1. Introduction
In mobile communications such as fourth generation of mobile networks (4G) and fifth generation of mobile networks (5G), data transmissions over the air interface are targets for attacks because transmissions can be intercepted and because mobile equipment might be less protected than stationary devices. This tendency is intensified by the three usage scenarios for which 5G was designed: enhanced mobile broadband, ultra-reliable and low-latency communication, and massive machine-type communication. As an extreme example, we consider that confidential information about the network (be it user profiles or passwords) might be leaked via the air interface to a mobile device in a stealthy way, i.e., via a network covert channel [
1]. Because of the richness of 5G, the attacker has a wealth of protocols to choose from.
While the possibilities for covert channels in 4G (also known as long-term evolution (LTE))–air interface protocols were investigated in the past [
2], its successor, 5G, introduced new features and protocols for the air interface, called 5G New Radio [
3], to address usage scenarios like enhanced mobile broadband, ultra-reliable and low-latency communication, and massive machine-type communication. Therefore, new possibilities for covert channels could arise. Although 5G is a widespread communication medium, it has not been investigated systematically for covert channels, which are often used for malicious purposes, which is a notable research gap and motivated us to investigate 5G New Radio protocols to investigate the possibility of using covert channels to close this gap. Our research expands upon the state of the art, which is discussed in
Section 2.3.
As an innovation over the prior methods, we provide the first systematic analysis of the protocols in 5G New Radio with respect to the possibility of using covert channels. As another novelty over the prior method, we perform this systematic analysis with the help of hiding patterns [
4] to find as many potential covert channels as possible. To the best our knowledge, this is the first study that has applied hiding pattern analysis to 5G New Radio protocols. We extend the analysis of storage covert channels in our previous work [
5], and, as another innovation, we provide the first systematic analysis of 5G New Radio protocols with respect to timing covert channels, again by applying hiding patterns.
Building on the analyses above, we provide another innovation in the design and implementation of the first network storage covert channel in the Packet Data Convergence Protocol (PDCP). Compared to our previous work [
5], the implementation is extended from simulation to real-world equipments. Furthermore, as another extension of our previous work [
5] and as a possible practical application of our work, we sketch a timing channel that could be developed from a recent overshadowing attack [
6] and involves a scenario of a flying drone that is remotely controlled and an attacker near the controlling person can stealthily transmit data to the drone or a confederate within eye sight of the drone.
As another practical application of our research, we perform both simulation and, as an extension of our previous work [
5], real-world experiments comprising a base station and mobile device to demonstrate the feasibility and practical application of our approach and to evaluate our prototype steganographic channel with respect to steganographic bandwidth, robustness, stealthiness, and steganographic cost, i.e., its influence on the carrier. Beyond an application scenario, we investigate countermeasures to demonstrate that such covert channels can be eliminated by careful design.
The remainder of this article is structured as follows:
Section 2 summarizes background information on the protocols used in 5G–air interfaces, network steganography, and related work about steganographic channels in 4G and 5G radio communication.
Section 3 describes our methodology followed to analyze the protocols used in 5G–air interfaces in view of steganographic channels with the help of hiding patterns.
Section 4 presents the design of a storage covert channel in the Packet Data Convergence Protocol (PDCP) of the 5G–air interface and a sketch of a timing channel. In
Section 5, we evaluate the storage covert channel with simulations and real-world experiments.
Section 6 presents our conclusions and gives an outlook on our future work.
3. Method
First, a detailed analysis of the 5G New Radio protocols was necessary to assess whether they were potentially suitable for information hiding. Then, one of the protocols that offered the best characteristics for a covert channel was selected for further analysis of the hiding pattern collection [
22] by checking, for each pattern, if its application on a field of the chosen protocol might result in a feasible covert channel. The taxonomy of Wendzel et al. [
4] defines patterns in order to categorize covert channel techniques. Originally, the taxonomy was limited to network covert channels. Since then, the categorization has been revised and expanded to a generic taxonomy [
23] for all steganography domains. Nevertheless, the previous classification retains its validity and can still be applied in the domain of network steganography. After both the protocol to be exploited and the pattern to be used were selected, the theoretical concept of the covert channel was created. To ensure comparability and reproducibility of the results, a well-known method from the research field of steganography was used. The unified description method of Wendzel et al. [
24] is based on extensive analysis of publications in the steganography domain. It is designed to describe the covert channel technique or hiding method in a unified and structured way so that it is easier to compare and evaluate new methods. Finally, an experimental implementation of the proposed covert channel was evaluated in a test environment that simulated a real-world mobile network.
4. Protocol Analysis and Covert Channel Design
The focus of our analysis was on the Layer 2 protocols of 5G New Radio, which include the Service Data Adaption Protocol (SDAP), Packet Data Convergence Protocol (PDCP), and Radio Link Control (RLC). They seem the most promising part of the 5G protocol stack for the reasons given below: The exploitation of MAC procedures in 4G and 5G for covert communication was already covered by Soosahabi in [
18,
19], as mentioned before. On Layer 3, the RRC is not considered a suitable protocol for continuous covert transmission, since it is only used for signaling and control instructions on the control plane. The physical layer (Layer 1) does not seem suitable for information hiding because modifications of the time-critical procedures would probably cause failures of the wireless connection. In the following, the headers of the Protocol Data Units (PDUs) of the SDAP, PDCP and RLC are analyzed. For convenience, the headers are shown in
Figure 2.
4.1. Analysis of Exploitable Protocols
4.1.1. Service Data Adaption Protocol
The header of the SDAP Data PDU [
11] offers only a few bits per packet to hide information. This is mainly due to the fact that the SDAP is only responsible for identifying the QoS flow of the packet, and the header therefore consists mostly of the QoS flow identifier, which is less suitable for hiding information. Overall, the SDAP only offers one reserved bit in the header of the uplink PDU, which is possibly suitable for embedding covert data. Therefore, the SDAP was not considered further.
4.1.2. Packet Data Convergence Protocol
Although the PDCP [
10] adds only few header elements to the payload, these provide a good basis for a covert channel, especially with five bits of reserved header space. However, it must be taken into account that exploiting the PDCP sequence number as a carrier of hidden information entails a high risk of detection. So, in order to keep the probability of detection as low as possible, not every PDU can be modified. Ultimately, covert capacity and detection risk must be weighed. Alternatively, hiding information in the MAC-I field was discussed in the analysis of Rezaei et al. [
2]. This field is 32 bits in size and contains the Message Authentication Code (MAC) of the user data if integrity protection has been configured by the RRC layer. In 5G, this is enabled as a mandatory security feature for Control Plane messages over the Signaling Radio Bearer. Yet, for the user plane packets over the data radio bearer, it is only optional and is not used in real mobile networks, as shown, e.g., by Lasierra et al. [
25]. This header field could also be used in 5G for a covert transmission, but only in the PDUs of the control plane.
4.1.3. Radio Link Control
The header elements of the RLC [
9] provide a good basis for transmitting covert information. However, a distinction must be made between the data PDUs in acknowledged mode (AM) and unacknowledged mode (UM). The biggest difference between these RLC modes is the acknowledgement of the packets by the receiving entity. In contrast to the UM, the so-called ACK or NACK messages are sent in AM. Since the RLC AM naturally generates significantly more data traffic and processing overhead than the UM, the use of the modes depends on the performance requirements of the application scenario. However, more bits are available for encoding covert information in the PDU header for AM than for UM PDUs due to the longer RLC sequence number. However, only a fraction of the PDUs can be used for the transmission of covert data when exploiting the sequence number and the segment offset; otherwise, the covert channel would be easily detected.
4.1.4. Selection of a Suitable Protocol
At first glance, the underlying RLC layer has more capacity in the header than the PDCP. This is due to the fact that the RLC supports the segmentation of payload, and therefore more overhead is created by information necessary for the segmentation. However, these additional header fields probably cannot be used for a covert channel without affecting the correct assembly of the RLC segments. Otherwise, the RLC offers only two bits of suitable header space and is therefore less capable of hiding information compared to the header of PDCP. So finally, PDCP is selected as the primary protocol for the covert channel. However, it is also conceivable that the available capacities of the RLC header are used in addition to the PDCP. This combination of the PDCP and RLC would increase either the covert capacity or the robustness of the covert channel, since information can also be stored redundantly in the PDCP and RLC headers.
4.2. Analysis of Covert Storage Patterns
Since the focus of our analysis was on network covert channels within the Packet Data Convergence Protocol (PDCP) of the 5G–air interface, the network-specific pattern collection [
4,
22] is used for the following analysis: First, the covert storage patterns that modify data in protocol-specific fields are analyzed.
4.2.1. Size Modulation (PS1) Pattern
The hidden information is encoded by choosing different PDU sizes. As specified in TS 38.323 [
10], the maximum PDCP PDU size is 9000 bytes, without further requirements or limitations. However, the packet sizes of different layers are highly dependent on the radio resource allocation. Therefore, it is theoretically possible to use the PDU size of the PDCP for a covert channel, but, from a practical point of view, manipulation of the packet size is only possible if the entire 5G radio stack is considered. Therefore, the modulation of PDU size is less suitable for hiding information in PDCP.
4.2.2. Sequence (PS2) Pattern
The hidden information is encoded by altering the sequence of the header fields. The header structure of PDCP is clearly specified in TS 38.323 [
10]. Both the position and number of header elements are defined bit-exactly. It is not allowed to deviate from the specified header structure. Therefore, the
Sequence pattern as well as sub-patterns
Position (PS2a) and
Number of Elements (PS2b) are not suitable for hiding information in PDCP.
4.2.3. Add Redundancy (PS3) Pattern
The hidden information is embedded into freed space of a header element which was created by the covert sender. In PDCP, creating new space in a header element is only possible by modifying the sequence number, for example by using only 12-bit numbers instead of 18-bit values. The remaining 6 bits could probably be used to embed the hidden data. However, manipulating the sequence number may affect the correct processing by the legitimate receiver and would raise suspicion if applied too often. Consequently, only a small portion of the PDUs can be used for the covert channel. Overall, adding redundancy in the PDCP header is less suitable for the covert transmission.
4.2.4. Random Value (PS10) Pattern
The hidden information is encoded in a header element that contains a random value by default. However, the PDCP header does not comprise elements with a random value. Thus, this pattern is not suitable for covert data in the PDCP header.
4.2.5. Value Modulation (PS11) Pattern
The hidden information is encoded by selecting one or more of
n values in a header field. With the
case pattern (PS11a), upper- and lowercase characters are used for encoding the information. Since the PDCP header does not contain any letters, case modification is not feasible within the PDCP. The
least significant bit (LSB) pattern (PS11b) modifies the lower bit(s) of a header field to transmit covert data. This pattern could probably be applied to the PDCP sequence number. However, if the LSB of the PDCP sequence number is modified, the legitimate receiver would reject the packet since the PDU would not contain the expected sequence number. Therefore, only the initial sequence number of a packet stream can be used for embedding the covert data. This means that the LSB pattern is probably suitable for a covert channel in the PDCP header, but the covert capacity would be very limited. When applying the
value influencing pattern (PS11c), the covert sender influences the values of a header field by changing the other values or network conditions that are closely related to this header element. As specified in TS 38.323 [
10], the sequence number of the PDCP is calculated by
mod
, where
is the size of the sequence number, and
is the counter for the next packet to be transmitted. The covert sender could influence the value of the PDCP SN header field by changing
. However, modifying the sequence number may raise suspicion on the receiving side. Therefore, this pattern is less suitable for a covert channel in the PDCP header.
4.2.6. Reserved/Unused (PS12) Pattern
The hidden information is embedded in unused or reserved header elements. As specified in TS 38.323 [
10], the value of the reserved header fields in the PDCP has to be ignored by the receiving entity. Since the header of the PDCP contains five reserved bits, this is the most suitable of all analyzed patterns for a covert channel within the PDCP header.
4.3. Analysis of Covert Timing Patterns
For completeness, the susceptibility of the PDCP to timing patterns is analyzed below. Network-specific pattern collection [
22] is also used here. However, the focus of the analysis is only on the protocol-aware patterns, as the protocol-agnostic patterns can always be applied without relying on a specific protocol.
4.3.1. Artificial Loss (PT10) Pattern
Hidden information is encoded by artificially suppressing certain PDUs. To utilize this pattern in the PDCP, the covert sender continuously monitors the sequence numbers of the next PDUs to be transmitted. Subsequently, the covert data are encoded by forwarding or discarding the PDUs. The covert receiver monitors incoming PDUs and the corresponding sequence numbers. Finally, covert data can be extracted by comparing the received sequence numbers with the expected numbers. With this pattern, the covert bits are therefore transferred via the artificial loss of PDCP sequence numbers.
4.3.2. Message (PDU) Ordering (PT11) Pattern
The hidden data are encoded via a predefined order of transmitted PDUs. Similar to the procedure for the artificial loss pattern, the covert sender influences the sequence of PDUs that are to be transmitted next. In this case, however, the covert receiver must not only compare the received sequence numbers with the expected ones but also save the specific order of the sequence numbers from the received PDUs. With the help of the predefined template, the covert receiver can then extract the covertly transmitted information.
4.3.3. (Artificial) Retransmission (PT12) Pattern
The hidden information is encoded by intentionally retransmitting a message or packet that was already transferred beforehand. Within the PDCP, the sequence number can be exploited by the covert sender to utilize this pattern for covertly exchanging data. The covert sender can transmit the covert bits through a single or a duplicate PDU transmission. The covert receiver can extract the covert information by monitoring and sequentially comparing the sequence numbers of the incoming PDCP PDUs. However, packets with sequence numbers that were already received are eventually discarded by the overt receiver.
4.3.4. Frame Collisions (PT13) Pattern
The hidden data are transferred by intentionally producing frame collisions. However, frame collisions are only an issue in network protocols that are used for medium access control on shared media. Therefore, this pattern is not feasible within the PDCP layer.
4.3.5. Temperature (PT14) Pattern
By increasing the receiver’s system temperature, e.g., of the CPU, the hidden data are encoded. The covert sender could achieve a higher temperature through sending burst traffic. However, the number of PDCP packets depends on the overt traffic. It is not possible for the covert sender to increase the number of PDCP PDUs. Therefore, this pattern is not feasible within the PDCP layer.
4.3.6. Artificial Reconnections (PT15) Pattern
The hidden information is encoded by artificially inducing reconnects of an existing connection between network nodes. As defined in TS 38.323 [
10], a PDCP entity and a corresponding PDCP connection are created for every radio bearer used by UE. The covert sender could suspend and re-establish the PDCP session via the RRC layer. If the covert receiver is able to monitor these reconnections at the PDCP layer, the hidden data can be extracted.
4.3.7. Artificial Resets (PT16) Pattern
Similar to the artificial reconnections pattern, connection resets are produced artificially by the covert sender. In contrast to reconnect, the hidden data are transferred via the connection states, which are reset during the reconnection. Within the PDCP layer, any entity has a certain state including several parameters and values for controlling transmission and operation of the PDUs. If the covert sender induces a re-establishment of the transmitting PDCP entity, the receiving PDCP entity performs a reset of these values. To decode the hidden data, the covert receiver has to monitor the changes in this state variables.
4.4. Summary of Pattern Analysis
Concluding the analysis, the Packet Data Convergence Protocol (PDCP) in 5G New Radio is susceptible to both timing and storage patterns. Both types of patterns can be used to create a covert channel within the PDCP layer. However, only about half of the covert storage patterns that modify a protocol-specific field are applicable to the PDCP. Finally, only the reserved/unused pattern is considered suitable for a covert channel. All other applicable storage patterns most likely affect the functionality of the PDCP in some way and thus increase detectability. Due to the increased requirements of 5G, connection losses can occur very quickly if the timing behavior is manipulated. Therefore, covert timing patterns are generally not as suitable as covert storage patterns for information hiding on the air interface.
4.5. Design
Our 5G covert channel is presented in a unified description [
24] for comparability.
4.5.1. Hiding Pattern
The covert channel stores hidden information in the PDCP, i.e., can be categorized as a network covert storage channel. More precisely, a header element of the PDCP data PDU is exploited by the modification of the nonpayload. Since the hidden information is embedded into the reserved bits, the header structure of the PDCP is not modified. So, the covert channel is structure preserving and applies the reserved/unused hiding pattern.
4.5.2. Application Scenario
The proposed covert channel can be used in a variety of application scenarios associated with 5G-based communication. The hiding method involves exactly one covert sender and one covert receiver. The covert sender is located in the gNodeB, while the covert receiver is residing in the UE. The overt communication link between the gNodeB and the UE is bidirectional, but the covert data are only transferred from the covert sender to the covert receiver. Thus, a backward channel would be feasible. A covert sender and receiver can also be located the other way around depending on the respective application scenario. It may also be possible to use the proposed hiding method for the transmission of covert data among the participants of a group communication, but this depends on the message types and the associated logical channels. Since the covert channel is based on the PDCP, the messages that are exploited for the covert data transmission must also be processed by the PDCP layer. Otherwise, the covert channel cannot be applied.
4.5.3. Properties of the Carrier
The proposed covert channel exploits the Packet Data Convergence Protocol (PDCP) in the 5G New Radio protocol stack. In particular, the five reserved bits of the PDCP header are used to store the hidden information. Since the reserved/unused pattern is not protocol-specific, the proposed hiding method can also be applied to other protocols of the 5G air interface. However, our analysis showed that PDCP is the most suitable protocol for a covert channel in 5G New Radio. In order for the covert sender to transfer the hidden information, data must be continuously transmitted over the 5G–air interface and processed by the PDCP layer. At best, the covert data are exchanged during the transmission of user data, such as a video stream. In contrast to deployment in the user plane, the proposed covert channel is less suitable for control-plane messages, since signaling messages are not sent as frequently. The operation of the proposed hiding method also does not depend on whether the encryption and integrity protection are configured for the overt communication link by the RRC layer.
4.5.4. Sender-Side Process
The covert sender must have access to the PDCP layer and must be able to modify the processing of the PDCP header. Since the gNodeB is implemented either as monolithic software or as a microservice architecture, the covert sender has to manipulate the software or the software components responsible for processing the PDCP, i.e., an insider attack to leak data seems most plausible. Since only five reserved bits are available within the PDCP header for hiding secret text, the covert sender cannot embed the entire one-byte character to the PDCP header. Therefore, the hidden text message has to be transmitted by splitting the ASCII characters (or bytes in case of a binary message) into two segments with four bits each. In addition, to avoid detectability, not every data packet can be used, but only a certain fraction of them. The specific transmission interval of the covert data depends on several parameters of the network environment and must therefore be determined during the practical tests. For the proposed covert channel, the covert sender utilizes every tenth PDCP data PDU. To signal that the selected PDU contains covert data, the least significant bit of the five reserved bits in the PDCP header is set to on. After that, only four reserved bits are available for the transmission of hidden information. The higher four bits of the ASCII character are embedded into the four reserved bits of one PDU. Then, the remaining bits are stored in the header of the PDU that is selected for the next covert transmission. Reliable transmission is ensured by the PDCP and the underlying protocols. Therefore, no measures are implemented within the covert channel to increase the reliability of the covert transmission. An algorithmic description of the covert sender is shown in Algorithm 1.
Instead of using a fixed transmission distance d between PDCP data PDUs, a randomized distance with mean d, e.g., in the range to with equal distribution, might be used, where the covert sender and receiver use the same random number generator. If the PDCP data PDUs used for the transmission of covert data can be clearly distinguished from other PDCP data PDUs (e.g., by an appropriate encoding of values), then a variation in the distance can alternatively be used to establish a timing covert channel.
4.5.5. Receiver-Side Process
The covert receiver must be able to capture the 5G data traffic and decode the received packets according to the 5G New Radio standard. The position and the values of the PDCP header are identified based on the specified protocol structures. By looking at the least significant bit of the reserved bits in the PDCP header, the covert receiver recognizes whether the PDU contains hidden information. If this bit is set to one, the remaining bits
of the corresponding header element are extracted and cached. The covert receiver then monitors the data traffic again a packet is identified with the covert data flag set to one. From this PDU, the covert bits
are extracted and concatenated with the cached bits in the correct order. The covert receiver gradually extracts all the transmitted characters and thus obtains the information hidden by the covert sender. An algorithmic description is depicted in Algorithm 2.
Algorithm 1 Hiding method applied by covert sender. |
- 1
Read input from file: secret message - 2
Set counter for overall transmitted PDUs: - 3
Set counter for transmitted covert segments: - 4
For each PDU to be transmitted: - 5
Covert flag of current PDU - 6
if modulo 10 == 0 then - 7
if is not empty then - 8
if modulo 2 == 0 then - 9
Extract from first ASCII character of - 10
Covert flag of current PDU - 11
Reserved bits of current PDU , covert flag) - 12
else - 13
Extract from first ASCII character of - 14
Covert flag of current PDU - 15
Reserved bits of current PDU , covert flag) - 16
Delete first ASCII character from - 17
end if - 18
+ 1 - 19
end if - 20
else - 21
Reserved bits of current PDU , covert flag) - 22
end if - 23
+ 1
|
Algorithm 2 Hiding method applied by covert receiver. |
- 1
Create empty byte for assembly of ASCII character: - 2
Set counter for received covert segments: - 3
For each received PDU: - 4
← Reserved bits of current PDU - 5
if Covert flag == 1 then - 6
if modulo 2 == 0 then - 7
Extract first 4 reserved bits of received PDU - 8
of Extracted bits - 9
else - 10
Extract first 4 reserved bits of received PDU - 11
of Extracted bits - 12
Convert to ASCII character - 13
Write ASCII character to output file - 14
- 15
end if - 16
+ 1 - 17
end if
|
4.5.6. Covert Channel Properties
The proposed covert channel is robust against normal traffic noise due to the reliability measures of the PDCP and the underlying protocols. However, it can be limited or even completely eliminated by traffic normalization of the reserved bits in the PDCP header. Regarding detectability, it is not feasible to easily place a warden on the air interface. This is mainly because communication over the air interface is very dynamic. The physical properties of the carrier channel often change during data transmission. In addition, wardening on the air interface only makes sense if the UE in which the covert sender or receiver is located does not change location. Otherwise, the UE would force a handover to another cell in the mobile network, and the warden would not be able to detect the covert channel anymore. However, detection may be simple within the base station or the UE if a network analyzer is used. The covert capacity is evaluated in the next section.
4.5.7. Countermeasures
In general, there are three different categories of countermeasures for covert channels: detection, limitation, and elimination. The detection of the reserved/unused pattern and thus the detection of the proposed covert channel is simple if it is possible to capture and read the network traffic of the 5G–air interface. If the protocol exploited by the hiding method is known, a network analyzer like Wireshark can monitor the affected protocol fields. If the network analyzer regularly observes behavior that deviates from the specified values, this is an indication that information is being hidden in the communication. The proposed covert channel can thus be easily detected if the focus of the network analysis is on the reserved bits of the PDCP header. Since these are set to 0 by default, any reserved bit that contains a 1 is suspicious. Based on the network analysis, a traffic normalizer can be used to limit or eliminate the covert channel by normalizing the suspicious bits.
4.6. Sketch of a Timing Covert Channel
An example scenario of the attack from [
6] is controlling the flight of a drone with a virtual reality (VR) headset. Both drone and headset have mobile 5G connectivity, and they are normally in different cells. The VR headset is the sender (in the context of covert channels: the overt sender), which turns headset movements into flight commands that are sent to the drone, which is the receiver (in the context of covert channels: overt receiver and possibly covert receiver). The commands arrive with regular distances. The drone follows the commands and replies with a video stream that is displayed on the VR headset.
By observing ACK messages from the base station, the attacker (in the context of covert channels: the covert sender), who is in the same cell as the sender, is able to create and send fake negative ACK messages from time to time by overshadowing. This triggers the sender to repeat messages, which in turn delays further messages. Now the distances between command messages arriving at the receiver are varying. In the original attack scenario, the delay of commands may delay the turn of the drone and thus lead to contact between the drone and an obstacle, resulting in the possible loss of the drone.
In our covert channel scenario, the drone (as covert receiver) can notice the variation in the time intervals between commands and decode them as bits with values 0 and 1 depending on the delay (which can be controlled by the attacker/covert sender via the number of packets that it requests to be retransmitted). Also, some entity external to the drone may notice the change in movements induced by the delays in commands, i.e., the covert receiver could also be external to the drone.
This covert channel is noisy as there are other reasons for retransmissions. To make the covert channel robust, the secret message must be protected with an error correction code and possibly even with an erasure code, as a retransmission from other causes might be falsely interpreted as the transmission of an additional bit of the secret message.
The covert channel is not too stealthy, as the covert sender is actively sending, and the increased number of retransmissions might be perceived as an anomaly or at least as a degradation of the communication quality, i.e., the covert channel can have a negative influence on the carrier. Yet, the covert receiver can act in a stealthy manner, as it is not forced to extract data from a communication or correct bits modified by the covert sender: it only observes the arrival times of packets.
The covert bandwidth cannot be high in order to remain stealthy. Measurement of the covert bandwidth would require implementation of the whole scenario and covert channel, which was outside the scope of the present research.
The countermeasures could be rather general: any countermeasure against overshadowing attacks would eliminate this covert channel. Also, normalization of packet distances could at least limit the bandwidth of the covert channel, but this might increase the negative impact on the carrier. Further investigation of countermeasures would also necessitate an implementation, which was out of scope here.
5. Evaluation
The experimental implementation of our proposed hiding method was initially evaluated in a test environment that simulated a real 5G network. The test setup consisted of virtualized open source software components and a simulated radio interface based on the networking library ZeroMQ. Open5GS was deployed as the 5G Core, and the gNB from srsRAN Project was used as the 5G RAN. The UE was simulated with the srsUE from srsRAN 4G. For the experimental tests, the covert sender was located in the gNodeB and the covert receiver in the UE. The overt traffic stream was generated with iperf. For different bandwidths as well as different intervals of the covert transmission, the covert capacity was evaluated (cf.
Figure 3). Additionally, these tests were conducted with a real radio interface. The basic test setup was not changed. Only the virtualized radio interface was replaced with a physical radio interface provided through software-defined radios. For the evaluation of the proposed covert channel, two USRP B210s were used in the test environment.
The covert capacity was proportional to the bit rate of the overt traffic. The percentage of covert bits in the data stream was 0.0075% for the 5 PDU interval, 0.0037% for the 10 PDU interval, and 0.0025% for the 15 PDU interval. Therefore, the results of the experiment can easily be transferred to higher bit rates such as 100 Mbps or 1 Gbps. Furthermore, the covert capacity obviously decreased with increasing intervals between the covert transmissions. However, the experiments also showed that the same covert capacity was achieved for transmissions with random intervals equally distributed between 5 and 15 PDUs, i.e., with a mean of 10, and for transmissions with a static interval of 10 PDUs between successive transmissions of covert data. The advantage of the randomized intervals is primarily the irregularity of the covert transmission, which improves undetectability. In practical terms, this means that at a bandwidth of 20 Mbps, approx. 815 words with 5600 characters can be transmitted via the covert channel in one minute with randomized intervals between 5 and 15 PDUs. Nevertheless, it is necessary to modify the software of the base station or the mobile device to implement the proposed hiding method. This is a major challenge in the field, as only proprietary closed source products are currently used in public mobile networks. Therefore, the proposed covert channel can only be exploited by the vendor of the base station software, e.g., for covertly leaking information that is only accessible for an internal attacker.
6. Conclusions
We analyzed the protocols of the 5G–air interface, called New Radio, to assess whether they are potentially suitable for a covert storage or timing channel. The analysis identified possibilities for the transmission of hidden information in all considered protocol layers. However, hiding information in these protocols would probably affect their functionality in most cases. Only the reserved bits in the protocol header can be used without any limitations for a covert storage channel. With five reserved bits, the PDCP offers the highest covert capacity. The covert parties are located in the 5G base station and in the mobile device. Thus, a leak by an insider, e.g., an employee of the base station operator, seems the most likely deployment scenario. In general, the proposed covert channel is suitable for the hidden transmission of arbitrary text encodings or binary data. However, both the theoretical and the practical proof of concept demonstrated the secret transmission of ASCII characters. Due to the limited covert capacity of the PDCP header in a packet, the one-byte characters are divided into two covert transmissions each. The covert channel was successfully implemented in a test setup with open source software. In the experimental tests, it was demonstrated that the covert capacity grows proportionally with the bandwidth of the overt traffic as it accounts for a fixed although small percentage of the data transmission bandwidth. The covert bandwidth also depends on the interval between the covert transmissions. Finally, it was shown that it is easy to detect the covert channel and to eliminate it with traffic normalization. However, this requires the network analyzer to have direct access to the protocol layer.
Additionally, a timing channel in 5G New Radio was sketched based on an existing attack that employs fake status reports to trigger retransmits via overshadowing.
Overall, the feasibility of implementing a covert channel in the 5G–air interface was demonstrated both theoretically and practically. Therefore, it is necessary to design and test more information hiding methods in the 5G domain based on our results. In particular, it would be important to verify whether the proposed hiding method has an impact on the quality of mobile connections with commercial 5G network equipment and mobile devices. Other future work could comprise implementing and evaluating the sketched timing covert channel based on the experimental scenario in [
6] to explore AI-based anomaly detection countermeasures and to explore extensions of the presented storage channel to multiple malicious users.