Computer Science ›› 2024, Vol. 51 ›› Issue (8): 364-370.doi: 10.11896/jsjkx.230500037

• Computer Network • Previous Articles     Next Articles

Construction of Internet of Vehicles Covert Channel Based on Websocket Protocol

ZHAO Hui, PENG Jianyou, QIN Yulin, HAN Lili   

  1. 1 School of Communication and Information Engineering,Chongqing University of Posts and Telecommunications,Chongqing 400065,China
    2 Chongqing Key Laboratory of Signal and Information Processing,Chongqing 400065,China
  • Received:2023-05-08 Revised:2023-08-30 Online:2024-08-15 Published:2024-08-13
  • About author:ZHAO Hui,born in 1980,Ph.D,professor,doctorial supervisor.Her main research interests include information security and vehicle networking security.
  • Supported by:
    Science and Technology Research Project of Chongqing Municipal Education Commission(KJZD-K202000602) and Key R & D Program of Sichuan Province(2022YFG0022).

Abstract: Aiming at the problem that the construction method of covert channel under traditional Internet of Vehicles protocol is single and cannot be applied to complex network environment,a construction method of covert channel in Internet of Vehicles based on WebSocket protocol is proposed by analyzing the data frame format and communication mechanism of Websocket-a lightweight application layer protocol of Internet of Things.This method uses information separation and aggregation algorithm to transmit the covert information in multiple dimensions to enhance the transmission rate and anti-exposure of the covert channel.Besides,considering the dynamic topological characteristics of the Internet of Vehicles network,the information separation and aggregation mode and coding mapping table are transformed adaptively based on frequency hopping technology.Finally,in order to improve the concealment of the channel,the least square algorithm is used to simulate the transmission characteristics of normal network traffic.The results of simulation experiments show that the constructed covert channel is less affected by network fluctuations and has better robustness when facing poor network environment.And compared with the covert channel with single-dimension transmission,it has certain improvement in terms of concealment and transmission rate.

Key words: Internet of Vehicles, Websocket, Information separation and aggregation, Frequency hopping technology, Least square

CLC Number: 

  • TP309.2
[1]TASLIMASA H,DADKHAH S,NETO E C P,et al.Security issues in Internet of Vehicles(IoV):A comprehensive survey [J].Internet of Things,2023,22:100809.
[2]MAKHDOOM I,ABOLHASAN M,LIPMAN J.A comprehensive survey of covert communication techniques,limitations and future challenges [J].Computers & Security,2022,120:102784.
[3]AL-KHULAIDI N A,ZAHARY A T,HAZAA M A S,et al.Covert Channel Detection and Generation Techniques:A Survey[C]//2023 3rd International Conference on Emerging Smart Technologies and Applications(eSmarTA).IEEE,2023:1-9.
[4]ELSADIG M A,GAFAR A.Covert channel detection:machine learning approaches [J].IEEE Access,2022,10:38391-38405.
[5]LU J,DING Y,LI Z,et al.A timestamp-based covert data transmission method in Industrial Control System[C]//2022 7th IEEE International Conference on Data Science in Cyberspace(DSC).IEEE,2022:526-532.
[6]WANG J,ZHANG L,LI Z,et al.CC-Guard:An IPv6 CovertChannel Detection Method Based on Field Matching[C]//2022 IEEE 24th Int Conf on High Performance Computing & Communications;8th Int Conf on Data Science & Systems;20th Int Conf on Smart City;8th Int Conf on Dependability in Sensor,Cloud & Big Data Systems & Application(HPCC/DSS/SmartCity/DependSys).IEEE,2022:1416-1421.
[7]DUA A,JINDAL V,BEDI P.Detecting and Locating Storage-Based Covert Channels in Internet Protocol Version 6 [J].IEEE Access,2022,10:110661-110675.
[8]SEMUSHIN S,SEYTNAZAROV S.HTTP Header Reordering-based Covert Channel Protocol[C]//2023 6th Interna-tional Conference on Signal Processing and Information Security(ICSPIS).IEEE,2023:145-150.
[9]SZARY P,MAZURCZYK W,WENDZEL S,et al.Analysis of reversible network covert channels [J].IEEE Access,2022,10:41226-41238.
[10]ABBAS M K,SANDIKKAYA M T.An efficient VoLTE covert timing channel for 5 G networks:RDCTC [J].Optik,2022,270:170076.
[11]HARRIS K,HENRY W,DILL R.A network-based IoT covert channel[C]//2022 4th International Conference on Computer Communication and the Internet(ICCCI).IEEE,2022:91-99.
[12]XU J,WANG X,JIANG Y,et al.Secured Data TransmissionOver Insecure Networks-on-Chip by Modulating Inter-Packet Delays [J].IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems,2022,41(11):4313-4324.
[13]YING X,BERNIERI G,CONTI M,et al.Covert channel-based transmitter authentication in controller area networks [J].IEEE Transactions on Dependable and Secure Computing,2021,19(4):2665-2679.
[14]ZHANG H,ZOU Y,YU D,et al.Covert communications with friendly jamming in Internet of vehicles [J].Vehicular Communications,2022,35:100472.
[15]TAHERI S,MAHDAVI M,MOGHIM N.A dynamic timing-storage covert channel in vehicular ad hoc networks [J].Telecommunication Systems,2018,69:415-429.
[16]SHARMA N,AGARWAL R.HTTP,WebSocket,and SignalR:A Comparison of Real-Time Online Communication Protocols[C]//International Conference on Mining Intelligence and Knowledge Exploration.Cham:Springer Nature Switzerland,2023:128-135.
[17]FU Y,GARCÍA-VALLS M.Security aspects of full-duplex web interactions and WebSockets[C]//2023 20th ACS/IEEE International Conference on Computer Systems and Applications(AICCSA).IEEE,2023:1-8.
[18]BAYıLMıŞ C,EBLEME M A,ÇAVUŞOĞLU Ü,et al.A survey on communication protocols and performance evaluations for Internet of Things [J].Digital Communications and Networks,2022,8(6):1094-1104.
[19]KAVAS-TORRIS O,GELBAL S Y,CANTAS M R,et al.V2X communication between connected and automated vehicles(CAVs) and unmanned aerial vehicles(UAVs) [J].Sensors,2022,22(22):8941.
[20]LIU Y,GHOSAL D,ARMKNECHT F,et al.Robust and undetectable steganographic timing channels for iid traffic[C]//Information Hiding:12th International Conference,IH 2010,Calgary,AB,Canada,June 28-30,2010,Revised Selected Papers 12.Berlin:Springer,2010:193-207.
[21]DENG Y X,TANG Z G,ZHANG J,et al.Research on covert channels based on block coding of MQTT protocol commands [J].Computer Engineering,2019,45(11):138-143.
[22]GUO R,DU Y H,LU T L,et al.Covert channel based on CoAP protocol parameter sequence [J].Computer Applications and Software,2021,38(8):138-143.
[23]CHEN C,LUO S L,WU Q,et al.Research on Covert channel Construction Method Based on HTTP Protocol Combination [J].Netinfo Security,2020,20(6):57-64.
[1] LI Fengyun, CHEN Mingming, WANG Lin, LI Peng , JU Xianyin. Study on Trust Management Mechanism of Internet of Vehicles Based on Blockchain [J]. Computer Science, 2024, 51(4): 381-387.
[2] GAO Yang, JIANG Yini, LIN Hongwei. Local Progressive and Iterative Approximation for Least Squares B-spline Curve and Surface Fitting [J]. Computer Science, 2024, 51(1): 225-232.
[3] LIN Xinyu, YAO Zewei, HU Shengxi, CHEN Zheyi, CHEN Xing. Task Offloading Algorithm Based on Federated Deep Reinforcement Learning for Internet of Vehicles [J]. Computer Science, 2023, 50(9): 347-356.
[4] GUO Nan, SONG Xiaobo, ZHUANG Luyuan, ZHAO Cong. Anonymous Batch Authentication Scheme in Internet of Vehicles for WAVE Security Services [J]. Computer Science, 2023, 50(4): 308-316.
[5] CHEN Jing, WU Ling-ling. Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment [J]. Computer Science, 2022, 49(8): 108-112.
[6] SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353.
[7] TANG Liang, LI Fei. Research on Forecasting Model of Internet of Vehicles Security Situation Based on Decision Tree [J]. Computer Science, 2021, 48(6A): 514-517.
[8] YU Jian-ye, QI Yong, WANG Bao-zhuo. Distributed Combination Deep Learning Intrusion Detection Method for Internet of Vehicles Based on Spark [J]. Computer Science, 2021, 48(6A): 518-523.
[9] YU Tian-qi, HU Jian-ling, JIN Jiong, YANG Jian-feng. Mobile Edge Computing Based In-vehicle CAN Network Intrusion Detection Method [J]. Computer Science, 2021, 48(1): 34-39.
[10] TANG Jia-lin, ZHANG Chong, GUO Yan-feng, SU Bing-hua and SU Qing-lang. Color Difference Correction Algorithm Based on Multi Colors Space Information [J]. Computer Science, 2020, 47(6A): 157-160.
[11] WANG Chun-dong, LUO Wan-wei, MO Xiu-liang, YANG Wen-jun. Survey on Mutual Trust Authentication and Secure Communication of Internet of Vehicles [J]. Computer Science, 2020, 47(11): 1-9.
[12] LIU Dan. Fog Computing and Self-assessment Based Clustering and Cooperative Perception for VANET [J]. Computer Science, 2020, 47(10): 55-62.
[13] XUE Ling-ling, FAN Xiu-mei. Cognitive Spectrum Allocation Mechanism in Internet of Vehicles Based on Clustering Structure [J]. Computer Science, 2019, 46(9): 143-149.
[14] WANG Ding-cheng, LU Yi-yi, ZOU Yong-jie. Multi-output Intuitionistic Fuzzy Least Squares Support Vector Regression Algorithm [J]. Computer Science, 2019, 46(5): 163-168.
[15] CHENG Xian-yi, SHI Quan, ZHU Jian-xin, CHEN Feng-mei, DAI Ran-ran. VID Model of Vehicles-infrastructure-driver Collaborative Control in Big Data Environment [J]. Computer Science, 2019, 46(11A): 185-188.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!