enables the tradeoff between the robustness and voice quality which is an important performance indicator for VoLTE. The experiment results show that the proposed covert channel is undetectable by statistical tests and outperforms the other covert channels based on IPDs in terms of robustness.
引用
收藏
页码:9292 / 9302
页数:11
相关论文
共 50 条
  • [21] YODA: Covert Communication Channel over Public DNS Resolvers
    Saha, Sandip
    Karapoola, Sareena
    Rebeiro, Chester
    Kamakoti, V
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, DSN, 2023, : 252 - 260
  • [22] A Reliable Covert Channel over IEEE 802.15.4 using Steganography
    Nain, Ajay Kumar
    Rajalakshmi, P.
    2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 711 - 716
  • [23] Fundamental Limits of Covert Communication over MIMO AWGN Channel
    Abdelaziz, Amr
    Koksal, C. Emre
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 64 - 72
  • [24] MRCC: A Practical Covert Channel Over Monero With Provable Security
    Guo, Zhaozhong
    Shi, Liucheng
    Xu, Maozhi
    Yin, Hong
    IEEE ACCESS, 2021, 9 : 31816 - 31825
  • [25] DLchain: A Covert Channel over Blockchain Based on Dynamic Labels
    Tian, Jing
    Gou, Gaopeng
    Liu, Chang
    Chen, Yige
    Xiong, Gang
    Li, Zhen
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 814 - 830
  • [26] LoPhy: A Resilient and Fast Covert Channel over LoRa PHY
    Liu, Boya
    Gu, Chaojie
    He, Shibo
    Chen, Jiming
    PROCEEDINGS OF THE 2023 THE 22ND INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, IPSN 2023, 2023, : 1 - 13
  • [27] Exploring Timing Covert Channel Performance over the IEEE 802.15.4
    Severino, Ricardo
    Rodrigues, Joao
    Ferreira, Luis Lino
    2022 IEEE 27TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2022,
  • [28] LoPhy: A Resilient and Fast Covert Channel Over LoRa PHY
    Liu, Boya
    Gu, Chaojie
    He, Shibo
    Chen, Jiming
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, : 1 - 16
  • [29] Covert Surveillance via Proactive Eavesdropping Under Channel Uncertainty
    Cheng, Zihao
    Si, Jiangbo
    Li, Zan
    Guan, Lei
    Zhao, Yan
    Wang, Danyang
    Cheng, Julian
    Al-Dhahir, Naofal
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (06) : 4024 - 4037
  • [30] Covert channel limitation via special dummy traffic generating
    Anna Epishkina
    Nikolay Karapetyants
    Konstantin Kogos
    Philip Lebedev
    Journal of Computer Virology and Hacking Techniques, 2023, 19 : 341 - 349