Browse > Article
http://dx.doi.org/10.7236/IJIBC.2021.13.1.243

Applying the Nash Equilibrium to Constructing Covert Channel in IoT  

Ho, Jun-Won (Department of Information Security, Seoul Women's University)
Publication Information
International Journal of Internet, Broadcasting and Communication / v.13, no.1, 2021 , pp. 243-248 More about this Journal
Abstract
Although many different types of covert channels have been suggested in the literature, there are little work in directly applying game theory to building up covert channel. This is because researchers have mainly focused on tailoring game theory for covert channel analysis, identification, and covert channel problem solving. Unlike typical adaptation of game theory to covert channel, we show that game theory can be utilized to establish a new type of covert channel in IoT devices. More specifically, we propose a covert channel that can be constructed by utilizing the Nash Equilibrium with sensor data collected from IoT devices. For covert channel construction, we set random seed to the value of sensor data and make payoff from random number created by running pseudo random number generator with the configured random seed. We generate I × J (I ≥ 2, J ≥ 2) matrix game with these generated payoffs and attempt to obtain the Nash Equilibrium. Covert channel construction method is distinctly determined in accordance with whether or not to acquire the Nash Equilibrium.
Keywords
Covert Channel; Nash Equilibrium; IoT; Sensor Data;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Maschler, E. Solan, and S. Zamir, Game Theory, Cambridge University Press, Second Edition 2020.
2 S. Anand, S. Sengupta and R. Chandramouli, "An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks," 2010 Proceedings IEEE INFOCOM, San Diego, CA, 2010, pp. 1-9. DOI: https://doi.org/10.1109/INFCOM.2010.5461976.   DOI
3 J. Wang, W. Tang, X. Li and S. Li, "Optimal Strategy in Covert Communication based on Game Theory," 2019 IEEE/CIC International Conference on Communications in China (ICCC), Changchun, China, 2019, pp. 189-194. DOI: https://doi.org/10.1109/ICCChina.2019.8855950.   DOI
4 Malte Diehl, "Secure Covert Channels in Multiplayer Games," MM&Sec pp. 117-122, Sep. 2008. DOI: https://doi.org/10.1145/1411328.1411350.   DOI
5 A. S. Leong, D. E. Quevedo, and S. Dey, "A Game-Theoretic Approach to Covert Communications," https://arxiv.org/pdf/1911.00156.pdf.
6 M. Guri, Y. Solewicz, A. Daidakulov, and Y. Elovici, "Acoustic data exfiltration from speakerless air-gapped computers via covert hard-drive noise (diskfiltration)," In European Symposium on Research in Computer Security, 2017. DOI: https://doi.org/10.1007/978-3-319-66399-9_6.   DOI
7 L. Helouet, M. Zeitoun, A. Degorre, "Scenarios and Covert Channels: Another Game...," Electronic Notes in Theoretical Computer Science, 119 (2005), pp. 93-116. DOI: https://doi.org/10.1016/j.entcs.2004.07.010.   DOI
8 J. Ho, "Covert Channel Establishment Through the Dynamic Adaptation of the Sequential Probability Ratio Test to Sensor Data in IoT," in IEEE Access, vol. 7, pp. 146093-146107, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2945974.   DOI
9 D. Evtyushkin and D. Ponomarev, "Covert Channels through RandomNumber Generator: Mechanisms, Capacity Estimation and Mitigations," In ACM CCS, 2016. DOI: https://doi.org/10.1145/2976749.2978374.   DOI
10 K. Block, S. Narain, and G. Noubir, "An Autonomic and Permissionless Android Covert Channel," In ACM WiSec, 2017. DOI: https://doi.org/10.1145/3098243.3098250.   DOI
11 W. Qi, Y. Xu, W. Ding, Y. Jiang, J. Wang, and K. Lu, "Privacy Leaks When You Play Games: A Novel User-Behavior-Based Covert Channel on Smartphones," In ICNP, 2015. DOI: https://doi.org/10.1109/ICNP.2015.40.   DOI
12 A. Al-Haiqi, M. Ismail, and R. Nordin, "A New Sensors-Based Covert Channel on Android," In The Scientific World Journal, DOI: https://doi.org/10.1155/2014/969628, 2014.   DOI
13 P. C. Ritchey and V. J. Rego, "Covert Channels in Combinatorial Games," In DISIO Workshop 2012. DOI:https://doi.org/10.4108/icst.simutools.2012.247733.   DOI
14 R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang, "Soundcomber: A Stealthy and Context Aware Sound Trojan for Smartphones," In NDSS, 2011.
15 T. Heard, D. Johnson, and B. Stackpole, "Exploring a high-capacity covert channel on the Android operating system," In IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2015. DOI: https://doi.org/10.1109/IDAACS.2015.7340765.   DOI
16 S. Chandra, Z. Lin, A. Kundu, and L. Khan, "Towards a Systematic Study of the Covert Channel Attacks in Smartphones," In SecureComm, 2014. DOI: https://doi.org/10.1007/978-3-319-23829-6_29.   DOI
17 J. Xiong, L. Xuan, T. Huang, and J. Zhao, "Novel Covert Data Channel in Wireless Sensor Networks Using Compressive Sensing," In Journal of Networks, vol. 7, no. 10, pp. 1523-1529, October 2012. DOI:https://doi.org/10.4304/jnw.7.10.1523-1529.   DOI
18 L. Deshotels, "Inaudible Sound as a Covert Channel in Mobile Devices," In WOOT, 2014. DOI: https://doi.org/10.5555/2671293.2671309.   DOI
19 S. Cabuk, C. Brodley, and C. Shields, "IP covert timing channels: Design and detection," In ACM Conference on Computer and Communications Security, October 2004. DOI: https://doi.org/10.1145/1030083.1030108.   DOI
20 S. Li and A. Ephremides, "A Network Layer Covert Channel in Ad-hoc Wireless Networks," In IEEE SECON, 2004. DOI: https://doi.org/ 10.1109/SAHCN.2004.1381906.   DOI
21 C. Maurice, C. Neumann, O. Heen, and A. Francillon, "C5: cross-cores cache covert channel," In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 2015. DOI: https://doi.org/10.1007/978-3-319-20550-2_3.   DOI