SPARROW: A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G Beyond

08/27/2021
by   Reza Soosahabi, et al.
0

This work proposes a novel framework to identify and exploit vulnerable MAC layer procedures in commercial wireless technologies for covert communication. Examples of covert communication include data exfiltration, remote command-and-control (CnC) and espionage. In this framework, the SPARROW schemes use the broadcast power of incumbent wireless networks to covertly relay messages across a long distance without connecting to them. This enables the SPARROW schemes to bypass all security and lawful-intercept systems and gain ample advantage over existing covert techniques in terms of maximum anonymity, more miles per Watts and less hardware. The SPARROW schemes can also serve as an efficient solution for long-range M2M applications. This paper details one recently disclosed vulnerability (CVD-2021-0045 in GSMA coordinated vulnerability disclosure program) in the common random-access procedure in the LTE and 5G standards This work also proposes a rigorous remediation for similar access procedures in current and future standards that disrupts the most sophisticated SPARROW schemes with minimal impact on other users.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/18/2022

Flexible and dependable manufacturing beyond xURLLC: A novel framework for communication-control co-design

Future Industrial 4.0 applications in the 6G era is calling for high dep...
research
05/12/2023

Decentralized Learning over Wireless Networks: The Effect of Broadcast with Random Access

In this work, we focus on the communication aspect of decentralized lear...
research
11/02/2018

Two-Layered Superposition of Broadcast/Multicast and Unicast Signals in Multiuser OFDMA Systems

We study optimal delivery strategies of one common and K independent mes...
research
04/18/2022

Completion Delay of Random Linear Network Coding in Full-Duplex Relay Networks

As the next-generation wireless networks thrive, full-duplex and relayin...
research
10/09/2020

On the Security of Group Communication Schemes

Secure group communications are a mechanism facilitating protected trans...
research
01/25/2021

SEA-BREW: A Scalable Attribute-Based Encryption Scheme for Low-Bitrate IoT Wireless Networks

Attribute-Based Encryption (ABE) is an emerging cryptographic technique ...
research
09/02/2022

Delay-Tolerant ICN and Its Application to LoRa

Connecting long-range wireless networks to the Internet imposes challeng...

Please sign up or login with your details

Forgot password? Click here to reset