A Wireless Covert Channel Based on Constellation Shaping Modulation

Wireless covert channel is an emerging covert communication technique which conceals the very existence of secret information in wireless signal including GSM, CDMA, and LTE. The secret message bits are always modulated into artificial noise superposed with cover signal, which is then demodulated with the shared codebook at the receiver. In this paper, we first extend the traditional KS test and regularity test in covert timing channel detection into wireless covert channel, which can be used to reveal the very existence of secret data in wireless covert channel from the aspect of multiorder statistics. In order to improve the undetectability, a wireless covert channel for OFDM-based communication system based on constellation shaping modulation is proposed, which generates additional constellation points around the standard points in normal constellations. The carrier signal is then modulated with the dirty constellation and the secret message bits are represented by the selection mode of the additional constellation points; shaping modulation is employed to keep the distribution of constellation errors unchanged. Experimental results show that the proposed wireless covert channel scheme can resist various statistical detections. The communication reliability under typical interference is also proved.

[1]  Yuewei Dai,et al.  Network covert timing channel with distribution matching , 2012, Telecommun. Syst..

[2]  Carla E. Brodley,et al.  IP covert timing channels: design and detection , 2004, CCS '04.

[3]  Hisato Iwai,et al.  Wireless steganography using MIMO system , 2014, 2014 IEEE Fifth International Conference on Communications and Electronics (ICCE).

[4]  Limin Sun,et al.  CovertMIMO: A covert uplink transmission scheme for MIMO systems , 2017, 2017 IEEE International Conference on Communications (ICC).

[5]  Peng Ning,et al.  On the secrecy of timing-based active watermarking trace-back techniques , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[6]  Dirk Grunwald,et al.  Secret Agent Radio: Covert Communication through Dirty Constellations , 2012, Information Hiding.

[7]  Sushil Jajodia,et al.  Model-Based Covert Timing Channels: Automated Modeling and Evasion , 2008, RAID.

[8]  Matthew K. Wright,et al.  Liquid: A detection-resistant covert timing channel based on IPD shaping , 2011, Comput. Networks.

[9]  Eldad Perahia,et al.  Next Generation Wireless LANs: Preface , 2008 .

[10]  Feng Shu,et al.  Covert Communication in Wireless Relay Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[11]  Matthew K. Wright,et al.  Mimic: An active covert channel that evades regularity-based detection , 2013, Comput. Networks.

[12]  Steffen Wendzel,et al.  "The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography , 2015, J. Commun..

[13]  Iwona Grabska,et al.  Steganography in Long Term Evolution Systems , 2014, 2014 IEEE Security and Privacy Workshops.

[14]  Matthias Hollick,et al.  Practical covert channels for WiFi systems , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[15]  Aleksandra Mileva,et al.  Covert channels in TCP/IP protocol stack - extended version- , 2014, Central European Journal of Computer Science.

[16]  Steven Gianvecchio,et al.  An Entropy-Based Approach to Detecting Covert Timing Channels , 2011, IEEE Transactions on Dependable and Secure Computing.

[17]  Wojciech Mazurczyk,et al.  Hiding Data in OFDM Symbols of IEEE 802.11 Networks , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[18]  Victor S. Frost,et al.  Exploiting OFDM systems for covert communication , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[19]  Jun Li,et al.  Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.