ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술지 Practical covert wireless unidirectional communication in IEEE 802.11 environment
Cited 3 time in scopus Download 131 time Share share facebook twitter linkedin kakaostory
저자
성하영, 김익균, 전용성, 오미경, 이상재, 최두호
발행일
202301
출처
IEEE Internet of Things Journal, v.10 no.2, pp.1499-1516
ISSN
2327-4662
출판사
IEEE
DOI
https://dx.doi.org/10.1109/JIOT.2022.3204987
협약과제
22HR3200, 무선 은닉채널 위험성 검증 연구, 전용성
초록
Covert communications, or covert channels, are commonly exploited to establish a data exfiltration channel from an insider on a trusted network to a malicious receiver outside the network without using normal communication of the network. It is because the malicious receiver is an unauthorized user of the communication network and so he cannot communicate with any entity in the network. In this study, we construct a new covert wireless unidirectional communication mechanism in an IEEE 802.11 environment. Our covert communication is based on a covert timing channel exploiting the beacon interval of a given commercial-like AP. Because the wireless covert channel we proposed can be implemented only with firmware modification to the WLAN MAC protocol, it is very suitable for application in a real public AP environment. In order to dramatically reduce the chance of covert signals being detected by others, a new and simple covert data encoding scheme, called ping-pong covert timing channel (PPCTC), is proposed, and we show that the covertness of the PPCTC is excellent compared to the previous timing-based covert channels. Although this wireless covert communication is unidirectional communication, since PPCTC has recovery characteristics against consecutive 2-bit errors, stable communication is guaranteed. Furthermore, a covert frame structure is presented for providing the confidentiality and integrity of the information transmitted via our covert channel. To the best of our knowledge, this is the first attempt.
KSP 제안 키워드
Beacon Interval(BI), Communication Mechanism, Covert Channel, Covert Communication, Covert Data, Covert timing channel(CTC), Data Encoding, Data exfiltration, Frame structure, IEEE 802.11, Ping-pong
본 저작물은 공공누리 제4유형 : 출처표시 + 상업적 이용금지 + 변경금지 조건에 따라 이용할 수 있습니다.
제4유형