Stealthy Messaging: Leveraging Message Queuing Telemetry Transport for Covert Communication Channels
Abstract
:1. Introduction
- We propose a novel covert communication method by utilizing MQTT messages to build a storage channel for secure data exfiltration.
- We provide an analysis of the overhead introduced by our solution both in terms of time and bytes sent. Overall, the overhead required appears to be acceptable.
- We provide a security analysis of the proposed approach. This analysis shows that our solution offers security guarantees in scenarios with network monitoring and censorship without raising suspicion due to the common usage of the MQTT protocol in IoT environments.
2. Related Works
3. Background
- Packet type: Identifies the type of packet, e.g., whether it is a publish packet.
- Remaining length: Length of the variable header and payload.
- Topic name: UTF-8 string that indicates the topic to which the message is published.
- Properties: User-defined properties that add metadata to MQTT messages in order to transmit additional user-defined information.
4. Motivations
5. The Proposed Approach
5.1. Design Overview
5.2. Formal Description
- are randomly extracted of a size equal to the size of M.
- , where ⊕ denotes the XOR (exclusive or) operator.
6. Numerical Example
6.1. Step 1: ASCII Representation and Binary Conversion
6.2. Step 2: Split the Binary Message into k Parts
- and are randomly chosen.
- .
- (45 in decimal).
- (211 in decimal).
6.3. Step 3: Publish Each Part Using a Covert Channel
- Prime modulus
- Exponent
6.4. Step 4: Publish to Brokers and Topics
6.5. Step 5: Subscriber Retrieves the Parts
- For the packet with length 264313832, the subscriber brute-forces 8 bits to find (00101101).
- For the packet with length 89686678, the subscriber brute-forces 8 bits to find (11010011).
- For the packet with length 144660972, the subscriber brute-forces 8 bits to find (10001011).
6.6. Step 6: Reconstruct the Original Message
7. Overhead Analysis
8. Security Analysis
- Message splitting: Each message to be sent is split in k parts. An adversary cannot reconstruct M without knowing all the parts.
- Covert channel: Each part is sent through a cover channel exploiting the length field of the MQTT packet. This makes it harder to distinguish between a publisher transmitting actual data and dummy data.
- PRNG: The use of a shared seed for a PRNG ensures synchronized and unpredictable selection of brokers and topics for communication. Moreover, secure and unpredictable parameters for the execution of the protocol are extracted through the PRNG.
- Eavesdropping and traffic analysis: An adversary intercepts communication to gain information about the transmitted message.
- Man-in-the-M=middle attacks [54]: An adversary intercepts, modifies, or injects messages between the publisher and subscribers.
- Broker compromise [55]: An adversary gains control over one or more brokers.
9. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
MQTT | Message Queuing Telemetry Transport |
IoT | Internet of Things |
DPI | Deep Packet Inspection |
PRNG | Pseudo-Random Number Generation |
QoS | Quality of Service |
References
- Kim, J.; Lee, J.; Kim, J.; Yun, J. M2M Service Platforms: Survey, Issues, and Enabling Technologies. IEEE Commun. Surv. Tutor. 2014, 16, 61–76. [Google Scholar] [CrossRef]
- Buccafurri, F.; De Angelis, V.; Lazzaro, S.; Pugliese, A. Enforcing security policies on interacting authentication systems. Comput. Secur. 2024, 140, 103771. [Google Scholar] [CrossRef]
- Hofmann, R.; Boano, C.A.; Römer, K. X-Burst: Enabling Multi-Platform Cross-Technology Communication between Constrained IoT Devices. In Proceedings of the 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Boston, MA, USA, 10–13 June 2019; pp. 1–9. [Google Scholar] [CrossRef]
- Lee, C.T.; Chen, L.B.; Chu, H.M.; Hsieh, C.J.; Liang, W.C. An Internet of Things (IoT)-Based Master-Slave Regionalized Intelligent LED-Light-Controlling System. Appl. Sci. 2022, 12, 420. [Google Scholar] [CrossRef]
- Celik, Z.B.; Babun, L.; Sikder, A.K.; Aksu, H.; Tan, G.; McDaniel, P.; Uluagac, A.S. Sensitive information tracking in commodity {IoT}. In Proceedings of the 27th USENIX Security Symposium (USENIX Security 18), Baltimore, MD, USA, 15–17 August 2018; pp. 1687–1704. [Google Scholar]
- Buccafurri, F.; De Angelis, V.; Labrini, C. A Privacy-Preserving Solution for Proximity Tracing Avoiding Identifier Exchanging. In Proceedings of the 2020 International Conference on Cyberworlds (CW), Caen, France, 29 September –1 October 2020; pp. 235–242. [Google Scholar] [CrossRef]
- Buccafurri, F.; De Angelis, V.; Idone, M.F.; Labrini, C. A Distributed Location Trusted Service Achieving k-Anonymity against the Global Adversary. In Proceedings of the 2021 22nd IEEE International Conference on Mobile Data Management (MDM), Toronto, ON, Canada, 15–18 June 2021; pp. 133–138. [Google Scholar] [CrossRef]
- Piotrowska, A.M.; Hayes, J.; Elahi, T.; Meiser, S.; Danezis, G. The Loopix Anonymity System. In Proceedings of the 26th USENIX Security Symposium (USENIX Security 17), Vancouver, BC, Canada, 16–18 August 2017; USENIX Association: Vancouver, BC, Canada, 2017; pp. 1199–1216. [Google Scholar]
- Buccafurri, F.; De Angelis, V.; Idone, M.F.; Labrini, C. A protocol for anonymous short communications in social networks and its application to proximity-based services. Online Soc. Netw. Media 2022, 31, 100221. [Google Scholar] [CrossRef]
- van den Hooff, J.; Lazar, D.; Zaharia, M.; Zeldovich, N. Vuvuzela: Scalable private messaging resistant to traffic analysis. In Proceedings of the 25th Symposium on Operating Systems Principles, Monterey, CA, USA, 4–7 October 2015; Association for Computing Machinery: New York, NY, USA, 2015. SOSP’15. pp. 137–152. [Google Scholar] [CrossRef]
- Young, A.L.; Yung, M. The drunk motorcyclist protocol for anonymous communication. In Proceedings of the 2014 IEEE Conference on Communications and Network Security, San Francisco, CA, USA, 29–31 October 2014; pp. 157–165. [Google Scholar] [CrossRef]
- Wendzel, S.; Zander, S.; Fechner, B.; Herdin, C. Pattern-Based Survey and Categorization of Network Covert Channel Techniques. ACM Comput. Surv. 2015, 47, 1–26. [Google Scholar] [CrossRef]
- Tian, J.; Xiong, G.; Li, Z.; Gou, G. A Survey of Key Technologies for Constructing Network Covert Channel. Secur. Commun. Netw. 2020, 2020, 8892896. [Google Scholar] [CrossRef]
- Kemmerer, R. A practical approach to identifying storage and timing channels: Twenty years later. In Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, NV, USA, 9–13 December 2002; pp. 109–118. [Google Scholar] [CrossRef]
- Tsai, C.R.; Gligor, V.; Chandersekaran, C. On the identification of covert storage channels in secure systems. IEEE Trans. Softw. Eng. 1990, 16, 569–580. [Google Scholar] [CrossRef]
- Tsai, C.R.; Gligor, V.D.; Chandersekaran, C.S. A Formal Method for the Identification of Covert Storage Channels in Source Code. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 27–29 April 1987; p. 74. [Google Scholar] [CrossRef]
- Cock, D.; Ge, Q.; Murray, T.; Heiser, G. The Last Mile: An Empirical Study of Timing Channels on seL4. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, 3–7 November 2014; Association for Computing Machinery: New York, NY, USA, 2014. CCS’14. pp. 570–581. [Google Scholar] [CrossRef]
- Gianvecchio, S.; Wang, H. Detecting covert timing channels: An entropy-based approach. In Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 2 November–31 October 2007; Association for Computing Machinery: New York, NY, USA, 2007. CCS’07. pp. 307–316. [Google Scholar] [CrossRef]
- Caviglione, L.; Merlo, A.; Migliardi, M. Covert Channels in IoT Deployments Through Data Hiding Techniques. In Proceedings of the 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA), Krakow, Poland, 16–18 May 2018; pp. 559–563. [Google Scholar] [CrossRef]
- Guri, M.; Hasson, O.; Kedma, G.; Elovici, Y. An optical covert-channel to leak data through an air-gap. In Proceedings of the 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 12–14 December 2016; pp. 642–649. [Google Scholar] [CrossRef]
- Loughry, J.; Umphress, D.A. Information leakage from optical emanations. ACM Trans. Inf. Syst. Secur. 2002, 5, 262–289. [Google Scholar] [CrossRef]
- Lupia, F.; Lucchese, M.; Merro, M.; Zannone, N. ICS Honeypot Interactions: A Latitudinal Study. In Proceedings of the 2023 IEEE International Conference on Big Data (BigData), Sorrento, Italy, 15–18 December 2023; pp. 3025–3034. [Google Scholar] [CrossRef]
- Liu, S.F.; Fan, Y.J.; Luh, D.B.; Teng, P.S. Organizational Culture: The Key to Improving Service Management in Industry 4.0. Appl. Sci. 2022, 12, 437. [Google Scholar] [CrossRef]
- Longo, G.; Lupia, F.; Pugliese, A.; Russo, E. Physics-aware targeted attacks against maritime industrial control systems. J. Inf. Secur. Appl. 2024, 82, 103724. [Google Scholar] [CrossRef]
- Lazzaro, A.; D’Addona, D.M.; Merenda, M. Comparison of Machine Learning Models for Predictive Maintenance Applications. In Proceedings of the Advances in System-Integrated Intelligence, Genova, Italy, 7–9 September 2022; Valle, M., Lehmhus, D., Gianoglio, C., Ragusa, E., Seminara, L., Bosse, S., Ibrahim, A., Thoben, K.D., Eds.; Springer: Cham, Switzerland, 2022; pp. 657–666. [Google Scholar]
- Carrara, B.; Adams, C. Out-of-Band Covert Channels—A Survey. ACM Comput. Surv. 2016, 49, 1–36. [Google Scholar] [CrossRef]
- Cronin, P.; Gouert, C.; Mouris, D.; Tsoutsos, N.G.; Yang, C. Covert Data Exfiltration Using Light and Power Channels. In Proceedings of the 2019 IEEE 37th International Conference on Computer Design (ICCD), Abu Dhabi, United Arab Emirates, 17–20 November 2019; pp. 301–304. [Google Scholar] [CrossRef]
- Ronen, E.; Shamir, A. Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. In Proceedings of the 2016 IEEE European Symposium on Security and Privacy (EuroS&P), Saarbruecken, Germany, 21–24 March 2016; pp. 3–12. [Google Scholar] [CrossRef]
- Claeys, T.; Rousseau, F.; Simunovic, B.; Tourancheau, B. Thermal covert channel in bluetooth low energy networks. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, Miami, FL, USA, 1–17 May 2019; Association for Computing Machinery: New York, NY, USA, 2019. WiSec’19. pp. 267–276. [Google Scholar] [CrossRef]
- Chen, S.; Xiong, W.; Xu, Y.; Li, B.; Szefer, J. Thermal Covert Channels Leveraging Package-on-Package DRAM. In Proceedings of the 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, 5–8 August 2019; pp. 319–326. [Google Scholar] [CrossRef]
- Roy, N.; Hassanieh, H.; Roy Choudhury, R. BackDoor: Making Microphones Hear Inaudible Sounds. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, Niagara Falls, NY, USA, 23 June 2017; Association for Computing Machinery: New York, NY, USA, 2017. MobiSys’17. pp. 2–14. [Google Scholar] [CrossRef]
- Al Faruque, M.A.; Chhetri, S.R.; Canedo, A.; Wan, J. Acoustic Side-Channel Attacks on Additive Manufacturing Systems. In Proceedings of the 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS), Vienna, Austria, 11–14 April 2016; pp. 1–10. [Google Scholar] [CrossRef]
- Lee, K.S.; Wang, H.; Weatherspoon, H. PHY Covert Channels: Can you see the Idles? In Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14), Seattle, WA, USA, 2–4 April 2014; USENIX Association: Seattle, WA, USA, 2014; pp. 173–185. [Google Scholar]
- Classen, J.; Schulz, M.; Hollick, M. Practical covert channels for WiFi systems. In Proceedings of the 2015 IEEE Conference on Communications and Network Security (CNS), Florence, Italy, 28–30 September 2015; pp. 209–217. [Google Scholar] [CrossRef]
- Jiang, Y.; Wang, L.; Chen, H.H.; Shen, X. Physical Layer Covert Communication in B5G Wireless Networks—Its Research, Applications, and Challenges. Proc. IEEE 2024, 112, 47–82. [Google Scholar] [CrossRef]
- Li, Y.; Zhao, R.; Deng, Y.; Shu, F.; Nie, Z.; Aghvami, A.H. Harvest-and-Opportunistically-Relay: Analyses on Transmission Outage and Covertness. IEEE Trans. Wirel. Commun. 2020, 19, 7779–7795. [Google Scholar] [CrossRef]
- Li, Y.; Aghvami, A.H. Covertness-Aware Trajectory Design for UAV: A Multi-Step TD3-PER Solution. In Proceedings of the ICC 2022—IEEE International Conference on Communications, Seoul, Republic of Korea, 16–20 May 2022; pp. 7–12. [Google Scholar] [CrossRef]
- Nain, A.K.; Rajalakshmi, P. A reliable covert channel over IEEE 802.15.4 using steganography. In Proceedings of the 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12–14 December 2016; pp. 711–716. [Google Scholar] [CrossRef]
- Tan, Y.a.; Zhang, X.; Sharif, K.; Liang, C.; Zhang, Q.; Li, Y. Covert Timing Channels for IoT over Mobile Networks. IEEE Wirel. Commun. 2018, 25, 38–44. [Google Scholar] [CrossRef]
- Ahsan, K.; Kundur, D. Practical data hiding in TCP/IP. In Proceedings of the Workshop on Multimedia Security at ACM Multimedia, Juan-les-Pins, France, 6 December 2002; ACM Press: New York, NY, USA, 2002; Volume 2, pp. 1–8. [Google Scholar]
- Cabuk, S.; Brodley, C.E.; Shields, C. IP covert timing channels: Design and detection. In Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2–29 October 2004; Association for Computing Machinery: New York, NY, USA, 2004. CCS’04. pp. 178–187. [Google Scholar] [CrossRef]
- Servetto, S.; Vetterli, M. Communication using phantoms: Covert channels in the Internet. In Proceedings of the 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252), Washington, DC, USA, 29 June 2001; p. 229. [Google Scholar] [CrossRef]
- Cabuk, S.; Brodley, C.E.; Shields, C. IP Covert Channel Detection. ACM Trans. Inf. Syst. Secur. 2009, 12, 1–29. [Google Scholar] [CrossRef]
- Zander, S.; Armitage, G.; Branch, P. Covert channels in the IP time to live field. In Proceedings of the Australian Telecommunication Networks and Applications Conference (ATNAC), Melbourne, Australia, 4–6 December 2006; Volume 13, pp. 16–53. [Google Scholar]
- Murdoch, S.J.; Lewis, S. Embedding Covert Channels into TCP/IP. In Proceedings of the Information Hiding, Barcelona, Spain, 6–8 June 2005; Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F., Eds.; Springer: Berlin/Heidelberg, Germany, 2005; pp. 247–261. [Google Scholar]
- Sohn, T.; Seo, J.; Moon, J. A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine. In Proceedings of the Information and Communications Security, Huhehaote, China, 10–13 October 2003; Qing, S., Gollmann, D., Zhou, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2003; pp. 313–324. [Google Scholar]
- OASIS. MQTT, Version 5.0; OASIS Standard, OASIS Open: Burlington, MA, USA, 2019.
- Anselmi, G.; Mandalari, A.M.; Lazzaro, S.; De Angelis, V. COPSEC: Compliance-Oriented IoT Security and Privacy Evaluation Framework. In Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, Madrid, Spain, 2–6 October 2023; Association for Computing Machinery: New York, NY, USA, 2023. [Google Scholar]
- Buccafurri, F.; Angelis, V.D.; Francesca Idone, M.; Labrini, C. WIP: An Onion-Based Routing Protocol Strengthening Anonymity. In Proceedings of the 2021 IEEE 22nd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Pisa, Italy, 7–11 June 2021; pp. 231–235. [Google Scholar] [CrossRef]
- Eugster, P.T.; Felber, P.A.; Guerraoui, R.; Kermarrec, A.M. The many faces of publish/subscribe. ACM Comput. Surv. 2003, 35, 114–131. [Google Scholar] [CrossRef]
- Greco, G.; Lupia, F.; Scarcello, F. The Tractability of the Shapley Value over Bounded Treewidth Matching Games. In Proceedings of the 26th International Joint Conference on Artificial Intelligence, IJCAI 2017, Melbourne, VIC, Australia, 19–25 August 2017; pp. 1046–1052. [Google Scholar] [CrossRef]
- Andy, S.; Rahardjo, B.; Hanindhito, B. Attack scenarios and security analysis of MQTT communication protocol in IoT system. In Proceedings of the 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), Yogyakarta, Indonesia, 19–21 September 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Lucchese, M.; Lupia, F.; Merro, M.; Paci, F.; Zannone, N.; Furfaro, A. HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems. In Proceedings of the 18th International Conference on Availability, Reliability and Security, Benevento, Italy, 29 August–1 September 2023; Association for Computing Machinery: New York, NY, USA, 2023. ARES ’23. [Google Scholar] [CrossRef]
- Lazzaro, S.; De Angelis, V.; Mandalari, A.M.; Buccafurri, F. Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices. In Proceedings of the 2024 IEEE International Conference on Pervasive Computing and Communications (PerCom), Biarritz, France, 11–15 March 2024; pp. 114–124. [Google Scholar] [CrossRef]
- Buccafurri, F.; De Angelis, V.; Lazzaro, S. MQTT-I: Achieving End-to-End Data Flow Integrity in MQTT. IEEE Trans. Dependable Secur. Comput. 2024; 21, 4717–4734. [Google Scholar] [CrossRef]
Approach | Data Content | Sender Identity | Sender Activity |
---|---|---|---|
Encryption-based | yes | no | no |
Anonymous communication | yes | yes | no |
Covert channel | yes | yes | yes |
Operations | Execution Time | |
---|---|---|
Publisher side | Selection of k parts | |
Length computation | ||
Subscriber side | Setup phase | 27.8 s (for 20 bits) |
Message reconstruction |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lazzaro, S.; Buccafurri, F. Stealthy Messaging: Leveraging Message Queuing Telemetry Transport for Covert Communication Channels. Appl. Sci. 2024, 14, 8874. https://doi.org/10.3390/app14198874
Lazzaro S, Buccafurri F. Stealthy Messaging: Leveraging Message Queuing Telemetry Transport for Covert Communication Channels. Applied Sciences. 2024; 14(19):8874. https://doi.org/10.3390/app14198874
Chicago/Turabian StyleLazzaro, Sara, and Francesco Buccafurri. 2024. "Stealthy Messaging: Leveraging Message Queuing Telemetry Transport for Covert Communication Channels" Applied Sciences 14, no. 19: 8874. https://doi.org/10.3390/app14198874
APA StyleLazzaro, S., & Buccafurri, F. (2024). Stealthy Messaging: Leveraging Message Queuing Telemetry Transport for Covert Communication Channels. Applied Sciences, 14(19), 8874. https://doi.org/10.3390/app14198874