Skip to main content

An RTP Extension for Reliable User-Data Transmission over VoIP Traffic

  • Conference paper
  • First Online:
Security and Privacy in Social Networks and Big Data (SocialSec 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1095))

Abstract

Covert channels are those breaking the restrictions of the legitimate channel and transmitting covert messages secretly. According to the modulation methods, the covert channels are separated into two types, which are the covert storage channel and the covert timing channel. Since the covert storage channel modulates a covert message into the shared storage space, both capacity and throughput exceed the covert timing channel, which guarantees the effectiveness of covert communication. In this paper, a covert storage channel over RTP is proposed and evaluated. Since mobile multimedia communication requires low transmission latency, the RTP based on UDP is widely utilized by VoIP applications. Through modifying the packet layout of RTP packets and embedding secret message sections into the target position, the covert message could be delivered to the receiver. However, since the RTP is not a reliable protocol, the transmission procedure could be infected by the network noise. To solve this, a transmission control mechanism with retransmission is designed for the scheme. Besides, the secret message is also encrypted with a secure encryption algorithm, which prevents message leakage. To evaluate the scheme, several experiments are deployed, and the scheme is proved to be reliable and secure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, X., Tan, Y., Liang, C., Li, Y., Li, J.: A covert channel over VoLTE via adjusting silence periods. Access IEEE 6, 9292–9302 (2018). https://doi.org/10.1109/acces-s.2018.2802783

    Article  Google Scholar 

  2. Tuptuk, N., Hailes, S.: Covert channel attacks in pervasive computing. In: 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 236–242, St. Louis, MO, USA (2015). https://doi.org/10.1109/percom.2015.7146534

  3. Rezaei, F., Hempel, M., Shrestha, P., Sharif, H.: Achieving robustness and capacity gains in covert timing channels. In: 2014 IEEE International Conference on Communications (ICC), pp. 969–974. IEEE, Sydney (2014). https://doi.org/10.1109/icc.2014.6-883445

  4. Denney, K., Uluagac, A., Akkaya, K., Bhansali, S.: A novel storage covert channel on wearable devices using status bar notifications. In: 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, Las Vegas (2016). https://doi.org/10.1109/ccnc.2016.7444898

  5. Epishkina, A., Kogos, K.: Covert channels parameters evaluation using the information theory statements. In: 2015 5th International Conference on IT Convergence and Security (ICITCS). IEEE Press, Kuala Lumpur (2015). https://doi.org/10.1109/icitcs.2015.7-292966

  6. Singh, A., Manchanda, K.: Establishment of bit selective mode storage covert channel in VA-NETS. In: 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). IEEE Press, Madurai (2015). https://doi.org/10.1109/icc-ic.2015.7435732

  7. Liang, C., Wang, X., Zhang, X., Zhang, Y., Sharif, K., Tan, Y.: A payload-dependent packet rearranging covert channel for mobile VoIP traffic. Inf. Sci. 465, 162–173 (2018). https://doi.org/10.1016/j.ins.2018.07.011

    Article  Google Scholar 

  8. Liang, C., Tan, Y., Zhang, X., Wang, X., Zheng, J., Zhang, Q.: Building packet length covert channel over mobile VoIP traffics. J. Netw. Comput. Appl. 118, 144–153 (2018). https://doi.org/10.1016/j.jnca.2018.06.012

    Article  Google Scholar 

  9. Archibald, R., Ghosal, D.: A covert timing channel based on fountain codes. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE Press, Liverpool (2012). https://doi.org/10.1109/trustcom.2012.21

  10. Chaari, H., Mnif, K., Kamoun, L.: Multimedia quality transmission evaluation over wireless networks: a survey. Wirel. Netw. 22, 2607–2621 (2016). https://doi.org/10.1007/s11276-015-1127-5

    Article  Google Scholar 

  11. Hovhannisyan, H., Qi, W., Lu, K., Yang, R., Wang, J.: Whispers in the cloud storage: a novel cross-user deduplication-based covert channel design. Peer-to-Peer Netw. Appl. 11, 277–286 (2018). https://doi.org/10.1007/s12083-016-0483-y

    Article  Google Scholar 

  12. Archibald, R., Ghosal, D.: Design and analysis of a model-based Covert Timing Channel for Skype traffic. In: 2015 IEEE Conference on Communications and Network Security (CNS). IEEE Press, Florence (2015). https://doi.org/10.1109/cns.2015.7346833

  13. Garcia, L., Senyondo, H., McLaughlin, S., Zonouz, S.: Covert channel communication through physical interdependencies in cyber-physical infrastructures. In: 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE Press, Venice (2014). https://doi.org/10.1109/smartgridcomm.2014.7007771

  14. Elsadig, M., Fadlalla, Y.: A balanced approach to eliminate packet length-based covert channels. In: 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS). IEEE Press, Salmabad (2017). https://doi.org/10.1109/ice-tas.2017.8277839

  15. El-Atawy, A., Duan, Q., Al-Shaer, E.: A novel class of robust covert channels using out-of-order packets. IEEE Trans. Dependable and Secure Comput. 14(2), 116–129 (2017). https://doi.org/10.1109/tdsc.2015.2443779

    Article  Google Scholar 

  16. Lin, Y., Malik, S., Bilal, K., Yang, Q., Wang, Y., Khan, S.: Designing and modeling of covert channels in operating systems. IEEE Trans. Comput. 65(6), 1706–1719 (2016). https://doi.org/10.1109/tc.2015.2458862

    Article  MathSciNet  MATH  Google Scholar 

  17. Shrestha, P., Hempel, M., Sharif, H., Chen H.: An event-based unified system model to characterize and evaluate timing covert channels. IEEE Syst. J. 10(1) (2016). https://doi.org/10.1109/jsyst.2014.2328665

  18. Mazurczyk, W., Karaś, M., Szczypiorski, K., Janicki, A.: YouSkyde: information hiding for Skype video traffic. Multimedia Tools Appl. 75(21), 13521–13540 (2016). https://doi.org/10.1007/s11042-015-2740-0

    Article  Google Scholar 

  19. Tan, Y., Zhang, X., Sharif, K., Liang, C., Zhang, Q., Li, Y.: Covert timing channels for IoT over mobile networks. IEEE Wirel. Commun. 25(6), 38–44 (2018). https://doi.org/10.1109/mwc.2017.1800062

    Article  Google Scholar 

  20. Zhang, X., Liang, C., Zhang, Q., Li, Y., Zheng, J., Tan, Y.: Building covert timing channels by packet rearrangement over mobile networks. Inf. Sci. 445–446, 66–78 (2018). https://doi.org/10.1016/j.ins.2018.03.007

    Article  MathSciNet  Google Scholar 

  21. Zhang, X., Zhu, L., Wang, X., Zhang, C., Zhu, H., Tan, Y.: A packet-reordering covert channel over VoLTE voice and video traffics. J. Netw. Comput. Appl. 126, 29–38 (2019). https://doi.org/10.1016/j.jnca.2018.11.001

    Article  Google Scholar 

  22. Zhang, Q., Gong, H., Zhang, X., Liang, C., Tan, Y.: A sensitive network jitter measurement for covert timing channels over interactive traffic. Multimedia Tools Appl. 78(3), 3493–3509 (2019). https://doi.org/10.1007/s11042-018-6281-1

    Article  Google Scholar 

  23. Tan, Y., Xu, X., Liang, C., Zhang, X., Zhang, Q., Li, Y.: An end-to-end covert channel via packet dropout for mobile networks. Int. J. Distrib. Sensor Netw. 14(5) (2018). https://doi.org/10.1177/155014771877956-8

Download references

Acknowledgment

This work is supported by the National Key R&D Program of China (No. 2018YFB1004402), the Beijing Municipal Natural Science Foundation (No. 4172053).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaosong Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gao, J., Li, Y., Jiang, H., Liu, L., Zhang, X. (2019). An RTP Extension for Reliable User-Data Transmission over VoIP Traffic. In: Meng, W., Furnell, S. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2019. Communications in Computer and Information Science, vol 1095. Springer, Singapore. https://doi.org/10.1007/978-981-15-0758-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0758-8_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0757-1

  • Online ISBN: 978-981-15-0758-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics