浏览全部资源
扫码关注微信
1. 内蒙古工业大学数据科学与应用学院,内蒙古 呼和浩特 010080
2. 内蒙古自治区基于大数据的软件服务工程技术研究中心,内蒙古 呼和浩特 010080
3. 天津理工大学计算机科学与工程学院,天津 300384
4. 内蒙古农业大学计算机与信息工程学院,内蒙古 呼和浩特 010011
[ "李雷孝(1978- ),男,山东成武人,博士,内蒙古工业大学教授,主要研究方向为网络空间安全、区块链技术、数据分析与数据挖掘等" ]
[ "杜金泽(1998- ),男,山西太原人,内蒙古工业大学硕士生,主要研究方向为区块链技术、隐蔽信道构建与分析" ]
[ "林浩(1995- ),男,天津人,天津理工大学博士生,主要研究方向为数据挖掘、人格检测、区块链技术" ]
[ "高昊昱(1994- ),男,山西太原人,内蒙古工业大学硕士生,主要研究方向为区块链技术、共识算法与可信执行环境" ]
[ "杨艳艳(1997- ),女,山东菏泽人,内蒙古工业大学硕士生,主要研究方向为计算机视觉、云计算与大数据分析、深度学习与图像处理" ]
[ "高静(1970- ),女,辽宁沈阳人,博士,内蒙古农业大学教授,主要研究方向为云计算、大数据与农业信息化" ]
网络出版日期:2022-09,
纸质出版日期:2022-09-25
移动端阅览
李雷孝, 杜金泽, 林浩, 等. 区块链网络隐蔽信道研究进展[J]. 通信学报, 2022,43(9):209-223.
Leixiao LI, Jinze DU, Hao LIN, et al. Research progress of blockchain network covert channel[J]. Journal on communications, 2022, 43(9): 209-223.
李雷孝, 杜金泽, 林浩, 等. 区块链网络隐蔽信道研究进展[J]. 通信学报, 2022,43(9):209-223. DOI: 10.11959/j.issn.1000-436x.2022146.
Leixiao LI, Jinze DU, Hao LIN, et al. Research progress of blockchain network covert channel[J]. Journal on communications, 2022, 43(9): 209-223. DOI: 10.11959/j.issn.1000-436x.2022146.
数字货币伴生的区块链技术具有去中心化、匿名性、强稳健性和抗篡改性等特点,是构建隐蔽通信信道的天然载体。首先介绍了网络隐蔽信道的定义和发展历史,区块链技术的架构,以及传统的网络隐蔽信道并引出了区块链网络隐蔽信道的优势;然后按照交易地址、签名算法、智能合约和P2P广播机制对区块链网络隐蔽信道进行分类,并从隐蔽性、传输效率和通信成本3个方面分析了其优缺点;最后提出了区块链网络隐蔽信道仍存在的问题并给出了未来研究方向。
Characterized by decentration
anonymity
strong robustness and tamper resistance
blockchain accompanied by digital currency is a natural carrier for building the covert communication channel.First
the definition and development history of the network covert channel
the framework of blockchain technology and the traditional network covert channel were introduced and the advantages of the channel in the blockchain were given.Thus
the channel in blockchain was classified on the basis of transaction address
signature algorithm
smart contract and P2P broadcast mechanism.The merits and demerits were analyzed in terms of crypticity
transmission efficiency
and communication costs.Lastly
problems and the future research direction of the network covert channel in blockchain were presented.
ZANDER S , ARMITAGE G , BRANCH P . Covert channels and countermeasures in computer network protocols [J]. IEEE Communications Surveys and Tutorials , 2007 , 45 ( 12 ): 136 - 142 .
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system [J]. Consulted , 2008 , 28 ( 1 ): 21260 - 21268 .
WENDZEL S , ZANDER S , FECHNER B , et al . Pattern-based survey and categorization of network covert channel techniques [J]. ACM Computing Surveys , 2015 , 47 ( 3 ): 50 .
王翀 , 王秀利 , 吕荫润 , 等 . 隐蔽信道新型分类方法与威胁限制策略 [J]. 软件学报 , 2020 , 31 ( 1 ): 228 - 245 .
WANG C , WANG X L , LYU Y R , et al . Categorization of covert channels and its application in threat restriction techniques [J]. Journal of Software , 2020 , 31 ( 1 ): 228 - 245 .
李彦峰 , 丁丽萍 , 吴敬征 , 等 . 网络隐蔽信道关键技术研究综述 [J]. 软件学报 , 2019 , 30 ( 8 ): 2470 - 2490 .
LI Y F , DING L P , WU J Z , et al . Survey on key issues in networks covert channel [J]. Journal of Software , 2019 , 30 ( 8 ): 2470 - 2490 .
李凤华 , 李超洋 , 郭超 , 等 . 泛在网络环境下隐蔽通道关键技术研究综述 [J]. 通信学报 , 2022 , 43 ( 4 ): 186 - 201 .
LI F H , LI C Y , GUO C , et al . Survey on key technologies of covert channel in ubiquitous network environment [J]. Journal on Communications , 2022 , 43 ( 4 ): 186 - 201 .
PETITCOLAS F A P , ANDERSON R J , KUHN M G . Information hiding-a survey [J]. Proceedings of the IEEE , 1999 , 87 ( 7 ): 1062 - 1078 .
LAMPSON B W . A note on the confinement problem [J]. Communications of the ACM , 1973 , 16 ( 10 ): 613 - 615 .
SIMMONS G J , . The prisoners’ problem and the subliminal channel [C]// Proceedings of CRYPTO . Berlin:Spinger , 1984 : 51 - 67 .
CRAVER S , . On public-key steganography in the presence of an active warden [C]// International Workshop on Information Hiding . Berlin:Spinger , 1998 : 355 - 368 .
MILLEN J , . 20 years of covert channel modeling and analysis [C]// Proceedings of the 1999 IEEE Symposium on Security and Privacy . Piscataway:IEEE Press , 1999 : 113 - 114 .
HANDEL T G , SANDFORD M T II . Hiding data in the OSI network model [C]// International Workshop on Information Hiding . Berlin:Spinger , 1996 : 23 - 38 .
CAUICH E , GOMEZ C R , WATANABE R . Data hiding in identification and offset IP fields [C]// Proceedings of the 5th International School and Symposium . Berlin:Spinger , 2005 : 247 - 261 .
GIRLING C G . Covert channels in LAN’s [J]. IEEE Transactions on Software Engineering , 1987 , 13 ( 2 ): 292 - 296 .
ROWLAND C H . Covert channels in the TCP/IP protocol suite [J]. First Monday , 1997 , 2 ( 5 ): 1 .
WOLF M , . Covert channels in LAN protocols [C]// Local Area Network Security . Berlin:Spinger , 1989 : 89 - 101 .
WU J Z , WU Y J , YANG M T , et al . POSTER:biTheft:stealing your secrets by bidirectional covert channel communication with zero-permission android application [C]// Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security . New York:ACM Press , 2015 : 1690 - 1692 .
PARTALA J . Provably secure covert communication on blockchain [J]. Cryptography , 2018 , 2 ( 3 ): 18 - 35 .
刘明达 , 陈左宁 , 拾以娟 , 等 . 区块链在数据安全领域的研究进展 [J]. 计算机学报 , 2021 , 44 ( 1 ): 1 - 27 .
LIU M D , CHEN Z N , SHI Y J , et al . Research progress of blockchain in data security [J]. Chinese Journal of Computers , 2021 , 44 ( 1 ): 1 - 27 .
EPISHKINA A , KOGOS K . Protection from binary and multi-symbol packet length covert channels [C]// Proceedings of the 8th International Conference on Security of Information and Networks . New York:ACM Press , 2015 : 196 - 202 .
MAZURCZYK W , SZCZYPIORSKI K . Evaluation of steganographic methods for oversized IP packets [J]. Telecommunication Systems , 2012 , 49 ( 2 ): 207 - 217 .
RIOS R , ONIEVA J A , LOPEZ J . HIDE_DHCP:covert communications through network configuration messages [C]// Information Security and Privacy Research .[S.l.:s.n.], 2012 : 162 - 173 .
ZOU X G , LI Q , SUN S H , et al . The research on information hiding based on command sequence of FTP protocol [C]// Knowledge-Based Intelligent Information and Engineering Systems .[S.l.:s.n.], 2005 : 1079 - 1085 .
PATUCK R , HERNANDEZ-CASTRO J , . Steganography using the extensible messaging and presence protocol (XMPP) [J]. arXiv Preprint,arXiv:1310.0524 , 2013 .
WENDZEL S , KAHLER B , RIST T . Covert channels and their prevention in building automation protocols:a prototype exemplified using BACnet [C]// Proceedings of 2012 IEEE International Conference on Green Computing and Communications . Piscataway:IEEE Press , 2012 : 731 - 736 .
GIFFIFIN J , GREENSTADT R , LITWACK P , et al . Covert messaging through TCP timestamps [C]// Proceedings of 2002 International Conference on Privacy Enhancing Technologies . Piscataway:IEEE Press , 2020 : 194 - 208 .
LUCENA N B , PEASE J , YADOLLAHPOUR P , et al . Syntax and semantics-preserving application-layer protocol steganography [C]// International Workshop on Information Hiding . Berlin:Spinger , 2004 : 164 - 179 .
MUCHENE D N , LULI K , SHUE C A . Reporting insider threats via covert channels [C]// Proceedings of 2013 IEEE Security and Privacy Workshops . Piscataway:IEEE Press , 2013 : 68 - 71 .
TAHIR R , KHAN M T , GONG X , et al . Sneak-Peek:high speed covert channels in data center networks [C]// Proceedings of the 35th Annual IEEE International Conference on Computer Communications . Piscataway:IEEE Press , 2016 : 1 - 9 .
EL-ATAWY A , DUAN Q , AL-SHAER E , . A novel class of robust covert channels using out-of-order packets [J]. IEEE Transactions on Dependable and Secure Computing , 2017 , 14 ( 2 ): 116 - 129 .
LIU F F , YAROM Y , GE Q , et al . Last-level cache side-channel attacks are practical [C]// Proceedings of 2015 IEEE Symposium on Security and Privacy . Piscataway:IEEE Press , 2015 : 605 - 622 .
IRAZOQUI G , EISENBARTH T , SUNAR B . Cross processor cache attacks [C]// Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security . New York:ACM Press , 2016 : 353 - 364 .
MAZURCZYK W . Lost audio packets steganography:the first practical evaluation [J]. Security and Communication Networks , 2012 , 5 ( 12 ): 1394 - 1403 .
TAHMASBI F , MOGHIM N , MAHDAVI M . Code-based timing covert channel in IEEE 802.11 [C]// Proceedings of 2015 5th International Conference on Computer and Knowledge Engineering (ICCKE) . Piscataway:IEEE Press , 2015 : 12 - 17 .
GILES J , HAJEK B . An information-theoretic and game-theoretic study of timing channels [J]. IEEE Transactions on Information Theory , 2002 , 48 ( 9 ): 2455 - 2477 .
宋上 , 彭伟 . BLOCCE+:一种改进的基于区块链的隐蔽通信方法 [J]. 重庆理工大学学报(自然科学) , 2020 , 34 ( 9 ): 238 - 244 .
SONG S , PENG W . BLOCCE +:an improved blockchain-based covert communication approach [J]. Journal of Chongqing University of Technology (Natural Science) , 2020 , 34 ( 9 ): 238 - 244 .
ZHANG L J , ZHANG Z J , WANG W Z , et al . A covert communication method using special bitcoin addresses generated by vanitygen [J]. Computers,Materials & Continua , 2020 , 65 ( 1 ): 597 - 616 .
BARTOLETTI M , POMPIANU L . An analysis of Bitcoin OP_RETURN metadata [J]. Lecture Notes in Computer Science , 2017 , 10323 : 218 - 230 .
CAO H T , YIN H , GAO F , et al . Chain-based covert data embedding schemes in blockchain [J]. IEEE Internet of Things Journal , 2022 , 9 ( 16 ): 14699 - 14707 .
LUO X Y , ZHANG P , ZHANG M L , et al . A novel covert communication method based on bitcoin transaction [J]. IEEE Transactions on Industrial Informatics , 2022 , 18 ( 4 ): 2830 - 2839 .
司成祥 , 高峰 , 祝烈煌 , 等 . 一种支持动态标签的区块链数据隐蔽传输机制 [J]. 西安电子科技大学学报 , 2020 , 47 ( 5 ): 94 - 102 .
SI C X , GAO F , ZHU L H , et al . Covert data transmission mechanism based on dynamic label in blockchain [J]. Journal of Xidian University , 2020 , 47 ( 5 ): 94 - 102 .
TIAN J , GOU G P , LIU C , et al . DLchain:a covert channel over blockchain based on dynamic labels [C]// International Conference on Information and Communications Security . Piscataway:IEEE Press , 2019 : 814 - 830 .
SIDIQ M F , WIBOWO F M , WIBOWO M , et al . Secret and trustable communication channel over blockchain public ledger [C]// Proceedings of 2021 IEEE International Conference on Communication,Networks and Satellite . Piscataway:IEEE Press , 2021 : 371 - 376 .
FIONOV A , . Exploring covert channels in bitcoin transactions [C]// Proceedings of 2019 International Multi-Conference on Engineering,Computer and Information Sciences (SIBIRCON) . Piscataway:IEEE Press , 2019 : 59 - 64 .
GAO F , ZHU L H , GAI K K , et al . Achieving a covert channel over an open blockchain network [J]. IEEE Network , 2020 , 34 ( 2 ): 6 - 13 .
FRKAT D , ANNESSI R , ZSEBY T . ChainChannels:private botnet communication over public blockchains [C]// Proceedings of 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber,Physical and Social Computing (CPSCom) and IEEE Smart Data . Piscataway:IEEE Press , 2018 : 1244 - 1252 .
GUO Z Z , SHI L C , XU M Z , et al . MRCC:a practical covert channel over monero with provable security [J]. IEEE Access , 2021 , 9 : 31816 - 31825 .
蓝怡琴 , 张方国 , 田海博 . 利用门罗币实现隐蔽通信 [J]. 西安电子科技大学学报 , 2020 , 47 ( 5 ): 19 - 27 .
LAN Y Q , ZHANG F G , TIAN H B . Using Monero to realize covert communication [J]. Journal of Xidian University , 2020 , 47 ( 5 ): 19 - 27 .
BASUKI A I , ROSIYADI D . Joint transaction-image steganography for high capacity covert communication [C]// Proceedings of 2019 International Conference on Computer,Control,Informatics and its Applications (IC3INA) . Piscataway:IEEE Press , 2019 : 41 - 46 .
ZHANG L J , ZHANG Z J , WANG W Z , et al . Research on a covert communication model realized by using smart contracts in blockchain environment [J]. IEEE Systems Journal , 2022 , 16 ( 2 ): 2822 - 2833 .
吕婧淑 , 操晓春 . 基于比特币系统的隐蔽通信技术 [J]. 信息安全学报 , 2021 , 6 ( 2 ): 143 - 152 .
LYU J S , CAO X C . Covert communication technology based on bitcoin [J]. Journal of Cyber Security , 2021 , 6 ( 2 ): 143 - 152 .
ABDULAZIZ M , ÇULHA D , YAZICI A . A decentralized application for secure messaging in a trustless environment [C]// Proceedings of 2018 International Congress on Big Data,Deep Learning and Fighting Cyber Terrorism (IBIGDELFT) . Piscataway:IEEE Press , 2018 : 1 - 5 .
ZHANG L J , ZHANG Z J , JIN Z L , et al . An approach of covert communication based on the Ethereum whisper protocol in blockchain [J]. International Journal of Intelligent Systems , 2021 , 36 ( 2 ): 962 - 996 .
ZHANG Z J , ZHANG L J , RASHEED W , et al . The research on covert communication model based on blockchain:a case study of Ethereum’s whisper protocol [C]// Frontiers in Cyber Security .[S.l.:s.n.], 2020 : 215 - 230 .
RECABARREN R , CARBUNAR B . Tithonus:a bitcoin based censorship resilient system [J]. Proceedings on Privacy Enhancing Technologies , 2019 , 2019 ( 1 ): 68 - 86 .
李彦峰 , 丁丽萍 , 吴敬征 , 等 . 区块链环境下的新型网络隐蔽信道模型研究 [J]. 通信学报 , 2019 , 40 ( 5 ): 67 - 78 .
LI Y F , DING L P , WU J Z , et al . Research on a new network covert channel model in blockchain environment [J]. Journal on Communications , 2019 , 40 ( 5 ): 67 - 78 .
李彦峰 , 丁丽萍 , 吴敬征 , 等 . 一种基于多节点时间戳共谋的区块链网络隐蔽通信方法:CN111245570B [P]. 2021 - 06 - 08 .
LI Y F , DING L P , WU J Z , et al . Block chain network covert communication method based on multi-node timestamp collusion:CN11124 5570B [P]. 2021 - 06 - 08 .
GAI K K , WU Y L , ZHU L H , et al . Permissioned blockchain and edge computing emPoWered privacy-preserving smart grid networks [J]. IEEE Internet of Things Journal , 2019 , 6 ( 5 ): 7992 - 8004 .
黄韬 , 刘江 , 汪硕 , 等 . 未来网络技术与发展趋势综述 [J]. 通信学报 , 2021 , 42 ( 1 ): 130 - 150 .
HUANG T , LIU J , WANG S , et al . Survey of the future network technology and trend [J]. Journal on Communications , 2021 , 42 ( 1 ): 130 - 150 .
MEIKLEJOHN S , ORLANDI C . Privacy-enhancing overlays in bitcoin [C]// International Conference on Financial Cryptography and Data Security . Berlin:Spinger , 2015 : 127 - 141 .
AVERIN A , SAMARTSEV A , SACHENKO N . Review of methods for ensuring anonymity and de-anonymization in blockchain [C]// Proceedings of 2020 International Conference on Quality Management,Transport and Information Security,Information Technologies (IT&QM&IS) . Piscataway:IEEE Press , 2020 : 82 - 87 .
WORLEY C , SKJELLUM A . Blockchain tradeoffs and challenges for current and emerging applications:generalization,fragmentation,sidechains,and scalability [C]// Proceedings of 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber,Physical and Social Computing (CPSCom) and IEEE Smart Data . Piscataway:IEEE Press , 2018 : 1582 - 1587 .
0
浏览量
363
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构