• Title/Summary/Keyword: Covert Communication

Search Result 25, Processing Time 0.018 seconds

Exploiting Correlation Characteristics to Detect Covert digital communication

  • Huang, Shuhua;Liu, Weiwei;Liu, Guangjie;Dai, Yuewei;Tian, Wen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3550-3566
    • /
    • 2020
  • As a widely used way to exfiltrate information, wireless covert channel (WCC) brings a serious threat to communication security, which enables the wireless communication process to bypass the authorized access control mechanism to disclose information. Unlike the covert channel on the network layer, wireless covert channels on the physical layer (WCC-P) is a new covert communication mode to implement and improve covert wireless communication. Existing WCC-P scheme modulates the secret message bits into the Gaussian noise, which is also called covert digital communication system based on the joint normal distribution (CJND). Finding the existence of this type of covert channel remains a challenging work due to its high undetectability. In this paper, we exploit the square autocorrelation coefficient (SAC) characteristic of the CJND signal to distinguish the covert communication from legitimate communication. We study the sharp increase of the SAC value when the offset is equal to the symbol length, which is caused by embedding secret information. Then, the SAC value of the measured sample is compared with the threshold value to determine whether the measured sample is CJND sample. When the signal-to-noise ratio reaches 20db, the detection accuracy can reach more than 90%.

Applying the Nash Equilibrium to Constructing Covert Channel in IoT

  • Ho, Jun-Won
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.243-248
    • /
    • 2021
  • Although many different types of covert channels have been suggested in the literature, there are little work in directly applying game theory to building up covert channel. This is because researchers have mainly focused on tailoring game theory for covert channel analysis, identification, and covert channel problem solving. Unlike typical adaptation of game theory to covert channel, we show that game theory can be utilized to establish a new type of covert channel in IoT devices. More specifically, we propose a covert channel that can be constructed by utilizing the Nash Equilibrium with sensor data collected from IoT devices. For covert channel construction, we set random seed to the value of sensor data and make payoff from random number created by running pseudo random number generator with the configured random seed. We generate I × J (I ≥ 2, J ≥ 2) matrix game with these generated payoffs and attempt to obtain the Nash Equilibrium. Covert channel construction method is distinctly determined in accordance with whether or not to acquire the Nash Equilibrium.

Research on Covert Communication Technology Based on Matrix Decomposition of Digital Currency Transaction Amount

  • Lejun Zhang;Bo Zhang;Ran Guo;Zhujun Wang;Guopeng Wang;Jing Qiu;Shen Su;Yuan Liu;Guangxia Xu;Zhihong Tian;Sergey Gataullin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.1020-1041
    • /
    • 2024
  • With the development of covert communication technologies, the number of covert communication technologies using blockchain as a carrier is increasing. However, using the transaction amount of digital currency as a carrier for covert communication has problems such as low embedding rate, large consumption of transaction amount, and easy detection. In this paper, firstly, by experimentally analyzing the distribution of bitcoin transaction amounts, we determine the most suitable range of amounts for matrix decomposition. Secondly, we design a novel matrix decomposition method that can successfully decompose a large amount matrix into two small amount matrices and utilize the elements in the small amount matrices for covert communication. Finally, we analyze the feasibility of the novel matrix decomposition method in this scheme in detail from four aspects, and verify it by experimental comparison, which proves that our scheme not only improves the embedding rate and reduces the consumption of transaction amount, but also has a certain degree of resistance to detection.

Covert Information in Names of Korean Dishes (한국 음식명 중의 비명시적 정보)

  • Maeng, Joo-Oeck
    • Korean Linguistics
    • /
    • v.62
    • /
    • pp.223-261
    • /
    • 2014
  • From the perspective of cross-cultural communication, it can be easily assumed that non-natives may have great difficulty understanding names of Korean dishes with covert information considering that even understanding those with overt information is a demanding task for them. Complex issues raised by cultural and linguistic differences hinder non-natives from having a clear understanding on names of Korean dishes. In order to resolve this problem, this paper focuses on providing clues to overcoming obstacles of cross-cultural communication in understanding names of Korean dishes by presenting issues including following cases:1. Analysis on types of Korean dish names with covert information in comparison to dish names with overt information. 2. Names of dishes made with a single contain covert information regarding a specific cooking and processing method. 3. A particular aspect regarding Korean food culture is that morphemes with a meaning of meat or flesh('gogi', 'sal', 'yook') contained in dish names indicate covert information that the dish is made of 'beef'.

Creating Covert Channel by Harnessing Shapley Values from Smartphone Sensor Data

  • Ho, Jun-Won
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.10-16
    • /
    • 2021
  • In this paper, we devise a Shapley-value-based covert channel in smartphones. More specifically, unlike ordinary use of Shapley value in cooperative game, we make use of a series of Shapley values, which are computed from sensor data collected from smartphones, in order to create a covert channel between encoding smartphone and decoding smartphone. To the best of our knowledge, we are the first to contrive covert channel based on Shapley values. We evaluate the encoding process of our proposed covert channel through simulation and present our evaluation results.

Research trends of biomimetic covert underwater acoustic communication (생체모방 은밀 수중 음향 통신 연구 동향)

  • Seol, Seunghwan;Lee, Hojun;Kim, Yongcheol;Kim, Wanjin;Chung, Jaehak
    • The Journal of the Acoustical Society of Korea
    • /
    • v.41 no.2
    • /
    • pp.227-234
    • /
    • 2022
  • Covert Underwater Communication (CUC) signals should not be detected by other unintended users. Similar to the method used in Radio Frequency (RF), covert communication technique sending information underwater is designed in consideration of the characteristics of Low Probability of Detection (LPD) and Low Probability of Intercept (LPI). These conventional methods, however, are difficult to be used in the underwater communications because of the narrow frequency bandwidth. Unlike the conventional methods of reducing transmission power or increasing the modulation bandwidth, a method of mimicking the acoustic signal of an underwater mammal is being studied. The biomimetic underwater acoustic communication mainly mimics the click or whistle sound produced by dolphin or whale. This paper investigates biomimetic communication method and introduces research trends to understand the potential for the development of such biomimetic covert underwater acoustic communication and future research areas.

Turbo Equalization for Covert communication in Underwater Channel (터보등화를 이용한 직접대역확산통신 기반의 은밀 수중통신 성능분석)

  • Ahn, Tae-Seok;Jung, Ji-Won;Park, Tae-Doo;Lee, Dong-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1422-1430
    • /
    • 2016
  • Researches for oceans are limited to military purpose such as underwater sound detection and tracking system. Underwater acoustic communications with low-probability-of-interception (LPI) covert characteristics were received much attention recently. Covert communications are conducted at a low received signal-to-noise ratio to prevent interception or detection by an eavesdropper. This paper proposed optimal covert communication model based on direct sequence spread spectrum for underwater environments. Spread spectrum signals may be used for data transmission on underwater acoustic channels to achieve reliable transmission by suppressing the detrimental effect of interference and self-interference due to jamming and multipath propagation. The characteristics of the underwater acoustic channel present special problems in the design of covert communication systems. To improve performance and probability of interception, we applied BCJR(Bahl, Cocke, Jelinek, Raviv) decoding method and the direct sequence spread spectrum technology in low SNR. Also, we compared the performance between conventional model and proposed model based on turbo equalization by simulation and lake experiment.

The design and implementation of security kernel assured trusted path (신뢰경로가 보장되는 보안커널 설계 및 구현)

  • 이해균;김재명;조인준
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.340-347
    • /
    • 2001
  • Security operating system applied to MAC(Mandatory Access Control) or to MLS(Multi Level Security) gives both subject and object both Security Level and value of Category, and it restrict access to object from subject. But it violates Security policy of system and could be a circulated course of illegal information. This is correctly IPC(Interprocess Communication)mechanism and Covert Channel. In this thesis, I tried to design and implementation as OS kernel in order not only to give confidence of information circulation in the Security system, but also to defend from Covert Channel by Storage and IPC mechanism used as a circulated course of illegal information. For removing a illegal information flow by IPC mechanism. I applied IPC mechanism to MLS Security policy, and I made Storage Covert Channel analyze system call Spec. and than distinguish Storage Covert Channel. By appling auditing and delaying, I dealt with making low bandwidth.

  • PDF

Covert Channel Based on Instruction Gadgets in Smart Sensing Devices

  • Ho, Jun-Won
    • International journal of advanced smart convergence
    • /
    • v.6 no.4
    • /
    • pp.56-59
    • /
    • 2017
  • In this paper, we design a covert channel based on instruction gadgets in smart sensing devices. Unlike the existing convert channels that usually utilize diverse physical characteristics or user behaviors or sensory data of smart sensing devices, we show that instruction gadgets could be exploited for covert channel establishment in smart sensing devices. In our devised covert channels, trojan smart sensing devices exchange attack packets in such a way that they encode an attack bit in attack packet to a series of addresses of instruction gadgets and decode an attack bit from a series of addresses of instruction gadgets.

Correlation between overt and covert characteristics of stuttering in adults who stutter (말더듬의 외현적 특성과 내면적 특성 간의 상관: 말더듬 성인을 중심으로)

  • HeeCheong Chon
    • Phonetics and Speech Sciences
    • /
    • v.15 no.4
    • /
    • pp.35-43
    • /
    • 2023
  • This study aimed to investigate the relationship between overt and covert characteristics of stuttering. This study included 10 adult participants who stutter. To analyze the overt characteristics, stuttering frequency, duration of stuttering moments, concomitant behaviors, and total score were scored based on the Stuttering Severity Instrument-Fourth Edition (SSI-4). Additionally, the modified Erickson scale of communication attitudes (S-24) and the Overall Assessment of the Speaker's Experience of Stuttering for Adults (OASES-A; general information, reactions to stuttering, communication in daily situations, quality of life, and total score) were used to determine the covert characteristics. Correlation analyses showed no significant association between the overt and covert variables. However, there were significant correlations between the scores on the S-24 and the OASES-A. These findings support the perspective that the overt characteristics of stuttering do not predict the covert characteristics, and vice versa. Therefore, when evaluating and intervening with adults who stutter, it is important to consider these characteristics separately.