2012 IEEE International Conference on Communications (ICC) 2012
DOI: 10.1109/icc.2012.6364876
|View full text |Cite
|
Sign up to set email alerts
|

Covert and side channels in buildings and the prototype of a building-aware active warden

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Covert channels ICC.1 and ICC.2 are quite generic and should be implementable for other protocols representing the same paradigm. Some examples of protocols that are using the publish−subscribe model include XEP−0060, 13 which is an XMPP extension that provides public/subscribe functionalities, and Google Cloud Pub/Sub, 14 which uses HTTPS for the message transport. Other ICCs are more MQTT-specific and to be implementable in other protocols, similar features like retain messages or clear/persistent sessions must exist in them.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Covert channels ICC.1 and ICC.2 are quite generic and should be implementable for other protocols representing the same paradigm. Some examples of protocols that are using the publish−subscribe model include XEP−0060, 13 which is an XMPP extension that provides public/subscribe functionalities, and Google Cloud Pub/Sub, 14 which uses HTTPS for the message transport. Other ICCs are more MQTT-specific and to be implementable in other protocols, similar features like retain messages or clear/persistent sessions must exist in them.…”
Section: Discussionmentioning
confidence: 99%
“…Recently, several works have been published that deploy data hiding techniques in some IoT protocols, like several storage covert channels in the Extensible Messaging and Presence Protocol (XMPP) [12], two storage and one timing covert channels in the Building Automation and Control Networking Protocol (BACnet) [13], six storage and two timing covert channels in the Constrained Application Protocol (CoAP) [14], etc. Wendzel et al [15] have shown that one can hide data in a cyber-physical system (e.g., smart building), by slightly modifying some of its components, like sensors, controllers, actuators, etc., as well as by storing secret data in unused registers.…”
Section: Related Workmentioning
confidence: 99%
“…Cabaj et al [29] stated that most of the published papers regarding covert channels in IoT utilized data-hiding techniques in some IoT protocols. For example, some storage covert channels exploit the extensible messaging and presence Protocol [30], one timing covert channel and two storage covert channels use the building automation and control networking protocol [31] and two timing covert channels and six storage covert channels exploit the constrained application protocol (CoAP) [32], an extended work which includes power consumption analysis of these covert channels of CoAP, which is given in [33]. Moreover, Smith [34] indicated that while CoAP is widely used in IoT, it has mostly been ignored in covert channel research.…”
Section: A Covert Channels Over Iotmentioning
confidence: 99%
“…The authors of [34] developed detection and mitigation tools for covert storage and covert timing channel attacks with a BACNet Firewall Router (BFR) -which is available for download. Other papers propose traffic normalization methods like [63] against covert channels and side channels, and [64] exemplified using BACnet. Other works focused more on detection.…”
Section: Intrusion Detection and Preventionmentioning
confidence: 99%