In this work, we propose a novel framework to identify and mitigate a recently disclosed covert channel scheme exploiting unprotected broadcast messages in cellular MAC layer protocols. Examples of covert channel are used in data exfiltration, remote command-and-control (CnC) and espionage. Responsibly disclosed to GSMA (CVD-2021-0045), the SPARROW covert channel scheme exploits the downlink power of LTE/5G base-stations that broadcast contention resolution identity (CRI) from any anonymous device according to the 3GPP standards. Thus, the SPARROW devices can covertly relay short messages across long-distance which can be potentially harmful to critical infrastructure. The SPARROW schemes can also complement the solutions for long-range M2M applications. This work investigates the security vs. performance trade-off in CRI-based contention resolution mechanisms. Then it offers a rigorously designed method to randomly obfuscate CRI broadcast in future 5G/6G standards. Compared to CRI length reduction, the proposed method achieves considerable protection against SPARROW exploitation with less impact on the random-access performance as shown in the numerical results.
翻译:在这项工作中,我们提出了一个新框架,用以确定和减轻最近披露的利用手机MAC层协议中无保护广播信息的秘密频道计划,在数据过滤、远程指挥和控制(CnC)和间谍活动中使用了秘密频道的例子,向GSMA(CVD-2021-0045)负责披露了SPARROW秘密频道计划,利用LTE/5G基地站的下行联系能力,根据3GPP标准从任何匿名设备中广播争议识别(CRI),因此,SPARROW装置可以秘密地将短信息传送到长途上,这可能会对关键基础设施造成危害。SPARROW计划还可以补充远程M2M应用程序的解决方案。这项工作调查安全情况与基于CRI争议解决机制的绩效交易情况。随后,它提供了严格设计的方法,随机混淆未来5G/6G标准中的CREC广播。与CRIC缩短长度相比,拟议方法取得了相当大的保护,防止SPARROW开发对数字结果显示的随机访问性能的影响较小。