ABSTRACT
Wireless networks based on visible light communication (VLC) are often considered to be resilient to eavesdropping by design, since light cannot penetrate most walls and objects. In this paper, we experimentally study the ability of a VLC eavesdropper to intercept and decode a transmission even while being outside of the direct beam. We design a testbed using software defined radios (SDRs) and evaluate different VLC eavesdropping scenarios. We find that a small gap under a door can be sufficient for an eavesdropper to decode high-order modulated (DCO-OFDM 64-QAM) reflected signals outside of a room. Likewise, neither Victorian keyholes nor window coatings provide any significant protection against information leakage to the outside. Furthermore, eavesdroppers located in the same room but not facing the sender can profit from reflections on walls.
- WARP Project, http://warpproject.org.Google Scholar
- IEEE standard for local and metropolitan area networks--part 15.7: Short-range wireless optical communication using visible light. Std 802.15.7, 2011.Google Scholar
- Proceedings of the 1st ACM MobiCom Workshop on Visible Light Communication Systems, New York, NY, USA, 2014. ACM.Google Scholar
- M. G. Kuhn. Optical time-domain eavesdropping risks of CRT displays. In IEEE Symposium on Security and Privacy, Proceedings., 2002. Google ScholarDigital Library
- M. G. Kuhn. Eavesdropping attacks on computer displays. Information Security Summit, 2006.Google Scholar
- Cen B. Liu, Bahareh Sadeghi, and Edward W. Knightly. Enabling Vehicular Visible Light Communication Networks. In Proceedings of the Eighth ACM International Workshop on Vehicular Inter-networking, VANET, New York, NY, USA, 2011. ACM. Google ScholarDigital Library
- F.J. Lopez-Martinez, G. Gomez, and J.M. Garrido-Balsells. Physical-Layer Security in Free-Space Optical Communications. IEEE Photonics Journal, 2015.Google Scholar
- A. Mostafa and L. Lampe. Physical-layer security for indoor visible light communications. In IEEE International Conference on Communications, 2014.Google ScholarCross Ref
- A. Mostafa and L. Lampe. Securing visible light communications via friendly jamming. In Globecom Workshops, 2014.Google ScholarCross Ref
- Gordon Povey. Top 10 Visible Light Communications Applications, 2011.Google Scholar
- Yijun Qiao, Harald Haas, and Edward Knightly. Demo: A Software-defined Visible Light Communications System with WARP. In 1st ACM Workshop on Visible Light Communication Systems, 2014.Google Scholar
- Stefan Schmid, Josef Ziegler, Giorgio Corbellini, Thomas R. Gross, and Stefan Mangold. Using consumer led light bulbs for low-cost visible light communication systems. In Proceedings of the 1st ACM MobiCom Workshop on Visible Light Communication Systems, New York, NY, USA, 2014. ACM. Google ScholarDigital Library
- Y. Y. Tan and W. Y. Chung. Mobile health monitoring system through visible light communication. Bio-medical materials and engineering, 2014.Google Scholar
- A. Younis, W. Thompson, M. Di Renzo, C.-X. Wang, M.A. Beach, H. Haas, and P.M. Grant. Performance of spatial modulation using measured real-world channels. In IEEE 78th Vehicular Technology Conference (VTC Fall), 2013.Google ScholarCross Ref
- Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, and Cong Wang. SBVLC: Secure barcode-based visible light communication for smartphones. In Proceedings IEEE INFOCOM, 2014.Google ScholarCross Ref
Index Terms
- The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications
Recommendations
Sniffing visible light communication through walls
MobiCom '20: Proceedings of the 26th Annual International Conference on Mobile Computing and NetworkingVisible light communication (VLC) is gaining a significant amount of interest as a new paradigm to meet rapidly increasing demands on wireless capacity required by a digitalized world. VLC is considered as a secure wireless communication scheme because ...
A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control
Prevalent Wi-Fi networks have adopted various protections to prevent eavesdropping caused by the intrinsic shared nature of wireless medium. However, many of them are based on pre-shared secret incurring key management costs, and are still vulnerable ...
On the Eavesdrop Vulnerability of Random Network Coding over Wireless Networks
ICDCSW '09: Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems WorkshopsWhen random network coding is combined with path diversity, source data packets are mixed and distributed spatially across different parts of the network, providing some inherent protection against eavesdropping. In a wireless setting, the links may be ...
Comments