• DocumentCode
    8124
  • Title

    A Timing Channel Spyware for the CSMA/CA Protocol

  • Author

    Kiyavash, Negar ; Koushanfar, Farinaz ; Coleman, Todd P. ; Rodrigues, M.

  • Author_Institution
    Dept. of Ind. & Enterprise Syst. Eng., Univ. of Illinois at Urbana-Champaign, Urbana, IL, USA
  • Volume
    8
  • Issue
    3
  • fYear
    2013
  • fDate
    Mar-13
  • Firstpage
    477
  • Lastpage
    487
  • Abstract
    This paper presents the design and implementation of spyware communication circuits built into the widely used carrier sense multiple access with collision avoidance (CSMA/CA) protocol. The spyware components are embedded within the sequential and combinational communication circuit structure during synthesis, rendering the distinction or dissociation of the spyware from the original circuit impossible. We take advantage of the timing channel resulting from transmission of packets to implement a new practical coding scheme that covertly transfers the spied data. Our codes are robust against the CSMA/CA´s random retransmission time for collision avoidance and in fact take advantage of it to disguise the covert communication. The data snooping may be sporadically triggered, either externally or internally. The occasional trigger and the real-time traffic´s variability make the spyware timing covert channel detection a challenge. The spyware is implemented and tested on a widely used open-source wireless CSMA/CA radio platform. We identify the following performance metrics and evaluate them on our architecture: 1) efficiency of implementation of the encoder; 2) robustness of the communication scheme to heterogeneous CSMA/CA effects; and 3) difficulty of covert channel detection. We evaluate criterion 1) completely theoretically. Criterion 2) is evaluated by simulating a wireless CSMA/CA architecture and testing the robustness of the decoder in different heterogeneous wireless conditions. Criterion 3) is confirmed experimentally using the state-of-the-art covert timing channel detection methods.
  • Keywords
    carrier sense multiple access; codecs; collision avoidance; telecommunication channels; telecommunication security; CSMA/CA protocol; carrier sense multiple access with collision avoidance; channel detection; combinational communication circuit structure; decoder; encoder; heterogeneous CSMA/CA effects; heterogeneous wireless conditions; open-source wireless CSMA/CA radio platform; real-time traffic variability; spyware communication circuits; spyware components; spyware timing; timing channel detection methods; timing channel spyware; wireless CSMA/CA architecture; Hardware; Multiaccess communication; Protocols; Robustness; Spyware; Timing; Wireless communication; Timing channels; covert channels; hardware Trojan;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2013.2238930
  • Filename
    6410028