scispace - formally typeset
Search or ask a question
Author

Wei Yang

Bio: Wei Yang is an academic researcher from University of Science and Technology of China. The author has contributed to research in topics: Covert channel & LTE Advanced. The author has an hindex of 2, co-authored 6 publications receiving 7 citations.

Papers
More filters
Proceedings ArticleDOI
01 Oct 2017
TL;DR: A method based on the k-nearest neighbor (KNN) classification for detecting hidden information in Sequence Number fields of PDCP and RLC layer, which is known as the most difficult covert storage channel (CSC) to be detected.
Abstract: With the rapid development of cellular network systems, LTE is turning to be a wonderful carrier for covert channels. In this paper, we present a method based on the k-nearest neighbor (KNN) classification for detecting hidden information in Sequence Number (SN) fields of PDCP and RLC layer, which is known as the most difficult covert storage channel (CSC) to be detected. Our classifier is trained by the fingerprints extracted from overt traffic packets, and obtains the distribution zone of the distance between the SNs and their neighbors. The width of the distribution zone is seen as a confidence metric to the traffic data for detection. We simulate our proposed approach in NS3 platform, and the results have demonstrated that our proposed detection method is sensitive to the hidden information in the SN fields of the PDCP and RLC layer. It can detect them in an accurate manner, and can be used for both online and offline detection.

7 citations

Patent
29 Sep 2017
TL;DR: In this paper, a method for establishing a hidden channel through utilization of 4G mobile communication protocol layer characteristics is proposed, which comprises the steps of coding and converting hidden information into a binary data array according to an appointed hidden information bit length and coding mode; carrying out repeated transmission operation on PDUs at a sending end, wherein the PDUs correspond to SNs matching the data array and are in a protocol layer PDU queue of an original communication channel, and sending all PDUs to a receiving end through follow-up normal operation.
Abstract: The invention discloses a method for establishing a hidden channel through utilization of 4G mobile communication protocol layer characteristics. The method comprises the steps of coding and converting hidden information into a binary data array according to an appointed hidden information bit length and coding mode; carrying out repeated transmission operation on PDUs at a sending end, wherein the PDUs correspond to SNs matching the data array and are in a protocol layer PDU queue of an original communication channel, and sending all PDUs to a receiving end through follow-up normal operation; extracting repeated PDU SNs at the receiving end and storing the repeated PDU SNs in a data array form; and decoding the extracted SN data array according to the appointed bit length and coding mode, thereby obtaining the hidden information. According to the method, preconditions are easy to satisfy and a detection analysis technology for a protocol layer PDU special area can be effectively avoided. Compared with an existing hidden channel technology, the method has the advantages that the transmission of hidden data is relatively stable and the influence on the data transmission bandwidth of the original channel is relatively low.

3 citations

Proceedings ArticleDOI
01 Dec 2016
TL;DR: A new class of covert channel coined as SNsteg is proposed, designed for LTE-A system, which peculiarly utilizes the feature of Sequence Number fields in the headers of protocol stacks such as RLC (Radio Link Control) and PDCP (Packet Data Convergence Protocol).
Abstract: Long Term Evolution Advanced (LTE-A) is the fourth generation (4G) wireless cellular communication standard. A covert channel is a noticeable threat to network security because it is able to transfer data under the overt channel. In this paper, a new class of covert channel coined as SNsteg is proposed, designed for LTE-A system. The SNsteg peculiarly utilizes the feature of Sequence Number (SN) fields in the headers of protocol stacks such as RLC (Radio Link Control) and PDCP (Packet Data Convergence Protocol). Subsequently, there are some analyses and evaluations of this covert channel.

1 citations

Book ChapterDOI
14 Nov 2017
TL;DR: A novel class of covert channel based on Cantor Expansion and its inverse operation (for encoding) is proposed and designed for this mobile network and it is difficult to be detected.
Abstract: Worldwide, the Long Term Evolution Advanced technology has an unprecedented development and popularization in recent years. With the advantages of mobile communication technology, more and more researchers are focused on the security of mobile communication. Until then, some researches about covert channels over the 4th generation mobile communication technology had been proposed. Cantor Expansion is a permutation to a bijection of natural number, so it can be used as a coding scheme for a covert channel. In this paper, a novel class of covert channel based on Cantor Expansion (for decoding) and its inverse operation (for encoding) is proposed and designed for this mobile network. The description, analyses and evaluation of this covert channel will be present in the main part of this paper. Moreover, the peak value of camouflage capability can reach 1470 kbps. Nevertheless it doesnt affect the bandwidth of overt channel and it is difficult to be detected.
Proceedings ArticleDOI
09 May 2018
TL;DR: An entropy-based method for detecting CSC in Sequence Number (SN) fields of PDCP and RLC layer, which is seen as the most difficult to be detected.
Abstract: With the rapid development of mobile technologies, LTE is turning to be a wonderful carrier for covert channels. Existing detection for covert storage channel (CSC) are almost packet analysis based methods. In this paper, we present an entropy-based method for detecting CSC in Sequence Number (SN) fields of PDCP and RLC layer, which is seen as the most difficult to be detected. We simulate the LTE network in NS3 platform, and propose a Protocol Data Unit (PDU) based blind method to calculate the distance between the SN of PDU and its first left neighbor, instead of analyzing the packets or extracting the value of SN from the PDU. Our experimental results have demonstrated that the proposed detection method is sensitive to the hidden information in the SN fields of PDCP and RLC layer. It can detect them in an accurate manner, and can be conducted in both real-time online and offline storage detection.

Cited by
More filters
Journal ArticleDOI
TL;DR: A covert timing channel detection method based on the k-NearestNeighbor (kNN) algorithm is proposed, which uses a series of statistics related to the time interval and payload length as features to train a machine learning model and using 10-fold cross-validation to improve model performance.

11 citations

Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors conduct a comprehensive study on channel building and survey its core technologies by information embedding, transaction filtering, and transaction obfuscation, and summarize evaluation metrics to better analyze blockchain-based covert channels.
Abstract: Covert communication enables covert information transmission in an undetectable way to prevent the exposure of communication behaviors. Blockchain-based covert communication breaks through the limitations on concealment, reliability and anti-traceability, and has shown promising application prospects in both sensitive data transmission and botnets. Although there are studies on blockchain-based covert communication, it still lacks a systematic investigation. In this paper, we conduct a comprehensive study on channel building and survey its core technologies by information embedding, transaction filtering, and transaction obfuscation. We also summarize evaluation metrics to better analyze blockchain-based covert channels. Privacy aspects are also discussed. Finally, we suggest seven future directions to stir research efforts into this area.

4 citations

Proceedings ArticleDOI
01 Dec 2019
TL;DR: Two different schemes for two-way mutual authentication between the UAV and dumb sensors which utilize non-cryptographic physical layer cover channel and neighboring devices' signal sensing correlations respectively are presented.
Abstract: Nowadays, The Internet of Things (IoT) has been widely used in various fields due to its smart sensing and communication capabilities. IoT devices serve as bridges for the cyber system to interact with the physical environment by providing various useful sensing capabilities such as battlefield surveillance, home monitoring, traffic control, etc. These capabilities also make IoT an important role in tactical missions in the military, including Reconnaissance, Intelligence, Surveillance, and Target Acquisition (RISTA). Nevertheless, IoT devices are known to have critical issues on security due to constraints on cost and resources. Most existing researches are based on smart sensors that have comparatively more computing and communication resources, while security solutions for dumb sensors are still lacking. Some IoT sensors that are deployed in a hostile environment are dumb due to limitations on cost and power supply, making them more vulnerable to attacks. In this work, we try to tackle this problem by proposing effective authentication solutions between a UAV and dumb IoT devices (also referred to as dumb sensors) within an example application of a UAV-sensor collaborative RISTA mission. We present two different schemes for two-way mutual authentication between the UAV and dumb sensors which utilize non-cryptographic physical layer cover channel and neighboring devices' signal sensing correlations respectively. We demonstrate the feasibility and effectiveness of our schemes with extensive real-world experiments on our prototype deployment.

4 citations

Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors conduct a comprehensive study on channel building and survey its core technologies by information embedding, transaction filtering, and transaction obfuscation, and summarize evaluation metrics to better analyze blockchain-based covert channels.
Abstract: Covert communication enables covert information transmission in an undetectable way to prevent the exposure of communication behaviors. Blockchain-based covert communication breaks through the limitations on concealment, reliability and anti-traceability, and has shown promising application prospects in both sensitive data transmission and botnets. Although there are studies on blockchain-based covert communication, it still lacks a systematic investigation. In this paper, we conduct a comprehensive study on channel building and survey its core technologies by information embedding, transaction filtering, and transaction obfuscation. We also summarize evaluation metrics to better analyze blockchain-based covert channels. Privacy aspects are also discussed. Finally, we suggest seven future directions to stir research efforts into this area.

4 citations

Proceedings ArticleDOI
20 May 2019
TL;DR: This work proposes a light-weight authentication scheme for dumb IoT devices, in a case study of the UAV-sensor collaborative RISTA missions, and demonstrates the viability of the scheme by building a prototype system and conducting experiments to emulate the behaviors of UAVs and sensors in real scenarios.
Abstract: Internet of Things (IoT) is ubiquitous because of its broad applications and the advance in communication technologies. The capabilities of IoT also enable its important role in homeland security and tactical missions, including Reconnaissance, Intelligence, Surveillance, and Target Acquisition (RISTA). IoT security becomes the most critical issue before its extensive use in military operations. While the majority of research focuses on smart IoT devices, treatments for legacy dumb network-ready devices are lacking; moreover, IoT devices deployed in a hostile environment are often required to be dumb due to the strict hardware constraints, making them highly vulnerable to cyber attacks. To mitigate the problem, we propose a light-weight authentication scheme for dumb IoT devices, in a case study of the UAV-sensor collaborative RISTA missions. Our scheme utilizes the covert channels in the physical layer for authentications and does not request conventional key deployments, key generations which may cause security risks and large overhead that a dumb sensor cannot afford. Our scheme operates on the physical layer, and thus it is highly portable and generalizable to most commercial and military communication protocols. We demonstrate the viability of our scheme by building a prototype system and conducting experiments to emulate the behaviors of UAVs and sensors in real scenarios.

2 citations