A Covert Channel Over VoLTE via Adjusting Silence Periods

被引:87
|
作者
Zhang, Xiaosong [1 ,2 ]
Tan, Yu-An [1 ]
Liang, Chen [1 ]
Li, Yuanzhang [1 ,3 ]
Li, Jin [4 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[2] Tangshan Univ, Dept Comp Sci & Technol, Tangshan 063000, Peoples R China
[3] Res Ctr Mass Language Informat Proc & Cloud Comp, Beijing 100081, Peoples R China
[4] Guangzhou Univ, Sch Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Covert channel; VoLTE; voice activity detection; silence period; SCHEME;
D O I
10.1109/ACCESS.2018.2802783
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Covert channels represent unforeseen communication methods that exploit authorized overt communication as the carrier medium for covert messages. Covert channels can be a secure and effective means of transmitting confidential information hidden in overt traffic. For covert timing channel, the covert message is usually modulated into inter-packet delays (IPDs) of legitimate traffic, which is not suitable for voice over LTE (VoLTE) since the IPDs of VoLTE traffic are fixed to lose the possibility of being modulated. For this reason, we propose a covert channel via adjusting silence periods, which modulates covert message by the postponing or extending silence periods in VoLTE traffic. To keep the robustness, we employ the Gray code to encode the covert message to reduce the impact of packet loss. Moreover, the proposed covert channel enables the tradeoff between the robustness and voice quality which is an important performance indicator for VoLTE. The experiment results show that the proposed covert channel is undetectable by statistical tests and outperforms the other covert channels based on IPDs in terms of robustness.
引用
收藏
页码:9292 / 9302
页数:11
相关论文
共 50 条
  • [31] Covert channel limitation via special dummy traffic generating
    Epishkina, Anna
    Karapetyants, Nikolay
    Kogos, Konstantin
    Lebedev, Philip
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (03) : 341 - 349
  • [32] Exploiting WiMAX for covert transmission of secret data over fading channel
    Kumar, Sanjeev
    Kumar, Manoj
    Singh, Amarpal
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (08)
  • [33] A Robust Packet-Dropout Covert Channel over Wireless Networks
    Li, Yuanzhang
    Zhang, Xiaosong
    Xu, Xinting
    Tan, Yu-an
    IEEE WIRELESS COMMUNICATIONS, 2020, 27 (03) : 60 - 65
  • [34] Building packet length covert channel over mobile VoIP traffics
    Liang, Chen
    Tan, Yu-an
    Zhang, Xiaosong
    Wang, Xianmin
    Zheng, Jun
    Zhang, Quanxin
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 118 : 144 - 153
  • [35] Reverse Engineering with Bioinformatics Algorithms over a Sound Android Covert Channel
    Vargas Razo, Sergio Ivan
    Aguirre Anaya, Eleazar
    Escamilla Ambrosio, Ponciano Jorge
    2016 11TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), 2016, : 3 - 9
  • [36] Optimal Throughput for Covert Communication Over a Classical-Quantum Channel
    Wang, Ligong
    2016 IEEE INFORMATION THEORY WORKSHOP (ITW), 2016,
  • [37] A Covert Timing Channel via Algorithmic Complexity Attacks: Design and Analysis
    Sun, Xiaoshan
    Cheng, Liang
    Zhang, Yang
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [38] Determining Proximal Geolocation of IoT Edge Devices via Covert Channel
    Islam, Md Nazmul
    Patil, Vinay C.
    Kundu, Sandip
    PROCEEDINGS OF THE EIGHTEENTH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED), 2017, : 196 - 202
  • [39] MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding
    Zhang, Juchuan
    Ji, Xiaoyu
    Xu, Wenyuan
    Chen, Yi-Chao
    Tang, Yuting
    Qu, Gang
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2020, : 357 - 366
  • [40] Covert Communication Over a K-User Multiple-Access Channel
    Arumugam, Keerthi Suria Kumar
    Bloch, Matthieu R.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (11) : 7020 - 7044