Provenance Transmission through a Two-Dimensional Covert Timing Channel in WSNs

Provenances, which record the history of data acquisition and transmission, are hard to be transmitted in resource-tightened wireless sensor networks (WSNs) due to their drastic size expansion with the increase in packet transmission hops. To ease the burden caused by the provenance transmission, we first designed a two-dimensional covert timing channel (2dCTC) and then applied it to provenances transmission in WSNs. Based on Cantor Expansion, 2dCTC uses pseudo packet IDs permutation and packet sizes variation together to form a two-dimensional communication medium. Both theoretical analysis and experimental results show that 2dCTC not only has a much higher channel capacity than those of most of the known CTCs, but also conserves more energy for provenance transmission in WSNs. Furthermore, 2dCTC provides a new way to increase CTCs channel capacity and stealthiness through multi-dimensional approaches.

[1]  Sonia Fahmy,et al.  A practical approach for provenance transmission in wireless sensor networks , 2014, Ad Hoc Networks.

[2]  Elisa Bertino,et al.  Secure Provenance Transmission for Streaming Data , 2013, IEEE Transactions on Knowledge and Data Engineering.

[3]  Xianmin Wang,et al.  Building packet length covert channel over mobile VoIP traffics , 2018, J. Netw. Comput. Appl..

[4]  Jianhua Li,et al.  A study of on/off timing channel based on packet delay distribution , 2009, Comput. Secur..

[5]  Ehab Al-Shaer,et al.  A Novel Class of Robust Covert Channels Using Out-of-Order Packets , 2017, IEEE Transactions on Dependable and Secure Computing.

[6]  Elisa Bertino,et al.  Dictionary Based Secure Provenance Compression for Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.

[7]  Lei Huang,et al.  Base communication model of IP covert timing channels , 2016, Frontiers of Computer Science.

[8]  M.T. Goodrich,et al.  Probabilistic Packet Marking for Large-Scale IP Traceback , 2008, IEEE/ACM Transactions on Networking.

[9]  Liehuang Zhu,et al.  A packet-reordering covert channel over VoLTE voice and video traffics , 2019, J. Netw. Comput. Appl..

[10]  Elisa Bertino,et al.  Sensor Network Provenance Compression Using Dynamic Bayesian Networks , 2017, ACM Trans. Sens. Networks.

[11]  Sushil Jajodia,et al.  Model-Based Covert Timing Channels: Automated Modeling and Evasion , 2008, RAID.

[12]  Philip Levis,et al.  CTP , 2013, ACM Trans. Sens. Networks.

[13]  Craig Partridge,et al.  Packet reordering is not pathological network behavior , 1999, TNET.

[14]  Yu Zhang,et al.  A payload-dependent packet rearranging covert channel for mobile VoIP traffic , 2018, Inf. Sci..

[15]  Cristian S. Calude,et al.  Randomness relative to Cantor expansions , 2003, nlin/0304019.

[16]  Elisa Bertino,et al.  A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.

[17]  Elisa Bertino,et al.  Provenance for Wireless Sensor Networks: A Survey , 2016, Data Science and Engineering.