An end-to-end covert channel via packet dropout for mobile networks

Yu an Tan, Xinting Xu, Chen Liang, Xiaosong Zhang, Quanxin Zhang, Yuanzhang Li*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

33 Citations (Scopus)

Abstract

Voice over Long-Term Evolution enables reliable transmission among enormous Internet of Things devices, by providing end-to-end quality of service for Internet protocol–based services such as audio, video, and multimedia messaging. The research of covert timing channels aims at transmitting covert message stealthily to the receiver using variations of timing behavior. Existing approaches mainly modulate the covert message into inter-packet delays of overt traffic, which are not suitable for Voice over Long-Term Evolution, since most of the inter-packet delays of Voice over Long-Term Evolution traffic are of regular distribution, and any modification on inter-packet delays is easy to be detected. To address the issue, in this work, we propose a novel covert timing channel for the video stream in Voice over Long-Term Evolution, which modulates the covert message by deliberately dropping out video packets. Based on the two-dimensional mapping matrix, the blocks of covert message are mapped into dropout-packet sequence numbers. To recover the covert message, the receiver retrieves the sequence numbers of lost packets and identifies them to be translated into blocks of the covert message. To evaluate our scheme, the simulations with different packet loss rates are conducted to validate the undetectability, throughput, and robustness, finally, the results show that this scheme is effective and reliable.

Original languageEnglish
JournalInternational Journal of Distributed Sensor Networks
Volume14
Issue number5
DOIs
Publication statusPublished - 1 May 2018

Keywords

  • Covert timing channel
  • Voice over Long-Term Evolution
  • packet dropout
  • robustness
  • undetectability

Fingerprint

Dive into the research topics of 'An end-to-end covert channel via packet dropout for mobile networks'. Together they form a unique fingerprint.

Cite this