Next Article in Journal
Superimposed Training Combined Approach for a Reduced Phase of Spectrum Sensing in Cognitive Radio
Next Article in Special Issue
Reduced Cycle Spinning Method for the Undecimated Wavelet Transform
Previous Article in Journal
A Highly Selective Turn-on Fluorescent Probe for the Detection of Aluminum and Its Application to Bio-Imaging
Previous Article in Special Issue
Combined Kalman Filter and Multifeature Fusion Siamese Network for Real-Time Visual Tracking
Open AccessArticle

Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals

1
Department of Electrical and Computer Engineering, Binghamton University, Binghamton, NY 13902, USA
2
The U.S. Air Force Research Laboratory, Rome, NY 13441, USA
3
Department of Computer Science and Engineering, Penn State University, University Park, PA 16802, USA
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(11), 2424; https://doi.org/10.3390/s19112424
Received: 29 March 2019 / Revised: 17 May 2019 / Accepted: 24 May 2019 / Published: 28 May 2019
(This article belongs to the Special Issue Intelligent Signal Processing, Data Science and the IoT World)
Over the past few years, the importance of video surveillance in securing national critical infrastructure has significantly increased, with applications including the detection of failures and anomalies. Accompanied by the proliferation of video is the increasing number of attacks against surveillance systems. Among the attacks, False Frame Injection (FFI) attacks that replay video frames from a previous recording to mask the live feed has the highest impact. While many attempts have been made to detect FFI frames using features from the video feeds, video analysis is computationally too intensive to be deployed on-site for real-time false frame detection. In this paper, we investigated the feasibility of FFI attacks on compromised surveillance systems at the edge and propose an effective technique to detect the injected false video and audio frames by monitoring the surveillance feed using the embedded Electrical Network Frequency (ENF) signals. An ENF operates at a nominal frequency of 60 Hz/50 Hz based on its geographical location and maintains a stable value across the entire power grid interconnection with minor fluctuations. For surveillance system video/audio recordings connected to the power grid, the ENF signals are embedded. The time-varying nature of the ENF component was used as a forensic application for authenticating the surveillance feed. The paper highlights the ENF signal collection from a power grid creating a reference database and ENF extraction from the recordings using conventional short-time Fourier Transform and spectrum detection for robust ENF signal analysis in the presence of noise and interference caused in different harmonics. The experimental results demonstrated the effectiveness of ENF signal detection and/or abnormalities for FFI attacks. View Full-Text
Keywords: video surveillance; visual layer attack; Electrical Network Frequency (ENF) signal; False Frame Injection (FFI) attack video surveillance; visual layer attack; Electrical Network Frequency (ENF) signal; False Frame Injection (FFI) attack
Show Figures

Figure 1

MDPI and ACS Style

Nagothu, D.; Chen, Y.; Blasch, E.; Aved, A.; Zhu, S. Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals. Sensors 2019, 19, 2424.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map

1
Back to TopTop