[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3485730.3493684acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article

Detecting Compromised Edge Smart Cameras using Lightweight Environmental Fingerprint Consensus

Published: 15 November 2021 Publication History

Abstract

Rapid advances in the Internet of Video Things (IoVT) deployment in modern smart cities has enabled secure infrastructures with minimal human intervention. However, attacks on audio-video inputs affect the reliability of large-scale multimedia surveillance systems as attackers are able to manipulate the perception of live events. For example, Deepfake audio/video attacks and frame duplication attacks can cause significant security breaches. This paper proposes a Lightweight Environmental Fingerprint Consensus based detection of compromised smart cameras in edge surveillance systems (LEFC). LEFC is a partial decentralized authentication mechanism that leverages Electrical Network Frequency (ENF) as an environmental fingerprint and distributed ledger technology (DLT). An ENF signal carries randomly fluctuating spatio-temporal signatures, which enable digital media authentication. With the proposed DLT consensus mechanism named Proof-of-ENF (PoENF) as a backbone, LEFC can estimate and authenticate the media recording and detect byzantine nodes controlled by the perpetrator. The experimental evaluation shows feasibility and effectiveness of proposed LEFC scheme under a distributed byzantine network environment.

References

[1]
[n.d.]. Descript | Create podcasts, videos, and transcripts. https://www.descript.com/ accessed: Oct. 18, 2021.
[2]
[n.d.]. Flask: A Pyhon Microframework. http://flask.pocoo.org/. accessed: Oct. 18, 2021.
[3]
[n.d.]. Hyperledger Fabric. https://www.hyperledger.org/use/fabric. accessed: Oct. 14, 2021.
[4]
[n.d.]. pyca/cryptography documentation. https://cryptography.io/. accessed: Oct. 18, 2021.
[5]
Peva Blanchard, Rachid Guerraoui, Julien Stainer, et al. 2017. Machine learning with adversaries: Byzantine tolerant gradient descent. In Advances in Neural Information Processing Systems. 119--129.
[6]
Vitalik Buterin et al. 2014. A next-generation smart contract and decentralized application platform. white paper (2014).
[7]
Miguel Castro, Barbara Liskov, et al. 1999. Practical Byzantine fault tolerance. In OSDI, Vol. 99. 173--186.
[8]
Jidong Chai, Fan Liu, Zhiyong Yuan, Richard W Conners, and Yilu Liu. 2013. Source of ENF in battery-powered digital recordings. In Audio Engineering Society Convention 135. Audio Engineering Society.
[9]
Ning Chen, Yu Chen, Erik Blasch, Haibin Ling, Yang You, and Xinyue Ye. 2017. Enabling smart urban surveillance at the edge. In 2017 IEEE International Conference on Smart Cloud (SmartCloud). IEEE, 109--119.
[10]
Ravi Garg, Adi Hajj-Ahmad, and Min Wu. 2021. Feasibility Study on Intra-Grid Location Estimation Using Power ENF Signals. arXiv:2105.00668 [eess.SP]
[11]
Ravi Garg, Avinash L Varna, Adi Hajj-Ahmad, and Min Wu. 2013. "Seeing" ENF: power-signature-based timestamp for digital multimedia via optical sensing and signal processing. IEEE Transactions on Information Forensics and Security 8, 9 (2013), 1417--1432.
[12]
Catalin Grigoras. 2005. Digital audio recording analysis-the electric network frequency criterion. International Journal of Speech Language and the Law 12, 1 (2005), 63--76.
[13]
Ari Juels and Burton S Kaliski Jr. 2007. PORs: Proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security. 584--597.
[14]
Leslie Lamport, Robert Shostak, and Marshall Pease. 1982. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS) 4, 3 (1982), 382--401.
[15]
Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, and Jonathan Katz. 2014. Permacoin: Repurposing bitcoin work for data preservation. In 2014 IEEE Symposium on Security and Privacy. IEEE, 475--490.
[16]
Deeraj Nagothu, Yu Chen, Alexander Aved, and Erik Blasch. 2021. Authenticating video feeds using electric network frequency estimation at the edge. EAI Endorsed Transactions on Security and Safety 7, 24 (2021), e4.
[17]
Deeraj Nagothu, Yu Chen, Erik Blasch, Alexander Aved, and Sencun Zhu. 2019. Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals. Sensors 19, 11 (2019), 2424.
[18]
Deeraj Nagothu, Jacob Schwell, Yu Chen, Erik Blasch, and Sencun Zhu. 2019. A study on smart online frame forging attacks against video surveillance system. In Sensors and Systems for Space Applications XII, Vol. 11017. International Society for Optics and Photonics, 110170L.
[19]
Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch, and Alexander Aved. 2021. DeFake: Decentralized ENF-Consensus Based DeepFake Detection in Video Conferencing. In IEEE 23rd International Workshop on Multimedia Signal Processing. Tampere, Finland.
[20]
Satoshi Nakamoto. 2019. Bitcoin: A peer-to-peer electronic cash system. Technical Report. Manubot.
[21]
Seyed Yahya Nikouei, Yu Chen, Alexander Aved, Erik Blasch, and Timothy R Faughnan. 2019. I-safe: Instant suspicious activity identification at the edge using fuzzy decision making. In Proceedings of the 4th ACM/IEEE Symposium on Edge Computing. 101--112.
[22]
Seyed Yahya Nikouei, Ronghua Xu, Deeraj Nagothu, Yu Chen, Alexander Aved, and Erik Blasch. 2018. Real-time index authentication for event-oriented surveillance video query using blockchain. In 2018 IEEE International Smart Cities Conference (ISC2). IEEE, 1--8.
[23]
Ivan Perov, Daiheng Gao, Nikolay Chervoniy, Kunlin Liu, Sugasa Marangonda, Chris Umé, Mr Dpfks, Carl Shift Facenheim, Luis RP, Jian Jiang, et al. 2020. Deepfacelab: A simple, flexible and extensible face swapping framework. arXiv preprint arXiv:2005.05535 (2020).
[24]
Hui Su, Adi Hajj-Ahmad, Ravi Garg, and Min Wu. 2014. Exploiting rolling shutter for ENF signal extraction from video. In Image Processing (ICIP), 2014 IEEE International Conference on. Citeseer, 5367--5371.
[25]
Melanie Swan. 2015. Blockchain: Blueprint for a new economy. " O'Reilly Media, Inc.".
[26]
Luisa Verdoliva. 2020. Media forensics and deepfakes: an overview. IEEE Journal of Selected Topics in Signal Processing 14, 5 (2020), 910--932.
[27]
Ronghua Xu, Yu Chen, Erik Blasch, and Genshe Chen. 2018. Blendcac: A smart contract enabled decentralized capability-based access control mechanism for the iot. Computers 7, 3 (2018), 39.
[28]
Ronghua Xu., Yu Chen, Erik Blasch, and Genshe Chen. 2019. Exploration of blockchain-enabled decentralized capability-based access control strategy for space situation awareness. Optical Engineering 58, 4 (2019), 041609.
[29]
Ronghua Xu, Deeraj Nagothu, and Yu Chen. 2021. Decentralized video input authentication as an edge service for smart cities. IEEE Consumer Electronics Magazine 10, 6 (2021), 76--82.
[30]
Ronghua Xu, Deeraj Nagothu, and Yu Chen. 2021. EconLedger: A Proof-of-ENF Consensus Based Lightweight Distributed Ledger for IoVT Networks. Future Internet 13, 10 (2021), 248.
[31]
Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, and Robbert Van Renesse. 2017. {REM}: Resource-Efficient Mining for Blockchains. In 26th {USENIX} Security Symposium ({USENIX} Security 17). 1427--1444.

Cited By

View all
  • (2023)Evolution of Attacks on Intelligent Surveillance Systems and Effective Detection TechniquesIntelligent Video Surveillance - New Perspectives10.5772/intechopen.105958Online publication date: 8-Feb-2023
  • (2022)Deterring Deepfake Attacks with an Electrical Network Frequency Fingerprints ApproachFuture Internet10.3390/fi1405012514:5(125)Online publication date: 21-Apr-2022
  • (2022)Robustness of Electrical Network Frequency Signals as a Fingerprint for Digital Media Authentication2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP)10.1109/MMSP55362.2022.9949315(1-6)Online publication date: 26-Sep-2022
  • Show More Cited By

Index Terms

  1. Detecting Compromised Edge Smart Cameras using Lightweight Environmental Fingerprint Consensus

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SenSys '21: Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems
    November 2021
    686 pages
    ISBN:9781450390972
    DOI:10.1145/3485730
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 November 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Deepfake Detection
    2. Electrical Network Frequency (ENF) Signals
    3. Environmental Fingerprint
    4. Proof-of-ENF (PoENF) Consensus

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • U.S. Air Force Office of Scientific Research (AFOSR)
    • U.S. National Science Foundation (NSF)

    Conference

    Acceptance Rates

    SenSys '21 Paper Acceptance Rate 25 of 139 submissions, 18%;
    Overall Acceptance Rate 198 of 990 submissions, 20%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)16
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 03 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Evolution of Attacks on Intelligent Surveillance Systems and Effective Detection TechniquesIntelligent Video Surveillance - New Perspectives10.5772/intechopen.105958Online publication date: 8-Feb-2023
    • (2022)Deterring Deepfake Attacks with an Electrical Network Frequency Fingerprints ApproachFuture Internet10.3390/fi1405012514:5(125)Online publication date: 21-Apr-2022
    • (2022)Robustness of Electrical Network Frequency Signals as a Fingerprint for Digital Media Authentication2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP)10.1109/MMSP55362.2022.9949315(1-6)Online publication date: 26-Sep-2022
    • (2022)Artificial Intelligence Fusion of Information for Aerospace (AIFIA) Systems2022 IEEE Aerospace Conference (AERO)10.1109/AERO53065.2022.9843668(1-8)Online publication date: 5-Mar-2022
    • (2022)ECOM: Epoch Randomness-Based Consensus Committee Configuration for IoT BlockchainsPrinciples and Practice of Blockchains10.1007/978-3-031-10507-4_7(135-154)Online publication date: 4-Jul-2022

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media