ABC-Channel: An Advanced Blockchain-based Covert Channel
- URL: http://arxiv.org/abs/2403.06261v2
- Date: Sun, 24 Mar 2024 13:49:28 GMT
- Title: ABC-Channel: An Advanced Blockchain-based Covert Channel
- Authors: Xiaobo Ma, Pengyu Pan, Jianfeng Li, Wei Wang, Weizhi Meng, Xiaohong Guan,
- Abstract summary: We make the first effort to achieve a full-lifecycle covert channel, a novel blockchain-based covert channel named ABC-Channel.
We tackle a series of challenges, such as off-chain contact dependency, increased masquerading difficulties as growing transaction volume.
We develop a working prototype to validate ABC-Channel and conduct extensive tests on the Bitcoin testnet.
- Score: 19.925437637883917
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Establishing efficient and robust covert channels is crucial for secure communication within insecure network environments. With its inherent benefits of decentralization and anonymization, blockchain has gained considerable attention in developing covert channels. To guarantee a highly secure covert channel, channel negotiation should be contactless before the communication, carrier transaction features must be indistinguishable from normal transactions during the communication, and communication identities must be untraceable after the communication. Such a full-lifecycle covert channel is indispensable to defend against a versatile adversary who intercepts two communicating parties comprehensively (e.g., on-chain and off-chain). Unfortunately, it has not been thoroughly investigated in the literature. We make the first effort to achieve a full-lifecycle covert channel, a novel blockchain-based covert channel named ABC-Channel. We tackle a series of challenges, such as off-chain contact dependency, increased masquerading difficulties as growing transaction volume, and time-evolving, communicable yet untraceable identities, to achieve contactless channel negotiation, indistinguishable transaction features, and untraceable communication identities, respectively. We develop a working prototype to validate ABC-Channel and conduct extensive tests on the Bitcoin testnet. The experimental results demonstrate that ABC-Channel achieves substantially secure covert capabilities. In comparison to existing methods, it also exhibits state-of-the-art transmission efficiency.
Related papers
- Fundamental Scaling Laws of Covert Communication in the Presence of Block Fading [13.775204059410573]
In wireless communication systems, channel impairments such as signal fading present challenges in the effective implementation and analysis of covert communication systems.
This paper generalizes early work in the covert communication field by considering results for the number of bits that can be covertly transmitted in $n$ channel uses on a block fading channel.
arXiv Detail & Related papers (2024-07-18T20:56:53Z) - Physical Layer Deception with Non-Orthogonal Multiplexing [52.11755709248891]
We propose a novel framework of physical layer deception (PLD) to actively counteract wiretapping attempts.
PLD combines PLS with deception technologies to actively counteract wiretapping attempts.
We prove the validity of the PLD framework with in-depth analyses and demonstrate its superiority over conventional PLS approaches.
arXiv Detail & Related papers (2024-06-30T16:17:39Z) - Secure Cross-Chain Provenance for Digital Forensics Collaboration [0.0]
ForensiCross is a cross-chain solution specifically designed for digital forensics and provenance.
It includes BridgeChain and features a unique communication protocol for cross-chain and multi-chain solutions.
ForensiCross aims to simplify collaborative investigations by ensuring data integrity and traceability.
arXiv Detail & Related papers (2024-06-17T16:47:27Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Graph Attention Network-based Block Propagation with Optimal AoI and Reputation in Web 3.0 [59.94605620983965]
We design a Graph Attention Network (GAT)-based reliable block propagation optimization framework for blockchain-enabled Web 3.0.
To achieve the reliability of block propagation, we introduce a reputation mechanism based on the subjective logic model.
Considering that the GAT possesses the excellent ability to process graph-structured data, we utilize the GAT with reinforcement learning to obtain the optimal block propagation trajectory.
arXiv Detail & Related papers (2024-03-20T01:58:38Z) - BETA-UAV: Blockchain-based Efficient Authentication for Secure UAV Communication [6.885742280873289]
This paper presents an Efficient, and Trusted Authentication scheme for UAV communication, BETA-UAV.
The smart contract in BETA-UAV allows participants to publish and call transactions from the blockchain network.
transaction addresses are proof of freshness and trustworthiness for subsequent transmissions.
arXiv Detail & Related papers (2024-02-24T13:54:54Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - DYST (Did You See That?): An Amplified Covert Channel That Points To Previously Seen Data [0.0]
We introduce a new class of covert channels that we call history covert channels.
History covert channels can communicate by pointing to unaltered legitimate traffic created by regular network nodes.
arXiv Detail & Related papers (2022-12-22T16:34:52Z) - A Note on the Blockchain Trilemma for Decentralized Identity: Learning
from Experiments with Hyperledger Indy [0.38073142980732994]
We explore the blockchain trilemma of scalability, security, and decentralization in the context of the Trust Registry.
We make a case study of Hyperledger Indy, an open-source technology bespoke for decentralized identity.
While Hyperledger Indy captures data useful to underpin a decentralized identity scheme, the knock-on effect of its scalability limitations may indeed place constraints on properties of security and decentralization.
arXiv Detail & Related papers (2022-04-12T13:12:49Z) - Decentralized Learning for Channel Allocation in IoT Networks over
Unlicensed Bandwidth as a Contextual Multi-player Multi-armed Bandit Game [134.88020946767404]
We study a decentralized channel allocation problem in an ad-hoc Internet of Things network underlaying on the spectrum licensed to a primary cellular network.
Our study maps this problem into a contextual multi-player, multi-armed bandit game, and proposes a purely decentralized, three-stage policy learning algorithm through trial-and-error.
arXiv Detail & Related papers (2020-03-30T10:05:35Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.