4.6 Article

Research on a Covert Communication Model Realized by Using Smart Contracts in Blockchain Environment

Journal

IEEE SYSTEMS JOURNAL
Volume 16, Issue 2, Pages 2822-2833

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2021.3057333

Keywords

Blockchain; Smart contracts; Receivers; Heuristic algorithms; Encryption; Bitcoin; Information processing; Blockchain; covert communication; information security; smart contract; steganography

Funding

  1. Natural Science Foundation of Heilongjiang Province of China [LC2016024]
  2. Natural Science Foundation of the Jiangsu Higher Education Institutions [17KJB520044]
  3. Six Talent Peaks Project in Jiangsu Province [XYDXX-108]

Ask authors/readers for more resources

The combined covert communication model using smart contracts in the blockchain environment improves the concealment and security of communication, providing a tamper-resistant and low complexity solution.
The traditional covert communication channel relying on a third-party node is vulnerable to attack. The data are easily tampered with and the identity information of the communication party is fragile. Blockchain has the characteristics of decentralization and tamper resistance, which can effectively solve the above problems. In addition, some confidential information needs to be transmitted covertly in the transparent blockchain. A smart contract deployed in the blockchain to automatically realize its function can replace a centralized node to provide credible guarantee for communication. The diversity of parameters, data redundancy, and code programmability of smart contract make it an excellent carrier for covert communication under blockchain. In this article, we propose a covert communication model combined with smart contracts to covertly transfer information in the blockchain environment. To implement this model, we use the parameters in the contract to map the secret information sequence, and call the contract to transfer message. Voting contract and secret bidding contract are combined to instantiate the proposed model, and optimized versions of the two contracts are also proposed to reduce costs. Moreover, we use encryption algorithms and two-round protocols to ensure data privacy and design corresponding information embedding and transmission methods for different scenarios. To improve the concealment of communication, redundant options, effective price ranges, and invalid bids are set in two contracts, respectively. The experimental results show that the proposed model has tamper resistance and low complexity, and it is feasible to use this model for covert communication.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available