2018
DOI: 10.1177/1550147718779568
|View full text |Cite
|
Sign up to set email alerts
|

An end-to-end covert channel via packet dropout for mobile networks

Abstract: Voice over Long-Term Evolution enables reliable transmission among enormous Internet of Things devices, by providing end-to-end quality of service for Internet protocol-based services such as audio, video, and multimedia messaging. The research of covert timing channels aims at transmitting covert message stealthily to the receiver using variations of timing behavior. Existing approaches mainly modulate the covert message into inter-packet delays of overt traffic, which are not suitable for Voice over Long-Ter… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 26 publications
(5 citation statements)
references
References 38 publications
0
5
0
Order By: Relevance
“…Houmansadr et al 64 described the CoCo scheme, which was designed with a robust coding algorithm, and the covert messages was embedded into inter‐packet delays. Tan et al 21 proposed a covert channel over VoLTE via packet dropout, and robustness was guaranteed by additional packet dropouts.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Houmansadr et al 64 described the CoCo scheme, which was designed with a robust coding algorithm, and the covert messages was embedded into inter‐packet delays. Tan et al 21 proposed a covert channel over VoLTE via packet dropout, and robustness was guaranteed by additional packet dropouts.…”
Section: Related Workmentioning
confidence: 99%
“…Since packet payloads of VoLTE traffic are not encrypted during the currently implemented transmission, building a covert timing channel over VoLTE is a viable and practical solution. Inspired by the features of packet dropouts, 21,22 we propose a novel VoLTE covert timing channel scheme that is constructed by dropping packets with specific sequence numbers. More specifically, the encrypted covert message is first subdivided into fixed-length message blocks.…”
Section: Introductionmentioning
confidence: 99%
“…An efficient one round certificateless authenticated group key agreement protocol is proposed in [49], [50], it satisfies the security demand of mobile Ad Hoc networks. The protocol has achieved appropriate optimization to improve the performance of Ad Hoc networks in terms of frequent communication interruptions and reconnections.…”
Section: A Related Workmentioning
confidence: 99%
“…erefore, the new technique of database synchronization between isolated networks is worth further study. e general network isolation scheme is implemented by installing a network isolation device between trusted intranet and nontrusted internet [8][9][10][11][12][13][14][15][16][17][18][19]. e principle is based on the idea of access control and physical isolation and defines relevant constraints and rules to guarantee the security strength of the network.…”
Section: Introductionmentioning
confidence: 99%