计算机科学 ›› 2024, Vol. 51 ›› Issue (8): 364-370.doi: 10.11896/jsjkx.230500037
赵辉, 彭建友, 秦玉林, 韩利利
ZHAO Hui, PENG Jianyou, QIN Yulin, HAN Lili
摘要: 针对传统车联网协议下的隐蔽信道构建方式单一、无法适用于复杂网络环境的问题,通过分析轻量级物联网应用层协议Websocket的数据帧格式和通信机制,提出了一种基于Websocket协议的车联网隐蔽信道构建方法。该方法利用信息分离聚合算法将待发送的隐蔽信息进行多维传输,以提升隐蔽信道的传输速率和抗暴露性。同时,考虑到车联网网络的动态拓扑特性,基于跳频技术自适应变换信息分离聚合方式和编码映射表。为了提高信道的隐蔽性,通过最小二乘算法模拟了正常网络流量的传输特性。仿真实验结果表明,所构建的隐蔽信道在面对较差的网络环境时,受到的网络波动影响较小,具有较好的鲁棒性;并且相较于单一维度传输的隐蔽信道,在隐蔽性和传输速率方面有一定的提升。
中图分类号:
[1]TASLIMASA H,DADKHAH S,NETO E C P,et al.Security issues in Internet of Vehicles(IoV):A comprehensive survey [J].Internet of Things,2023,22:100809. [2]MAKHDOOM I,ABOLHASAN M,LIPMAN J.A comprehensive survey of covert communication techniques,limitations and future challenges [J].Computers & Security,2022,120:102784. [3]AL-KHULAIDI N A,ZAHARY A T,HAZAA M A S,et al.Covert Channel Detection and Generation Techniques:A Survey[C]//2023 3rd International Conference on Emerging Smart Technologies and Applications(eSmarTA).IEEE,2023:1-9. [4]ELSADIG M A,GAFAR A.Covert channel detection:machine learning approaches [J].IEEE Access,2022,10:38391-38405. [5]LU J,DING Y,LI Z,et al.A timestamp-based covert data transmission method in Industrial Control System[C]//2022 7th IEEE International Conference on Data Science in Cyberspace(DSC).IEEE,2022:526-532. [6]WANG J,ZHANG L,LI Z,et al.CC-Guard:An IPv6 CovertChannel Detection Method Based on Field Matching[C]//2022 IEEE 24th Int Conf on High Performance Computing & Communications;8th Int Conf on Data Science & Systems;20th Int Conf on Smart City;8th Int Conf on Dependability in Sensor,Cloud & Big Data Systems & Application(HPCC/DSS/SmartCity/DependSys).IEEE,2022:1416-1421. [7]DUA A,JINDAL V,BEDI P.Detecting and Locating Storage-Based Covert Channels in Internet Protocol Version 6 [J].IEEE Access,2022,10:110661-110675. [8]SEMUSHIN S,SEYTNAZAROV S.HTTP Header Reordering-based Covert Channel Protocol[C]//2023 6th Interna-tional Conference on Signal Processing and Information Security(ICSPIS).IEEE,2023:145-150. [9]SZARY P,MAZURCZYK W,WENDZEL S,et al.Analysis of reversible network covert channels [J].IEEE Access,2022,10:41226-41238. [10]ABBAS M K,SANDIKKAYA M T.An efficient VoLTE covert timing channel for 5 G networks:RDCTC [J].Optik,2022,270:170076. [11]HARRIS K,HENRY W,DILL R.A network-based IoT covert channel[C]//2022 4th International Conference on Computer Communication and the Internet(ICCCI).IEEE,2022:91-99. [12]XU J,WANG X,JIANG Y,et al.Secured Data TransmissionOver Insecure Networks-on-Chip by Modulating Inter-Packet Delays [J].IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems,2022,41(11):4313-4324. [13]YING X,BERNIERI G,CONTI M,et al.Covert channel-based transmitter authentication in controller area networks [J].IEEE Transactions on Dependable and Secure Computing,2021,19(4):2665-2679. [14]ZHANG H,ZOU Y,YU D,et al.Covert communications with friendly jamming in Internet of vehicles [J].Vehicular Communications,2022,35:100472. [15]TAHERI S,MAHDAVI M,MOGHIM N.A dynamic timing-storage covert channel in vehicular ad hoc networks [J].Telecommunication Systems,2018,69:415-429. [16]SHARMA N,AGARWAL R.HTTP,WebSocket,and SignalR:A Comparison of Real-Time Online Communication Protocols[C]//International Conference on Mining Intelligence and Knowledge Exploration.Cham:Springer Nature Switzerland,2023:128-135. [17]FU Y,GARCÍA-VALLS M.Security aspects of full-duplex web interactions and WebSockets[C]//2023 20th ACS/IEEE International Conference on Computer Systems and Applications(AICCSA).IEEE,2023:1-8. [18]BAYıLMıŞ C,EBLEME M A,ÇAVUŞOĞLU Ü,et al.A survey on communication protocols and performance evaluations for Internet of Things [J].Digital Communications and Networks,2022,8(6):1094-1104. [19]KAVAS-TORRIS O,GELBAL S Y,CANTAS M R,et al.V2X communication between connected and automated vehicles(CAVs) and unmanned aerial vehicles(UAVs) [J].Sensors,2022,22(22):8941. [20]LIU Y,GHOSAL D,ARMKNECHT F,et al.Robust and undetectable steganographic timing channels for iid traffic[C]//Information Hiding:12th International Conference,IH 2010,Calgary,AB,Canada,June 28-30,2010,Revised Selected Papers 12.Berlin:Springer,2010:193-207. [21]DENG Y X,TANG Z G,ZHANG J,et al.Research on covert channels based on block coding of MQTT protocol commands [J].Computer Engineering,2019,45(11):138-143. [22]GUO R,DU Y H,LU T L,et al.Covert channel based on CoAP protocol parameter sequence [J].Computer Applications and Software,2021,38(8):138-143. [23]CHEN C,LUO S L,WU Q,et al.Research on Covert channel Construction Method Based on HTTP Protocol Combination [J].Netinfo Security,2020,20(6):57-64. |
|