Practical Covert Channels For WiFi Systems
Practical Covert Channels For WiFi Systems
Practical Covert Channels For WiFi Systems
Abstract—Wireless covert channels promise to exfiltrate in- instance, an online banking application could establish a secure
formation with high bandwidth by circumventing traditional connection to a server but maliciously publish login data over
access control mechanisms. Ideally, they are only accessible by a covert wireless physical channel.
the intended recipient and—for regular system users/operators— WiFi covert channels have been mostly studied in theory
indistinguishable from normal operation. While a number of
arXiv:1505.01081v1 [cs.NI] 5 May 2015
exp(2πfc,tx t)
STF LTF ...
TX
Channel
H Insert Add Insert Symbol Bit Stream
PA DAC IFFT Data
STF, LTF CP Pilots Mapper Construct.
RX
LNA ADC Coarse Symbol Delete FFT H Estimate Symbol Bit Stream Data
AGC CFO Timing CP Fine CFO Demap. Reconstr.
A. Security Model
To secure a system against covert channels, there are two (a) Transmitter (b) Receivers
main procedures: either detecting or blocking them. Blocking
can be implemented by a wireless jammer [3], [21], though WARP Transmitter WARP Receiver
jamming all wireless transmissions including legitimate ones 5m
is not an option. Since there are no further processing steps Laptop Receiver
between sending and receiving a signal, there is no possi-
bility to filter signal variations for covert channel blocking.
Detecting covert channels to take further actions such as (c) Panorama of the lab setup.
jamming or sender identification does not prevent legitimate Fig. 3: Antenna setup for practical measurements.
wireless transmissions. Sending attackers could be identified Kerckhoff’s law, information passed to upper layers is often
using localization methods or device fingerprinting; however, insufficient for detecting high throughput covert channels.
fingerprints can be modified [17], and localization requires
multiple antennas. B. Setup
A covert channel should be secure against detection, even We analyze the performance of covert channels in simula-
if the information hiding mechanism is known. Detection tion and practice using the following setups.
security limits the capacity of covert channels. Legitimate 1) Simulation: We evaluate if the proposed covert channels
wireless transmissions containing a covert data have to be are feasible utilizing diverse channel models: A (no fading), B
indistinguishable from regular transmissions. Yet, the overall (residential), D (typical office), and E (large office) defined in
wireless capacity is limited and a high capacity covert channel [7] and commonly used for WiFi simulations. To each model,
might noticeably reduce legitimate throughput. we add white Gaussian noise (AWGN) and base our results
Layer 1 detection. On the physical layer, detection re- on 1000 Monte-Carlo simulations.
quires software defined radios (SDRs) or signal analyzers to 2) Practical Setup: Since simulations might disregard the
capture the raw waveforms to measure error vector magnitudes behavior of real hardware, we evaluate all covert channels
(EVMs), CFOs, and SNRs. A detector could compare these in our lab environment (see Figure 3). This evaluation is
measurements to a benchmark set of typical values in wireless twofold. We use WARPs to transmit and receive 802.11g
transmissions, and check which of them deviate significantly frames between Alice and Bob with covert channels. On the
from a certain margin of statistical tolerance. Hence, an receiver we can extract and analyze both, the WiFi frame
attacker should aim at keeping variations with respect to content and the covert channel. Hence, the WARP receiver
the signal relatively low, and let them only be remarkable can be considered as detector (Wendy) on Layer 1 as well as
in case a secret key is known, thus following Kerckhoff’s on the covert channel receiver (Bob). The signal processing
principle; which is reducing the actual possible covert channel on both nodes is implemented in MATLAB which connects to
throughput. the WARPs using WARPLab 7.5.0.
In this paper, we aim at showing the potential of practical To analyze the effect on off-the-shelf WiFi devices, we
and 802.11a/g compliant covert channels. Providing an upper use a laptop as detector (Wendy) on Layer 2 with a Qualcom
bound of performance, we do not implement statistical detec- Atheros AR9285 Wireless Network Adapter (revision 01) that
tion countermeasures; however, we give some intuition into we run in monitor mode with radiotap headers.
how they work in each channel covert description.
IV. C OVERT C HANNELS
Layer 2 detection. An upper layer detector is using off-
the-shelf wireless NICs. Even though this is not sufficient In what follows, we present four practical covert channels
equipment to record ongoing transmissions on the physi- for the physical layer of 802.11a/g.
cal layer, information passed to upper layers might indicate 1) A covert channel utilizing the Short Training Field in
whether a covert channel is present. combination with Phase Shift Keying (STF PSK).
Frames are validated on reception using the frame check 2) A covert channel utilizing the Carrier Frequency
sequence (FCS) [20]. If it fails, the frame is dropped by Offset with Frequency Shift Keying (CFO FSK).
default. Higher layers can only rely on irregularities in timing 3) A covert channel using 802.11a/g with additional
or throughput to detect covert channels. In our evaluation, subcarriers conforming to the 802.11n spectrum mask
we enable the capture of those frames having failed FCS (Camouflage Subcarriers).
checks using radiotap headers [1] to calculate actual BERs. 4) A covert channel replacing parts of the OFDM Cyclic
Radiotap headers are supported by various chipsets and for- Prefix (Cyclic Prefix Replacement).
ward additional information, such as the transmission’s center The schemes “STF PSK” and “CFO FSK” are new, “Cam-
frequency, RF signal and noise power at the antenna, and the ouflage Subcarriers” and “Cyclic Prefix Replacement” are
FCS. Detectors can correlate all this information, for instance, extensions and improvements to [11] and [10], respectively.
an increase of packet loss despite a constant RF signal power. To the best of our knowledge, none of the approaches were
Still, radiotap headers do not provide the raw signal. Applying put into practice before.
A. Short Training Field with Phase Shift Keying (STF PSK) I ∆Φ
Each 802.11a/g frame starts with the same STF in the
preamble, which is used for frame detection, automatic gain Q
control (AGC), and coarse CFO estimation. STF manipulations
must preserve these capabilities at the receiver, otherwise the
signal can not be demodulated. Implementing a covert channel (a) theoretical (b) measurement
in the STF allows to insert one symbol per WiFi frame that is
impossible to block even after detection. Fig. 4: STF PSK symbols are shifted by ∆φ to encode bits.
1) Implementation: The STF contains binary phase-shift
keying (BPSK) symbols that are shifted by 45◦ as illustrated BPSK QPSK
in Figure 4a. We insert our covert channel by introducing an −1 8-PSK 16-PSK
10
additional phase shift ∆φ into all STF symbols. As phase shifts
BER
32-PSK 64-PSK
do not change the power and correlation properties of the STF, 10−2 128-PSK 256-PSK
it can still be used for AGC and packet detection. Additionally, 512-PSK 1024-PSK
the periodicity required for CFO correction is preserved. 10−3
5 10 15 20 25 30 35 40
Per WiFi frame, we insert one phase shift. Depending on
the number of bits we intend to encode, we vary the number of SNRdB
possible phase shift values mapped to bits using Gray coding.
Fig. 5: Raw BER of the covert channel implemented as STF
To extract the covert channel information, the receiver needs
PSK scheme over an AWGN channel for different amounts of
to compensate the channel effects in the STF using the LTF
bits per frame.
channel estimation.
Then, ∆φ can be extracted and demapped to bits. In
Figure 4b, we illustrate this process with 32 possible phase 60 %
256-PSK
the original STF symbol positions, and the cloud of blue dots 40 %
30 %
are the received STF symbols from which we extract the phase
128-PSK
20 %
32-PSK
64-PSK
difference to the original symbol positions. 10 %
2) Performance: Assuming we transmit WiFi frames with 0%
STF phase shift keying (PSK) covert data over AWGN chan- AWGN B D E
nels without fading, we can reach the BERs illustrated in Channel Model
Figure 5. The more bits we encode in the STF, the smaller the
distance between the phase steps. This results in an increased (a) Simulation with 24 Mbps WiFi frames (SNR = 25 dB).
BER. For a typical 25 dB SNR, 6 covert bits per STF can be 60 %
Covert Channel BER
10 kHz
20 kHz
1 kHz
5 kHz
(see Figure 7). Their difference results in CFO, which needs to 10 %
be corrected, together with additional CFO due to the Doppler 0%
AWGN B D E
effect. WiFi receivers are capable of correcting CFOs by
tracking the pilots that are inserted into each OFDM symbol. Channel Model
We introduce an artificial fCFO at the transmitter as covert
channel. Regular WiFi receivers silently correct fCFO , while Fig. 10: CFO FSK covert channel simulation with 24 Mbps
covert channel receivers can extract the hidden information. WiFi frames (SNR = 25 dB).
35 %
1) Implementation: To encode bits, the transmitter maps 30 %
no covert channel
Frame BER
25 %
them to the two frequencies ±∆CFO , each with a symbol length 20 %
of an OFDM symbol (4 µs). The resulting complex waveform 15 %
20 kHz
is multiplied with the time-domain signal of the WiFi frames
10 kHz
10 %
1 kHz
5 kHz
5%
in the baseband. This shifts each OFDM symbol by ±∆CFO 0%
in the frequency-domain, depending on the encoded bit. AWGN B D E
A covert channel receiver estimates the phase shifts of Channel Model
the pilot symbols for each OFDM symbol, as illustrated in
Figure 8. The covert CFO changes are superimposed by an (a) Simulation with 24 Mbps WiFi frames (SNR = 25 dB).
additional slowly varying CFO. To extract bits despite further 35 %
CFO components, the receiver first lowpass filters the CFO
no covert channel
30 %
Frame BER
25 %
estimate and uses it as a threshold for a hard decision decoder. 20 %
The six outer bits on both sides are discarded as they contain
20 kHz
15 %
10 kHz
many bit errors. The lowpass filter is implemented as 20-tap 10 %
1 kHz
5 kHz
5%
finite impulse response (FIR) filter, which requires at least 60 0%
OFDM symbols to work correctly. WARP raw BER WARP eff. BER WiFi eff. BER
0
CFO 100 5000 Hz 20000 Hz
BER
−1
fCFO fc,tx fc,rx
10−2
−2
TX RX 20 40 60 80 100 5 10 15 20 25 30 35 40
Fig. 8: Frequency offset measurement Fig. 9: Raw BER of the CFO FSK
Fig. 7: We introduce artificial CFO fCFO of each received OFDM symbol show- covert channel over AWGN channels
into each OFDM symbol in the baseband. ing the binary shift keying modulation. with different ∆CFO .
C. Camouflage Subcarriers 20 MHz mask with CS w/o CS
Spectrum [dBr]
The camouflage subcarrier covert channel hides informa- 0
tion in subcarriers used in other protocol variants. In 802.11a/g,
52 subcarriers are used for 48 data and 4 pilot transmis- −20
BER
the 802.11n HT-LTF, which is still correlating with the LTF, 64-QAM
thus allowing a proper timing synchronization at the receiver. 10−2
Additionally, the covert receiver can estimate the channel
effects of the camouflage subcarriers. 10−3
5 10 15 20 25 30 35 40
2) Performance: When comparing Figure 13 to Figure 2,
it is obvious that the covert subcarriers perform very similar SNRdB
to the normal subcarriers. Depending on channel effects and
Fig. 13: Raw BER of the camouflage subcarriers over AWGN.
output filters, it might happen that the outer subcarriers have a
slightly different performance, though. Covert subcarrier per- 35 %
Covert Channel BER 30 %
formance for different channel models is depicted in Figure 14.
25 %
Assuming camouflage and normal subcarrier performance are
20 %
similar, the covert channel performance is 8.3 % of the normal
64-QAM
15 %
channel throughput.
16-QAM
10 %
QPSK
BPSK
In our experiments, we vary the rate of the camouflage sub- 5%
carriers, while keeping the rate of the regular WiFi data fixed. 0%
AWGN B D E
Figure 14 compares simulation results of camouflage subcar-
riers. Experimental results are not illustrated—the WARP-to- Channel Model
WARP channel in our lab is quite good and no errors occur
in the camouflage subcarriers for all modulation orders. Fig. 14: BER of covert camouflage subcarriers in simulation
with 24 Mbps WiFi frames (SNR = 25 dB).
3) Detection: Layer 1. A Layer 1 detector that can decode
the signal field is able to determine if the number of subcarriers Covert ... f
(TX)
within the signal is correct. However, only checking the
spectrum will not reveal the covert channel, as it is still valid
Covert
and conforms to the standard 802.11n. +
Normal
Layer 2. A Layer 2 detector has insufficient information
since neither normal subcarrier performance decreases nor Covert t
interference with neighboring channels occurs. Even further (RX)
(b) Effect of a smaller
subcarriers can be used to increase covert channel throughput (a) CP cutting and embedding within FFT size for covert sym-
as long as the neighboring channels do not overlap, but this one subcarrier in the time-domain. bols within one CP.
could be easily detected on Layer 1. Our results show that
adding camouflage subcarriers does neither increase BERs in Fig. 15: CP replacement methods compared.
simulation nor in practice. 100
BPSK
QPSK
D. Cyclic Prefix Replacement 10−1 16-QAM
Multipath effects and timing offsets during demodulation
BER
64-QAM
cause overlapping OFDM symbol parts, called inter-symbol in- 10−2
full CP rep.
terference (ISI). In 802.11a/g, a cyclic prefix (CP) is prepended 1/2 CP rep.
CP with CPCP
CP no CPCP
40 %
are limited to AWGN channels with neither fading nor ISI. 30 %
Hence, the CP is not required at all. In practice, we could not 20 %
full CP
reproduce such optimistic results. 10 %
1/2
1/2
1) Implementation: There are basically two ways of em- 0%
bedding data in the CP. In the first approach, four CPs are AWGN B D E
combined to obtain a symbol of regular length. In a practical Channel Model
channel instead of the AWGN channel proposed in [10], (a) Simulation with 24 Mbps WiFi frames (SNR = 25 dB).
fading effects disturb samples near to concatenation points.
A solution is shown in Figure 15a, where the covert symbols
are distributed to multiple CPs with some overlapping samples.
1/2 CP no CPCP
4, or 2 at the cost of covert throughput. Prepending a CP to Frame BER
25 %
the covert channel in the CP (called CPCP) even removes ISI 20 %
15 %
inside the covert channel. In our experiments, we add a CPCP
full CP
10 %
5%
of 2 samples to the 1/2 CP replacement scheme. 0%
2) Performance: The performance of the CP replacement AWGN B D E
covert channel is very high. Figure 16 compares BERs for Channel Model
different CP replacement strategies in an AWGN channel. Re- (a) Simulation with 24 Mbps WiFi frames (SNR = 25 dB).
placing shorter parts of the CP results in more errors. Adding a
CPCP does not help in an AWGN channel because the channel
35 %
CP with CPCP
no covert channel
30 %
simulations illustrated in Figure 17a, the CPCP significantly
Frame BER
25 %
20 %
decreases the covert channel BERs. In our lab environment,
full CP
15 %
the CPCP is required and very effective: it reduces the BER to 10 %
5%
0% as shown in Figure 17b. Depending on the actual amount
1/2
1/2
0%
of multipath effects, a higher CPCP length is reasonable. WARP raw BER WARP eff. BER WiFi eff. BER
Throughput of full CP replacement is 25 % of the cor- (b) WARP-to-WARP/Laptop measurement with 54 Mbps WiFi
responding WiFi frame throughput, if multipath effects are frames.
neglected. For 1/2 CP replacement, the maximum throughput Fig. 18: BER of WiFi frames with CP replacement at legiti-
is reduced to 12.5% of the WiFi frame throughput. Hence, mate receivers.
even with the CPCP improvement for less transmission errors,
this covert channel has good performance.
3) Detection: Layer 1. A physical layer detector can 20 MHz mask with rep. w/o rep.
Spectrum [dBr]
TABLE I: Summary of the analyzed covert channels. The exemplary performance values use our lab setup. Covert and
legitimate channel have a median raw BER of below 0.1% and use optimal settings for the covert channel.
Field (FCF) More Frag, Retry, PwrMgt, More Data as well as R EFERENCES
the 802.11 header fields Duration/ID and FCS. In [13], timings [1] Radiotap. radiotap.org.
of Retry bits indicating retransmissions are used to encode [2] WARP project. warpproject.org.
information. Hiding wireless access points by swapping fields [3] E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and
with an Atheros and madwifi-ng is realized in [5]. B. Thapa. Performance of IEEE 802.11 under jamming. Mobile
Wireless physical layer covert channels are rare, but they Networks and Applications, 18(5):678–696, 2013.
are more generic. Hence, related work in this area is not [4] K. M. Borle, B. Chen, and W. Du. A physical layer authentication
scheme for countering primary user emulation attack. In International
only on 802.11g but on OFDM based systems in general. In Conference on Acoustics, Speech and Signal Processing (ICASSP),
[11], the usage of additional subcarriers in LTE and WiMAX pages 2935–2939. IEEE, 2013.
is evaluated in simulation. The model assumes that covert [5] L. Butti and F. Veysset. Wi-Fi Advanced Stealth. Proceedings Black
sender and normal sender are different identities, therefore Hat US, Aug 2006.
their timing offset impacts subcarrier orthogonality. 802.11n [6] A. Dutta, D. Saha, D. Grunwald, and D. Sicker. Secret agent radio:
physical layer steganography using the CP is proposed in [10]. Covert communication through dirty constellations. In M. Kirchner and
In a simple AWGN based simulation, they archive a data rate D. Ghosal, editors, Information Hiding, volume 7692 of Lecture Notes
in Computer Science, pages 160–175. Springer, 2013.
as high as 1/4 of the normal channel without degradation.
[7] V. Erceg et al. TGn channel models. IEEE 802.11-03/940r4, 2004.
To the best of our knowledge, there is only one wireless
[8] L. Frikha and Z. Trabelsi. A new covert channel in WiFi networks. In
physical layer covert channel that was put into practice: dirty Third International Conference on Risks and Security of Internet and
IQ constellations for 802.11a/g [6]. The authors define four Systems (CRiSIS), pages 255–260, Oct 2008.
IQ constellations in addition to the four raw QPSK points. [9] N. Goergen, W. S. Lin, K. R. Liu, and T. C. Clancy. Authen-
This way, they can reach up to the same covert throughput ticating MIMO transmissions using channel-like fingerprinting. In
as normal throughput. To circumvent detection, they modified Global Telecommunications Conference (GLOBECOM), pages 1–6.
constellations to use a Gaussian distribution, and compared IEEE, 2010.
them to regular noisy signals. However, when we tried to [10] S. Grabski and K. Szczypiorski. Steganography in OFDM symbols
of fast IEEE 802.11n networks. In Security and Privacy Workshops
reproduce their results including the obfuscation mechanism, (SPW), pages 158–164. IEEE, 2013.
we had to cope with a high amount of bit errors, especially in [11] Z. Hijaz and V. Frost. Exploiting OFDM systems for covert commu-
more complex channel models. nication. In Military Communications Conference (MILCOM), pages
A related topic to covert channels is watermarking of 2149–2155, Oct 2010.
signals, allowing for identification and authorization on a phys- [12] C. Krätzer, J. Dittmann, A. Lang, and T. Kühne. WLAN steganography:
ical layer basis. For this, an authentication tag is embedded. a first practical review. In Proceedings of the 8th workshop on
In [19], cognitive radio primary users add phase noise to Multimedia and security, pages 17–22. ACM, 2006.
QPSK symbols to authenticate themselves while maintaining [13] C. Krätzer, J. Dittmann, and R. Merkel. WLAN steganography revisited.
In Electronic Imaging, pages 681903–681903. International Society for
backward compatibility to secondary users who are not aware Optics and Photonics, 2008.
of this scheme. A similar scheme for a non-return-to-zero [14] V. Kumar, J.-M. Park, T. C. Clancy, and K. Bian. PHY-layer authenti-
encoding is proposed in [14] by embedding authentication tags cation using hierarchical modulation and duobinary signaling. In Inter-
in redundant information reducing ISI. A fingerprint can also national Conference on Computing, Networking and Communications
be added to the channel state before sending, assuming only (ICNC), pages 782–786. IEEE, 2014.
small channel changes between transmissions, users knowing [15] B. W. Lampson. A note on the confinement problem. Commun. ACM,
the previous channel state can extract the fingerprint [9]. The 16(10):613–615, Oct 1973.
QPSK scheme is secured against user emulation attacks in [16] D. Martins and H. Guyennet. Attacks with steganography in PHY and
MAC layers of 802.15.4 protocol. In Fifth International Conference on
[4] by adapting the phase distortion to the current SNR. Systems and Networks Communications (ICSNC), pages 31–36, Aug
However, all these schemes were only verified in simulations. 2010.
A practical implementation adding further IQ constellations as [17] S. U. Rehman, K. W. Sowerby, and C. Coghill. Analysis of imperson-
in [6] without Gaussian distribution is shown in [22]. ation attacks on systems using RF fingerprinting and low-end receivers.
Journal of Computer and System Sciences, 80(3):591 – 601, 2014.
VII. C ONCLUSION Special Issue on Wireless Network Intrusion.
In this paper, we show that physical layer WiFi covert [18] K. Szczypiorski. HICCUPS: hidden communication system for cor-
rupted networks. In International Multi-Conference on Advanced
channels are feasible in practice. We design novel covert Computer Systems, pages 31–40, 2003.
channels and improve known ones. Our work is—to the best of
[19] X. Tan, K. Borle, W. Du, and B. Chen. Cryptographic link signatures
our knowledge—the first one to characterize various OFDM- for spectrum usage authentication in cognitive radio. In Proceedings of
based covert channels in practical settings. Based on our the fourth ACM conference on Wireless network security, pages 79–90.
results, we discuss pros and cons of the covert channels with ACM, 2011.
respect to their performance as well as their detectability. With [20] The Institute of Electrical and Electronic Engineers, Inc. IEEE standard
this, we provide a first compendium for practical physical layer 802.11-2012. IEEE Standard for Information technology, 2012.
WiFi covert channels, which facilitates the understanding of [21] M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders. WiFire: a
this potential attack vector. firewall for wireless networks. In Proc. SIGCOMM, 2011.
[22] P. L. Yu, J. S. Baras, and B. M. Sadler. Physical-layer authentication.
Transactions on Information Forensics and Security, 3(1):38–51, 2008.
ACKNOWLEDGMENTS
This work has been funded by the German Research Foundation (DFG) in the [23] S. Zander, G. Armitage, and P. Branch. A survey of covert channels and
Collaborative Research Center (SFB) 1053 “MAKI – Multi-Mechanism-Adaptation for countermeasures in computer network protocols. IEEE Communications
the Future Internet” and by LOEWE CASED. We thank Halis Altug, Athiona Xhoga and Surveys Tutorials, 9(3):44–57, Third 2007.
Stephan Pfistner for the implementation of the first prototypes.