Covert Communication by Exploiting Error-Correcting Codes

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Covert channels, enabling concealed communication within seemingly innocuous data streams, pose significant chal-lenges to traditional information security measures. This paper presents a novel method for constructing covert channels by leveraging Error-Correcting Codes (ECCs) and minimal-weight codewords. Adversaries embed their covert messages within the benign traffic of unsuspecting victims, carefully controlling the introduced errors to avoid detection. The proposed approach not only ensures the security and reliability of covert communication but also provides protection against channel errors. By integrating ECCs and minimal-weight codewords, our method offers an advanced level of stealth, data integrity, and resilience. Extensive simulations validate the feasibility and performance of the approach, highlighting its potential for practical implementation in real-world scenarios. This research opens new avenues for the construction of covert channels, enhancing information hiding capabilities and reinforcing communication security in the face of ever-evolving threats.

Original languageAmerican English
Title of host publication20th International Conference on the Design of Reliable Communication Networks, DRCN 2024
Pages143-150
Number of pages8
ISBN (Electronic)9798350348972
DOIs
StatePublished - 1 Jan 2024
Event20th International Conference on the Design of Reliable Communication Networks, DRCN 2024 - Montreal, Canada
Duration: 6 May 20249 May 2024

Publication series

Name20th International Conference on the Design of Reliable Communication Networks, DRCN 2024

Conference

Conference20th International Conference on the Design of Reliable Communication Networks, DRCN 2024
Country/TerritoryCanada
CityMontreal
Period6/05/249/05/24

Keywords

  • Covert channels
  • error-correcting codes
  • minimal-weight codewords

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality
  • Health Informatics

Fingerprint

Dive into the research topics of 'Covert Communication by Exploiting Error-Correcting Codes'. Together they form a unique fingerprint.

Cite this