دورية أكاديمية

Inaudible sound covert channel with anti-jamming capability: Attacks vs. countermeasure

التفاصيل البيبلوغرافية
العنوان: Inaudible sound covert channel with anti-jamming capability: Attacks vs. countermeasure
المؤلفون: Xiao-Hang Wang, Shou-Bin Li, Ying-Tao Jiang, Amit Kumar Singh, Bi-Yun Ma, Le-Tian Huang, Mei Yang, Fen Guo
المصدر: Journal of Electronic Science and Technology, Vol 20, Iss 4, Pp 100181- (2022)
بيانات النشر: KeAi Communications Co., Ltd., 2022.
سنة النشر: 2022
المجموعة: LCC:Electronic computers. Computer science
LCC:Electrical engineering. Electronics. Nuclear engineering
مصطلحات موضوعية: Countermeasure, Inaudible sound covert channel (ISCC), Electronic computers. Computer science, QA75.5-76.95, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
الوصف: When an inaudible sound covert channel (ISCC) attack is launched inside a computer system, sensitive data are converted to inaudible sound waves and then transmitted. The receiver at the other end picks up the sound signal, from which the original sensitive data can be recovered. As a forceful countermeasure against the ISCC attack, strong noise can be used to jam the channel and literally shut down any possible sound data transmission. In this paper, enhanced ISCC whose transmission frequency can be dynamically changed is proposed. Essentially, if the transmitter detects that the covert channel is being jammed, the transmitter and receiver both will switch to another available frequency and re-establish their communications, following the proposed communications protocol. Experimental results show that the proposed enhanced ISCC can remain connected even in the presence of a strong jamming noise source. Correspondingly, a detection method based on frequency scanning is proposed to help to combat such an anti-jamming sound channel. With the proposed countermeasure, the bit error rate (BER) of the data communications over enhanced ISCC soars to more than 48%, essentially shutting down the data transmission, and thus neutralizing the security threat.
نوع الوثيقة: article
وصف الملف: electronic resource
اللغة: English
تدمد: 2666-223X
العلاقة: http://www.sciencedirect.com/science/article/pii/S1674862X22000349Test; https://doaj.org/toc/2666-223XTest
DOI: 10.1016/j.jnlest.2022.100181
الوصول الحر: https://doaj.org/article/97d9284317ed4377b83504169cd0c8f5Test
رقم الانضمام: edsdoj.97d9284317ed4377b83504169cd0c8f5
قاعدة البيانات: Directory of Open Access Journals
الوصف
تدمد:2666223X
DOI:10.1016/j.jnlest.2022.100181