计算机科学 ›› 2024, Vol. 51 ›› Issue (8): 364-370.doi: 10.11896/jsjkx.230500037

• 计算机网络 • 上一篇    下一篇

基于Websocket协议的车联网隐蔽信道构建

赵辉, 彭建友, 秦玉林, 韩利利   

  1. 重庆邮电大学通信与信息工程学院 重庆 400065
    信号与信息处理重庆市重点实验室 重庆 400065
  • 收稿日期:2023-05-08 修回日期:2023-08-30 出版日期:2024-08-15 发布日期:2024-08-13
  • 通讯作者: 赵辉(zhaohui@cqupt.edu.cn)
  • 基金资助:
    重庆市教委科技研究项目(KJZD-K202000602);四川省重点研发计划项目(2022YFG0022)

Construction of Internet of Vehicles Covert Channel Based on Websocket Protocol

ZHAO Hui, PENG Jianyou, QIN Yulin, HAN Lili   

  1. 1 School of Communication and Information Engineering,Chongqing University of Posts and Telecommunications,Chongqing 400065,China
    2 Chongqing Key Laboratory of Signal and Information Processing,Chongqing 400065,China
  • Received:2023-05-08 Revised:2023-08-30 Online:2024-08-15 Published:2024-08-13
  • About author:ZHAO Hui,born in 1980,Ph.D,professor,doctorial supervisor.Her main research interests include information security and vehicle networking security.
  • Supported by:
    Science and Technology Research Project of Chongqing Municipal Education Commission(KJZD-K202000602) and Key R & D Program of Sichuan Province(2022YFG0022).

摘要: 针对传统车联网协议下的隐蔽信道构建方式单一、无法适用于复杂网络环境的问题,通过分析轻量级物联网应用层协议Websocket的数据帧格式和通信机制,提出了一种基于Websocket协议的车联网隐蔽信道构建方法。该方法利用信息分离聚合算法将待发送的隐蔽信息进行多维传输,以提升隐蔽信道的传输速率和抗暴露性。同时,考虑到车联网网络的动态拓扑特性,基于跳频技术自适应变换信息分离聚合方式和编码映射表。为了提高信道的隐蔽性,通过最小二乘算法模拟了正常网络流量的传输特性。仿真实验结果表明,所构建的隐蔽信道在面对较差的网络环境时,受到的网络波动影响较小,具有较好的鲁棒性;并且相较于单一维度传输的隐蔽信道,在隐蔽性和传输速率方面有一定的提升。

关键词: 车联网, Websocket, 信息分离聚合, 跳频技术, 最小二乘

Abstract: Aiming at the problem that the construction method of covert channel under traditional Internet of Vehicles protocol is single and cannot be applied to complex network environment,a construction method of covert channel in Internet of Vehicles based on WebSocket protocol is proposed by analyzing the data frame format and communication mechanism of Websocket-a lightweight application layer protocol of Internet of Things.This method uses information separation and aggregation algorithm to transmit the covert information in multiple dimensions to enhance the transmission rate and anti-exposure of the covert channel.Besides,considering the dynamic topological characteristics of the Internet of Vehicles network,the information separation and aggregation mode and coding mapping table are transformed adaptively based on frequency hopping technology.Finally,in order to improve the concealment of the channel,the least square algorithm is used to simulate the transmission characteristics of normal network traffic.The results of simulation experiments show that the constructed covert channel is less affected by network fluctuations and has better robustness when facing poor network environment.And compared with the covert channel with single-dimension transmission,it has certain improvement in terms of concealment and transmission rate.

Key words: Internet of Vehicles, Websocket, Information separation and aggregation, Frequency hopping technology, Least square

中图分类号: 

  • TP309.2
[1]TASLIMASA H,DADKHAH S,NETO E C P,et al.Security issues in Internet of Vehicles(IoV):A comprehensive survey [J].Internet of Things,2023,22:100809.
[2]MAKHDOOM I,ABOLHASAN M,LIPMAN J.A comprehensive survey of covert communication techniques,limitations and future challenges [J].Computers & Security,2022,120:102784.
[3]AL-KHULAIDI N A,ZAHARY A T,HAZAA M A S,et al.Covert Channel Detection and Generation Techniques:A Survey[C]//2023 3rd International Conference on Emerging Smart Technologies and Applications(eSmarTA).IEEE,2023:1-9.
[4]ELSADIG M A,GAFAR A.Covert channel detection:machine learning approaches [J].IEEE Access,2022,10:38391-38405.
[5]LU J,DING Y,LI Z,et al.A timestamp-based covert data transmission method in Industrial Control System[C]//2022 7th IEEE International Conference on Data Science in Cyberspace(DSC).IEEE,2022:526-532.
[6]WANG J,ZHANG L,LI Z,et al.CC-Guard:An IPv6 CovertChannel Detection Method Based on Field Matching[C]//2022 IEEE 24th Int Conf on High Performance Computing & Communications;8th Int Conf on Data Science & Systems;20th Int Conf on Smart City;8th Int Conf on Dependability in Sensor,Cloud & Big Data Systems & Application(HPCC/DSS/SmartCity/DependSys).IEEE,2022:1416-1421.
[7]DUA A,JINDAL V,BEDI P.Detecting and Locating Storage-Based Covert Channels in Internet Protocol Version 6 [J].IEEE Access,2022,10:110661-110675.
[8]SEMUSHIN S,SEYTNAZAROV S.HTTP Header Reordering-based Covert Channel Protocol[C]//2023 6th Interna-tional Conference on Signal Processing and Information Security(ICSPIS).IEEE,2023:145-150.
[9]SZARY P,MAZURCZYK W,WENDZEL S,et al.Analysis of reversible network covert channels [J].IEEE Access,2022,10:41226-41238.
[10]ABBAS M K,SANDIKKAYA M T.An efficient VoLTE covert timing channel for 5 G networks:RDCTC [J].Optik,2022,270:170076.
[11]HARRIS K,HENRY W,DILL R.A network-based IoT covert channel[C]//2022 4th International Conference on Computer Communication and the Internet(ICCCI).IEEE,2022:91-99.
[12]XU J,WANG X,JIANG Y,et al.Secured Data TransmissionOver Insecure Networks-on-Chip by Modulating Inter-Packet Delays [J].IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems,2022,41(11):4313-4324.
[13]YING X,BERNIERI G,CONTI M,et al.Covert channel-based transmitter authentication in controller area networks [J].IEEE Transactions on Dependable and Secure Computing,2021,19(4):2665-2679.
[14]ZHANG H,ZOU Y,YU D,et al.Covert communications with friendly jamming in Internet of vehicles [J].Vehicular Communications,2022,35:100472.
[15]TAHERI S,MAHDAVI M,MOGHIM N.A dynamic timing-storage covert channel in vehicular ad hoc networks [J].Telecommunication Systems,2018,69:415-429.
[16]SHARMA N,AGARWAL R.HTTP,WebSocket,and SignalR:A Comparison of Real-Time Online Communication Protocols[C]//International Conference on Mining Intelligence and Knowledge Exploration.Cham:Springer Nature Switzerland,2023:128-135.
[17]FU Y,GARCÍA-VALLS M.Security aspects of full-duplex web interactions and WebSockets[C]//2023 20th ACS/IEEE International Conference on Computer Systems and Applications(AICCSA).IEEE,2023:1-8.
[18]BAYıLMıŞ C,EBLEME M A,ÇAVUŞOĞLU Ü,et al.A survey on communication protocols and performance evaluations for Internet of Things [J].Digital Communications and Networks,2022,8(6):1094-1104.
[19]KAVAS-TORRIS O,GELBAL S Y,CANTAS M R,et al.V2X communication between connected and automated vehicles(CAVs) and unmanned aerial vehicles(UAVs) [J].Sensors,2022,22(22):8941.
[20]LIU Y,GHOSAL D,ARMKNECHT F,et al.Robust and undetectable steganographic timing channels for iid traffic[C]//Information Hiding:12th International Conference,IH 2010,Calgary,AB,Canada,June 28-30,2010,Revised Selected Papers 12.Berlin:Springer,2010:193-207.
[21]DENG Y X,TANG Z G,ZHANG J,et al.Research on covert channels based on block coding of MQTT protocol commands [J].Computer Engineering,2019,45(11):138-143.
[22]GUO R,DU Y H,LU T L,et al.Covert channel based on CoAP protocol parameter sequence [J].Computer Applications and Software,2021,38(8):138-143.
[23]CHEN C,LUO S L,WU Q,et al.Research on Covert channel Construction Method Based on HTTP Protocol Combination [J].Netinfo Security,2020,20(6):57-64.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!