A Timing Channel Spyware Robust to MAC Random Back-off

نویسندگان

  • Yousra Alkabani
  • Negar Kiyavash
  • Farinaz Koushanfar
چکیده

This paper presents the design and implementation of spyware communication circuits built into the widely used Carrier Sense Multiple Access with collision avoidance (CSMA/CA) protocol. The spyware components are embedded within the sequential and combinational communication circuit structure during synthesis, rendering the distinction or dissociation of the spyware from the original circuit impossible. We take advantage of the timing channel resulting from transmission of packets to implement a new practical coding scheme that covertly transfers the spied data. Our codes are robust against the CSMA/CA’s random retransmission time for collision avoidance and in fact take advantage of it to disguise the covert communication. The data snooping may be sporadically triggered, either externally or internally. The occasional trigger and the real-time traffic’s variability make the spyware timing covert channel detection a challenge. The spyware is implemented and tested on a widely used open-source wireless CSMA/CA radio platform. We identify the following performance metrics and evaluate them on our architecture: 1) efficiency of implementation of the encoder; 2) robustness of the communication scheme to heterogeneous CSMA/CA effects; and 3) difficulty of covert channel detection. We evaluate criterion 1) completely theoretically. Criterion 2) is evaluated by simulating a wireless CSMA/CA architecture and testing the robustness of the decoder in different heterogeneous wireless conditions. Criterion 3) is confirmed experimentally using the state-of-the-art covert timing channel detection methods.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Dynamic CDMA with Binary Exponential Code (BEC) back-off MAC Protocol in Wireless Networks

IEEE 802.11 wireless media random access protocols uses binary exponential back-off in time domain to coordinate multiple accesses. Every frame must undergo channel contention before transmission which incurs severe inefficiencies in channel utilization in hidden terminal and multi-hop networks because more than 50% of the total time, stations are waiting to gain channel access. Furthermore, th...

متن کامل

Multi-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey

Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...

متن کامل

Multi-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey

Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...

متن کامل

A Fairness Oriented Neighbor-Channel-Aware MAC Protocol for Airborne Sensor Networks

In airborne sensor networks (ASNs), the media access control (MAC) protocol faces a serious unfairness problem due to the traditional protection mechanism of air-to-air communications among aircraft. Actually, by using the binary exponential back-off algorithm at high traffic loads to minimize collisions among users, the latest successful node can always benefit from this kind of MAC to obtain ...

متن کامل

Fairness Oriented Neighbor-Channel-Aware MAC Protocol for Airborne Sensor Networks

In airborne sensor networks (ASNs), the media access control (MAC) protocol is facing with serious unfairness problem due to the traditional protection mechanism of air-to-air communications among aircrafts. Actually by using the binary exponential back-off algorithm at high traffic loads to minimize collisions among users, the latest successful node can always benefit from this kind of MAC to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010