Abstract
Worldwide, the Long Term Evolution Advanced technology has an unprecedented development and popularization in recent years. With the advantages of mobile communication technology, more and more researchers are focused on the security of mobile communication. Until then, some researches about covert channels over the 4th generation mobile communication technology had been proposed. Cantor Expansion is a permutation to a bijection of natural number, so it can be used as a coding scheme for a covert channel. In this paper, a novel class of covert channel based on Cantor Expansion (for decoding) and its inverse operation (for encoding) is proposed and designed for this mobile network. The description, analyses and evaluation of this covert channel will be present in the main part of this paper. Moreover, the peak value of camouflage capability can reach 1470 kbps. Nevertheless it doesnt affect the bandwidth of overt channel and it is difficult to be detected.
Similar content being viewed by others
References
3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio (E-UTRA) Physical Layer Procedures (Release 14). Technical Specification 36.213 (2016)
3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRAN), Medium Access Control (MAC) Protocol Specifications (Release 14). Technical Specification 36.321 (2016)
3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRAN), Radio Link Control (RLC) Protocol Specification (Release 13). Technical Specification 36.322 (2016)
3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRAN), Packet Data Convergence Protocol (PDCP) Specifications (Release 14). Technical Specification 36.323 (2016)
GSA: Evolution to LTE report: 4G Market and Technology Update. Global Mobile Suppliers Association, 26th October (2016)
Lampson, B.W.: A note on the confinement problem. Commun. ACM 16(10), 613–615 (1973)
Hijaz, Z., Frost, V.S.: Exploiting OFDM systems for covert communication. In: Military Communications Conference 2010, pp. 2149–2155. IEEE MILCOM (2010)
Kumar, P.P., Amirtharajan, R., Thenmozhi, K., Rayappan, J.B.B.: Steg-OFDM blend for highly secure multi-user communication. In: Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, pp. 1–5. IEEE Wireless VITAE (2011)
Szczypiorski, K., Mazurczyk, W.: Hiding data in OFDM symbols of IEEE 802.11 networks. In: Multimedia Information Networking and Security, pp. 835–840. IEEE Wireless MINES (2010)
Mazurczyk, W., Szaga, P., Szczypiorski, K.: Using transcoding for hidden communication in IP telephony. Multimed. Tools Appl. 70(3), 2139–2165 (2014)
Mazurczyk, W., Lubacz, J.: LACKa VoIP steganographic method. Telecommun. Syst. 45(2–3), 153–163 (2010)
Noda, H., Furuta, T., Niimi, M., Kawaguchi, E.: Video steganography based on bit-plane decomposition of wavelet-transformed video. In: Electronic Imaging 2004, pp. 345–353. International Society for Optics and Photonics (2004)
Hanafy, A.A., Salama, G.I., Mohasseb, Y.Z.: A secure covert communication model based on video steganography. In: Military Communications Conference 2008, pp. 1–6. IEEE MILCOM (2008)
Rezaei, F., Hempel, M., Peng, D., Qian, Y., Sharif, H.: A secure covert communication model based on video steganography. In: Wireless Communications and Networking Conference 2013, pp. 1903–1908. IEEE WCNC (2013)
Janicki, A., Mazurczyk, W., Szczypiorski, K.: Steganalysis of transcoding steganography. Ann. Telecommun. (annales des télécommunications) 69(7–8), 449–460 (2014)
Sinha, R., Papadopoulos, C., Heidemann, J.: Internet packet size distributions: Some observations. USC/Information Sciences Institute, Technical report, ISI-TR-2007-643 (2007)
Acknowledgments
This work was supported by the National Natural Science Foundation of China (No. 61572456), and the Natural Science Foundation of Jiangsu Province of China (No. BK20151241).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
He, Z., Huang, L., Yang, W., Wang, Z. (2017). Exploiting Cantor Expansion for Covert Channels over LTE-Advanced. In: Liu, D., Xie, S., Li, Y., Zhao, D., El-Alfy, ES. (eds) Neural Information Processing. ICONIP 2017. Lecture Notes in Computer Science(), vol 10638. Springer, Cham. https://doi.org/10.1007/978-3-319-70139-4_89
Download citation
DOI: https://doi.org/10.1007/978-3-319-70139-4_89
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70138-7
Online ISBN: 978-3-319-70139-4
eBook Packages: Computer ScienceComputer Science (R0)