Next Article in Journal
Micro-Droplet Detection Method for Measuring the Concentration of Alkaline Phosphatase-Labeled Nanoparticles in Fluorescence Microscopy
Next Article in Special Issue
An Experimental Study of a Micro-Projection Enabled Optical Terminal for Short-Range Bidirectional Multi-Wavelength Visible Light Communications
Previous Article in Journal
A Similarity Analysis of Audio Signal to Develop a Human Activity Recognition Using Similarity Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Study and Validation of Eavesdropping Scenarios over a Visible Light Communication Channel

by
Ignacio Marin-Garcia
1,2,*,†,
Victor Guerra
2,† and
Rafael Perez-Jimenez
2,†
1
Facultad de Ingenieria en Electricidad y Computacion, Escuela Superior Politecnica del Litoral (ESPOL), P.O. Box 09-01-5863 Guayaquil, Ecuador
2
Instituto para el Desarrollo de las Telecomunicaciones (IDeTIC), Universidad de las Palmas de Gran Canaria, 35001 Las Palmas de Gran Canaria, Spain
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2017, 17(11), 2687; https://doi.org/10.3390/s17112687
Submission received: 3 October 2017 / Revised: 10 November 2017 / Accepted: 17 November 2017 / Published: 21 November 2017
(This article belongs to the Special Issue Visible Light Communication Networks)

Abstract

:
The security and privacy provided by Visible Light Communication (VLC) technologies is an area that has been slightly addressed due to the misconception that, since light does not go through solid objects like walls, VLC-based communications cannot be eavesdropped on by outside observers. As an upcoming technology, VLC is expected to be used in multiple environments were, due to radio frequency RF overuse or limitations, RF solutions cannot or should not be employed. In this work, we study the eavesdropping characteristics of a VLC-based communication. To evaluate these concerns, a two-step process was followed. First, several simulations of a standardly used scenario were run. Later on, experimental tests were performed. Following those tests, the results of the simulations and the experimental tests were analyzed. The results of these simulations and tests seemed to indicate that VLC channels can be eavesdropped on without considerable difficulties. Furthermore, the results showed that sniffing attacks could be performed from areas outside the expected coverage of the VLC infrastructure. Finally, the use of the simulation such as the one implemented in this work to recognize places from which sniffing is possible helps determine the risk for eavesdropping that our VLC-based network has.

1. Introduction

Visible light communication (VLC) is one of the newest technologies that has been developed for short and middle range data communication. The implementation of VLC is based on the use of the communication band between 380 nm and 780 nm, which is unlicensed. This technology potentially increases the available bandwidth for wireless communication systems, which currently is quite congested at Radio Frequency (RF) bands due to its massive use [1].
The use of VLC as a commercial solution is predicted to have a considerable market penetration in the near future due to the advantages the technology brings. VLC provides a flexible communication channel that, according to the standard [2], allows data transfer rates ranging from 11.67 kb/s to 96 Mb/s. This flexibility is based on the use of three operating modes (PHY I, II and III) of which two (PHY-I and PHY-II) are mandatory to implement. This standard also defines two types of modulation: On–Off Keying (OOK) and Variable Pulse-Position Modulation (VPPM) for the mandated operating modes. VLC uses a different kind of modulation, Color-Shift Keying (CSK), to achieve higher transfer rates for the third operating mode (PHY-III).
Among the multiple benefits that VLC is supposed to bring into the market is the inherited security of the technology. This assumed security is based on the premise that (indoor) light data streams cannot be captured from outside users. Moreover, if a secure channel is required, the Advanced Encryption Standard (AES) with a modified Counter with cipher block chaining message authentication code (CCM*) optional Cryptosystem (AES-CCM*) is specified in the standard. However, no real proof of security has been provided, and no sniffing requirements have been determined.
Reasonable concerns about security have been stated, and some general research into VLC security has been conducted. For example, Mostafa and Lutz in their paper [3] studied the use of null-steering and artificial noise strategies to achieve positive secrecy rates against eavesdropping attacks. In another paper [4], the same authors considered using friendly jamming to secure data transmissions through VLC. Additionally, in [5], Chow, et al. proposed using several LEDs, called intrusion-LEDs, to transmit an interference signal to create a secure area inside which VLC communication was eavesdropping-proof. In [6], Grzegorz Blinowski studied the risk of snooping, jamming and modifying VLC based communications. In the paper [7], Classem, et al. considered the theoretical eavesdropping possibility of VLC based communications through keyholes and door gaps. In [8], a lab test of VLC sniffing using readily available components was performed with positive results. Finally, in a different paper [9], Prasad, et al. compared Ultra-Wide-Band (UWB) and VLC for Data-Intensive and Security-Sensitive Applications. All the presented works begin to consider the feasibility of VLC for secure data communications and try to determine some security and secrecy boundaries for VLC transmissions.
This concern is based on the expected large amounts of data that, in the near future, will be transmitted through VLC networks [10,11]. In addition to this, the information transmitted through VLC, like the one used in geolocation techniques [12,13,14,15,16], could be exploited for criminal activities, since the transmitted data could be of great interest for potential attackers. For the stated reasons, further understanding of the security limitations of VLC and its exploitation should be studied and understood for user protection.
To be able to sniff two critical parameters must be accomplished. The power received by the eavesdropper must be enough to correctly “Read” the signal, and the bandwidth of the signal must be big enough so the signal can be discriminated.
In this work, we proposed the study of eavesdropping on a VLC link. To accurately assess the possibilities of such an attack, simulations and practical experiments were performed. In the simulations, the evaluated channel model was used to determine the amount of received power as well as the signal quality. The test was run using an emitter and receiver over 25 m apart and a telescope to increase the gain of the receiver.
This paper is organized as follows: Section 2 describes the model used for the research. Section 3 presents the results from the simulation (Section 5.1) and from the experiments (Section 3.2). Section 4 puts into context the results of the previous section and examines the implication those results have for VLC-based systems security. Section 5 describes the materials and methods used in both the simulation and experiments. Finally, some conclusions reached in this work are presented.

2. Working Model

Indoor VLC links comprise Line-Of-Sight (LOS) and Non-Line-Of-Sight (NLOS) components. LOS components are modeled as the amount of energy radiated by the emitter that directly impacts the receiver. Mathematically, it is calculated as the solid-angle integral of the emitter’s radiation pattern. However, for small photoreceiver area-range relations, the solid angle differential can be approximated by d Ω A p d / d 2 , yielding as shown in Equation (1):
P r x P t x m + 1 2 π cos m ( θ ) G l e n s A e f f d 2 ,
where P t x is the overall optical emitted power, m is the directivity coefficient of the emitter (assumed a Lambertian one), θ is the elevation angle, G ( ψ ) is the lens gain which depends on the relative arrival angle ψ , A e f f is the effective area of the receiver, and d is the link’s range.
When considering indoor-to-outdoor (or vice versa) links, light travels through windows to reach the receiver. Depending on the type of window, the number of optical interfaces that are crossed vary. However, the simplest scenario implies a single-crystal window and, hence, two interfaces. When traversing an optical interface, light refracts following Snell’s law and an attenuation governed by Fresnel’s equation must be considered. This additional attenuation term can be included in Equation (1), yielding the following expression, Equation (2), in which L w corresponds to the aforementioned two-interfaces Fresnel loss term and n w is the crystal’s refractive index:
P r x P t x m + 1 2 π cos m ( θ ) L w ( θ , n w ) G l e n s A e f f d 2 .
If bandwidth estimation was needed, the impulse response could be approximated by the LOS component plus the first-bounce NLOS component. This final element depends on the receiver’s Field of View (FOV), the scenario’s geometry and the walls’ reflection patterns. For instance, in a scenario like the one shown in Figure 1, the eavesdropper’s bandwidth performance would be much higher than the indoor-located incumbents’ since the FOV limits the incoming contributions to a very narrow region centered on the emitters.
Generally, this situation will be kept in most scenarios, and it could be stated that an eavesdropper in an LOS case will be able to receive a signal with lesser inter-symbol interference (ISI). Nevertheless, there would be considerable received-power constraints and the necessity of high-gain optics, as well as the possibility of suffering sun-based interferences (Figure 2).
In this type of situation, the Signal-to-Noise Ratio (SNR) could be approximated by using Equation (3):
S N R P r x R ( λ ) 2 2 q i d + P r x + P s u n ϖ R ( λ ) B + 4 k B T B F n R L ,
where R ( λ ) is the receiver’s responsivity, q is the electron’s charge, i d is the photodiode’s darkness current, P s u n is the average sun’s irradiance, ϖ is the scenario’s albedo, k B is Boltzmann’s constant, T is the receiver’s temperature, B is the noise bandwidth, and F n and R L are the amplifier’s noise figure and gain, respectively.
Note that the sun generates both shot noise and offset level. This offset could be high enough to saturate the photoreceiver. Therefore, the receiver’s electrical topology must ensure a proper dynamic range.

3. Results

To validate the premise that VLC-based communication can be eavesdropped on from outside the premises as long as there is an “opening”, such as a window, two tests were conducted, a simulated one (Section 3.1) and an experimental one (Section 3.2).

3.1. Simulation Results

For the environment simulation. a basic scenario proposed in the literature [17,18,19] was used. Distribution of luminaries and room configuration is shown in Figure 3. Further details can be found on Section 5.1.
The definition of potential attack zones was based on pure geometrical considerations and assuming an LOS approach. A slice-based graph will be presented, showing how the number of available lamps varies depending on the position of the eavesdropper. The result of this first step, number of LEDs seen by the receiver using an LOS approach, is shown in Figure 4. It should be noted that, in the first 20 cm closest to the “window”, the number of LEDs viewed is zero.
The results of the simulation: number of LEDs seen with a 180 FOV and 20 FOV, power received ( P i ), and bandwidth ( B W )), of the second step are listed on Table 1. The values corresponding to each of the columns are:
  • Position follows the w i d t h , d e p t h , h e i g h t format and is expressed in meters.
  • There are two “Viewed LEDs” columns:
    -
    The first column represents the number of LEDs that can be viewed from that position having an FOV of 180 . This variable represents the number of individual LEDs that a single attacker may observe from that position by eye.
    -
    The second column represents the number of LEDs that can be viewed from that position having an FOV of 20 . This variable represents the number of LEDs that an attacker observes using some help that restricts the FOV, down to 20 , but may increase the receiver gain such as the employment of the telescope used for the experiments (Section 3.2).
  • The power value, in the fourth column, is in mW and represents the receiver power in that position with an FOV of 20 and no extra gain.
  • The bandwidth in MHz and, as in the previous value, it represents the bandwidth obtained with an FOV of 20 .
Additionally, to clarify which LEDs were being seen by the receiver at each of the points selected, and shown in Table 1, those LEDs were plotted as seen in Figure 5. The blue points in Figure 5 represent the LEDs viewed by the receiver using an LOS approach and an FOV of 20 . In addition to those blue points, if the receiver had an FOV of 180 , the LEDs represented by the red points would also be seen by the receiver.

3.2. Experimental Results

For the experimental part of the work, a similar simulation was performed using an emitter located on the second floor of the IDeTIC building at the “Universidad de Las Palmas de Gran Canaria”. Of the possible points from which the eavesdropping was tried, four were chosen. The distances, direct and vertical of those positions, are listed in Table 2.
The simulated power received in the positions shown on Table 2, the expected number of LEDs viewed from those positions as well as the tested power received in those areas are shown in Table 3. Power values are in mW, and viewed LEDs are a percentage of the total expected emitting LEDs on the lamp. In our case, a receiver as shown in Figure 6 was used, and a ten by ten matrix of LEDs was assumed. Furthermore, in Figure 7, it can be seen which part of the lamp could be seen from the different locations specified in Table 2 according to the computer simulation. The corresponding pictures are shown in Figure 8.
During the test, the channel bandwidth could not be measured due to the hardware limitations. Nevertheless, in all cases, as it can be observed in Figure 9, the signal could be captured relatively clearly in all cases. Even when windows are between the emitter and the receiver, as in the cases shown in Figure 8b,d, the signal can be recognized, as is shown in Figure 10.
In Table 4, the results of the sniffing/eavesdropping experiment can be observed. Values for the background interference level (BIL); signal mean power (SMP); electrical SNR and channel capacity are provided. As in all of this paper, the positions are identified by T1, T2, T3, and T4 names corresponding to the positions from which the pictures of Figure 8 were taken and whose distances are shown in Table 2. In the cases of positions T2 and T4, two scenarios were considered: one in which the windows panes were between the emitter and the receiver (with windows) and one in which they were not as in positions T1 and T3.

4. Discussion

Generally speaking, up until recently, VLC-based solutions were considered a secure way to communicate information since “light could not go through walls”. However, when we consider that most habitats have some window, due to design or regulatory requirements, we have to start thinking that, at least, some information leakage will occur even when some interference sources are emitting to obscure the signal, as has been proposed in [4,5]. These interference sources could be circumvented by directing the focus of the eavesdropper to the real emitter.
A first approach to determine the risk of information leakage in VLC channels can be made through a simulation of the environment. In our case, the simulation (Section 3.1) shows that, even if the more significant amount of leakage is located directly in front of the window, there are significant leakages on the sides, and the higher power density happens to be not in the closest locations but the middle range ones as shown in Figure 4 and Table 1.
However, when we observe Table 1, we note that when we are close to the emitters, such in positions S1 and S3, we get a higher bandwidth ( 3.76 and 8.16 GHz, respectively). Opposite to the previous situation, we have position S2, located between S1 and S3, where the bandwidth available (24.66 MHz) is smaller than the other two ( 3.76 and 8.16 GHz). At the same time, the power density received at S2 is the third largest (30.44 mW) after the one at S3 (42.95 mW) and the one at S5 (41.42 mW).
It can also point out that, even if in the first position, S1, we get a higher bandwidth than in almost any other of 16 tested locations, and the power density received is smaller than 12 of those who happen to be farther from the sources. The reason for this is the interference that the multiple sources, which emit the same signal synchronously, create. Therefore, the bandwidth limitation should be considered when eavesdropping since the available bandwidth may make it impossible if it is smaller than the bandwidth used in such communication.
The use of multiple spatially separated sources has been proposed to improve the communication link data rate of VLC [20,21] forming visual Multiple-Input Multiple-Output (MIMO)systems. This approach aims to give protection to the data since these coexisting signals can be considered as interference. This method is similar to procedures successfully applied for RF systems, such as in [22]. However, in the case of VLC eavesdropping techniques, the listener could still attack a MIMO-based link by using image-forming optics and an adequate receiver. Due to the theoretical feasibility of this kind of attack in MIMO systems, the scenario’s geometry could lead to an impracticable situation due to the closeness of the light sources. In this work, only synchronized multi-LED emitters have been considered.
An important aspect when considering the position is the aperture of the receiver. This aperture will influence the outcome significantly the eavesdropping as well as the selection of the location from where the eavesdropping will be conducted. As can be observed in Figure 5, the site of the receiver changes the list of viewed emitters and therefore the outcome of the attack.
All of these effects should be considered when considering eavesdropping for either defensive purposes or offensive (i.e., penetration tests) ones. For this reason, simulating the environment is an adequate tool for securing the environment to secure. To validate this latest premise, we executed a simulation and several experiments in a known location. As expected, the simulation generated areas of interest from which eavesdropping occurred had a higher possibility of success. The chosen locations are listed in Table 2.
Of the four chosen locations, from T1 to T4, it was expended, as shown in Table 3, that the T3 position, having a more direct line of sight to the emitter as the second shortest distance (19.00 m), had the best signal. This preconception happened to be true, and the power density that reached our receiver was twice as high as any of the other positions selected.
The location with the expected better received power density as T1 as it was the closest one to the emitters. When tested, this proved wrong, T4 being the place with the second better-received power density. Since, in the simulation, there was a difference smaller than 4.00%, and the percentage of the emitter viewed by the receiver was higher at the T4 position (64% vs. 20%), measurement errors may justify the discrepancy between expected and tested values.
The power received by the locations located “diagonally” to the emitter, T2 and T4, had a small difference in the simulations—less than 7%. However, this difference increases up to 25% in the tests, as can be seen in Table 3. At the same time, as is shown in Table 4, the background interference level obtained during the test increases, as can be expected, with distance making the signal harder to interpret.
When we compare the results of the simulated scenario and the test scenario, it can be observed that, in the case of the experimental one, the power that reached the receivers in the different positions was an order of magnitude than the expected received value (Table 3). The reason for this incoherence may be the factors that were evaluated. These factors didn’t include, for example, the lamp diffuser or the optoelectrical conversion on the emitter side. These unaccounted losses can explain the difference in magnitudes from the expected received power and the actual received power. Moreover, aiming at a small target and then using a photodiode to capture the signal proved challenging and aiming errors were common. Nevertheless, higher data rate eavesdropping requires higher received power and better SNR as shown in Table 4. To obtain those demanded SNR values, the attacker, as it was in our case, can play with the focus and gain of the sniffing device and, in general, the attacker can obtain a better SNR than a regular user so the result will benefit the eavesdropper most of the time from the calculated channel capacity, as observed in Table 4, and the fact that an outdoor located eavesdropper, with a powerful enough optical device, could reduce the incoming energy contributions from interference sources obtaining a purer LOS with the base station. This will conclude that eavesdroppers would generally have better channel capacity than system legit users.
The results seem to validate that it is possible to eavesdrop on a VLC-based channel from outside the premises, as it was previously accepted. Even if the values obtained by the experimental tests (Table 1) are not the same as the ones obtained from the simulations (Table 1) by an order of magnitude, the general distribution of the results is similar in both cases. The differences in values may be attributed to unmeasured effects such as the optoelectrical conversion in the emitter, the use of diffusers on the lamp or multiple aiming errors that decreased the received power. These results, in turn, ratify the usefulness of using simulations for select areas, or positions, of interest from which the attack is performed. These elected positions increase the chance of capturing a clear signal and may be located outside the expected attacker’s area. In the case of our experimentation, one such location was diagonally from the window (T4 in Table 2), which is mostly outside the view from the inside, but provides a clear and powerful enough signal (Table 4 and Figure 9d) with or without window panels in between (Figure 10c,d).

5. Materials and Methods

5.1. Simulation Materials and Methods

A standard scenario [17,18,19] was modified to consider an outdoor eavesdropping. The room was changed by the addition of a window 5.40 m wide by 1.50 m hide located 1.20 m from the floor and 0.30 m from the side walls and ceiling. The room was located on a second floor as shown in Figure 11 so the window was at the height of 4.20 m from the street. The expected location for the eavesdropper considered the street and parking area located on the front of the building where the emitters were located. All this area was defined as the target area from which an attack was possible, and it was delimited in an area of 26.00 m wide by 50.00 m long.
For the simulations, a multiple step approach was considered. The first step was determining in which points on the target area more emitters were visible. As stated, the receiver target area was a 26.00 by 50.00 m one. This approach allowed for the receivers to be located up to 10.00 m from the side of the room (or 10.30 m from the window’s edge).
The second phase of our simulation approach was choosing several locations, based on the presence or absence of LOS to multiple emitters and calculating the power received and the bandwidth available at those points. The selected points for this second phase tried to take into account the variances shown in phase one that included differential received power and number of emitters so the effect in the bandwidth could be understood. The bandwidth available at a point was calculated by applying Equations (4)–(7):
H ( 0 ) = h ( t ) d t i = 1 N P i ,
T ¯ = t t h ( t ) H ( 0 ) d t i = 1 N t i P i H ( 0 ) ,
τ r m s = t T ¯ 2 h ( t ) H ( 0 ) d t i = 1 N [ t i T ¯ 2 P i H ( 0 ) ] = i = 1 N t i i = 1 N t i P i j = 1 N P j 2 P i i = 1 N P i ,
B W 1 5 τ r m s .
In Equations (4)–(7), N is the number of lamps with LOS from the receiver point of view, P i is the power received from that lamp and t is the time of arrival of the same signal.
As stated, each of the lamps was an array of 100 LEDs emitting a total of 12 watts, so each LED emitted 0.12 watts of power. For the computer simulations, the receiver had a 20 FOV, and no optical or electrical gain was applied.
To choose the points from which the eavesdropping was tested, several constraints were considered:
  • The lower the FOV of the lenses, the higher the receiver power. Therefore, reducing the FOV through optical means, using a telescope in our case, increased the receiver power.
  • The higher the FOV, the higher the background noise. Therefore, decreasing the FOV would also decrease the background noise and improve the acquired signal.
  • The higher the FOV, the higher the probability of receiving light from different sources. In our case, since the network access points emit simultaneously the same information, the receiver will be affected by ISI. On the other hand, if the access points are part of a cellular network, an SINR could be defined on the received signal using Equation (8):
    S I N R = P t x H ( 0 ) R ( λ ) 2 σ t h 2 + σ s h 2 + i I P i H i ( 0 ) R ( λ ) 2 .
  • The more directive the emitters, the lower the received power due to the radiation pattern’s thin shape. For this work, general Lambertian emitting patterns were used.
  • The longer the distance, the higher the turbulence effect. Moreover, due to the signal propagation characteristics, the receiver power decreases with the distance. Even with optical gains, the turbulence affects the communication channel, so, for example, time of the day will affect the communication. (i.e., higher turbulence during the daytime due to thermal currents.).
    It should be noted that, contrary to the RF case where the power of the signal decreases with the square of the distance, as shown in Equation (9), in the VLC case, the power falls faster, as shown in Equation (10), due to the optoelectric conversion:
    P e l e c R F P T x G T x G R x λ 4 π d 2 P e l e c R F d 2 ,
    P e l e c V L C P T x S ( θ ) G l e n s A e f f d 2 R ( λ ) 2 , P e l e c V L C d 4 .
  • The channel capacity was large enough for the eavesdropping. The channel capacity was calculated using Equation (11):
    C = B W l o g 2 1 + S N .
All the concerns as mentioned earlier should be taken into account at the moment of choosing the points from which the sniffing attack will be held.

5.2. Experimental Materials and Methods

To validate the different scenarios and simulations, we did several real-world tests by creating a test bed using a commonly used illumination device. The characteristics of the emitter device are shown in Table 5.
The characteristics of the receiver device can be seen in Table 6. An image of the assembly is shown in Figure 12.The photodiode used for the capture is highlighted in red.
On the receiver side, a telescope was used to increase the gain of the receiver. The gain from the telescope ( G l e n s ) was calculated using Equation (12). The telescope had a lens with a diameter ( ϕ ) of 60 mm 2 . The area in which the light was projected had a diameter of 16 mm 2 . This configuration resulted in an approximated gain ( G l e n s ) of 14.0625:
G l e n s A L e n s A p r o j e c t e d ϕ l e n s ϕ p r o j e c t e d 2 .
The total receiver’s gain included the gain from the telescope ( G l e n s ), the responsivity (R) of 0.3 A W , and an electronic gain ( G e l e c ) of 70 dB. When Equation (13) was applied, we got an approximated total gain (G) of 13.34 V m W :
G = G l e n s · R · G e l e c .
Four target positions at different heights and distances were selected for the test. The distances and height for each one of the locations are shown in Table 2. As can be observed, the positions were selected to emulate possible scenarios such as eavesdropping from a parking space or from outside the premises. The view of the emitter from the different locations as well as the general assembly used are shown in Figure 8. The distances were used to calculate the theoretical received power at each position and to compare those values with the ones obtained in the experiments as shown in Table 3.

6. Conclusions

In this work, we proposed the study of eavesdropping on a VLC link. To assess such an attack, simulations were performed. To validate the results from the simulations, practical experiments were performed.
The study proved the validity of using geometrical considerations to define potential attacks zones. This study served as the base to choose, from those potential attacks zones, the ones that seemed more adequate. Additionally, the simulations showed that even if the more significant amount of leakage was located directly in front of the window, there are significant leakages on the sides, and the higher power density happened to be not in the closest locations but in the middle range ones. The interference between sources decreased the bandwidth available for eavesdroppers. However, this issue affected both legit and non legit users so it can be minimized when a VLC system is implemented.
An important aspect was the aperture of the receiver. This aperture will influence the outcome significantly, as well as the selection of the location from where the eavesdropping will be conducted. However attackers can modify their receiver’s aperture more freely than legit users.
Although the simulations provide a good starting point, validating those results with experimental testing proved to be a necessity. Due to measurement and aiming errors, the resulting values vary significantly. However, the simulations and the experimental test proved that eavesdropping a VLC link is possible and that the attacker is less limited than previously expected.
In turn, the simulations are useful for selecting areas, or positions, of interest from which the attack may be carried out. These positions increase the chance of capturing a clear signal and may be located outside the expected attacker’s area.
The results seem to validate that it is possible to eavesdrop on a VLC-based channel from outside the premises, as it was previously accepted. Furthermore, this is exploited since the received power can be incremented while the noise can be decreased through optical means.

Acknowledgments

This research was supported in part by the Escuela Superior Politecnica del Litoral (ESPOL), Ecuador.

Author Contributions

Ignacio Marin-Garcia and Victor Guerra conceived and performed the experiments. Ignacio Marin-Garcia implemented the simulator, designed the experiments, analyzed the data and wrote the paper. Rafael Perez-Jimenez contributed with analysis tools and reviewed the work.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
bpsbits per second
AESAdvanced encryption Standard
CBC-MACCipher Block Chaining Message Authentication Code
CCMCounter with CBC-MAC
CSKColor-Shift Keying
FOVField of View
ISIInter-Symbol Interference
LEDLight Emitting Diode
LOSLine-of-Sight
MIMOMultiple-Input Multiple-Output
NLOSNon Line-of-Sight
NRZNon-Return-to-Zero
RFRadio Frequency
OOKOn–Off Keying
SNRSignal-to-Noise Ratio
UWBUltra-Wide Band
VLCVisible Light Communication
VPPMVariable Pulse-Position Modulation

References

  1. Jovicic, A.; Li, J.; Richardson, T. Visible light communication: Opportunities, challenges and the path to market. IEEE Commun. Mag. 2013, 51, 26–32. [Google Scholar] [CrossRef]
  2. IEEE Standard for Local and Metropolitan Area Networks–Part 15.7: Short-Range Wireless Optical Communication Using Visible Light, 2011. Available online: http://ieeexplore.ieee.org/document/6016195/ (accessed on 1 October 2017).
  3. Mostafa, A.; Lampe, L. Physical-layer security for indoor visible light communications. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, 10–14 June 2014; pp. 3342–3347. [Google Scholar]
  4. Mostafa, A.; Lampe, L. Enhancing the security of VLC links: Physical-layer approaches. In Proceedings of the 2015 Summer Topicals Meeting Series (SUM), Nassau, Bahamas, 13–15 July 2015; pp. 39–40. [Google Scholar]
  5. Chow, C.W.; Liu, Y.; Yeh, C.H.; Chen, C.Y.; Lin, C.N.; Hsu, D.Z. Secure communication zone for white-light LED visible light communication. Opt. Commun. 2015, 344, 81–85. [Google Scholar] [CrossRef]
  6. Blinowski, G. Security issues in visible light communication systems. IFAC-PapersOnLine 2015, 48, 234–239. [Google Scholar] [CrossRef]
  7. Classen, J.; Chen, J.; Steinmetzer, D.; Hollick, M.; Knightly, E. The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications. In Proceedings of the 2Nd International Workshop on Visible Light Communications Systems, Paris, France, 11 September 2015; ACM: New York, NY, USA; pp. 9–14. [Google Scholar]
  8. Marin-Garcia, I.; Ramirez-Aguilera, A.M.; Guerra, V.; Rabadan, J.; Perez-Jimenez, R. Data sniffing over an open VLC channel. In Proceedings of the 10th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), Prague, Czech Republic, 20–22 July 2016; pp. 1–6. [Google Scholar]
  9. Prasad, R.; Mihovska, A.; Cianca, E.; Mukherjee, S. Comparative overview of UWB and VLC for data-intensive and security-sensitive applications. In Proceedings of the IEEE International Conference on Ultra-Wideband, Syracuse, NY, USA, 17–20 September 2012; pp. 41–45. [Google Scholar]
  10. Elgala, H.; Mesleh, R.; Haas, H. Indoor optical wireless communication: Potential and state-of-the-art. IEEE Commun. Mag. 2011, 49, 56–62. [Google Scholar] [CrossRef]
  11. Mahdy, A.; Deogun, J.S. Wireless optical communications: A survey. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Atlanta, GA, USA, 21–25 March 2004; Volume 4, pp. 2399–2404. [Google Scholar]
  12. Sewaiwar, A.; Tiwari, S.V.; Chung, Y.H. Smart LED allocation scheme for efficient multiuser visible light communication networks. Opt. Exp. 2015, 23, 13015–13024. [Google Scholar] [CrossRef] [PubMed]
  13. Jung, S.Y.; Hann, S.; Park, C.S. TDOA-based optical wireless indoor localization using LED ceiling lamps. IEEE Trans. Consum. Electron. 2011, 57, 1592–1597. [Google Scholar] [CrossRef]
  14. Wang, T.Q.; Sekercioglu, Y.A.; Neild, A.; Armstrong, J. Position Accuracy of Time-of-Arrival Based Ranging Using Visible Light With Application in Indoor Localization Systems. J. Lightwave Technol. 2013, 31, 3302–3308. [Google Scholar] [CrossRef]
  15. Marin-Garcia, I.; Chavez-Burbano, P.; Muñoz-Arcentles, A.; Calero-Bravo, V.; Perez-Jimenez, R. Indoor location technique based on visible light communications and ultrasound emitters. In Proceedings of the IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 9–12 January 2015; pp. 297–298. [Google Scholar]
  16. Rabadan, J.; Guerra, V.; Rodríguez, R.; Rufo, J.; Luna-Rivera, M.; Perez-Jimenez, R. Hybrid Visible Light and Ultrasound-Based Sensor for Distance Estimation. Sensors 2017, 17, 330. [Google Scholar] [CrossRef] [PubMed]
  17. Tronghop, D.; Hwang, J.; Jung, S.; Shin, Y.; Yoo, M. Modeling and analysis of the wireless channel formed by LED angle in visible light communication. In Proceedings of the International Conference on Information Network 2012, Bali, Indonesia, 1–3 February 2012; pp. 354–357. [Google Scholar]
  18. Komine, T.; Nakagawa, M. Fundamental analysis for visible-light communication system using LED lights. IEEE Trans. Consum. Electron. 2004, 50, 100–107. [Google Scholar] [CrossRef]
  19. Uysal, M.; Miramirkhani, F.; Narmanlioglu, O.; Baykas, T.; Panayirci, E. IEEE 802.15.7r1 Reference Channel Models for Visible Light Communications. IEEE Commun. Mag. 2017, 55, 212–217. [Google Scholar] [CrossRef]
  20. Ashok, A.; Gruteser, M.; Mandayam, N.; Dana, K. Characterizing multiplexing and diversity in visual MIMO. In Proceedings of the 2011 45th Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, USA, 23–25 March 2011; pp. 1–6. [Google Scholar]
  21. Hsu, C.W.; Chow, C.W.; Lu, I.C.; Liu, Y.L.; Yeh, C.H.; Liu, Y. High Speed Imaging 3 x 3 MIMO Phosphor White-Light LED Based Visible Light Communication System. IEEE Photon. J. 2016, 8, 1–6. [Google Scholar] [CrossRef]
  22. Goel, S.; Negi, R. Guaranteeing Secrecy using Artificial Noise. IEEE Trans. Wirel. Commun. 2008, 7, 2180–2189. [Google Scholar] [CrossRef]
Figure 1. Eavesdropping scenario. The emitter is located on a second floor room and the eavesdropper is located outside. The existence of an interference source, a street lamp, is shown in the figure.
Figure 1. Eavesdropping scenario. The emitter is located on a second floor room and the eavesdropper is located outside. The existence of an interference source, a street lamp, is shown in the figure.
Sensors 17 02687 g001
Figure 2. Indoor and outdoor examples of noise sources. In (a), two interference sources are present: non Visible Light Communication (VLC) light fixtures and the light coming through a window; in (b), two interference sources are present: the non-VLC street light and the sun.
Figure 2. Indoor and outdoor examples of noise sources. In (a), two interference sources are present: non Visible Light Communication (VLC) light fixtures and the light coming through a window; in (b), two interference sources are present: the non-VLC street light and the sun.
Sensors 17 02687 g002
Figure 3. Room Configuration. In the scenario, the emitters are located in a room 6 m wide by 6 m deep by 3 m high. In the scenario’s room, there are nine luminaries with a power output of 12 W per luminary. Each luminary is composed of 100 individual LEDs and each luminary is a square one.
Figure 3. Room Configuration. In the scenario, the emitters are located in a room 6 m wide by 6 m deep by 3 m high. In the scenario’s room, there are nine luminaries with a power output of 12 W per luminary. Each luminary is composed of 100 individual LEDs and each luminary is a square one.
Sensors 17 02687 g003
Figure 4. Number of emitters (LEDs) viewed from the target area. The observation area is 50.00 by 26.00 m and is located at the height of 0.00 m. The window being observed is at 4.20 m of height and located between the 0.00 to the 6.00 m in the horizontal axis.
Figure 4. Number of emitters (LEDs) viewed from the target area. The observation area is 50.00 by 26.00 m and is located at the height of 0.00 m. The window being observed is at 4.20 m of height and located between the 0.00 to the 6.00 m in the horizontal axis.
Sensors 17 02687 g004
Figure 5. LEDs viewed from the receiver’s position: (a) S1; (b) S2; (c) S3; (d) S4; (e) S5; (f) S6; (g) S7; (h) S8; (i) S9; (j) S10; (k) S11; (l) S12; (m) S13; (n) S14; (o) S15; (p) S16; (q) S17; and (r) S18 as listed in Table 1. Blue points represent the LEDs viewed by the receiver with an FOV of 20 . Red points represent the LEDs viewed by the receiver, in addition to the blue ones, when the receiver has an FOV of 180 .
Figure 5. LEDs viewed from the receiver’s position: (a) S1; (b) S2; (c) S3; (d) S4; (e) S5; (f) S6; (g) S7; (h) S8; (i) S9; (j) S10; (k) S11; (l) S12; (m) S13; (n) S14; (o) S15; (p) S16; (q) S17; and (r) S18 as listed in Table 1. Blue points represent the LEDs viewed by the receiver with an FOV of 20 . Red points represent the LEDs viewed by the receiver, in addition to the blue ones, when the receiver has an FOV of 180 .
Sensors 17 02687 g005
Figure 6. Assembly used to eavesdrop on the VLC channel from position T1.
Figure 6. Assembly used to eavesdrop on the VLC channel from position T1.
Sensors 17 02687 g006
Figure 7. Representations of the expected LEDs viewed from the different locations as simulated: (a) at T1; (b) at T2; (c) at T3; and (d) at T4 as defined in Table 2.
Figure 7. Representations of the expected LEDs viewed from the different locations as simulated: (a) at T1; (b) at T2; (c) at T3; and (d) at T4 as defined in Table 2.
Sensors 17 02687 g007
Figure 8. Pictures of the target emitter from the diferent locations where the sniffer was positioned: (a) T1; (b) T2; (c) T3; and (d) T4 as defined in Table 2. In (b,d), it can be observed that the double panel window is between the emitter and the receiver. In (a,c), the receiver has a clear and direct view without obstacles of the emitter; and the window in which the emitter can be observed is highlighted in red.
Figure 8. Pictures of the target emitter from the diferent locations where the sniffer was positioned: (a) T1; (b) T2; (c) T3; and (d) T4 as defined in Table 2. In (b,d), it can be observed that the double panel window is between the emitter and the receiver. In (a,c), the receiver has a clear and direct view without obstacles of the emitter; and the window in which the emitter can be observed is highlighted in red.
Sensors 17 02687 g008
Figure 9. Captures of the signal from diferent locations: (a) at T1; (b) at T2; (c) at T3; and (d) at T4 as defined in Table 2. The emitted signal used an On-Off keying with non return to zero (OOK-NRZ) modulation scheme at a 512 bps data rate.
Figure 9. Captures of the signal from diferent locations: (a) at T1; (b) at T2; (c) at T3; and (d) at T4 as defined in Table 2. The emitted signal used an On-Off keying with non return to zero (OOK-NRZ) modulation scheme at a 512 bps data rate.
Sensors 17 02687 g009
Figure 10. Subfigures (a,b) are measures taken from location T2 being (a) a case in which the windows are present between the emitter and the receiver and (b) a case in which the windows are not present between the emitter and the receiver. Subfigures (c,d) are measurements taken from location T4 being (c) a case in which the windows are present between the emitter and the receiver and (d) a case in which the windows are not present between the emitter and the receiver. In all cases, the positions are as defined in Table 2. Vertical axes denote power in nW and the horizontal axes denote time in s.
Figure 10. Subfigures (a,b) are measures taken from location T2 being (a) a case in which the windows are present between the emitter and the receiver and (b) a case in which the windows are not present between the emitter and the receiver. Subfigures (c,d) are measurements taken from location T4 being (c) a case in which the windows are present between the emitter and the receiver and (d) a case in which the windows are not present between the emitter and the receiver. In all cases, the positions are as defined in Table 2. Vertical axes denote power in nW and the horizontal axes denote time in s.
Sensors 17 02687 g010
Figure 11. Simulation configuration. In the scenario, the emitters are located in a room 6 m wide by 6 m deep by 3 m height. In the scenario’s room, there are nine luminaries with a power output of 12 W per luminary. Each luminary is composed of 100 individual LEDs and each luminary is a square one.
Figure 11. Simulation configuration. In the scenario, the emitters are located in a room 6 m wide by 6 m deep by 3 m height. In the scenario’s room, there are nine luminaries with a power output of 12 W per luminary. Each luminary is composed of 100 individual LEDs and each luminary is a square one.
Sensors 17 02687 g011
Figure 12. Receiver Assembly. The photodiode used for the data capture is highlighted in red.
Figure 12. Receiver Assembly. The photodiode used for the data capture is highlighted in red.
Sensors 17 02687 g012
Table 1. Simulation results.
Table 1. Simulation results.
PositionCoordinates (x, y, z)Viewed LEDsPower (mW/dBm)Bandwidth (MHz)
FOV 180 FOV 20
S1 1.50 , 9.00 , 0.00 1001005.14/7.113760.00
S2 1.50 , 0.30 , 0.00 2545430.44/14.8324.66
S3 1.50 , 5.00 , 0.00 30010042.97/16.338160.00
S4 8.00 , 9.00 , 0.00 30030015.22/11.8244.13
S5 8.00 , 4.00 , 0.00 40040041.42/16.1752.89
S6 8.00 , 5.00 , 0.00 60020028.13/14.4930.65
S7 12.00 , 9.00 , 0.00 2002004.96/6.9522.17
S8 12.00 , 0.30 , 0.00 3002009.61/9.8369.64
S9 12.00 , 5.00 , 0.00 3002008.62/9.3673.78
S10 15.00 , 9.00 , 0.00 3003005.35/7.2814.50
S11 15.00 , 4.00 , 0.00 4004009.80/9.9150.20
S12 15.00 , 5.00 , 0.00 60040010.92/10.3851.13
S13 25.00 , 9.00 , 0.00 4004002.70/4.3148.91
S14 25.00 , 0.30 , 0.00 6006005.15/7.1248.83
S15 25.00 , 5.00 , 0.00 6006004.97/6.9649.19
S16 45.00 , 9.00 , 0.00 4004000.65/−1.876.42
S17 45.00 , 4.00 , 0.00 4004000.69/−1.616.70
S18 45.00 , 5.00 , 0.00 6006001.05/0.2148.41
FOV: Field of View.
Table 2. Sniffing positions.
Table 2. Sniffing positions.
PositionCoordinatesDistance (m) Δ h ( m ) Azimuth
T1 13.90 , 0.90 , 10.65 17.5310.65 37.50
T2 13.90 , 11.10 , 10.65 20.7310.65 35.50
T3 19.60 , 0.90 , 8.25 21.288.25 28.00
T4 20.40 , 15.10 , 7.85 26.577.85 20.00
Table 3. Sniffing results.
Table 3. Sniffing results.
PositionSimulated Power (mW/dBm)Viewed LEDsTested Power (mW/dBm)
T10.9876/−0.054220%0.0014/−28.5387
T20.8684/−0.612817%0.0031/−25.0864
T31.1005/0.4159100%0.0087/−20.6048
T40.9251/−0.338164%0.0044/−23.5655
Table 4. Sniffing results.
Table 4. Sniffing results.
PositionBIL (nW/dBm)SMP (nW/dBm)Electrical SNR (dB)Channel Capacityx (Gbps)
T 1 4.8550/−53.13811.3692/−58.635317.169114.2771
T 2 2.2186/−56.53921.4142/−58.494920.47100.3774
T 2 5.9669/−52.24253.0506/−55.156121.79650.4016
T 3 5.6765/−52.45928.7199/−50.594920.53402.5841
T 4 29.1200/−45.358123.6920/−46.254019.57480.2466
T 4 13.5230/−48.689344.3630/−43.529819.96670.2515
Note: The symbol denotes measures in which a double panned window was between the emitter and the receiver.The channel capacity values were obtained using the theoretical channel bandwidth and without taking into account the bandwidth of the emitter and the receiver. If those values were taken into account, the channel capacity would decrease. BIL is the background interference level, SMP is the sygnal mean power, and SNR is the signal to noise ratio.
Table 5. Emitter characteristics.
Table 5. Emitter characteristics.
ParametersValue
Electrical Power40 W
R a >80
Emission angle120
Emission Frequency512 Hz
Modulation SchemeOOK-NRZ
Table 6. Receiver characteristics.
Table 6. Receiver characteristics.
ParameterValue
Lens ϕ 60 mm
Photodiode ϕ 5 mm
Electrical Gain70 dB

Share and Cite

MDPI and ACS Style

Marin-Garcia, I.; Guerra, V.; Perez-Jimenez, R. Study and Validation of Eavesdropping Scenarios over a Visible Light Communication Channel. Sensors 2017, 17, 2687. https://doi.org/10.3390/s17112687

AMA Style

Marin-Garcia I, Guerra V, Perez-Jimenez R. Study and Validation of Eavesdropping Scenarios over a Visible Light Communication Channel. Sensors. 2017; 17(11):2687. https://doi.org/10.3390/s17112687

Chicago/Turabian Style

Marin-Garcia, Ignacio, Victor Guerra, and Rafael Perez-Jimenez. 2017. "Study and Validation of Eavesdropping Scenarios over a Visible Light Communication Channel" Sensors 17, no. 11: 2687. https://doi.org/10.3390/s17112687

APA Style

Marin-Garcia, I., Guerra, V., & Perez-Jimenez, R. (2017). Study and Validation of Eavesdropping Scenarios over a Visible Light Communication Channel. Sensors, 17(11), 2687. https://doi.org/10.3390/s17112687

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop