Skip to main content

2017 | OriginalPaper | Buchkapitel

Exploiting Cantor Expansion for Covert Channels over LTE-Advanced

verfasst von : Zhiqiang He, Liusheng Huang, Wei Yang, Zukui Wang

Erschienen in: Neural Information Processing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Worldwide, the Long Term Evolution Advanced technology has an unprecedented development and popularization in recent years. With the advantages of mobile communication technology, more and more researchers are focused on the security of mobile communication. Until then, some researches about covert channels over the 4th generation mobile communication technology had been proposed. Cantor Expansion is a permutation to a bijection of natural number, so it can be used as a coding scheme for a covert channel. In this paper, a novel class of covert channel based on Cantor Expansion (for decoding) and its inverse operation (for encoding) is proposed and designed for this mobile network. The description, analyses and evaluation of this covert channel will be present in the main part of this paper. Moreover, the peak value of camouflage capability can reach 1470 kbps. Nevertheless it doesnt affect the bandwidth of overt channel and it is difficult to be detected.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat 3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio (E-UTRA) Physical Layer Procedures (Release 14). Technical Specification 36.213 (2016) 3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio (E-UTRA) Physical Layer Procedures (Release 14). Technical Specification 36.213 (2016)
2.
Zurück zum Zitat 3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRAN), Medium Access Control (MAC) Protocol Specifications (Release 14). Technical Specification 36.321 (2016) 3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRAN), Medium Access Control (MAC) Protocol Specifications (Release 14). Technical Specification 36.321 (2016)
3.
Zurück zum Zitat 3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRAN), Radio Link Control (RLC) Protocol Specification (Release 13). Technical Specification 36.322 (2016) 3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRAN), Radio Link Control (RLC) Protocol Specification (Release 13). Technical Specification 36.322 (2016)
4.
Zurück zum Zitat 3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRAN), Packet Data Convergence Protocol (PDCP) Specifications (Release 14). Technical Specification 36.323 (2016) 3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRAN), Packet Data Convergence Protocol (PDCP) Specifications (Release 14). Technical Specification 36.323 (2016)
5.
Zurück zum Zitat GSA: Evolution to LTE report: 4G Market and Technology Update. Global Mobile Suppliers Association, 26th October (2016) GSA: Evolution to LTE report: 4G Market and Technology Update. Global Mobile Suppliers Association, 26th October (2016)
6.
Zurück zum Zitat Lampson, B.W.: A note on the confinement problem. Commun. ACM 16(10), 613–615 (1973)CrossRef Lampson, B.W.: A note on the confinement problem. Commun. ACM 16(10), 613–615 (1973)CrossRef
7.
Zurück zum Zitat Hijaz, Z., Frost, V.S.: Exploiting OFDM systems for covert communication. In: Military Communications Conference 2010, pp. 2149–2155. IEEE MILCOM (2010) Hijaz, Z., Frost, V.S.: Exploiting OFDM systems for covert communication. In: Military Communications Conference 2010, pp. 2149–2155. IEEE MILCOM (2010)
8.
Zurück zum Zitat Kumar, P.P., Amirtharajan, R., Thenmozhi, K., Rayappan, J.B.B.: Steg-OFDM blend for highly secure multi-user communication. In: Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, pp. 1–5. IEEE Wireless VITAE (2011) Kumar, P.P., Amirtharajan, R., Thenmozhi, K., Rayappan, J.B.B.: Steg-OFDM blend for highly secure multi-user communication. In: Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, pp. 1–5. IEEE Wireless VITAE (2011)
9.
Zurück zum Zitat Szczypiorski, K., Mazurczyk, W.: Hiding data in OFDM symbols of IEEE 802.11 networks. In: Multimedia Information Networking and Security, pp. 835–840. IEEE Wireless MINES (2010) Szczypiorski, K., Mazurczyk, W.: Hiding data in OFDM symbols of IEEE 802.11 networks. In: Multimedia Information Networking and Security, pp. 835–840. IEEE Wireless MINES (2010)
10.
Zurück zum Zitat Mazurczyk, W., Szaga, P., Szczypiorski, K.: Using transcoding for hidden communication in IP telephony. Multimed. Tools Appl. 70(3), 2139–2165 (2014)CrossRef Mazurczyk, W., Szaga, P., Szczypiorski, K.: Using transcoding for hidden communication in IP telephony. Multimed. Tools Appl. 70(3), 2139–2165 (2014)CrossRef
11.
Zurück zum Zitat Mazurczyk, W., Lubacz, J.: LACKa VoIP steganographic method. Telecommun. Syst. 45(2–3), 153–163 (2010)CrossRef Mazurczyk, W., Lubacz, J.: LACKa VoIP steganographic method. Telecommun. Syst. 45(2–3), 153–163 (2010)CrossRef
12.
Zurück zum Zitat Noda, H., Furuta, T., Niimi, M., Kawaguchi, E.: Video steganography based on bit-plane decomposition of wavelet-transformed video. In: Electronic Imaging 2004, pp. 345–353. International Society for Optics and Photonics (2004) Noda, H., Furuta, T., Niimi, M., Kawaguchi, E.: Video steganography based on bit-plane decomposition of wavelet-transformed video. In: Electronic Imaging 2004, pp. 345–353. International Society for Optics and Photonics (2004)
13.
Zurück zum Zitat Hanafy, A.A., Salama, G.I., Mohasseb, Y.Z.: A secure covert communication model based on video steganography. In: Military Communications Conference 2008, pp. 1–6. IEEE MILCOM (2008) Hanafy, A.A., Salama, G.I., Mohasseb, Y.Z.: A secure covert communication model based on video steganography. In: Military Communications Conference 2008, pp. 1–6. IEEE MILCOM (2008)
14.
Zurück zum Zitat Rezaei, F., Hempel, M., Peng, D., Qian, Y., Sharif, H.: A secure covert communication model based on video steganography. In: Wireless Communications and Networking Conference 2013, pp. 1903–1908. IEEE WCNC (2013) Rezaei, F., Hempel, M., Peng, D., Qian, Y., Sharif, H.: A secure covert communication model based on video steganography. In: Wireless Communications and Networking Conference 2013, pp. 1903–1908. IEEE WCNC (2013)
15.
Zurück zum Zitat Janicki, A., Mazurczyk, W., Szczypiorski, K.: Steganalysis of transcoding steganography. Ann. Telecommun. (annales des télécommunications) 69(7–8), 449–460 (2014)CrossRef Janicki, A., Mazurczyk, W., Szczypiorski, K.: Steganalysis of transcoding steganography. Ann. Telecommun. (annales des télécommunications) 69(7–8), 449–460 (2014)CrossRef
16.
Zurück zum Zitat Sinha, R., Papadopoulos, C., Heidemann, J.: Internet packet size distributions: Some observations. USC/Information Sciences Institute, Technical report, ISI-TR-2007-643 (2007) Sinha, R., Papadopoulos, C., Heidemann, J.: Internet packet size distributions: Some observations. USC/Information Sciences Institute, Technical report, ISI-TR-2007-643 (2007)
Metadaten
Titel
Exploiting Cantor Expansion for Covert Channels over LTE-Advanced
verfasst von
Zhiqiang He
Liusheng Huang
Wei Yang
Zukui Wang
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-70139-4_89