{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:13:36Z","timestamp":1775913216789,"version":"3.50.1"},"reference-count":44,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2018,5]]},"abstract":"<jats:p>Voice over Long-Term Evolution enables reliable transmission among enormous Internet of Things devices, by providing end-to-end quality of service for Internet protocol\u2013based services such as audio, video, and multimedia messaging. The research of covert timing channels aims at transmitting covert message stealthily to the receiver using variations of timing behavior. Existing approaches mainly modulate the covert message into inter-packet delays of overt traffic, which are not suitable for Voice over Long-Term Evolution, since most of the inter-packet delays of Voice over Long-Term Evolution traffic are of regular distribution, and any modification on inter-packet delays is easy to be detected. To address the issue, in this work, we propose a novel covert timing channel for the video stream in Voice over Long-Term Evolution, which modulates the covert message by deliberately dropping out video packets. Based on the two-dimensional mapping matrix, the blocks of covert message are mapped into dropout-packet sequence numbers. To recover the covert message, the receiver retrieves the sequence numbers of lost packets and identifies them to be translated into blocks of the covert message. To evaluate our scheme, the simulations with different packet loss rates are conducted to validate the undetectability, throughput, and robustness, finally, the results show that this scheme is effective and reliable.<\/jats:p>","DOI":"10.1177\/1550147718779568","type":"journal-article","created":{"date-parts":[[2018,5,30]],"date-time":"2018-05-30T14:05:26Z","timestamp":1527689126000},"page":"155014771877956","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":28,"title":["An end-to-end covert channel via packet dropout for mobile networks"],"prefix":"10.1177","volume":"14","author":[{"given":"Yu-an","family":"Tan","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"given":"Xinting","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"given":"Chen","family":"Liang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"given":"Xiaosong","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"},{"name":"Department of Computer Science and Technology, Tangshan University, Tangshan, China"}]},{"given":"Quanxin","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"given":"Yuanzhang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]}],"member":"179","published-online":{"date-parts":[[2018,5,30]]},"reference":[{"key":"bibr1-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0721-3"},{"key":"bibr2-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2690522"},{"key":"bibr3-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"bibr4-1550147718779568","first-page":"178","volume-title":"Proceedings of the 11th ACM conference on computer and communications security","author":"Cabuk S"},{"key":"bibr5-1550147718779568","first-page":"155","volume-title":"Proceedings of the on Great Lakes symposium on VLSI 2017","author":"Yao F"},{"key":"bibr6-1550147718779568","first-page":"173","volume-title":"Proceeding of the 11th USENIX symposium on network system design and implementation","author":"Lee KS"},{"key":"bibr7-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-015-0391-4"},{"key":"bibr8-1550147718779568","first-page":"59","volume-title":"Proceeding of the 15th USENIX security symposium","author":"Shah G"},{"key":"bibr9-1550147718779568","unstructured":"Cabuk S. Network covert channels: design, analysis, detection, and elimination. West Lafayette, IN: Purdue University, 2006, p.4."},{"key":"bibr10-1550147718779568","first-page":"236","volume-title":"Proceeding of the 2015 IEEE conference on communications and network security","author":"Archibald R"},{"key":"bibr11-1550147718779568","first-page":"211","volume-title":"Proceeding of the international workshop on recent advances in intrusion detection","author":"Gianvecchio S"},{"key":"bibr12-1550147718779568","first-page":"1","volume-title":"Proceeding of the 2011 international conference on information and communication technologies","author":"Hussain M"},{"key":"bibr14-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.03.007"},{"key":"bibr15-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5490974"},{"key":"bibr16-1550147718779568","first-page":"316","volume-title":"Proceedings of the 22nd ACM SIGSAC conference on computer and communications security","author":"Li CY"},{"key":"bibr17-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2802783"},{"key":"bibr18-1550147718779568","first-page":"432","volume-title":"Proceeding of the 37th international convention on information and communication technology, electronics and microelectronics","author":"Serval D"},{"key":"bibr19-1550147718779568","first-page":"1","volume-title":"Proceeding of the 16th Asia-Pacific network operations and management symposium","author":"Hyun J"},{"key":"bibr20-1550147718779568","first-page":"1595","volume-title":"Proceeding of 2013 IEEE global communications conference","author":"Ozturk O"},{"key":"bibr21-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1002\/9781119944935.ch3"},{"key":"bibr22-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6507393"},{"key":"bibr23-1550147718779568","first-page":"90","volume-title":"Proceeding of the 10th international conference on wireless and mobile communications","author":"Tabany M"},{"key":"bibr24-1550147718779568","first-page":"409","volume-title":"International conference on advanced information networking and applications workshops","author":"Yang CF"},{"key":"bibr25-1550147718779568","first-page":"1064","volume-title":"Proceeding of 2012 IEEE international conference on communications","author":"Korczynski M"},{"key":"bibr26-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2016.12.002"},{"key":"bibr27-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2017.10.008"},{"issue":"1","key":"bibr29-1550147718779568","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1109\/TCSVT.2016.2605045","volume":"28","author":"Sun Z","year":"2016","journal-title":"IEEE T Circ Syst Vid"},{"key":"bibr30-1550147718779568","first-page":"452","volume-title":"Proceeding of the 2014 European modelling symposium","author":"Vizzarri A"},{"key":"bibr31-1550147718779568","first-page":"328","volume-title":"Proceedings of the 22nd ACM SIGSAC conference on computer and communications security","author":"Kim H"},{"key":"bibr32-1550147718779568","first-page":"102","volume-title":"2015 international wireless communications and mobile computing conference","author":"Rezaei F"},{"key":"bibr33-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.03.007"},{"key":"bibr34-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.019"},{"key":"bibr35-1550147718779568","first-page":"62","volume-title":"Proceedings of the 2017 international conference on cryptography, security and privacy","author":"Ameri A"},{"issue":"2","key":"bibr36-1550147718779568","first-page":"109","volume":"14","author":"Dong P","year":"2012","journal-title":"Int J Netw Secur"},{"key":"bibr37-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.46"},{"key":"bibr38-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2505688"},{"key":"bibr39-1550147718779568","volume-title":"Proceeding of the workshop multimedia security at ACM multimedia","author":"Ahsan K"},{"key":"bibr40-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443779"},{"key":"bibr41-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.64"},{"key":"bibr42-1550147718779568","first-page":"314","volume-title":"Proceeding of the 13th international workshop on information hiding","author":"Houmansadr A"},{"key":"bibr43-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.01.051"},{"key":"bibr44-1550147718779568","first-page":"2204","volume-title":"Proceeding of the IEEE international conference on computer communications 2009","author":"Sellke SH"},{"key":"bibr45-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1145\/3023872"},{"key":"bibr46-1550147718779568","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2656078"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718779568","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147718779568","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718779568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T18:46:42Z","timestamp":1661366802000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147718779568"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":44,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["10.1177\/1550147718779568"],"URL":"https:\/\/doi.org\/10.1177\/1550147718779568","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5]]}}}