Abstract
Nowadays, the use of nodes with different sensing capabilities is pervasive. This leads to many environments capable of monitoring human activity for security, comfort, and connectivity applications among others. However, this also leads to many opportunities for security breaches in personal mobile devices when they are in such environments. In this work, we focus on a covert channel communication system based on sound waves with cognitive radio capabilities. In such system, the mobile nodes are infected with malware that allows the attacker to obtain information from the devices, sending data using a covert channel (hidden communications) to neighbor sensor nodes used for IoT applications through sound waves imperceptible to human ears. A cognitive radio design is based on allowing such hidden communications to occur when the primary channel is unused (i.e., when the user is not using or handling its device). As such, the primary network is considered to be any activity of the mobile (communication, application or service) and the secondary network is the covert channel communication system. Such a system is studied and mathematically analyzed using Continuous Time Markov Chains in order to obtain the throughput in the covert channel for different system parameters. A main result from this work is that, a careful selection of the activation parameter can lead to a more efficient covert data transfer system, irrespective of the rest of the system parameters.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11036-019-01482-6/MediaObjects/11036_2019_1482_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11036-019-01482-6/MediaObjects/11036_2019_1482_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11036-019-01482-6/MediaObjects/11036_2019_1482_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11036-019-01482-6/MediaObjects/11036_2019_1482_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11036-019-01482-6/MediaObjects/11036_2019_1482_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11036-019-01482-6/MediaObjects/11036_2019_1482_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11036-019-01482-6/MediaObjects/11036_2019_1482_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11036-019-01482-6/MediaObjects/11036_2019_1482_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11036-019-01482-6/MediaObjects/11036_2019_1482_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11036-019-01482-6/MediaObjects/11036_2019_1482_Fig10_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11036-019-01482-6/MediaObjects/11036_2019_1482_Fig11_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11036-019-01482-6/MediaObjects/11036_2019_1482_Fig12_HTML.png)
Similar content being viewed by others
References
Luke D (2014) Inaudible Sound as a covert channel in mobile devices. WOOT 2014
Shwartz O, Birk Y (2017) Sound covert: a fast and silent communication channel through the audio buffer. In: 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), St. Petersburg, pp 313–320
Li S, Zhang L, Zhao C (2018) An overview of android covert channel. In: 2018 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), Xi’an, pp 482–485
Yang Z, Huang Q, Zhang Q (2018) Backscatter as a covert channel in mobile devices. GetMobile: Mobile Comp and Comm, pp 31–34
Al-Haiqi A, Ismail M, Nordin R (2014) A new sensors-based covert channel on android. The Scientific World Journal 2014
Kirovski D, Malvar H (2001) Robust covert communication over a public audio channel using spread spectrum. In: International Workshop on Information Hiding. Springer, Berlin
Wang Z, Lee RB (2005) New constructive approach to covert channel modeling and channel capacity estimation. In: International Conference on Information Security. Springer, Berlin
Millen J.K. (1987) Covert channel capacity. 1987 IEEE Symposium on Security and Privacy, IEEE
Qi Wen, et al. (2018) Construction and mitigation of User-Behavior-Based covert channels on smartphones. IEEE Transactions on Mobile Computing
Chandra S, et al. (2014) Towards a systematic study of the covert channel attacks in smartphones. In: International Conference on Security and Privacy in Communication Systems. Springer, Cham
Wang B, Liu KJR (2011) Advances in cognitive radio networks A survey. IEEE J Sel Topics Signal Process, 5(1)
Xue J, Feng Z, Chen K (2013) Beijing spectrum survey for cognitive radio applications. IEEE Beijing University of Posts and Telecommunications Beijing
Akan OB, Karli OB, Ergul O (2009) Cognitive Radio Sensor Networks. IEEE Netw, pp 34–40
Reddy V, Krisha R, Reddy M (2011) Sensor networks for cognitive radio: theory and system design. In: IEEE 3rd International Conference on Electronics Computer Technology (ICECT). III, pp 229–233
Hu X, Wang B (2013) A wireless sensor network-based structural health monitoring system for highway bridges. Computer, Aided Civil and Infrastructure Engineering 28:193–209
Pradnya G, Anjali M (2008) A survey of architecture and node deployment in Wireless Sensor Network. IEEE First International Conference on the Applications of Digital Information and Web Technologies. ICADIWT 2008, pp 426–430
Dargie W, Poellabauer C (2010) Fundamentals of Wireless Sensor Networks. Theory and Practice, Sons Ltd
Guri M, Solewicz Y, Elovici Y (2018) MOSQUITO: covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication. In: 2018 IEEE Conference On Dependable and Secure Computing (DSC), Kaohsiung, Taiwan, pp. 1–8
Matyunin N, Szefer J, Katzenbeisser S Zero-permission acoustic cross-device tracking. In: 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Washington, pp 25–32, vol 2018
Robert B (1981) Cooper, introduction to queuing theory. 2nd edn, North Holland, New York, Oxford
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
The authors declare that there is no conflict of interest regarding the publication of this paper.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Coyac-Torres, J.E., Rivero-Angeles, M.E. & Aguirre-Anaya, E. Cognitive Radio Based System for Best Effort Communications in Sound-based Covert Channel for IoT Environments. Mobile Netw Appl 26, 1449–1460 (2021). https://doi.org/10.1007/s11036-019-01482-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-019-01482-6