SlideShare a Scribd company logo
1 of 1
Download to read offline
Benjamin	Graham,	A.	Selcuk Uluagac,	and	Nezih Pala,
Florida	International	University
Department	of	Electrical	and	Computer	Engineering
bgraham@fiu.edu,	auluagac@fiu.edu,	npala@fiu.edu
• Communication by capturing the modulation (on/off signals) of LED
lights from an encoder (light fixture) to a receiver (user device).
• The modulation is then decoded into bytes on the receiving device.
• Develop	the	IDS	as	a	cloud	network	
operation	to	relieve	device	CPU	
stress.
• Pursue	IDS	implementation	for	all	
sensors	on	Android	devices.
• Adapt	the	IDS	to	respond/ignore	
VLC	Network	protocol	802.15
WHAT	IS	VISIBLE	LIGHT	COMMUNICATION? MALWARE	INJECTION	CHANNEL
ABSTRACT
AN	IDS	FOR	SECURE	VISIBLE	LIGHT	COMMUNICATION	ON	
ANDROID	DEVICES
1. Radio Frequency Based
Implementation
1. Small frequency spectrum
2. Wide range of capture
3. Requires intricate radio tower
infrastructure
2. Data Rates
1. Limited bitrate
2. Max: 20-25 Mbits/sec
With 14 billion LED lighting systems installed worldwide, the field of Visible Light Communication has emerged over the last decade to harness their capabilities. This technology allows devices to take advantage of the rapid modulation made possible by LEDs
to transmit data at bitrates of over 100 times that of modern WiFi connections. Over the next few years as VLC research and development rise we can expect to see the addition of photoreceptor sensors for this data transmission on mobile devices such as
smartphones and tablets. In the past, sensors such as these were identified to be unsecure in the face of malicious code injection and activation as malware can be transmitted and decoded through sensory input on a device bypassing restrictions in many
cases. The research presented here is performed in an effort to secure this sensory channel on Android mobile devices.
VLC WIFI
1. Light Implementation
1. Diverse spectrum for data
transmission
2. Does not travel through walls
3. Requires minimal installation
and infrastructure
2. Data Rates
1. Large bitrate
2. Current rates: 500Mbits/sec
AN	INTRUSION	DETECTION	SYSTEM
1. Photoreceptors on the device intended for VLC can capture more
than known data transfer signals.
2. A hacker can encode malware through light modulation in an LED
system.
3. Photoreceptors on device capture the modulation and preinstalled
seemingly harmless code can decrypt the the signal into the intended
message.
4. Once on the device it can report back information to the hacker.
• System	monitors	sensory	inputs	and	stores	normal	responses.
• When	an	abnormality	is	found	in	sensory	input,	GPU	levels	can	
be	checked	for	irregularities.
• If	an	irregularity	is	discovered	the	input	sequence		is	marked	as	
malicious	and	will	be	ignored	in	the	future.
IMPLEMENTATION
• In	Android	OS	sensors	must	be	called	programmatically	to	power	
them	and	begin	logging	inputs.
• By	altering	the	source	code	provided	by	Google	and	installing	on	a	
device,	sensor	data	can	be	made	public	for	the	whole	system	to	view.
• This	data	can	include	the	package	that	calls	for	the	sensor	and	the	
sensory	data	received	by	the	package.
• Making	this	information	readily	available	allows	for	the	creation	of	an	
IDS	by	monitoring	data	logs	and	classifying	input	as	normal	or	
malicious.
• Sensory	inputs	and	their	corresponding	GPU	level	outputs	can	now	be	
directly	linked	to	the	application	which	calls	for	the	sensor	initialization.
• The	sensory	input	sequence	can	be	flagged	and	ignored	by	the	system	if	
it	arises	again.
FUTURE	WORK REFERENCES
• A.	S.	Uluagac,	V.	Subramanian,	and	R.	Beyah.	Sensory	channel	
threats	to	cyber	physical	systems:	A	wake-up	call.	In	
Communications	and	Network	Security	(CNS),	2014	IEEE	
Conference	on,	pages	301–309,	Oct	2014.
• Iker	Burguera,	Urko	Zurutuza,	and	Simin	Nadjm-Tehrani.	
Crowdroid:	Behavior-based	malware	detection	system	for	
android.	In	Proceedings	 of	the	1st	ACM	Workshop	on	Security	
and	Privacy	in	Smartphones	and	Mobile	Devices,	SPSM	’11,	
pages	15–26,	New	York,	NY,	USA,	2011.	ACM.
• H.	Elgala,	R.	Mesleh,	and	H.	Haas.	Indoor	optical	wireless	
communication:	potential	and	state-of-the-art.	IEEE	
Communications	Magazine,49(9):56–62,	 September	2011.
• Y.	Tanaka,	T.	Komine,	S.	Haruyama	and	M.	Nakagawa,	"Indoor	
visible	communication	utilizing	plural	white	LEDs	as	
lighting," Personal,	Indoor	and	Mobile	Radio	Communications,	
2001	12th	IEEE	International	Symposium	on,	San	Diego,	CA,	
2001,	pp.	F-81-F-85	vol.2.
• Asaf	Shabtai,	Uri	Kanonov,	Yuval	Elovici,	Chanan	Glezer,	and	
Yael	Weiss.	“Andromaly”:	a	behavioral	malware	detection	
framework	for	android	devices.	Journal	of	Intelligent	
Information	Systems,	38(1):161–190,	2012
VLC	ON	ANDROID	DEVICES
• VLC	proves	to	be	more	secure	than	WiFi as	it	does	not	travel	through	
walls.	Eavesdroppers	must	not	only	be	able	to	mimic	user	
authentication,	but	be	in	the	room	with	the	user	as	well.
• This	security	combined	with	the	bitrates	of	500Mbits/sec	leads	to	a	
large	push	for	VLC	on	a	future	generation	of	smart	devices	and	
Android	devices	specifically.
• While	VLC	is	currently	possible	using	the	rolling	shutter	effect	of	most	
camera	enabled	devices	on	the	market,	this	is	significantly	slower	and	
consumes	a	great	deal	of	power	to	sustain.
• In	order	to	use	VLC	within	reasonable	limits,	Android	devices	will	be	
equipped	with	photoreceptors	to	monitor	modulations	in	light.	These	
sensors	will	act	much	like	the	current	light	sensors	on	devices,	but	
with	much	more	accuracy	and	precision	as	well	as	larger	power	
requirements.
ACKNOWLEDGEMENTS
This work was partly
supported by the US NSF
Research Experiences for
Undergraduates Sites
Program Grant No: REU-
CNS-1461119.
Sensory	Channel	Intrusion	Assessment	and	
Detection	[1]
Sample	Public	Log	Output

More Related Content

What's hot

blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor networkMaulik Patel
 
border security using gsm
border security using gsmborder security using gsm
border security using gsmbharath naidu
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)Saurabh Giratkar
 
Smart home automation using z wave protocol
Smart home automation using z wave protocolSmart home automation using z wave protocol
Smart home automation using z wave protocolManje Gowda
 
Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)PRADEEP Cheekatla
 
Bss seminar ppt
Bss seminar pptBss seminar ppt
Bss seminar pptmangal das
 
Embedded based home security system
Embedded based home security systemEmbedded based home security system
Embedded based home security systemNIT srinagar
 
Border security-using-wireless-integrated-network-sensors-1
Border security-using-wireless-integrated-network-sensors-1Border security-using-wireless-integrated-network-sensors-1
Border security-using-wireless-integrated-network-sensors-1Sayeed Shawon
 
border-security-using-wins
 border-security-using-wins border-security-using-wins
border-security-using-winsAakashkumar276
 
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Sindhu Nathan
 
IRJET- A Review on Intelligent Agriculture Service Platform with Lora Bas...
IRJET-  	  A Review on Intelligent Agriculture Service Platform with Lora Bas...IRJET-  	  A Review on Intelligent Agriculture Service Platform with Lora Bas...
IRJET- A Review on Intelligent Agriculture Service Platform with Lora Bas...IRJET Journal
 
Keypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm TechnologyKeypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm TechnologyIJRES Journal
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for SmartphoneEditor IJMTER
 
Wireless border security system
Wireless border security systemWireless border security system
Wireless border security systemBllu
 
Presentation on Wireless border security system
Presentation on  Wireless border security systemPresentation on  Wireless border security system
Presentation on Wireless border security systemStudent
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

What's hot (20)

blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
 
border security using gsm
border security using gsmborder security using gsm
border security using gsm
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)
 
Smart home automation using z wave protocol
Smart home automation using z wave protocolSmart home automation using z wave protocol
Smart home automation using z wave protocol
 
Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)
 
Bss seminar ppt
Bss seminar pptBss seminar ppt
Bss seminar ppt
 
Embedded based home security system
Embedded based home security systemEmbedded based home security system
Embedded based home security system
 
Border security-using-wireless-integrated-network-sensors-1
Border security-using-wireless-integrated-network-sensors-1Border security-using-wireless-integrated-network-sensors-1
Border security-using-wireless-integrated-network-sensors-1
 
TechShield
TechShieldTechShield
TechShield
 
border-security-using-wins
 border-security-using-wins border-security-using-wins
border-security-using-wins
 
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
A1 Presentation
A1 PresentationA1 Presentation
A1 Presentation
 
IRJET- A Review on Intelligent Agriculture Service Platform with Lora Bas...
IRJET-  	  A Review on Intelligent Agriculture Service Platform with Lora Bas...IRJET-  	  A Review on Intelligent Agriculture Service Platform with Lora Bas...
IRJET- A Review on Intelligent Agriculture Service Platform with Lora Bas...
 
Keypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm TechnologyKeypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm Technology
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for Smartphone
 
Wireless border security system
Wireless border security systemWireless border security system
Wireless border security system
 
Presentation on Wireless border security system
Presentation on  Wireless border security systemPresentation on  Wireless border security system
Presentation on Wireless border security system
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Ppt
PptPpt
Ppt
 

Similar to An IDS for Secure Visible Light Communication on Android Devices

WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEMA ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEMijistjournal
 
A zigbee and embedded based security
A zigbee and embedded based securityA zigbee and embedded based security
A zigbee and embedded based securityijistjournal
 
IoT Based Disaster Detection and Early Warning Device By Shweta Gaikwad
IoT Based Disaster Detection and Early Warning Device By Shweta GaikwadIoT Based Disaster Detection and Early Warning Device By Shweta Gaikwad
IoT Based Disaster Detection and Early Warning Device By Shweta GaikwadShweta Gaikwad
 
Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areasAmulya Anu
 
A ZigBee Based Wireless Sensor Network for an Agricultural Environment
A ZigBee Based Wireless Sensor Network for an Agricultural EnvironmentA ZigBee Based Wireless Sensor Network for an Agricultural Environment
A ZigBee Based Wireless Sensor Network for an Agricultural Environmentijsrd.com
 
Future Trends of Embedded Systems - Technical Paper Presentation
Future Trends of Embedded Systems - Technical Paper PresentationFuture Trends of Embedded Systems - Technical Paper Presentation
Future Trends of Embedded Systems - Technical Paper PresentationKaushik Gupta
 
WSN Based Temperature Monitoring System for Multiple Locations in Industry
WSN Based Temperature Monitoring System for Multiple Locations in IndustryWSN Based Temperature Monitoring System for Multiple Locations in Industry
WSN Based Temperature Monitoring System for Multiple Locations in Industryijtsrd
 
Report ON a Remote Security System Using wireless sensor and GSM module Techn...
Report ON a Remote Security System Using wireless sensor and GSM module Techn...Report ON a Remote Security System Using wireless sensor and GSM module Techn...
Report ON a Remote Security System Using wireless sensor and GSM module Techn...Priyanka Tyagi
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area networkRajeev N
 
Smart home project technical paper
Smart home project technical paperSmart home project technical paper
Smart home project technical paperAnwar Al Ahdab
 
Project Dissertation - ZigBee Based Wireless Sensor Network
Project Dissertation - ZigBee Based Wireless Sensor NetworkProject Dissertation - ZigBee Based Wireless Sensor Network
Project Dissertation - ZigBee Based Wireless Sensor NetworkAnand Agrawal
 
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTORIMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTORIRJET Journal
 
VLC Visible light communication (leaders of li fi)
VLC Visible light communication (leaders of li fi)VLC Visible light communication (leaders of li fi)
VLC Visible light communication (leaders of li fi)Niket Chandrawanshi
 
Internet of things for the “smart home”
Internet of things for the “smart home”Internet of things for the “smart home”
Internet of things for the “smart home”Virendra Thakur
 
Wirless Parsonal Area Networks.ppt
Wirless Parsonal Area Networks.pptWirless Parsonal Area Networks.ppt
Wirless Parsonal Area Networks.pptMunazza63
 
Io t based smart irrigation system
Io t based smart irrigation systemIo t based smart irrigation system
Io t based smart irrigation systemKrishna Vala
 

Similar to An IDS for Secure Visible Light Communication on Android Devices (20)

WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Wsn
WsnWsn
Wsn
 
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEMA ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
 
A zigbee and embedded based security
A zigbee and embedded based securityA zigbee and embedded based security
A zigbee and embedded based security
 
IoT Based Disaster Detection and Early Warning Device By Shweta Gaikwad
IoT Based Disaster Detection and Early Warning Device By Shweta GaikwadIoT Based Disaster Detection and Early Warning Device By Shweta Gaikwad
IoT Based Disaster Detection and Early Warning Device By Shweta Gaikwad
 
Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areas
 
A ZigBee Based Wireless Sensor Network for an Agricultural Environment
A ZigBee Based Wireless Sensor Network for an Agricultural EnvironmentA ZigBee Based Wireless Sensor Network for an Agricultural Environment
A ZigBee Based Wireless Sensor Network for an Agricultural Environment
 
Future Trends of Embedded Systems - Technical Paper Presentation
Future Trends of Embedded Systems - Technical Paper PresentationFuture Trends of Embedded Systems - Technical Paper Presentation
Future Trends of Embedded Systems - Technical Paper Presentation
 
WSN Based Temperature Monitoring System for Multiple Locations in Industry
WSN Based Temperature Monitoring System for Multiple Locations in IndustryWSN Based Temperature Monitoring System for Multiple Locations in Industry
WSN Based Temperature Monitoring System for Multiple Locations in Industry
 
Report ON a Remote Security System Using wireless sensor and GSM module Techn...
Report ON a Remote Security System Using wireless sensor and GSM module Techn...Report ON a Remote Security System Using wireless sensor and GSM module Techn...
Report ON a Remote Security System Using wireless sensor and GSM module Techn...
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area network
 
Smart home project technical paper
Smart home project technical paperSmart home project technical paper
Smart home project technical paper
 
Project Dissertation - ZigBee Based Wireless Sensor Network
Project Dissertation - ZigBee Based Wireless Sensor NetworkProject Dissertation - ZigBee Based Wireless Sensor Network
Project Dissertation - ZigBee Based Wireless Sensor Network
 
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTORIMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
 
VLC Visible light communication (leaders of li fi)
VLC Visible light communication (leaders of li fi)VLC Visible light communication (leaders of li fi)
VLC Visible light communication (leaders of li fi)
 
Kv2518941899
Kv2518941899Kv2518941899
Kv2518941899
 
Kv2518941899
Kv2518941899Kv2518941899
Kv2518941899
 
Internet of things for the “smart home”
Internet of things for the “smart home”Internet of things for the “smart home”
Internet of things for the “smart home”
 
Wirless Parsonal Area Networks.ppt
Wirless Parsonal Area Networks.pptWirless Parsonal Area Networks.ppt
Wirless Parsonal Area Networks.ppt
 
Io t based smart irrigation system
Io t based smart irrigation systemIo t based smart irrigation system
Io t based smart irrigation system
 

An IDS for Secure Visible Light Communication on Android Devices

  • 1. Benjamin Graham, A. Selcuk Uluagac, and Nezih Pala, Florida International University Department of Electrical and Computer Engineering bgraham@fiu.edu, auluagac@fiu.edu, npala@fiu.edu • Communication by capturing the modulation (on/off signals) of LED lights from an encoder (light fixture) to a receiver (user device). • The modulation is then decoded into bytes on the receiving device. • Develop the IDS as a cloud network operation to relieve device CPU stress. • Pursue IDS implementation for all sensors on Android devices. • Adapt the IDS to respond/ignore VLC Network protocol 802.15 WHAT IS VISIBLE LIGHT COMMUNICATION? MALWARE INJECTION CHANNEL ABSTRACT AN IDS FOR SECURE VISIBLE LIGHT COMMUNICATION ON ANDROID DEVICES 1. Radio Frequency Based Implementation 1. Small frequency spectrum 2. Wide range of capture 3. Requires intricate radio tower infrastructure 2. Data Rates 1. Limited bitrate 2. Max: 20-25 Mbits/sec With 14 billion LED lighting systems installed worldwide, the field of Visible Light Communication has emerged over the last decade to harness their capabilities. This technology allows devices to take advantage of the rapid modulation made possible by LEDs to transmit data at bitrates of over 100 times that of modern WiFi connections. Over the next few years as VLC research and development rise we can expect to see the addition of photoreceptor sensors for this data transmission on mobile devices such as smartphones and tablets. In the past, sensors such as these were identified to be unsecure in the face of malicious code injection and activation as malware can be transmitted and decoded through sensory input on a device bypassing restrictions in many cases. The research presented here is performed in an effort to secure this sensory channel on Android mobile devices. VLC WIFI 1. Light Implementation 1. Diverse spectrum for data transmission 2. Does not travel through walls 3. Requires minimal installation and infrastructure 2. Data Rates 1. Large bitrate 2. Current rates: 500Mbits/sec AN INTRUSION DETECTION SYSTEM 1. Photoreceptors on the device intended for VLC can capture more than known data transfer signals. 2. A hacker can encode malware through light modulation in an LED system. 3. Photoreceptors on device capture the modulation and preinstalled seemingly harmless code can decrypt the the signal into the intended message. 4. Once on the device it can report back information to the hacker. • System monitors sensory inputs and stores normal responses. • When an abnormality is found in sensory input, GPU levels can be checked for irregularities. • If an irregularity is discovered the input sequence is marked as malicious and will be ignored in the future. IMPLEMENTATION • In Android OS sensors must be called programmatically to power them and begin logging inputs. • By altering the source code provided by Google and installing on a device, sensor data can be made public for the whole system to view. • This data can include the package that calls for the sensor and the sensory data received by the package. • Making this information readily available allows for the creation of an IDS by monitoring data logs and classifying input as normal or malicious. • Sensory inputs and their corresponding GPU level outputs can now be directly linked to the application which calls for the sensor initialization. • The sensory input sequence can be flagged and ignored by the system if it arises again. FUTURE WORK REFERENCES • A. S. Uluagac, V. Subramanian, and R. Beyah. Sensory channel threats to cyber physical systems: A wake-up call. In Communications and Network Security (CNS), 2014 IEEE Conference on, pages 301–309, Oct 2014. • Iker Burguera, Urko Zurutuza, and Simin Nadjm-Tehrani. Crowdroid: Behavior-based malware detection system for android. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM ’11, pages 15–26, New York, NY, USA, 2011. ACM. • H. Elgala, R. Mesleh, and H. Haas. Indoor optical wireless communication: potential and state-of-the-art. IEEE Communications Magazine,49(9):56–62, September 2011. • Y. Tanaka, T. Komine, S. Haruyama and M. Nakagawa, "Indoor visible communication utilizing plural white LEDs as lighting," Personal, Indoor and Mobile Radio Communications, 2001 12th IEEE International Symposium on, San Diego, CA, 2001, pp. F-81-F-85 vol.2. • Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, and Yael Weiss. “Andromaly”: a behavioral malware detection framework for android devices. Journal of Intelligent Information Systems, 38(1):161–190, 2012 VLC ON ANDROID DEVICES • VLC proves to be more secure than WiFi as it does not travel through walls. Eavesdroppers must not only be able to mimic user authentication, but be in the room with the user as well. • This security combined with the bitrates of 500Mbits/sec leads to a large push for VLC on a future generation of smart devices and Android devices specifically. • While VLC is currently possible using the rolling shutter effect of most camera enabled devices on the market, this is significantly slower and consumes a great deal of power to sustain. • In order to use VLC within reasonable limits, Android devices will be equipped with photoreceptors to monitor modulations in light. These sensors will act much like the current light sensors on devices, but with much more accuracy and precision as well as larger power requirements. ACKNOWLEDGEMENTS This work was partly supported by the US NSF Research Experiences for Undergraduates Sites Program Grant No: REU- CNS-1461119. Sensory Channel Intrusion Assessment and Detection [1] Sample Public Log Output