skip to main content
10.1145/2801073.2801075acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications

Published:11 September 2015Publication History

ABSTRACT

Wireless networks based on visible light communication (VLC) are often considered to be resilient to eavesdropping by design, since light cannot penetrate most walls and objects. In this paper, we experimentally study the ability of a VLC eavesdropper to intercept and decode a transmission even while being outside of the direct beam. We design a testbed using software defined radios (SDRs) and evaluate different VLC eavesdropping scenarios. We find that a small gap under a door can be sufficient for an eavesdropper to decode high-order modulated (DCO-OFDM 64-QAM) reflected signals outside of a room. Likewise, neither Victorian keyholes nor window coatings provide any significant protection against information leakage to the outside. Furthermore, eavesdroppers located in the same room but not facing the sender can profit from reflections on walls.

References

  1. WARP Project, http://warpproject.org.Google ScholarGoogle Scholar
  2. IEEE standard for local and metropolitan area networks--part 15.7: Short-range wireless optical communication using visible light. Std 802.15.7, 2011.Google ScholarGoogle Scholar
  3. Proceedings of the 1st ACM MobiCom Workshop on Visible Light Communication Systems, New York, NY, USA, 2014. ACM.Google ScholarGoogle Scholar
  4. M. G. Kuhn. Optical time-domain eavesdropping risks of CRT displays. In IEEE Symposium on Security and Privacy, Proceedings., 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. G. Kuhn. Eavesdropping attacks on computer displays. Information Security Summit, 2006.Google ScholarGoogle Scholar
  6. Cen B. Liu, Bahareh Sadeghi, and Edward W. Knightly. Enabling Vehicular Visible Light Communication Networks. In Proceedings of the Eighth ACM International Workshop on Vehicular Inter-networking, VANET, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. F.J. Lopez-Martinez, G. Gomez, and J.M. Garrido-Balsells. Physical-Layer Security in Free-Space Optical Communications. IEEE Photonics Journal, 2015.Google ScholarGoogle Scholar
  8. A. Mostafa and L. Lampe. Physical-layer security for indoor visible light communications. In IEEE International Conference on Communications, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  9. A. Mostafa and L. Lampe. Securing visible light communications via friendly jamming. In Globecom Workshops, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  10. Gordon Povey. Top 10 Visible Light Communications Applications, 2011.Google ScholarGoogle Scholar
  11. Yijun Qiao, Harald Haas, and Edward Knightly. Demo: A Software-defined Visible Light Communications System with WARP. In 1st ACM Workshop on Visible Light Communication Systems, 2014.Google ScholarGoogle Scholar
  12. Stefan Schmid, Josef Ziegler, Giorgio Corbellini, Thomas R. Gross, and Stefan Mangold. Using consumer led light bulbs for low-cost visible light communication systems. In Proceedings of the 1st ACM MobiCom Workshop on Visible Light Communication Systems, New York, NY, USA, 2014. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Y. Y. Tan and W. Y. Chung. Mobile health monitoring system through visible light communication. Bio-medical materials and engineering, 2014.Google ScholarGoogle Scholar
  14. A. Younis, W. Thompson, M. Di Renzo, C.-X. Wang, M.A. Beach, H. Haas, and P.M. Grant. Performance of spatial modulation using measured real-world channels. In IEEE 78th Vehicular Technology Conference (VTC Fall), 2013.Google ScholarGoogle ScholarCross RefCross Ref
  15. Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, and Cong Wang. SBVLC: Secure barcode-based visible light communication for smartphones. In Proceedings IEEE INFOCOM, 2014.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      VLCS '15: Proceedings of the 2nd International Workshop on Visible Light Communications Systems
      September 2015
      52 pages
      ISBN:9781450337021
      DOI:10.1145/2801073

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 September 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate21of28submissions,75%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader