Loading…

A robust packet‐dropping covert channel for mobile intelligent terminals

Covert communication in this regard has been widely used for protecting the secrecy of communication. Voice over Long Term Evolution (VoLTE) is a packet‐switched core network solution for high‐speed and high‐quality end‐to‐end services which usually applied to the communication between intelligent s...

Full description

Saved in:
Bibliographic Details
Published in:International journal of intelligent systems 2022-10, Vol.37 (10), p.6928-6950
Main Authors: Yuanzhang, Li, Junli, Liu, Xinting, Xu, Xiaosong, Zhang, Li, Zhang, Quanxin, Zhang
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Covert communication in this regard has been widely used for protecting the secrecy of communication. Voice over Long Term Evolution (VoLTE) is a packet‐switched core network solution for high‐speed and high‐quality end‐to‐end services which usually applied to the communication between intelligent systems. However, covert channels using inter‐packet delays and packet order in VoLTE services are limited by specific rules. Since minor modifications to overt traffic can be detected, existing covert channel solutions cannot be directly applied to VoLTE. Therefore, this study presents a robust packet loss covert timing channel by cascade hash coding with intelligent system. To ensure robustness and undetectability, we design hash‐based inter‐codeword verification, codeword self‐verification based on cyclic redundancy check, and adaptive mapping matrix. The sender modulates the covert messages according to the sequence number of the actively dropped packets, and the receiver can retrieve the covert messages using a specialized verification method. To evaluate undetectability, robustness, throughput, and construction costs, a large number of experiments in mobile intelligent terminals have been conducted. The experimental results prove that the proposed scheme is feasible for VoLTE communication, as the covert message is shown to be transmitted secretly, and the bit error and throughput are within acceptable ranges.
ISSN:0884-8173
1098-111X
DOI:10.1002/int.22868