Steganography for Cyber-physical Systems
DOI:
https://doi.org/10.13052/2245-1439.621Keywords:
Cyber-physical Systems (CPS), Internet of Things (IoT), Steganography, Covert Channels, Information Hiding, Smart Home, Smart Building, BACnetAbstract
Cyber-physical Systems (CPS) have raised serious security concerns and thus have been subjected to intensive security research lately. Recent publications have shown that there is a potential to transfer hidden information through CPS environments. In comparison to these existing studies, we demonstrate that CPS cannot only be used to covertly transfer secret data but also to store secret data. Using an analogy to the biological concept of animal scatter hoarding behavior we exemplify CPS secret data storage using automated buildings.1
Downloads
References
BACnet.org. Vendor ID list. http://www.bacnet.org/VendorID/, 2016.
Y. A. H. Fadlalla. Approaches to Resolving Covert Storage Channels in Multilevel Secure Systems. PhD thesis, Univ. of Brunswick, 1996.
Gerry Howser. Using information flow methods to secure cyber-physical systems. In Critical Infrastructure Protection IX, volume 466 of IFIP AICT, pages 185–205. Springer, 2015.
ISO. Standard 16484-5:2014: Building automation and control systems (BACS) – part 5: Data communication protocol, 2012.
Simo Jokinen and Jukka Suhonen. Food caching by willow and crested tits: A test of scatterhoarding models. Ecology, 76(3):892–898, 1995.
Steve Karg. BACnet Stack. http://bacnet.sourceforge.net/, 2015.
Edward A. Lee. Cyber physical systems: Design challenges. In 2008 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing (ISORC), pages 363–369, 2008.
Maxim Integrated Products, Inc. Data sheet for the DS18B20 digital thermometer, 2015. http://datasheets.maximintegrated.com/en/ds/DS18B 20.pdf.
Wojciech Mazurczyk, Steffen Wendzel, Sebastian Zander, et al. Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures. IEEE Press series on information & communication networks security. Wiley, 2016.
Frederik Möllers and Christoph Sorge. Deducing user presence from inter-message intervals in home automation systems. In Jaap-Henk Hoepman and Stefan Katzenbeisser, editors, Proc. ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International Conference, SEC 2016, pages 369–383, Cham, 2016. Springer International Publishing.
Thomas Mundt, Frank Krüger, and Till Wollenberg. Who refuses to wash hands? privacy issues in modern house installation networks. In Int. Conf. Broadband, Wireless Computing, Communication and Applications, pages 271–277. IEEE, 2012.
Marissa A. Ramsier, Andrew J. Cunningham, et al. Primate communication in the pure ultrasound. Biology Letters, 8(4):508–511, 2012.
Lennart Suselbeek, Vena M.A.P. Adamczyk, Frans Bongers, et al. Scatter hoarding and cache pilferage by superior competitors: an experiment with wild boar, sus scrofa. Animal Behaviour, 96:107–115, 2014.
Jernej Tonejc, Sabrina Güttes, Alexandra Kobekova, and Jaspreet Kaur. Machine learning methods for anomaly detection in BACnet networks. Journal of Universal Computer Science (J.UCS), 22(9):1203–1224, 2016.
Jernej Tonejc, Jaspreet Kaur, Adrian Karsten, and Steffen Wendzel. Visualizing BACnet data to facilitate humans in building-security decision-making. In Proc. Int. Conference Human on Aspects of Information Security, Privacy and Trust (HAS), volume 9190 of LNCS, pages 693–704. Springer, 2015.
Nilufer Tuptuk and Stephen Hailes. Covert channel attacks in pervasive computing. In Proc. 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom), pages 236–242. IEEE, 2015.
Steffen Wendzel, Benjamin Kahler, and Thomas Rist. Covert channels and their prevention in building automation protocols: A prototype exemplified using BACnet. In Proc. IEEE CPSCom Workshop on Security of Systems and Software Resiliency (3SL), pages 731–736. IEEE, November 2012.
Steffen Wendzel, Wojciech Mazurczyk, and Georg Haas. Don’t you touch my nuts: Information hiding in cyber physical systems. In Proc. IEEE Security & Privacy Workshops 2017. IEEE, 2017. in press.
Joanne Hwan Jie Yin, Gan May Fen, Fiza Mughal, and Vahab Iranmanesh. Internet of Things: securing data using image steganography. In Proc. Third International Conference on Artificial Intelligence, Modelling and Simulation, pages 310–314. IEEE, 2015.
Elżbieta Zielińska, Wojciech Mazurczyk, and Krzysztof Szczypiorski. Trends in steganography. Commun. ACM, 57(3):86–95, March 2014.