A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints

Abstract The widely adaptation of shared or public cloud computing raises an amount of concerns about privacy and information security. Establishing a covert channel is a feasible solution to the problem by hiding privacy data into the overt packets, so that network information eavesdropping will not detect the existence of user’s privacy data transmission. Enormous amount of VoLTE traffic makes it potentially available for stealthy message transfer. A novel covert storage channel based on RTCP (Realtime Transport Control Protocol) is proposed. Based on the analysis of the protocol and real VoLTE traffic data, the secret data is modulated by setting the jitter, or EHSNR(Extended Highest Sequence Number Received) and BLP (Bitmask of following Lost Packets) fields of the RTCP protocol, according to that the sender’s network packets are captured by the ward or not. The undetectability of the proposed covert channel is verified by the K-S test (Kolmogorov–Smirnov test) under adversary transmission model.

[1]  B. B. Gupta,et al.  Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain , 2017, Multimedia Tools and Applications.

[2]  Alessandro Andreadis,et al.  A cross-layer jitter-based TCP for wireless networks , 2016, EURASIP J. Wirel. Commun. Netw..

[3]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[4]  Mahmoud Al-Ayyoub,et al.  Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques , 2017, Multimedia Tools and Applications.

[5]  Chung G. Kang,et al.  LTE Network Emulator for VoLTE Service , 2014 .

[6]  Feiping Nie,et al.  Compound Rank- $k$ Projections for Bilinear Analysis , 2014, IEEE Transactions on Neural Networks and Learning Systems.

[7]  Yu-Hui Wang,et al.  Applying Patent-Based Fuzzy Quality Function Deployment to Explore Prospective VoLTE Technologies , 2016, Int. J. Fuzzy Syst..

[8]  Marcin Szpyrka FAST AND FLEXIBLE MODELLING OF REAL-TIME SYSTEMS WITH RTCP-NETS , 2004 .

[9]  Javier López,et al.  HIDE_DHCP: Covert Communications through Network Configuration Messages , 2012, SEC.

[10]  Yong Gan,et al.  A Self-certified Cross-Cluster Asymmetric Group Key Agreement for Wireless Sensor Networks , 2019 .

[11]  Jean Meloche,et al.  Statistical Aspects of the Analysis of Data Networks , 2007, Technometrics.

[12]  Xiaohui Kuang,et al.  Boosting Targeted Black-Box Attacks via Ensemble Substitute Training and Linear Augmentation , 2019, Applied Sciences.

[13]  Wojciech Mazurczyk,et al.  Retransmission steganography and its detection , 2011, Soft Comput..

[14]  Xiaojun Chang,et al.  Semisupervised Feature Analysis by Mining Correlations Among Multiple Tasks , 2014, IEEE Transactions on Neural Networks and Learning Systems.

[15]  Liehuang Zhu,et al.  A round-optimal lattice-based blind signature scheme for cloud services , 2017, Future Gener. Comput. Syst..

[16]  Longfei Wu,et al.  EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid , 2019, Science China Information Sciences.

[17]  Jin Li,et al.  Flexible neural trees based early stage identification for IP traffic , 2017, Soft Comput..

[18]  Ghizlane Orhanou,et al.  Secure Mobile Multi Cloud Architecture for Authentication and Data Storage , 2017, Int. J. Cloud Appl. Comput..

[19]  Xiaojiang Du,et al.  Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities , 2018, IEEE Communications Magazine.

[20]  Vijay Varadharajan,et al.  The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs , 2014, IEEE Trans. Inf. Forensics Secur..

[21]  Yuanzhang Li,et al.  A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images , 2019, IEEE Access.

[22]  Javier López,et al.  Covert communications through network configuration messages , 2013, Comput. Secur..

[23]  Chen Liang,et al.  A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..

[24]  Zouhair Guennoun,et al.  Towards successful VoLTE and VoWiFi deployment: network function virtualization solutions’ benefits and challenges , 2017, Telecommun. Syst..

[25]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[26]  Georg Carle,et al.  Survey of error recovery techniques for IP-based audio-visual multicast applications , 1997, IEEE Netw..

[27]  Chen Liang,et al.  RootAgency: A digital signature-based root privilege management agency for cloud terminal devices , 2018, Inf. Sci..

[28]  N. deSouza,et al.  Investigation of metabolite changes in the transition from pre‐invasive to invasive cervical cancer measured using 1H and 31P magic angle spinning MRS of intact tissue , 2009, NMR in biomedicine.

[29]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.

[30]  Chen Liang,et al.  A sensitive network jitter measurement for covert timing channels over interactive traffic , 2018, Multimedia Tools and Applications.

[31]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[32]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[33]  Yi Yang,et al.  Bi-Level Semantic Representation Analysis for Multimedia Event Detection , 2017, IEEE Transactions on Cybernetics.

[34]  Jacob Philip,et al.  Composition dependence of optical band gap and thermal diffusivity of AsTeSe glasses , 1992 .

[35]  Kwang-deok Seo,et al.  A client-driven media synchronization mechanism for RTP packet-based video streaming , 2015, Journal of Real-Time Image Processing.

[36]  Jin Li,et al.  Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..

[37]  Kejie Lu,et al.  Construction and Mitigation of User-Behavior-Based Covert Channels on Smartphones , 2018, IEEE Transactions on Mobile Computing.