Abstract
Covert channels aim to conceal the communication behaviors and are widely applied to transmit sensitive data. Blockchains are well-suited for building state-of-the-art covert channels due to their decentralization property. Most existing blockchain-based covert channels require the sender to create transactions. Creating transactions requires a fee, and transactions with covert information are permanently stored on the blockchain. Implementing such methods needs a high cost, and the on-chain covert information faces the risk of being exposed. In this paper, we first propose a Bitcoin-based covert channel that rearranges the transaction hashes in Bitcoin inv packets. To improve undetectability and transmission efficiency, we further propose a dynamic channel link scheme and a method for establishing channels with multiple receiving nodes. The dynamic channel link scheme provides the ability to change the connection between the sender and the receiver at any moment. The multiple receiving nodes method linearly increases the transmission efficiency according to the number of nodes. Theoretical and experimental analysis shows that our scheme is undetectable and has higher transmission efficiency than existing schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Transaction fees in bitcoin. https://bitinfocharts.com/zh/comparison/bitcoin-transactionfees.html/. Accessed 2 Feb 2023
Ali, S.T., McCorry, P., Lee, P.H.-J., Hao, F.: ZombieCoin: powering next-generation botnets with bitcoin. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015. LNCS, vol. 8976, pp. 34–48. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48051-9_3
Bartoletti, M., Pompianu, L.: An analysis of bitcoin OP_RETURN metadata. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 218–230. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70278-0_14
Basuki, A.I., Rosiyadi, D.: Joint transaction-image steganography for high capacity covert communication. In: 2019 International Conference on Computer, Control, Informatics and its Applications (IC3INA), pp. 41–46. IEEE (2019)
Fionov, A.: Exploring covert channels in bitcoin transactions. In: 2019 International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON), pp. 0059–0064. IEEE (2019)
Franzoni, F., Abellan, I., Daza, V.: Leveraging bitcoin testnet for bidirectional botnet command and control systems. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 3–19. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-51280-4_1
Frkat, D., Annessi, R., Zseby, T.: ChainChannels: private botnet communication over public blockchains. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1244–1252. IEEE (2018)
Gianvecchio, S., Wang, H.: An entropy-based approach to detecting covert timing channels. IEEE Trans. Dependable Secure Comput. 8(6), 785–797 (2010)
Hartl, A., Annessi, R., Zseby, T.: A subliminal channel in EdDSA: information leakage with high-speed signatures. In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, pp. 67–78 (2017)
Liu, S., et al.: Whispers on ethereum: blockchain-based covert data embedding schemes. In: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, pp. 171–179 (2020)
Llamas, D., Allison, C., Miller, A.: Covert channels in internet protocols: a survey. In: Proceedings of the 6th Annual Postgraduate Symposium about the Convergence of Telecommunications, Networking and Broadcasting, PGNET, vol. 2005 (2005)
Nakamoto, S., Bitcoin, A.: A peer-to-peer electronic cash system. Bitcoin, vol. 4, p. 2 (2008). https://bitcoin.org/bitcoin.pdf
Partala, J.: Provably secure covert communication on blockchain. Cryptography 2(3), 18 (2018)
Sleiman, M.D., Lauf, A.P., Yampolskiy, R.: Bitcoin message: data insertion on a proof-of-work cryptocurrency system. In: 2015 International Conference on Cyberworlds (CW), pp. 332–336. IEEE (2015)
Tian, J., **ong, G., Li, Z., Gou, G.: A survey of key technologies for constructing network covert channel. Secur. Commun. Netw. 2020, 1–20 (2020)
Acknowledgments
This work is supported by the National Key Research and Development Program of China (Grant No. 2020YFB1006100) and the National Natural Science Foundation of China (Grant No. 62232002).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liu, Q., Chen, Z., Gao, F., Zhu, L. (2024). Rearranging Inv Message in the Bitcoin to Construct Covert Channels. In: Chen, J., Wen, B., Chen, T. (eds) Blockchain and Trustworthy Systems. BlockSys 2023. Communications in Computer and Information Science, vol 1897. Springer, Singapore. https://doi.org/10.1007/978-981-99-8104-5_10
Download citation
DOI: https://doi.org/10.1007/978-981-99-8104-5_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-8103-8
Online ISBN: 978-981-99-8104-5
eBook Packages: Computer ScienceComputer Science (R0)