130 research outputs found

    Building Covert Timing Channel of the IoT-'Enabled MTS Based on Multi-Stage Verification

    Get PDF
    Although the global shipping industry is experiencing a productivity revolution due to the adoption of IoTs (Internet of Things), the dependence on complex data transmission and interactive centers is also increasing, which makes the IoT-enabled Maritime Transportation Systems (MTS) one of the most valuable but vulnerable industries against network security attacks. To guarantee the transmission security of confidential data, an important alternative in an untrustworthy IoT-enabled MTS is to apply the covert timing channels. This paper mainly introduces the construction of covert timing channel with low bit shifting rate and high reliability by multi-stage verification and error correction. For the covert timing channel schemes realized by active packet loss, the packet loss noise interferes with the channel's reliability. However, due to the constraints of stealthiness, the active packet loss ratio during covert communication is low, so more effective reliable strategies are needed to reduce noise interference. In the excellent scenario, when the bit error rate is lower than 0.08%, the transmission performance is kept at 0.49 bps. In the good scenario with strong network noise, although this method loses some performance, it can still maintain the transmission performance of 0.2 bps under the condition of bit error rate less than 1%, which effectively proves the effectiveness of multi-stage verification and error correction

    Secure Communication Using Cryptography and Covert Channel

    Get PDF
    The keys which are generated by cryptography algorithms have still been compromised by attackers. So, they extra efforts to enhance security, time consumption and communication overheads. Encryption can achieve confidentiality but cannot achieve integrity. Authentication is needed beside encryption technique to achieve integrity. The client can send data indirectly to the server through a covert channel. The covert channel needs pre-shared information between parties before using the channel. The main challenges of covert channel are security of pre-agreement information and detectability. In this chapter, merging between encryption, authentication, and covert channel leads to a new covert channel satisfying integrity and confidentiality of sending data. This channel is used for secure communication that enables parties to agree on keys that are used for future communication

    Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications

    Get PDF
    Covert timing channels are an important alternative for transmitting information in the world of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival times between consecutive packets based on modifying the transmission time of legitimate traffic. Typically, the modification of time takes place by delaying the transmitted packets on the sender side. A key aspect in covert timing channels is to find the threshold of packet delay that can accurately distinguish covert traffic from legitimate traffic. Based on that we can assess the level of dangerous of security threats or the quality of transferred sensitive information secretly. In this paper, we study the inter-arrival time behavior of covert timing channels in two different network configurations based on statistical metrics, in addition we investigate the packet delaying threshold value. Our experiments show that the threshold is approximately equal to or greater than double the mean of legitimate inter-arrival times. In this case covert timing channels become detectable as strong anomalies

    Selective Noise Based Power-Efficient and Effective Countermeasure against Thermal Covert Channel Attacks in Multi-Core Systems

    Get PDF
    With increasing interest in multi-core systems, such as any communication systems, infra-structures can become targets for information leakages via covert channel communication. Covert channel attacks lead to leaking secret information and data. To design countermeasures against these threats, we need to have good knowledge about classes of covert channel attacks along with their properties. Temperature–based covert communication channel, known as Thermal Covert Channel (TCC), can pose a threat to the security of critical information and data. In this paper, we present a novel scheme against such TCC attacks. The scheme adds selective noise to the thermal signal so that any possible TCC attack can be wiped out. The noise addition only happens at instances when there are chances of correct information exchange to increase the bit error rate (BER) and keep the power consumption low. Our experiments have illustrated that the BER of a TCC attack can increase to 94% while having similar power consumption as that of state-of-the-art

    The Role of the Adversary Model in Applied Security Research

    Get PDF
    Adversary models have been integral to the design of provably-secure cryptographic schemes or protocols. However, their use in other computer science research disciplines is relatively limited, particularly in the case of applied security research (e.g., mobile app and vulnerability studies). In this study, we conduct a survey of prominent adversary models used in the seminal field of cryptography, and more recent mobile and Internet of Things (IoT) research. Motivated by the findings from the cryptography survey, we propose a classification scheme for common app-based adversaries used in mobile security research, and classify key papers using the proposed scheme. Finally, we discuss recent work involving adversary models in the contemporary research field of IoT. We contribute recommendations to aid researchers working in applied (IoT) security based upon our findings from the mobile and cryptography literature. The key recommendation is for authors to clearly define adversary goals, assumptions and capabilities

    Sonic, infrasonic, and ultrasonic frequencies : the utilisation of waveforms as weapons, apparatus for psychological manipulation, and as instruments of physiological influence by industrial, entertainment, and military organisations

    Get PDF
    This study is a trans-disciplinary and trans-historical investigation into civilian and battlefield contexts in which speaker systems have been utilised by the military-industrial and military-entertainment complexes to apply pressure to mass social groupings and the individuated body. Drawing on authors such as historian/sociologist Michel Foucault, economist Jacques Attali, philosopher Michel Serres, political geographer/urban planner Edward Soja, musician/sonic theorist Steve Goodman, and cultural theorist/urbanist Paul Virilio, this study engages a wide range of texts to orchestrate its arguments. Conducting new strains of viral theory that resonate with architectural, neurological, and political significance, this research provides new and original analysis about the composition of waveformed geography. Ultimately, this study listens to the ways in which the past and current utilisation of sonic, infrasonic, and ultrasonic frequencies as weapons, apparatus for psychological manipulation, and instruments of physiological influence, by industrial, civilian, entertainment, and military organisations, predict future techniques of sociospatialised organisation. In chapter one it is argued that since the inception of wired radio speaker systems into U.S. industrial factories in 1922, the development of sonic strategies based primarily on the scoring of architectonic spatiality, cycles of repetition, and the enveloping dynamics of surround sound can be traced to the sonic torture occurring in Guantanamo Bay during the first decade of the twenty-first century. Exploring the use of surround sound speaker techniques by the FBI during the Waco Siege in Texas, this argument is developed in chapter two. In chapter three it is further contended that the acoustic techniques utilised in the Guantanamo torture cells represent the final modality and the logical conclusion of these strategies that have evolved between civilian and military contexts over the past 80 years. In chapter four, the speaker system instrumentality of the HSS ultrasonic beam - occurring post Guantanamo - comes to symbolise an epistemic shift in the application of waveformed pressure; the dynamics of directional ultrasound technology signalling the orchestration of a new set of frequency-based relations between the transmitter and the receiver, the speaker system and architectural context, and the civilian and war torn environment. The concluding proposition of the study submits that a waveformed cartography - mapping the soundscape's territorialisation by the military-entertainment complex - needs to be composed and arranged so that forms of recording, amplification, and resistance can be made coherent. Given the new set of non-sound politics announced by the HSS, this philosophy of frequency-based mapping will have to re-evaluate the taxonomy and indexical nature of spatial relations. This discipline will be a waveformed psychogeography; a frequency-based modality that heuristically charts the spatial concerns of the neural environment as well as the environs of the material and the built. As a field of research it will have a wide-ranging remit to explore the spatial, psychological, physiological, social, economic, and sexual effects that waveforms have upon our subjectivity. Its methodology - as suggested through the structuring of this study - will be multi-disciplined and multi-channelled. It will create new forms of knowledge about LRADs, iPods, Mosquitos, I ntonarumori , loudhailers, and Sequential Arc Discharge Acoustic Generators - the meta-network of speaker systems through which rhythms and cadences of power are transmitted, connected, and modulated
    • …
    corecore