1. Introduction
Visible light communication (VLC) is one of the newest technologies that has been developed for short and middle range data communication. The implementation of VLC is based on the use of the communication band between 380 nm and 780 nm, which is unlicensed. This technology potentially increases the available bandwidth for wireless communication systems, which currently is quite congested at Radio Frequency (RF) bands due to its massive use [
1].
The use of VLC as a commercial solution is predicted to have a considerable market penetration in the near future due to the advantages the technology brings. VLC provides a flexible communication channel that, according to the standard [
2], allows data transfer rates ranging from 11.67 kb/s to 96 Mb/s. This flexibility is based on the use of three operating modes (PHY I, II and III) of which two (PHY-I and PHY-II) are mandatory to implement. This standard also defines two types of modulation: On–Off Keying (OOK) and Variable Pulse-Position Modulation (VPPM) for the mandated operating modes. VLC uses a different kind of modulation, Color-Shift Keying (CSK), to achieve higher transfer rates for the third operating mode (PHY-III).
Among the multiple benefits that VLC is supposed to bring into the market is the inherited security of the technology. This assumed security is based on the premise that (indoor) light data streams cannot be captured from outside users. Moreover, if a secure channel is required, the Advanced Encryption Standard (AES) with a modified Counter with cipher block chaining message authentication code (CCM*) optional Cryptosystem (AES-CCM*) is specified in the standard. However, no real proof of security has been provided, and no sniffing requirements have been determined.
Reasonable concerns about security have been stated, and some general research into VLC security has been conducted. For example, Mostafa and Lutz in their paper [
3] studied the use of null-steering and artificial noise strategies to achieve positive secrecy rates against eavesdropping attacks. In another paper [
4], the same authors considered using friendly jamming to secure data transmissions through VLC. Additionally, in [
5], Chow, et al. proposed using several LEDs, called intrusion-LEDs, to transmit an interference signal to create a secure area inside which VLC communication was eavesdropping-proof. In [
6], Grzegorz Blinowski studied the risk of snooping, jamming and modifying VLC based communications. In the paper [
7], Classem, et al. considered the theoretical eavesdropping possibility of VLC based communications through keyholes and door gaps. In [
8], a lab test of VLC sniffing using readily available components was performed with positive results. Finally, in a different paper [
9], Prasad, et al. compared Ultra-Wide-Band (UWB) and VLC for Data-Intensive and Security-Sensitive Applications. All the presented works begin to consider the feasibility of VLC for secure data communications and try to determine some security and secrecy boundaries for VLC transmissions.
This concern is based on the expected large amounts of data that, in the near future, will be transmitted through VLC networks [
10,
11]. In addition to this, the information transmitted through VLC, like the one used in geolocation techniques [
12,
13,
14,
15,
16], could be exploited for criminal activities, since the transmitted data could be of great interest for potential attackers. For the stated reasons, further understanding of the security limitations of VLC and its exploitation should be studied and understood for user protection.
To be able to sniff two critical parameters must be accomplished. The power received by the eavesdropper must be enough to correctly “Read” the signal, and the bandwidth of the signal must be big enough so the signal can be discriminated.
In this work, we proposed the study of eavesdropping on a VLC link. To accurately assess the possibilities of such an attack, simulations and practical experiments were performed. In the simulations, the evaluated channel model was used to determine the amount of received power as well as the signal quality. The test was run using an emitter and receiver over 25 m apart and a telescope to increase the gain of the receiver.
This paper is organized as follows:
Section 2 describes the model used for the research.
Section 3 presents the results from the simulation (
Section 5.1) and from the experiments (
Section 3.2).
Section 4 puts into context the results of the previous section and examines the implication those results have for VLC-based systems security.
Section 5 describes the materials and methods used in both the simulation and experiments. Finally, some conclusions reached in this work are presented.
2. Working Model
Indoor VLC links comprise Line-Of-Sight (LOS) and Non-Line-Of-Sight (NLOS) components. LOS components are modeled as the amount of energy radiated by the emitter that directly impacts the receiver. Mathematically, it is calculated as the solid-angle integral of the emitter’s radiation pattern. However, for small photoreceiver area-range relations, the solid angle differential can be approximated by
, yielding as shown in Equation (
1):
where
is the overall optical emitted power,
m is the directivity coefficient of the emitter (assumed a Lambertian one),
is the elevation angle,
is the lens gain which depends on the relative arrival angle
,
is the effective area of the receiver, and
d is the link’s range.
When considering indoor-to-outdoor (or vice versa) links, light travels through windows to reach the receiver. Depending on the type of window, the number of optical interfaces that are crossed vary. However, the simplest scenario implies a single-crystal window and, hence, two interfaces. When traversing an optical interface, light refracts following Snell’s law and an attenuation governed by Fresnel’s equation must be considered. This additional attenuation term can be included in Equation (
1), yielding the following expression, Equation (
2), in which
corresponds to the aforementioned two-interfaces Fresnel loss term and
is the crystal’s refractive index:
If bandwidth estimation was needed, the impulse response could be approximated by the LOS component plus the first-bounce NLOS component. This final element depends on the receiver’s Field of View (FOV), the scenario’s geometry and the walls’ reflection patterns. For instance, in a scenario like the one shown in
Figure 1, the eavesdropper’s bandwidth performance would be much higher than the indoor-located incumbents’ since the FOV limits the incoming contributions to a very narrow region centered on the emitters.
Generally, this situation will be kept in most scenarios, and it could be stated that an eavesdropper in an LOS case will be able to receive a signal with lesser inter-symbol interference (ISI). Nevertheless, there would be considerable received-power constraints and the necessity of high-gain optics, as well as the possibility of suffering sun-based interferences (
Figure 2).
In this type of situation, the Signal-to-Noise Ratio (SNR) could be approximated by using Equation (
3):
where
is the receiver’s responsivity,
q is the electron’s charge,
is the photodiode’s darkness current,
is the average sun’s irradiance,
is the scenario’s albedo,
is Boltzmann’s constant,
T is the receiver’s temperature,
B is the noise bandwidth, and
and
are the amplifier’s noise figure and gain, respectively.
Note that the sun generates both shot noise and offset level. This offset could be high enough to saturate the photoreceiver. Therefore, the receiver’s electrical topology must ensure a proper dynamic range.
4. Discussion
Generally speaking, up until recently, VLC-based solutions were considered a secure way to communicate information since “light could not go through walls”. However, when we consider that most habitats have some window, due to design or regulatory requirements, we have to start thinking that, at least, some information leakage will occur even when some interference sources are emitting to obscure the signal, as has been proposed in [
4,
5]. These interference sources could be circumvented by directing the focus of the eavesdropper to the real emitter.
A first approach to determine the risk of information leakage in VLC channels can be made through a simulation of the environment. In our case, the simulation (
Section 3.1) shows that, even if the more significant amount of leakage is located directly in front of the window, there are significant leakages on the sides, and the higher power density happens to be not in the closest locations but the middle range ones as shown in
Figure 4 and
Table 1.
However, when we observe
Table 1, we note that when we are close to the emitters, such in positions S1 and S3, we get a higher bandwidth (
and 8.16 GHz, respectively). Opposite to the previous situation, we have position S2, located between S1 and S3, where the bandwidth available (24.66 MHz) is smaller than the other two (
and 8.16 GHz). At the same time, the power density received at S2 is the third largest (30.44 mW) after the one at S3 (42.95 mW) and the one at S5 (41.42 mW).
It can also point out that, even if in the first position, S1, we get a higher bandwidth than in almost any other of 16 tested locations, and the power density received is smaller than 12 of those who happen to be farther from the sources. The reason for this is the interference that the multiple sources, which emit the same signal synchronously, create. Therefore, the bandwidth limitation should be considered when eavesdropping since the available bandwidth may make it impossible if it is smaller than the bandwidth used in such communication.
The use of multiple spatially separated sources has been proposed to improve the communication link data rate of VLC [
20,
21] forming visual Multiple-Input Multiple-Output (MIMO)systems. This approach aims to give protection to the data since these coexisting signals can be considered as interference. This method is similar to procedures successfully applied for RF systems, such as in [
22]. However, in the case of VLC eavesdropping techniques, the listener could still attack a MIMO-based link by using image-forming optics and an adequate receiver. Due to the theoretical feasibility of this kind of attack in MIMO systems, the scenario’s geometry could lead to an impracticable situation due to the closeness of the light sources. In this work, only synchronized multi-LED emitters have been considered.
An important aspect when considering the position is the aperture of the receiver. This aperture will influence the outcome significantly the eavesdropping as well as the selection of the location from where the eavesdropping will be conducted. As can be observed in
Figure 5, the site of the receiver changes the list of viewed emitters and therefore the outcome of the attack.
All of these effects should be considered when considering eavesdropping for either defensive purposes or offensive (i.e., penetration tests) ones. For this reason, simulating the environment is an adequate tool for securing the environment to secure. To validate this latest premise, we executed a simulation and several experiments in a known location. As expected, the simulation generated areas of interest from which eavesdropping occurred had a higher possibility of success. The chosen locations are listed in
Table 2.
Of the four chosen locations, from T1 to T4, it was expended, as shown in
Table 3, that the T3 position, having a more direct line of sight to the emitter as the second shortest distance (19.00 m), had the best signal. This preconception happened to be true, and the power density that reached our receiver was twice as high as any of the other positions selected.
The location with the expected better received power density as T1 as it was the closest one to the emitters. When tested, this proved wrong, T4 being the place with the second better-received power density. Since, in the simulation, there was a difference smaller than 4.00%, and the percentage of the emitter viewed by the receiver was higher at the T4 position (64% vs. 20%), measurement errors may justify the discrepancy between expected and tested values.
The power received by the locations located “diagonally” to the emitter, T2 and T4, had a small difference in the simulations—less than 7%. However, this difference increases up to 25% in the tests, as can be seen in
Table 3. At the same time, as is shown in
Table 4, the background interference level obtained during the test increases, as can be expected, with distance making the signal harder to interpret.
When we compare the results of the simulated scenario and the test scenario, it can be observed that, in the case of the experimental one, the power that reached the receivers in the different positions was an order of magnitude than the expected received value (
Table 3). The reason for this incoherence may be the factors that were evaluated. These factors didn’t include, for example, the lamp diffuser or the optoelectrical conversion on the emitter side. These unaccounted losses can explain the difference in magnitudes from the expected received power and the actual received power. Moreover, aiming at a small target and then using a photodiode to capture the signal proved challenging and aiming errors were common. Nevertheless, higher data rate eavesdropping requires higher received power and better SNR as shown in
Table 4. To obtain those demanded SNR values, the attacker, as it was in our case, can play with the focus and gain of the sniffing device and, in general, the attacker can obtain a better SNR than a regular user so the result will benefit the eavesdropper most of the time from the calculated channel capacity, as observed in
Table 4, and the fact that an outdoor located eavesdropper, with a powerful enough optical device, could reduce the incoming energy contributions from interference sources obtaining a purer LOS with the base station. This will conclude that eavesdroppers would generally have better channel capacity than system legit users.
The results seem to validate that it is possible to eavesdrop on a VLC-based channel from outside the premises, as it was previously accepted. Even if the values obtained by the experimental tests (
Table 1) are not the same as the ones obtained from the simulations (
Table 1) by an order of magnitude, the general distribution of the results is similar in both cases. The differences in values may be attributed to unmeasured effects such as the optoelectrical conversion in the emitter, the use of diffusers on the lamp or multiple aiming errors that decreased the received power. These results, in turn, ratify the usefulness of using simulations for select areas, or positions, of interest from which the attack is performed. These elected positions increase the chance of capturing a clear signal and may be located outside the expected attacker’s area. In the case of our experimentation, one such location was diagonally from the window (T4 in
Table 2), which is mostly outside the view from the inside, but provides a clear and powerful enough signal (
Table 4 and
Figure 9d) with or without window panels in between (
Figure 10c,d).
6. Conclusions
In this work, we proposed the study of eavesdropping on a VLC link. To assess such an attack, simulations were performed. To validate the results from the simulations, practical experiments were performed.
The study proved the validity of using geometrical considerations to define potential attacks zones. This study served as the base to choose, from those potential attacks zones, the ones that seemed more adequate. Additionally, the simulations showed that even if the more significant amount of leakage was located directly in front of the window, there are significant leakages on the sides, and the higher power density happened to be not in the closest locations but in the middle range ones. The interference between sources decreased the bandwidth available for eavesdroppers. However, this issue affected both legit and non legit users so it can be minimized when a VLC system is implemented.
An important aspect was the aperture of the receiver. This aperture will influence the outcome significantly, as well as the selection of the location from where the eavesdropping will be conducted. However attackers can modify their receiver’s aperture more freely than legit users.
Although the simulations provide a good starting point, validating those results with experimental testing proved to be a necessity. Due to measurement and aiming errors, the resulting values vary significantly. However, the simulations and the experimental test proved that eavesdropping a VLC link is possible and that the attacker is less limited than previously expected.
In turn, the simulations are useful for selecting areas, or positions, of interest from which the attack may be carried out. These positions increase the chance of capturing a clear signal and may be located outside the expected attacker’s area.
The results seem to validate that it is possible to eavesdrop on a VLC-based channel from outside the premises, as it was previously accepted. Furthermore, this is exploited since the received power can be incremented while the noise can be decreased through optical means.