Nothing Special   »   [go: up one dir, main page]

Skip to main content

Exploiting Cantor Expansion for Covert Channels over LTE-Advanced

  • Conference paper
  • First Online:
Neural Information Processing (ICONIP 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10638))

Included in the following conference series:

  • 4712 Accesses

Abstract

Worldwide, the Long Term Evolution Advanced technology has an unprecedented development and popularization in recent years. With the advantages of mobile communication technology, more and more researchers are focused on the security of mobile communication. Until then, some researches about covert channels over the 4th generation mobile communication technology had been proposed. Cantor Expansion is a permutation to a bijection of natural number, so it can be used as a coding scheme for a covert channel. In this paper, a novel class of covert channel based on Cantor Expansion (for decoding) and its inverse operation (for encoding) is proposed and designed for this mobile network. The description, analyses and evaluation of this covert channel will be present in the main part of this paper. Moreover, the peak value of camouflage capability can reach 1470 kbps. Nevertheless it doesnt affect the bandwidth of overt channel and it is difficult to be detected.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. 3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio (E-UTRA) Physical Layer Procedures (Release 14). Technical Specification 36.213 (2016)

    Google Scholar 

  2. 3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRAN), Medium Access Control (MAC) Protocol Specifications (Release 14). Technical Specification 36.321 (2016)

    Google Scholar 

  3. 3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRAN), Radio Link Control (RLC) Protocol Specification (Release 13). Technical Specification 36.322 (2016)

    Google Scholar 

  4. 3GPP: 3rd Generation Partnership Project: Technical Specification Group Radio Access Network, Evolved Universal Terrestrial Radio Access (E-UTRAN), Packet Data Convergence Protocol (PDCP) Specifications (Release 14). Technical Specification 36.323 (2016)

    Google Scholar 

  5. GSA: Evolution to LTE report: 4G Market and Technology Update. Global Mobile Suppliers Association, 26th October (2016)

    Google Scholar 

  6. Lampson, B.W.: A note on the confinement problem. Commun. ACM 16(10), 613–615 (1973)

    Article  Google Scholar 

  7. Hijaz, Z., Frost, V.S.: Exploiting OFDM systems for covert communication. In: Military Communications Conference 2010, pp. 2149–2155. IEEE MILCOM (2010)

    Google Scholar 

  8. Kumar, P.P., Amirtharajan, R., Thenmozhi, K., Rayappan, J.B.B.: Steg-OFDM blend for highly secure multi-user communication. In: Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, pp. 1–5. IEEE Wireless VITAE (2011)

    Google Scholar 

  9. Szczypiorski, K., Mazurczyk, W.: Hiding data in OFDM symbols of IEEE 802.11 networks. In: Multimedia Information Networking and Security, pp. 835–840. IEEE Wireless MINES (2010)

    Google Scholar 

  10. Mazurczyk, W., Szaga, P., Szczypiorski, K.: Using transcoding for hidden communication in IP telephony. Multimed. Tools Appl. 70(3), 2139–2165 (2014)

    Article  Google Scholar 

  11. Mazurczyk, W., Lubacz, J.: LACKa VoIP steganographic method. Telecommun. Syst. 45(2–3), 153–163 (2010)

    Article  Google Scholar 

  12. Noda, H., Furuta, T., Niimi, M., Kawaguchi, E.: Video steganography based on bit-plane decomposition of wavelet-transformed video. In: Electronic Imaging 2004, pp. 345–353. International Society for Optics and Photonics (2004)

    Google Scholar 

  13. Hanafy, A.A., Salama, G.I., Mohasseb, Y.Z.: A secure covert communication model based on video steganography. In: Military Communications Conference 2008, pp. 1–6. IEEE MILCOM (2008)

    Google Scholar 

  14. Rezaei, F., Hempel, M., Peng, D., Qian, Y., Sharif, H.: A secure covert communication model based on video steganography. In: Wireless Communications and Networking Conference 2013, pp. 1903–1908. IEEE WCNC (2013)

    Google Scholar 

  15. Janicki, A., Mazurczyk, W., Szczypiorski, K.: Steganalysis of transcoding steganography. Ann. Telecommun. (annales des télécommunications) 69(7–8), 449–460 (2014)

    Article  Google Scholar 

  16. Sinha, R., Papadopoulos, C., Heidemann, J.: Internet packet size distributions: Some observations. USC/Information Sciences Institute, Technical report, ISI-TR-2007-643 (2007)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (No. 61572456), and the Natural Science Foundation of Jiangsu Province of China (No. BK20151241).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liusheng Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

He, Z., Huang, L., Yang, W., Wang, Z. (2017). Exploiting Cantor Expansion for Covert Channels over LTE-Advanced. In: Liu, D., Xie, S., Li, Y., Zhao, D., El-Alfy, ES. (eds) Neural Information Processing. ICONIP 2017. Lecture Notes in Computer Science(), vol 10638. Springer, Cham. https://doi.org/10.1007/978-3-319-70139-4_89

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-70139-4_89

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-70138-7

  • Online ISBN: 978-3-319-70139-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics