DOI QR코드

DOI QR Code

Applying the Nash Equilibrium to Constructing Covert Channel in IoT

  • Ho, Jun-Won (Department of Information Security, Seoul Women's University)
  • Received : 2021.01.13
  • Accepted : 2021.01.24
  • Published : 2021.02.28

Abstract

Although many different types of covert channels have been suggested in the literature, there are little work in directly applying game theory to building up covert channel. This is because researchers have mainly focused on tailoring game theory for covert channel analysis, identification, and covert channel problem solving. Unlike typical adaptation of game theory to covert channel, we show that game theory can be utilized to establish a new type of covert channel in IoT devices. More specifically, we propose a covert channel that can be constructed by utilizing the Nash Equilibrium with sensor data collected from IoT devices. For covert channel construction, we set random seed to the value of sensor data and make payoff from random number created by running pseudo random number generator with the configured random seed. We generate I × J (I ≥ 2, J ≥ 2) matrix game with these generated payoffs and attempt to obtain the Nash Equilibrium. Covert channel construction method is distinctly determined in accordance with whether or not to acquire the Nash Equilibrium.

Keywords

References

  1. M. Maschler, E. Solan, and S. Zamir, Game Theory, Cambridge University Press, Second Edition 2020.
  2. S. Anand, S. Sengupta and R. Chandramouli, "An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks," 2010 Proceedings IEEE INFOCOM, San Diego, CA, 2010, pp. 1-9. DOI: https://doi.org/10.1109/INFCOM.2010.5461976.
  3. J. Wang, W. Tang, X. Li and S. Li, "Optimal Strategy in Covert Communication based on Game Theory," 2019 IEEE/CIC International Conference on Communications in China (ICCC), Changchun, China, 2019, pp. 189-194. DOI: https://doi.org/10.1109/ICCChina.2019.8855950.
  4. Malte Diehl, "Secure Covert Channels in Multiplayer Games," MM&Sec pp. 117-122, Sep. 2008. DOI: https://doi.org/10.1145/1411328.1411350.
  5. A. S. Leong, D. E. Quevedo, and S. Dey, "A Game-Theoretic Approach to Covert Communications," https://arxiv.org/pdf/1911.00156.pdf.
  6. L. Helouet, M. Zeitoun, A. Degorre, "Scenarios and Covert Channels: Another Game...," Electronic Notes in Theoretical Computer Science, 119 (2005), pp. 93-116. DOI: https://doi.org/10.1016/j.entcs.2004.07.010.
  7. J. Ho, "Covert Channel Establishment Through the Dynamic Adaptation of the Sequential Probability Ratio Test to Sensor Data in IoT," in IEEE Access, vol. 7, pp. 146093-146107, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2945974.
  8. D. Evtyushkin and D. Ponomarev, "Covert Channels through RandomNumber Generator: Mechanisms, Capacity Estimation and Mitigations," In ACM CCS, 2016. DOI: https://doi.org/10.1145/2976749.2978374.
  9. M. Guri, Y. Solewicz, A. Daidakulov, and Y. Elovici, "Acoustic data exfiltration from speakerless air-gapped computers via covert hard-drive noise (diskfiltration)," In European Symposium on Research in Computer Security, 2017. DOI: https://doi.org/10.1007/978-3-319-66399-9_6.
  10. K. Block, S. Narain, and G. Noubir, "An Autonomic and Permissionless Android Covert Channel," In ACM WiSec, 2017. DOI: https://doi.org/10.1145/3098243.3098250.
  11. W. Qi, Y. Xu, W. Ding, Y. Jiang, J. Wang, and K. Lu, "Privacy Leaks When You Play Games: A Novel User-Behavior-Based Covert Channel on Smartphones," In ICNP, 2015. DOI: https://doi.org/10.1109/ICNP.2015.40.
  12. P. C. Ritchey and V. J. Rego, "Covert Channels in Combinatorial Games," In DISIO Workshop 2012. DOI:https://doi.org/10.4108/icst.simutools.2012.247733.
  13. R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang, "Soundcomber: A Stealthy and Context Aware Sound Trojan for Smartphones," In NDSS, 2011.
  14. T. Heard, D. Johnson, and B. Stackpole, "Exploring a high-capacity covert channel on the Android operating system," In IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2015. DOI: https://doi.org/10.1109/IDAACS.2015.7340765.
  15. S. Chandra, Z. Lin, A. Kundu, and L. Khan, "Towards a Systematic Study of the Covert Channel Attacks in Smartphones," In SecureComm, 2014. DOI: https://doi.org/10.1007/978-3-319-23829-6_29.
  16. J. Xiong, L. Xuan, T. Huang, and J. Zhao, "Novel Covert Data Channel in Wireless Sensor Networks Using Compressive Sensing," In Journal of Networks, vol. 7, no. 10, pp. 1523-1529, October 2012. DOI:https://doi.org/10.4304/jnw.7.10.1523-1529.
  17. A. Al-Haiqi, M. Ismail, and R. Nordin, "A New Sensors-Based Covert Channel on Android," In The Scientific World Journal, DOI: https://doi.org/10.1155/2014/969628, 2014.
  18. L. Deshotels, "Inaudible Sound as a Covert Channel in Mobile Devices," In WOOT, 2014. DOI: https://doi.org/10.5555/2671293.2671309.
  19. S. Cabuk, C. Brodley, and C. Shields, "IP covert timing channels: Design and detection," In ACM Conference on Computer and Communications Security, October 2004. DOI: https://doi.org/10.1145/1030083.1030108.
  20. S. Li and A. Ephremides, "A Network Layer Covert Channel in Ad-hoc Wireless Networks," In IEEE SECON, 2004. DOI: https://doi.org/ 10.1109/SAHCN.2004.1381906.
  21. C. Maurice, C. Neumann, O. Heen, and A. Francillon, "C5: cross-cores cache covert channel," In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 2015. DOI: https://doi.org/10.1007/978-3-319-20550-2_3.