TY - JOUR
T1 - Covert Timing Channels for IoT over Mobile Networks
AU - Tan, Yu An
AU - Zhang, Xiaosong
AU - Sharif, Kashif
AU - Liang, Chen
AU - Zhang, Quanxin
AU - Li, Yuanzhang
N1 - Publisher Copyright:
© 2002-2012 IEEE.
PY - 2018/12
Y1 - 2018/12
N2 - Various security threats have prompted covert timing channels to become an important alternative for the transmission of confidential information in an untrusted Internet of Things (IoT). This article aims to demonstrate the susceptibility of IoT to covert timing channels over mobile networks. It presents the system model of a covert timing channel for IoT and then analyzes whether the traditional covert timing channels based on inter-packet delays apply to IoT over 4G/5G networks. Given that there are so many covert timing channels proposed for computer networks, we investigate different kinds of construction approaches of covert timing channels to illustrate the feasibility of building covert timing channels for IoT, including packet-reordering-based, rateswitching- based, packet-loss-based, retransmission- based, and scheduling-based covert timing channels. Furthermore, this article also discusses several detection methods of revealing and preventing covert timing channels for IoT.
AB - Various security threats have prompted covert timing channels to become an important alternative for the transmission of confidential information in an untrusted Internet of Things (IoT). This article aims to demonstrate the susceptibility of IoT to covert timing channels over mobile networks. It presents the system model of a covert timing channel for IoT and then analyzes whether the traditional covert timing channels based on inter-packet delays apply to IoT over 4G/5G networks. Given that there are so many covert timing channels proposed for computer networks, we investigate different kinds of construction approaches of covert timing channels to illustrate the feasibility of building covert timing channels for IoT, including packet-reordering-based, rateswitching- based, packet-loss-based, retransmission- based, and scheduling-based covert timing channels. Furthermore, this article also discusses several detection methods of revealing and preventing covert timing channels for IoT.
UR - http://www.scopus.com/inward/record.url?scp=85059843664&partnerID=8YFLogxK
U2 - 10.1109/MWC.2017.1800062
DO - 10.1109/MWC.2017.1800062
M3 - Article
AN - SCOPUS:85059843664
SN - 1536-1284
VL - 25
SP - 38
EP - 44
JO - IEEE Wireless Communications
JF - IEEE Wireless Communications
IS - 6
M1 - 8600755
ER -