LoPhy: A Resilient and Fast Covert Channel Over LoRa PHY

IF 3.6 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE IEEE/ACM Transactions on Networking Pub Date : 2024-03-15 DOI:10.1109/TNET.2024.3398814
Boya Liu;Chaojie Gu;Shibo He;Jiming Chen
{"title":"LoPhy: A Resilient and Fast Covert Channel Over LoRa PHY","authors":"Boya Liu;Chaojie Gu;Shibo He;Jiming Chen","doi":"10.1109/TNET.2024.3398814","DOIUrl":null,"url":null,"abstract":"Covert channel, which can break the logical protections of the computer system and leak confidential or sensitive information, has long been considered a security issue in the network research community. However, recent research has shown that cooperative agents can use the “covert” channel to augment the communication of legitimate applications, rather than by adversaries seeking to compromise computer security. This further broadens the potential applications of covert channels. Despite this, the design and implementation of covert channels in the context of Low Power Wide Area Networks (LPWANs) have not been widely discussed. Current state-of-the-art uses On-off keying (OOK) on LoRa PHY to create a covert channel, but this channel has limited transmission distance and capacity. In this paper, we propose \n<monospace>LoPhy</monospace>\n, a resilient and fast covert channel over LoRa physical layer (PHY). \n<monospace>LoPhy</monospace>\n uses the Chirp Spreading Spectrum (CSS) modulation scheme to increase its resilience and explore the trade-off between the covert channel’s capacity and the legitimate channel’s resilience. We implement the proposed covert channel on off-the-shelf devices and software-defined radios and show that \n<monospace>LoPhy</monospace>\n achieves a 0.57% bit error rate at a distance of \n<inline-formula> <tex-math>$700\\,\\text {m}$ </tex-math></inline-formula>\n with slight impact on legitimate channel’s performance. Moreover, we present two applications enabled by \n<monospace>LoPhy</monospace>\n to demonstrate the potential of \n<monospace>LoPhy</monospace>\n. Compared with the state-of-the-art, \n<monospace>LoPhy</monospace>\n brings up to \n<inline-formula> <tex-math>$18\\times $ </tex-math></inline-formula>\n reduction of bit errors and \n<inline-formula> <tex-math>$63\\times $ </tex-math></inline-formula>\n gain on noise resilience.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 5","pages":"3792-3807"},"PeriodicalIF":3.6000,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE/ACM Transactions on Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10531153/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

Covert channel, which can break the logical protections of the computer system and leak confidential or sensitive information, has long been considered a security issue in the network research community. However, recent research has shown that cooperative agents can use the “covert” channel to augment the communication of legitimate applications, rather than by adversaries seeking to compromise computer security. This further broadens the potential applications of covert channels. Despite this, the design and implementation of covert channels in the context of Low Power Wide Area Networks (LPWANs) have not been widely discussed. Current state-of-the-art uses On-off keying (OOK) on LoRa PHY to create a covert channel, but this channel has limited transmission distance and capacity. In this paper, we propose LoPhy , a resilient and fast covert channel over LoRa physical layer (PHY). LoPhy uses the Chirp Spreading Spectrum (CSS) modulation scheme to increase its resilience and explore the trade-off between the covert channel’s capacity and the legitimate channel’s resilience. We implement the proposed covert channel on off-the-shelf devices and software-defined radios and show that LoPhy achieves a 0.57% bit error rate at a distance of $700\,\text {m}$ with slight impact on legitimate channel’s performance. Moreover, we present two applications enabled by LoPhy to demonstrate the potential of LoPhy . Compared with the state-of-the-art, LoPhy brings up to $18\times $ reduction of bit errors and $63\times $ gain on noise resilience.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
LoPhy:LoRa PHY 上的弹性快速隐蔽信道
隐蔽信道可以打破计算机系统的逻辑保护,泄露机密或敏感信息,长期以来一直被认为是网络研究界的一个安全问题。然而,最近的研究表明,合作代理可以使用 "隐蔽 "信道来增强合法应用程序的通信,而不是由试图破坏计算机安全的对手使用。这进一步拓宽了隐蔽信道的潜在应用范围。尽管如此,低功耗广域网(LPWAN)中隐蔽信道的设计和实施尚未得到广泛讨论。目前最先进的技术是在 LoRa 物理层上使用开关键控(OOK)来创建隐蔽信道,但这种信道的传输距离和容量有限。在本文中,我们提出了 LoPhy,一种在 LoRa 物理层(PHY)上的弹性快速隐蔽信道。LoPhy 采用啁啾扩频(CSS)调制方案来提高其弹性,并探索隐蔽信道容量与合法信道弹性之间的权衡。我们在现成设备和软件定义无线电上实现了所提出的隐蔽信道,结果表明,LoPhy在700\text {m}$的距离上实现了0.57%的误码率,对合法信道的性能影响很小。此外,我们还介绍了由 LoPhy 支持的两个应用,以展示 LoPhy 的潜力。与最先进的技术相比,LoPhy可以减少18倍的误码率,提高63倍的抗噪能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE/ACM Transactions on Networking
IEEE/ACM Transactions on Networking 工程技术-电信学
CiteScore
8.20
自引率
5.40%
发文量
246
审稿时长
4-8 weeks
期刊介绍: The IEEE/ACM Transactions on Networking’s high-level objective is to publish high-quality, original research results derived from theoretical or experimental exploration of the area of communication/computer networking, covering all sorts of information transport networks over all sorts of physical layer technologies, both wireline (all kinds of guided media: e.g., copper, optical) and wireless (e.g., radio-frequency, acoustic (e.g., underwater), infra-red), or hybrids of these. The journal welcomes applied contributions reporting on novel experiences and experiments with actual systems.
期刊最新文献
Table of Contents IEEE/ACM Transactions on Networking Information for Authors IEEE/ACM Transactions on Networking Society Information IEEE/ACM Transactions on Networking Publication Information FPCA: Parasitic Coding Authentication for UAVs by FM Signals
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1