Skip to main content
Log in

Cognitive Radio Based System for Best Effort Communications in Sound-based Covert Channel for IoT Environments

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Nowadays, the use of nodes with different sensing capabilities is pervasive. This leads to many environments capable of monitoring human activity for security, comfort, and connectivity applications among others. However, this also leads to many opportunities for security breaches in personal mobile devices when they are in such environments. In this work, we focus on a covert channel communication system based on sound waves with cognitive radio capabilities. In such system, the mobile nodes are infected with malware that allows the attacker to obtain information from the devices, sending data using a covert channel (hidden communications) to neighbor sensor nodes used for IoT applications through sound waves imperceptible to human ears. A cognitive radio design is based on allowing such hidden communications to occur when the primary channel is unused (i.e., when the user is not using or handling its device). As such, the primary network is considered to be any activity of the mobile (communication, application or service) and the secondary network is the covert channel communication system. Such a system is studied and mathematically analyzed using Continuous Time Markov Chains in order to obtain the throughput in the covert channel for different system parameters. A main result from this work is that, a careful selection of the activation parameter can lead to a more efficient covert data transfer system, irrespective of the rest of the system parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Luke D (2014) Inaudible Sound as a covert channel in mobile devices. WOOT 2014

  2. Shwartz O, Birk Y (2017) Sound covert: a fast and silent communication channel through the audio buffer. In: 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), St. Petersburg, pp 313–320

  3. Li S, Zhang L, Zhao C (2018) An overview of android covert channel. In: 2018 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), Xi’an, pp 482–485

  4. Yang Z, Huang Q, Zhang Q (2018) Backscatter as a covert channel in mobile devices. GetMobile: Mobile Comp and Comm, pp 31–34

  5. Al-Haiqi A, Ismail M, Nordin R (2014) A new sensors-based covert channel on android. The Scientific World Journal 2014

  6. Kirovski D, Malvar H (2001) Robust covert communication over a public audio channel using spread spectrum. In: International Workshop on Information Hiding. Springer, Berlin

  7. Wang Z, Lee RB (2005) New constructive approach to covert channel modeling and channel capacity estimation. In: International Conference on Information Security. Springer, Berlin

  8. Millen J.K. (1987) Covert channel capacity. 1987 IEEE Symposium on Security and Privacy, IEEE

  9. Qi Wen, et al. (2018) Construction and mitigation of User-Behavior-Based covert channels on smartphones. IEEE Transactions on Mobile Computing

  10. Chandra S, et al. (2014) Towards a systematic study of the covert channel attacks in smartphones. In: International Conference on Security and Privacy in Communication Systems. Springer, Cham

  11. Wang B, Liu KJR (2011) Advances in cognitive radio networks A survey. IEEE J Sel Topics Signal Process, 5(1)

  12. Xue J, Feng Z, Chen K (2013) Beijing spectrum survey for cognitive radio applications. IEEE Beijing University of Posts and Telecommunications Beijing

  13. Akan OB, Karli OB, Ergul O (2009) Cognitive Radio Sensor Networks. IEEE Netw, pp 34–40

  14. Reddy V, Krisha R, Reddy M (2011) Sensor networks for cognitive radio: theory and system design. In: IEEE 3rd International Conference on Electronics Computer Technology (ICECT). III, pp 229–233

  15. Hu X, Wang B (2013) A wireless sensor network-based structural health monitoring system for highway bridges. Computer, Aided Civil and Infrastructure Engineering 28:193–209

    Article  Google Scholar 

  16. Pradnya G, Anjali M (2008) A survey of architecture and node deployment in Wireless Sensor Network. IEEE First International Conference on the Applications of Digital Information and Web Technologies. ICADIWT 2008, pp 426–430

  17. Dargie W, Poellabauer C (2010) Fundamentals of Wireless Sensor Networks. Theory and Practice, Sons Ltd

  18. Guri M, Solewicz Y, Elovici Y (2018) MOSQUITO: covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication. In: 2018 IEEE Conference On Dependable and Secure Computing (DSC), Kaohsiung, Taiwan, pp. 1–8

  19. Matyunin N, Szefer J, Katzenbeisser S Zero-permission acoustic cross-device tracking. In: 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Washington, pp 25–32, vol 2018

  20. Robert B (1981) Cooper, introduction to queuing theory. 2nd edn, North Holland, New York, Oxford

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mario E. Rivero-Angeles.

Ethics declarations

Conflict of interests

The authors declare that there is no conflict of interest regarding the publication of this paper.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Coyac-Torres, J.E., Rivero-Angeles, M.E. & Aguirre-Anaya, E. Cognitive Radio Based System for Best Effort Communications in Sound-based Covert Channel for IoT Environments. Mobile Netw Appl 26, 1449–1460 (2021). https://doi.org/10.1007/s11036-019-01482-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-019-01482-6

Keywords

Navigation