An efficient VoLTE covert timing channel for 5 G networks: RDCTC

Mohammed Khudhair Abbas*, Mehmet Tahir Sandikkaya

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

Covert Channels are necessary to protect the privacy of individuals as well as to obtain confidentiality to governmental and military agencies. A novel covert timing channel is proposed with three main improvements over the existing ones: Reorder Density (RD) metric-based packet reordering that reduces exposure, introducing Modified Turbo Code (MTC) for efficient encoding, and Discrete Haar Wavelet Transform (DHWT) that increases channel reliability. A threat model is proposed and shown to be inefficient to effectively meet covert channel properties against network jitter, noise, and curious attackers that try to identify a channel exists. Run and test is applied to investigate randomness of the proposed covert channel. The proposed covert channel is adoptable to 5 G VoLTE networks. These proposed strategies significantly improve the robustness while also minimizing the detectability of covert channels in VoLTE.

Original languageEnglish
Article number170076
JournalOptik
Volume270
DOIs
Publication statusPublished - Nov 2022

Bibliographical note

Publisher Copyright:
© 2022 Elsevier GmbH

Funding

The authors would like to express their gratitude for Ministry of Iraqi Higher Education and Scientific Research. Also, great thanks to all Istanbul Technical University staff and especially the dean of the Computer and Informatics Engineering Faculty and the head of the Computer Engineering Department.

FundersFunder number
Ministry of Higher Education and Scientific Research

    Keywords

    • 5G networks
    • Covert timing channels
    • Discrete Haar wavelet transform, threat model, randomness test
    • Modified turbo code
    • Reorder density
    • VoLTE, inter-packet delays

    Fingerprint

    Dive into the research topics of 'An efficient VoLTE covert timing channel for 5 G networks: RDCTC'. Together they form a unique fingerprint.

    Cite this