skip to main content
research-article

Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting

Published:14 October 2023Publication History
Skip Abstract Section

Abstract

Photoelectric sensors are utilized in a range of safety-critical applications, such as medical devices and autonomous vehicles. However, the public exposure of the input channel of a photoelectric sensor makes it vulnerable to malicious inputs. Several studies have suggested possible attacks on photoelectric sensors by injecting malicious signals. While a few defense techniques have been proposed against such attacks, they could be either bypassed or used for limited purposes.

In this study, we propose Lightbox, a novel defense system to detect sensor attacks on photoelectric sensors based on signal fingerprinting. Lightbox uses the spectrum of the received light as a feature to distinguish the attacker’s malicious signals from the authentic signal, which is a signal from the sensor’s light source. We evaluated Lightbox against (1) a saturation attacker, (2) a simple spoofing attacker, and (3) a sophisticated attacker who is aware of Lightbox and can combine multiple light sources to mimic the authentic light source. Lightbox achieved the overall accuracy over 99% for the saturation attacker and simple spoofing attacker, and robustness against a sophisticated attacker. We also evaluated Lightbox considering various environments such as transmission medium, background noise, and input waveform. Finally, we demonstrate the practicality of Lightbox with experiments using a single-board computer after further reducing the training time.

REFERENCES

  1. [1] Amazon. [n. d.]. Optex Outdoor Dual Beam Photoelectric Detector. Retrieved from https://www.amazon.com/Optex-Outdoor-Dual-Photoelectric-Detector/dp/B007HKHJ8CGoogle ScholarGoogle Scholar
  2. [2] Amazon. [n. d.]. Smoke Detector Fire Alarm Product. Retrieved from https://www.amazon.com/Detector-Ardwolf-Photoelectric-Battery-Powered-Included/dp/B071DQXW3WGoogle ScholarGoogle Scholar
  3. [3] Baldini Gianmarco, Steri Gary, Dimc Franc, Giuliani Raimondo, and Kamnik Roman. 2016. Experimental identification of smartphones using fingerprints of built-in micro-electro mechanical systems (MEMS). Sensors 16, 6 (2016).Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] BANNER. [n. d.]. Basics of Photoelectric Sensing. Retrieved from https://stevenengineering.com/tech_support/PDFs/04PHREF.pdfGoogle ScholarGoogle Scholar
  5. [5] BANNER. [n. d.]. Liquid Leak Detection with a QS18. Retrieved from https://www.bannerengineering.com/my/en/solutions/other/liquid-leak-detection-with-a-qs18.htmlGoogle ScholarGoogle Scholar
  6. [6] BANNER. [n. d.]. Q4X Series Sensor. Retrieved from https://www.bannerengineering.com/us/en/products/sensors/photoelectric-sensors/q4x-laser-distance-sensor.htmlGoogle ScholarGoogle Scholar
  7. [7] BANNER. [n. d.]. Q5X Series Sensor. Retrieved from https://www.bannerengineering.com/us/en/products/sensors/photoelectric-sensors/q5x-series.htmlGoogle ScholarGoogle Scholar
  8. [8] BANNER. [n. d.]. QS18 Series All Purpose Photoelectric Sensor. Retrieved from https://www.bannerengineering.com/my/en/solutions/other/conveyor-jam-detection.htmlGoogle ScholarGoogle Scholar
  9. [9] BANNER. [n. d.]. WORLD-BEAM Q20 Series Sensor. Retrieved from https://www.bannerengineering.com/us/en/products/sensors/photoelectric-sensors/q20-series.htmlGoogle ScholarGoogle Scholar
  10. [10] BANNER. [n. d.]. WORLD-BEAM QS30 Series Sensor. Retrieved from https://www.bannerengineering.com/us/en/products/sensors/photoelectric-sensors/qs30-series.htmlGoogle ScholarGoogle Scholar
  11. [11] Cao Yulong, Xiao Chaowei, Cyr Benjamin, Zhou Yimeng, Park Won, Rampazzi Sara, Chen Qi Alfred, Fu Kevin, and Mao Z. Morley. 2019. Adversarial sensor attack on LiDAR-based perception in autonomous driving. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’19). Association for Computing Machinery, New York, NY, 15 pages. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Chauhan Ruchir. 2014. A Platform for False Data Injection in Frequency Modulated Continuous Wave Radar. Ph. D. Dissertation. Utah State University.Google ScholarGoogle Scholar
  13. [13] Cheng Yushi, Ji Xiaoyu, Zhang Juchuan, Xu Wenyuan, and Chen Yi-Chao. 2019. DemiCPU: Device fingerprinting with magnetic signals radiated by CPU. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Das Anupam, Borisov Nikita, and Caesar Matthew. 2014. Do you hear what I hear? Fingerprinting smart devices through embedded acoustic components. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security.Google ScholarGoogle Scholar
  15. [15] SENSORS ELECTRO. [n. d.]. Single-beam Safety Sensor E3ZS/E3FS. Retrieved from https://www.fa.omron.com.cn/data_pdf/cat/e3zs_e3fs_ds_e_10_4_csm1260.pdf?id=1519Google ScholarGoogle Scholar
  16. [16] Engineering Penn. [n. d.]. Generic PCA Infusion Pump Reference Implementation. Retrieved from https://rtg.cis.upenn.edu/medical/gpca/rtg-gpca-video-v1.htmlGoogle ScholarGoogle Scholar
  17. [17] Ernst F. and Pirouz P.. 1988. Formation of planar defects in the epitaxial growth of GaP on Si substrate by metal organic chemical-vapor deposition. J. Appl. Phys. 64, 9 (1988).Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Gassend Blaise, Clarke Dwaine, Dijk Marten Van, and Devadas Srinivas. 2002. Silicon physical random functions. In Proceedings of the 9th ACM Conference on Computer and Communications Security. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Gou Jun, Niu Qingchen, Liang Kai, Wang Jun, and Jiang Yadong. 2018. Frequency modulation and absorption improvement of THz micro-bolometer with micro-bridge structure by spiral-type antennas. Nanosc. Res. Lett. 13, 1 (2018), 19.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Intel. [n. d.]. Intel RealSense LiDAR Camera L515. Retrieved from https://www.intelrealsense.com/lidar-camera-l515/Google ScholarGoogle Scholar
  21. [21] Kuhn Markus G. and Anderson Ross J.. 1998. Soft tempest: Hidden data transmission using electromagnetic emanations. In Proceedings of the International Workshop on Information Hiding. Springer, 124142.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] LEDinside. 2015. Color Consistency—One of the Challenges for Solid-state Lighting. Retrieved from https://www.ledinside.com/knowledge/2015/8/color_consistency_one_of_the_challenges_for_solid_state_lightingGoogle ScholarGoogle Scholar
  23. [23] McGrattan Kevin, Hostikka Simo, McDermott Randall, Floyd Jason, Weinschenk Craig, and Overholt Kristopher. 2013. Fire dynamics simulator user’s guide. NIST Spec. Public. 1019, 6 (2013).Google ScholarGoogle Scholar
  24. [24] MongoDB. [n. d.]. MongoDB Server. Retrieved from https://www.mongodb.com/Google ScholarGoogle Scholar
  25. [25] OceanInsight. [n. d.]. STS-NIR-L-10-400-SMA. Retrieved from https://www.oceaninsight.com/products/spectrometers/microspectrometer/sts-series/sts-nir-l-10-400-sma/?qty=1Google ScholarGoogle Scholar
  26. [26] Omron. [n. d.]. Overview of Photoelectric Sensors. Retrieved from https://www.ia.omron.com/support/guide/43/introduction.htmlGoogle ScholarGoogle Scholar
  27. [27] Park Youngseok, Son Yunmok, Shin Hocheol, Kim Dohyun, and Kim Yongdae. 2016. This ain’t your dose: Sensor spoofing attack on medical infusion pump. In Proceedings of the 10th USENIX Workshop on Offensive Technologies (WOOT’16). USENIX Association. Retrieved from https://www.usenix.org/conference/woot16/workshop-program/presentation/parkGoogle ScholarGoogle Scholar
  28. [28] Fuchs Pepperl. [n. d.]. Retroreflective Sensor MLV12-54/47/92. Retrieved from https://www.pepperl-fuchs.com/korea/ko/classid_11.htm?view=productdetails&prodid=7224Google ScholarGoogle Scholar
  29. [29] Perera Pramuditha and Patel Vishal. 2019. Learning deep features for one-class classification. IEEE Transactions on Image Processing 28, 11 (2019), 5450–5463.Google ScholarGoogle Scholar
  30. [30] Petit Jonathan, Stottelaar Bas, Feiri Michael, and Kargl Frank. 2015. Remote attacks on automated vehicles sensors: Experiments on camera and LiDAR. Black Hat Eur. 11 (2015).Google ScholarGoogle Scholar
  31. [31] Ribeiro Marco Tulio, Singh Sameer, and Guestrin Carlos. 2016. “Why should I trust you?”: Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Royer Michael. 2014. Color Stability of LEDs: Understanding the Basics. Retrieved from https://www1.eere.energy.gov/buildings/publications/pdfs/ssl/royer_stability_lightfair2014.pdfGoogle ScholarGoogle Scholar
  33. [33] Shin Hocheol, Kim Dohyun, Kwon Yujin, and Kim Yongdae. 2017. Illusion and dazzle: Adversarial optical channel exploits against lidars for automotive applications. In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems. Springer.Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Shin Hocheol, Noh Juhwan, Kim Dohyun, and Kim Yongdae. 2020. The system that cried wolf: Sensor security analysis of wide-area smoke detectors for critical infrastructure. ACM Trans. Priv. Secur. 23, 3, Article 15 (June2020), 32 pages. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Shin Hocheol, Son Yunmok, Park Youngseok, Kwon Yujin, and Kim Yongdae. 2016. Sampling race: Bypassing timing-based analog active sensor spoofing detection on analog-digital systems. In Proceedings of the 10th USENIX Workshop on Offensive Technologies (WOOT’16).Google ScholarGoogle Scholar
  36. [36] Shoukry Yasser, Martin Paul, Yona Yair, Diggavi Suhas, and Srivastava Mani. 2015. PyCRA: Physical challenge-response authentication for active sensors under spoofing attacks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Shuai Yun, He Yongzhi, Tran Nguyen T., and Shi Frank G.. 2010. Angular CCT uniformity of phosphor converted white LEDs: Effects of phosphor materials and packaging structures. IEEE Photon. Technol. Lett. 23, 3 (2010).Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Softnoze. [n. d.]. Photoelectric Sensors Theory of Operation. Retrieved from https://www.softnoze.com/downloads/Sensor%20Basics%204.pdfGoogle ScholarGoogle Scholar
  39. [39] Son Ji-Su, Honda Yoshio, and Amano Hiroshi. 2014. Growth of low-defect-density nonpolar a-plane GaN on r-plane sapphire using pulse NH 3 interrupted etching. Optics Expr. 22, 3 (2014).Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Sugawara Takeshi, Cyr Benjamin, Rampazzi Sara, Genkin Daniel, and Fu Kevin. 2020. Light commands: Laser-based audio injection attacks on voice-controllable systems. In Proceedings of the 29th USENIX Security Symposium (USENIX Security’20).Google ScholarGoogle Scholar
  41. [41] Encyclopedia The Great Soviet. [n. d.]. Modulation of Light. Retrieved from https://encyclopedia2.thefreedictionary.com/Modulation+of+LightGoogle ScholarGoogle Scholar
  42. [42] Thorlabs. [n. d.]. Compact CCD Spectrometers. Retrieved from https://www.thorlabs.com/newgrouppage9.cfm?objectgroup_id=3482Google ScholarGoogle Scholar
  43. [43] Thorlabs. [n. d.]. Cosine Corrector for SMA-Connectorized Fiber. Retrieved from https://www.thorlabs.com/thorproduct.cfm?partnumber=CCSA1Google ScholarGoogle Scholar
  44. [44] Toh A., Yang L., Sakiyama K., and Sugawara T.. 2019. Fingerprinting light emitting diodes using spectrometer. Electron. Lett. 55, 24 (2019).Google ScholarGoogle ScholarCross RefCross Ref
  45. [45] Tran Nguyen The, You Jiun Pyng, and Shi Frank G.. 2009. Effect of phosphor particle size on luminous efficacy of phosphor-converted white LED. J. Lightw. Technol. 27, 22 (2009).Google ScholarGoogle Scholar
  46. [46] Verbauwhede Ingrid and Maes Roel. 2011. Physically unclonable functions: Manufacturing variability as an unclonable device identifier. In Proceedings of the 21st Edition of the Great Lakes Symposium on Great Lakes Symposium on VLSI. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47] Vicardio. [n. d.]. The Principle of Blood Pressure Detector. Retrieved from http://www.vicardio.care/how-it-works/Google ScholarGoogle Scholar
  48. [48] Visconti P., Huang D., Reshchikov M. A., Yun F., Cingolani R., Smith D. J., Jasinski J., Swider W., Liliental-Weber Z., and Morkoc H.. 2002. Investigation of defects and surface polarity in GaN using hot wet etching together with microscopy and diffraction techniques. Mater. Sci. Eng.: B 93, 1-3 (2002).Google ScholarGoogle ScholarCross RefCross Ref
  49. [49] Waymo. [n. d.]. Google Waymo. Retrieved from https://waymo.com/waymo-driver/Google ScholarGoogle Scholar
  50. [50] Wuu D. S., Wang W. K., Wen K. S., Huang S. C., Lin S. H., Huang S. Y., Lin C. F., and Horng R. H.. 2006. Defect reduction and efficiency improvement of near-ultraviolet emitters via laterally overgrown GaN on a GaN/patterned sapphire template. Appl. Phys. Lett. 89, 16 (2006).Google ScholarGoogle ScholarCross RefCross Ref
  51. [51] Xu W., Yan C., Jia W., Ji X., and Liu J.. 2018. Analyzing and enhancing the security of ultrasonic sensors for autonomous vehicles. IEEE Internet Things J. 5, 6 (Dec2018). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  52. [52] Yan Chen, Xu Wenyuan, and Liu Jianhao. 2016. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. DEF CON 24 (2016).Google ScholarGoogle Scholar
  53. [53] Zheng Huai, Luo Xiaobing, Hu Run, Cao Bin, Fu Xing, Wang Yiman, and Liu Sheng. 2012. Conformal phosphor coating using capillary microchannel for controlling color deviation of phosphor-converted white light-emitting diodes. Optics Expr. 20, 5 (2012).Google ScholarGoogle ScholarCross RefCross Ref
  54. [54] Zhou Zhe, Diao Wenrui, Liu Xiangyu, and Zhang Kehuan. 2014. Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. [55] Zhu Ciyou, Byrd Richard H., Lu Peihuang, and Nocedal Jorge. 1997. Algorithm 778: L-BFGS-B: Fortran subroutines for large-scale bound-constrained optimization. ACM Trans. Math. Softw. 23, 4 (1997), 550560.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. [56] Zhuang Zhou, Ji Xiaoyu, Zhang Taimin, Zhang Juchuan, Xu Wenyuan, Li Zhenhua, and Liu Yunhao. 2018. FBSleuth: Fake base station forensics via radio frequency fingerprinting. In Proceedings of the Asia Conference on Computer and Communications Security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. [57] Zou Ling, He Qianhua, and Wu Junfeng. 2017. Source cell phone verification from speech recordings using sparse representation. Digit. Sig. Process. 62 (2017).Google ScholarGoogle Scholar

Index Terms

  1. Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Privacy and Security
        ACM Transactions on Privacy and Security  Volume 26, Issue 4
        November 2023
        260 pages
        ISSN:2471-2566
        EISSN:2471-2574
        DOI:10.1145/3614236
        • Editor:
        • Ninghui Li
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 14 October 2023
        • Online AM: 17 August 2023
        • Accepted: 31 July 2023
        • Revised: 18 July 2023
        • Received: 10 January 2023
        Published in tops Volume 26, Issue 4

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
      • Article Metrics

        • Downloads (Last 12 months)282
        • Downloads (Last 6 weeks)42

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text