publications
publications by categories in reversed chronological order.
2025
- Interest Flooding Attacks in Named Data Networking and Mitigations: Recent Advances and ChallengesSimeon Ogunbunmi, Yu Chen, Qi Zhao, and 4 more authorsFuture Internet, Aug 2025Publisher: Multidisciplinary Digital Publishing Institute
Named Data Networking (NDN) represents a promising Information-Centric Networking architecture that addresses limitations of traditional host-centric Internet protocols by emphasizing content names rather than host addresses for communication. While NDN offers advantages in content distribution, mobility support, and built-in security features, its stateful forwarding plane introduces significant vulnerabilities, particularly Interest Flooding Attacks (IFAs). These IFA attacks exploit the Pending Interest Table (PIT) by injecting malicious interest packets for non-existent or unsatisfiable content, leading to resource exhaustion and denial-of-service attacks against legitimate users. This survey examines research advances in IFA detection and mitigation from 2013 to 2024, analyzing seven relevant published detection and mitigation strategies to provide current insights into this evolving security challenge. We establish a taxonomy of attack variants, including Fake Interest, Unsatisfiable Interest, Interest Loop, and Collusive models, while examining their operational characteristics and network performance impacts. Our analysis categorizes defense mechanisms into five primary approaches: rate-limiting strategies, PIT management techniques, machine learning and artificial intelligence methods, reputation-based systems, and blockchain-enabled solutions. These approaches are evaluated for their effectiveness, computational requirements, and deployment feasibility. The survey extends to domain-specific implementations in resource-constrained environments, examining adaptations for Internet of Things deployments, wireless sensor networks, and high-mobility vehicular scenarios. Five critical research directions are proposed: adaptive defense mechanisms against sophisticated attackers, privacy-preserving detection techniques, real-time optimization for edge computing environments, standardized evaluation frameworks, and hybrid approaches combining multiple mitigation strategies.
- SD-SAT: software-defined multi-constellation satellite communication traffic management frameworkQi Zhao, Deeraj Nagothu, Xin Tian, and 3 more authorsIET Conference Proceedings, Feb 2025Publisher: The Institution of Engineering and Technology
As Satellite Communication (SATCOM) continues to expand rapidly, the need for dynamic and resilient traffic management solutions tailored to large-scale SATCOM environments is becoming increasingly critical. To address these SATCOM challenges, we introduce the SD-SAT framework, a hierarchical, distributed Software-Defined Networking (SDN) enabled network resource and traffic management solution designed specifically for SATCOM networks. The SD-SAT architecture tackles key issues of scalability, flexibility, and efficiency by integrating multiple SDN controllers across different layers of the system. Within our SD-SAT framework, SDN controllers for individual satellite constellations are aggregated into a "control resource pool", which is managed by an upper-layer SDN control plane. This upper layer ensures global coordination and management, leveraging a distributed cluster of autonomous SDN controllers to enhance coverage, scalability, and resiliency. Additionally, we present a seamless SDN controller migration method that facilitates smooth transitions and load balancing for distributed SDN controllers within the network. The SD-SAT framework not only integrates seamlessly with an existing SATCOM infrastructure but also optimizes resource management and traffic handling across multiple constellations. By adapting distributed SDN control methodologies to the unique demands of SATCOM, the SD-SAT architecture provides a scalable, efficient solution that significantly enhances global connectivity and resource utilization.
- Securing Smart Grid Digital Twins via Real-World ENF Anchors Against Deepfake AttacksMohsen Hatami, Qian Qu, Deeraj Nagothu, and 4 more authorsIn , Mar 2025
Integrating digital twins (DTs) into smart grid systems within the Internet of Smart Grid Things (IoSGT) ecosystem introduces significant security challenges. Advanced Deepfake technologies enable malicious actors to fabricate fraudulent DTs, posing substantial risks to the reliability, safety, and integrity of power grids. This paper introduces ANCHOR-Grid, a novel method to authenticate smart grid DTs by using electric network frequency (ENF) signals as anchors in the real world. By capturing ENF variations from physical grid components and embedding this information into their digital counterparts, ANCHOR-Grid establishes a robust mechanism to enhance the security and trustworthiness of virtual representations, mitigating risks posed by Deepfake attacks. To evaluate the effectiveness of ANCHOR-Grid, we conducted comprehensive simulations and experiments within a virtual smart grid environment. We studied both authentic and deepfake DTs of grid components, with the latter attempting to mimic legitimate behavior while lacking the correct ENF signatures. The results demonstrate that ANCHOR-Grid is promising as a robust security layer for smart grid systems within the IoSGT ecosystem. Our work lays the groundwork for future research on the integration of environmental fingerprints into authentication processes for critical infrastructure and validates the importance of considering physical-world cues in securing digital ecosystems.
- Detecting Manipulated Digital Entities Through Real-World AnchorsRonghua Xu, Xinyun Liu, Deeraj Nagothu, and 2 more authorsIn Advanced Information Networking and Applications, Mar 2025
As the digital and physical worlds become increasingly intertwined, manipulating digital entities, such as avatars, digital twins, and virtual environments, poses significant challenges for forensic analysis. Traditional digital forensics often lacks the mechanisms to detect sophisticated alterations within these virtual constructs. This paper presents a novel framework called DeepAnchor that establishes real-world anchors for effective forensic analysis in digital domains. DeepAnchor adopts a Feature-Integrated and Attention-Enhanced digital watermarking mechanism based on GAN (FIAE-GAN). By creating verifiable links between digital entities and their physical counterparts, DeepAnchor facilitates the detection of manipulations that might otherwise go unnoticed. Through a series of case studies, we demonstrate FIAE-GAN’s ability to detect and analyze manipulated digital entities accurately. DeepAnchor lays the foundation for future forensic strategies to preserve authenticity and trust in an era of increasingly accessible and widespread digital manipulation.
2024
- A Secure Interconnected Autonomous System Architecture for Multi-Domain IoT EcosystemsRonghua Xu, Deeraj Nagothu, Yu Chen, and 3 more authorsIEEE Communications Magazine, Jul 2024Conference Name: IEEE Communications Magazine
The rapid merge of Artificial Intelligence (AI), Internet of Things (IoT), and Blockchain technologies atop the fifth generation and beyond (B5G) communication networks is envisioned to promote Next Generation Networks (NGNs), which aim for a large-scale, high-dimensional, intelligent, decentralized, and autonomous network infrastructure for complex and heterogeneous IoT ecosystems. To develop such an ecosystem, highly connected devices and user-defined applications bring serious connectivity, security, scalability, and interoperability issues to fragmented and isolated domain-specific autonomous networks. This article presents a Secure Interconnected Autonomous System Architecture (SIASA), which combines Software Defined Network (SDN) with the hierarchical blockchain federation to improve dynamicity, scalability, and interoperability for multi-domain IoT networks. Through softwarization and virtualization provided by network slicing (NS), a logic IoT ecosystem consists of multiple isolated physical networks as autonomous systems (ASs) that rely on heterogeneous blockchains to provide decentralization and security for each domain. SIASA adopts a hierarchical network of federated blockchains for inter-blockchain communication. In addition, an intelligent SDN-enabled Blockchain gateway framework is proposed to support scalable and secure transactions and data-sharing operations among interconnected autonomous systems. The experimental results based on a preliminary proof-of-concept prototype verify the feasibility of the proposed SIASA architecture in terms of end-to-end latency and throughput in the inter-blockchain scene.
- The Microverse: A Task-Oriented Edge-Scale MetaverseQian Qu, Mohsen Hatami, Ronghua Xu, and 6 more authorsFuture Internet, Feb 2024
- Generative adversarial networks-based AI-generated imagery authentication using frequency domain analysisNihal Poredi, Monica Sudarsan, Enoch Solomon, and 2 more authorsIn Disruptive Technologies in Information Sciences VIII, Jun 2024
In an era characterized by the prolific generation of digital imagery through advanced artificial intelligence, the need for reliable methods to authenticate actual photographs from AI-generated ones has become paramount. The ever-increasing ubiquity of AI-generated imagery, which seamlessly blends with authentic photographs, raises concerns about misinformation and trustworthiness. Authenticating these images has taken on critical significance in various domains, including journalism, forensic science, and social media. Traditional methods of image authentication often struggle to adapt to the increasingly sophisticated nature of AI-generated content. In this context, frequency domain analysis emerges as a promising avenue due to its effectiveness in uncovering subtle discrepancies and patterns that are less apparent in the spatial domain. Delving into the imperative task of imagery authentication, this paper introduces a novel Generative Adversarial Networks (GANs) based AI-generated Imagery Authentication (GANIA) method using frequency domain analysis. By exploiting the inherent differences in frequency spectra, GANIA uncovers unique signatures that are difficult to replicate, ensuring the integrity and authenticity of visual content. By training GANs on vast datasets of real images, we create AI-generated counterparts that closely mimic the characteristics of authentic photographs. This approach enables us to construct a challenging and realistic dataset, ideal for evaluating the efficacy of frequency domain analysis techniques in image authentication. Our work not only highlights the potential of frequency domain analysis for image authentication but also underscores the importance of adopting generative AI approaches in studying this critical topic. Through this innovative fusion of AI and frequency domain analysis, we contribute to advancing image forensics and preserving trust in visual information in an AI-driven world.
- A lightweight deep learning model for rapid detection of fabricated ENF signals from audio sourcesAdilet Pazylkarim, Deeraj Nagothu, and Yu ChenIn Disruptive Technologies in Information Sciences VIII, Jun 2024
The rapid advancement of multimedia content editing software tools has made it increasingly easy for malicious actors to manipulate real-time multimedia data streams, encompassing audio and video. Among the notorious cybercrimes, replay attacks have gained widespread prevalence, necessitating the development of more efficient authentication methods for detection. A cutting-edge authentication technique leverages Electrical Network Frequency (ENF) signals embedded within multimedia content. ENF signals offer a range of advantageous attributes, including uniqueness, unpredictability, and total randomness, rendering them highly effective for detecting replay attacks. To counter potential attackers who may seek to deceive detection systems by embedding fake ENF signals, this study harnesses the growing accessibility of deep Convolutional Neural Networks (CNNs). These CNNs are not only deployable on platforms with limited computational resources, such as Single-Board Computers (SBCs), but they also exhibit the capacity to swiftly identify interference within a signal by learning distinctive spatio-temporal patterns. In this paper, we explore applying a Computationally Efficient Deep Learning Model (CEDM) as a powerful tool for rapidly detecting potential fabrications within ENF signals originating from diverse audio sources. Our experimental study validates the effectiveness of the proposed method.
- A homogeneous low-resolution face recognition method using correlation features at the edgeXuan Zhao, Deeraj Nagothu, and Yu ChenIn Sensors and Systems for Space Applications XVII, Jun 2024
Face recognition technology has been well investigated in past decades and widely deployed in many real-world applications. However, low-resolution face recognition is still a challenging task in resource-constrained edge computing environment like the Internet of Video Things (IoVT) applications. For instance, low-resolution images are common in surveillance video streams, in which the rare information, variable angles, and light conditions create difficulties for recognition tasks. To address these problems, we optimized the correlation feature face recognition (CoFFaR) method and conducted experimental studies in two data preparation modes, symmetric and exhaustive arranging. The experimental results show that the CoFFaR method achieved an accuracy rate of over 82.56%, and the two-dimensional (2D) feature points after dimension reduction are uniformly distributed in a diagonal pattern. The analysis leads to the conclusion that the data augmentation advantage brought by the method of exhaustive arranging data preparation can effectively improve the performance, and the constraints by making the feature vector closer to its clustering center have no apparent improvement in the accuracy of the model identification.
- Authenticating AI-Generated Social Media Images Using Frequency Domain AnalysisNihal Poredi, Deeraj Nagothu, and Yu ChenIn 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC), Jan 2024ISSN: 2331-9860
Living in the age of social media, it is a daily routine for individuals to post videos, audio, pictures, and text online. In addition, the proliferation of Artificial Intelligence (AI) technology allows customizing multimedia content to meet personal demands. However, the popularity of AI-based text-to-image generators like DeepAI also opens the door to generating images for social media platforms that impersonate unsuspecting users without their permission. While people enjoy high creativity, such “fake” images could enable the propagation of deceptive information that negatively impacts an individual’s personal life and potentially cause public unrest. Therefore, reliable methods to facilitate image authentication are vital to identify and flag them. In this paper, we present AUSOME-2, an upgraded version of our system that AUthenticates SOcial MEdia images (AUSOME) using frequency analysis technologies and machine learning (ML) algorithms. Images from several text-to-image platforms, such as Dall-E 2 and Google Deep Dream, are distinguished from genuine images. Spectral analysis techniques are used to obtain features and fingerprints in the frequency domain. These features enable the ML model to classify AI -generated social media images from genuine ones. The experimental results, on top of a proof-of-concept prototype, showed that the AUSOME-2 system is a promising approach to authenticate images with decent detection accuracy.
- AR-Edge: Autonomous and Resilient Edge Computing Architecture for Smart CitiesRonghua Xu, Deeraj Nagothu, Yu Chen, and 3 more authorsJul 2024
\textlessp id="p1"\textgreaterWith the rapid advancements in artificial intelligence (AI), the Internet of Things (IoT), and network communication technologies, recent years have witnessed a boom in smart cities that has dramatically changed human life and society. While many smart city applications rely on cloud servers, enabling comprehensive information fusion among users, smart devices, and service providers to provide diverse, intelligent applications, IoT networks’ high dynamicity and heterogeneity also bring performance, security, and interoperability challenges to centralized service frameworks. This chapter introduces a novel Autonomous and Resilient Edge (AR-Edge) computing architecture, which integrates AI, software-defined network (SDN), and Blockchain technologies to enable next-generation edge computing networks. Thanks to capabilities in terms of logically centralized control, global network status, and programmable traffic rules, SDN allows for efficient edge resource coordination and optimization with the help of artificial intelligence methods, like large language models (LLM). In addition, a federated microchain fabric is utilized to ensure the security and resilience of edge networks in a decentralized manner. The AR-Edge aims to provide autonomous, secure, resilient edge networks for dynamic and complex IoT ecosystems. Finally, a preliminary proof-of-concept prototype of an intelligent transportation system (ITS) demonstrates the feasibility of applying AR-Edge in real-world scenarios.\textless/p\textgreater
2023
- Decentralized Vehicular Identification and Tracking on Lightweight IoT Edge NodesJohn Parker, Deeraj Nagothu, and Yu ChenIn NAECON 2023 - IEEE National Aerospace and Electronics Conference, Aug 2023ISSN: 2379-2027
Video Surveillance Systems (VSSs) are among the most investigated and widely adopted systems in smart cities by administrative officials for public safety and by private sector individuals to secure residents, employees, and properties. While many new technologies based on Machine Learning (ML) have enabled systems to be utilized for a diverse set of applications, such as license plate detection and car YMM (Year, Make Model) classification, one of the underlying concerns behind VSSs for both public and private sectors is the cost and resource constraints of the devices themselves. Given that optical character recognition and object detection are already computing and data-intensive activities, both in regards to the training of those ML models, as well as the real-time processing of the data, it is highly desired to create or optimize systems to operate on lightweight Internet of Things (IoT) devices. In this paper, we introduce a lightweight scheme for Decentralized Vehicular Identification (DEVID), which is affordable to inexpensive IoT devices as long as they are capable of managing their inputs and outputs (IO) in a fashion that is not costly in terms of storage or power consumption. While the performance in the experimental study is not satisfactory, the DEVID system possesses the potential to be a cost-friendly lightweight solution for smart cities.
- Application of Electrical Network Frequency as an Entropy Generator in Distributed SystemsDeeraj Nagothu, Ronghua Xu, Yu Chen, and 2 more authorsIn NAECON 2023 - IEEE National Aerospace and Electronics Conference, Aug 2023ISSN: 2379-2027
The development of public information technology (IT) infrastructures using modern edge devices has revolutionized the smart city ecosystem. As the number of devices in the ecosystem exponentially increases, the power grid infrastructure has continued to function as the backbone of smart cities and support the growing requirements for electricity, such as multimedia services. Media authentication technology leveraging the power system frequency, the Electrical Network Frequency (ENF) signal, has gained traction as an environmental fingerprint to counteract visual layer attacks targeted toward multimedia-based edge devices. Due to the unique and similar fluctuation patterns throughout the grid, the ENF signal is reliable in applications like multimedia synchronization, authentication, and source identification. ENF -based systems are inevitably targeted by perpetrators to bypass their detection schemes; however, such attacks are successful only if the ENF fingerprint can be pre-dicted. In this work, we studied the randomization nature of ENF signals and the societal impacts on its fluctuation patterns due to power grid consumption. Leveraging the ENF signal fluctuations, we integrate ENF as a source of randomness for the Random Bit Generator (RBG) system in cryptographic applications. An RBG-based encrypted communication and committee election mechanism is proposed for an enhanced distribution multimedia system. The paper further discusses the potential applications of the ENF -based randomness generator.
- AUSOME: authenticating social media images using frequency analysisNihal Poredi, Deeraj Nagothu, and Yu ChenIn Disruptive Technologies in Information Sciences VII, Jun 2023
Ever since human society entered the age of social media, every user has had a considerable amount of visual content stored online and shared in variant virtual communities. As an efficient information circulation measure, disastrous consequences are possible if the contents of images are tampered with by malicious actors. Specifically, we are witnessing the rapid development of machine learning (ML) based tools like DeepFake apps. They are capable of exploiting images on social media platforms to mimic a potential victim without their knowledge or consent. These content manipulation attacks can lead to the rapid spread of misinformation that may not only mislead friends or family members but also has the potential to cause chaos in public domains. Therefore, robust image authentication is critical to detect and filter off manipulated images. In this paper, we introduce a system that accurately AUthenticates SOcial MEdia images (AUSOME) uploaded to online platforms leveraging spectral analysis and ML. Images from DALL-E 2 are compared with genuine images from the Stanford image dataset. Discrete Fourier Transform (DFT) and Discrete Cosine Transform (DCT) are used to perform a spectral comparison. Additionally, based on the differences in their frequency response, an ML model is proposed to classify social media images as genuine or AI-generated. Using real-world scenarios, the AUSOME system is evaluated on its detection accuracy. The experimental results are encouraging and they verified the potential of the AUSOME scheme in social media image authentications.
- DEMA: decentralized electrical network frequency map for social media authenticationDeeraj Nagothu, Ronghua Xu, and Yu ChenIn Disruptive Technologies in Information Sciences VII, Jun 2023
The information era has gained a lot of traction due to the abundant digital media contents through technological broadcasting resources. Among the information providers, the social media platform has remained a popular platform for the widespread reach of digital content. Along with accessibility and reach, social media platforms are also a huge venue for spreading misinformation since the data is not curated by trusted authorities. With many malicious participants involved, artificially generated media or strategically altered content could potentially result in affecting the integrity of targeted organizations. Popular content generation tools like DeepFake have allowed perpetrators to create realistic media content by manipulating the targeted subject with a fake identity or actions. Media metadata like time and location-based information are altered to create a false perception of real events. In this work, we propose a Decentralized Electrical Network Frequency (ENF)-based Media Authentication (DEMA) system to verify the metadata information and the digital multimedia integrity. Leveraging the environmental ENF fingerprint captured by digital media recorders, altered media content is detected by exploiting the ENF consistency based on its time and location of recording along with its spatial consistency throughout the captured frames. A decentralized and hierarchical ENF map is created as a reference database for time and location verification. For digital media uploaded to a broadcasting service, the proposed DEMA system correlates the underlying ENF fingerprint with the stored ENF map to authenticate the media metadata. With the media metadata intact, the embedded ENF in the recording is compared with a reference ENF based on the time of recording, and a correlation-based metric is used to evaluate the media authenticity. In case of missing metadata, the frames are divided spatially to compare the ENF consistency throughout the recording.
- Authentication of Video Feeds in Smart Edge Surveillance NetworksDeeraj Nagothu, and Yu ChenJun 2023
- Lightweight Multimedia Authentication at the Edge Using Environmental FingerprintDeeraj NagothuJun 2023ISBN: 9798380566988
With the fast development of Fifth-/Sixth-Generation (5G/6G) communications and the Internet of Video Things (IoVT), a broad range of mega-scale data applications have emerged. The rapid deployment of IoVT devices in modern smart cities has enabled secure infrastructures with minimal human intervention. Accompanied by the proliferation of multimedia is the increasing number of attacks against the IoVT systems. With increased onboard computational resources and technological advances in machine learning (ML) models, attack vectors and detection techniques have evolved to use ML-based techniques more effectively, resulting in non-equilibrium dynamics. Modern Artificial Intelligence (AI) technology is integrated with many multimedia applications to help enhance its applications. However, the development of General Adversarial Networks (GANs) also led to DeepFake attacks resulting in the misuse of AI. Instead of engaging in an endless AI arms race “fighting fire with fire”, where new Deep Learning (DL) algorithms keep making fake media more realistic and inadvertently causing the spread of misinformation, this dissertation proposes a novel authentication approach leveraging the Electrical Network Frequency (ENF) signals embedded in the multimedia as an environmental fingerprint against visual layer attacks. An ENF operates at a nominal frequency of 60 Hz/50 Hz based on the geographical location and maintains similar fluctuations throughout the power grid. The multimedia recordings can be verified using signal consistency and similarity by leveraging the time-varying nature of the ENF signal collected from both the Audio-Video recordings and simultaneous ground truth ENF. By studying the spectral estimation techniques STFT and MUSIC along with robust frequency enhancement techniques like Weighted Harmonic Combination and Robust Filtering Algorithm (RFA), the optimal ENF estimation workflow for online forgery detection is analyzed and presented. To improve ENF-based authentication performance, frame processing techniques like Selective Superpixel Masking (SSM) to minimize noise from moving subjects and Singular Spectrum Analysis (SSA) to minimize false alarms in detection are introduced. Equipped with reliable and robust algorithms, AI-generated media like DeepFake can be detected leveraging the ENF-based authentication system proposed as DeFakePro. Furthermore, the synchronous random fluctuations of ENF throughout the grid are integrated as part of a distributed consensus mechanism for IoVT devices, where the proposed LEFC system can detect faulty nodes with fake media broadcast in the network. Along with online detection capabilities, the DEMA system exploits the media metadata information to verify the source based on the time and location of recording using the reference ENF database from all interconnects. The experimental results show that the proposed systems designed using ENF as the environmental fingerprint can enable effective detection and authentication measures against visual layer attacks.
2022
- Deterring Deepfake Attacks with an Electrical Network Frequency Fingerprints ApproachDeeraj Nagothu, Ronghua Xu, Yu Chen, and 2 more authorsFuture Internet, May 2022
With the fast development of Fifth-/Sixth-Generation (5G/6G) communications and the Internet of Video Things (IoVT), a broad range of mega-scale data applications emerge (e.g., all-weather all-time video). These network-based applications highly depend on reliable, secure, and real-time audio and/or video streams (AVSs), which consequently become a target for attackers. While modern Artificial Intelligence (AI) technology is integrated with many multimedia applications to help enhance its applications, the development of General Adversarial Networks (GANs) also leads to deepfake attacks that enable manipulation of audio or video streams to mimic any targeted person. Deepfake attacks are highly disturbing and can mislead the public, raising further challenges in policy, technology, social, and legal aspects. Instead of engaging in an endless AI arms race “fighting fire with fire”, where new Deep Learning (DL) algorithms keep making fake AVS more realistic, this paper proposes a novel approach that tackles the challenging problem of detecting deepfaked AVS data leveraging Electrical Network Frequency (ENF) signals embedded in the AVS data as a fingerprint. Under low Signal-to-Noise Ratio (SNR) conditions, Short-Time Fourier Transform (STFT) and Multiple Signal Classification (MUSIC) spectrum estimation techniques are investigated to detect the Instantaneous Frequency (IF) of interest. For reliable authentication, we enhanced the ENF signal embedded through an artificial power source in a noisy environment using the spectral combination technique and a Robust Filtering Algorithm (RFA). The proposed signal estimation workflow was deployed on a continuous audio/video input for resilience against frame manipulation attacks. A Singular Spectrum Analysis (SSA) approach was selected to minimize the false positive rate of signal correlations. Extensive experimental analysis for a reliable ENF edge-based estimation in deepfaked multimedia recordings is provided to facilitate the need for distinguishing artificially altered media content.
- Robustness of Electrical Network Frequency Signals as a Fingerprint for Digital Media AuthenticationNihal Poredi, Deeraj Nagothu, Yu Chen, and 4 more authorsIn 2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP), Sep 2022
Leveraging modern Artificial Intelligence (AI) technology, Deepfake attacks manipulate audio/video streams (AVS) to mimic any targeted person or scenario. Deepfake attacks are highly disturbing, and the misinformation can mislead the public, raising further challenges in policy, technical, social, and legal aspects. Electrical Network Frequency (ENF) signals embedded in AVS data are promising to be utilized as fingerprints to authenticate digital media and timely detect deepfaked audio or video. Meanwhile, the success of ENF-based deepfake detection approaches will be forfeited if attackers can create false ENF fingerprints to fool the detector. In this paper, a thorough experimental study validates the robustness of ENF signals as a fingerprint for digital media authentication. Taking statistical, supervised learning, and deep learning approaches, this work shows that it is infeasible to forecast the future ENF signals based on historical records. While strict theoretical proof is yet to be done, this work experimentally verifies ENF signals as a reliable fingerprint to authenticate digital media.
- A Distributed Crawler for IoVT-based Public Safety Surveillance Exploring the Spatio-Temporal CorrelationDeeraj Nagothu, Daniel Dimock, Adrian Kulesza, and 2 more authorsIn Sensors and Systems for Space Applications XV, Jun 2022
Modern infrastructure development has led to a rise in deployed surveillance cameras to monitor remote locations and widespread infrastructures. In today’s networked surveillance environment, however, human operators are often overwhelmed with the huge amount of visual feeds, which causes poor judgment and delayed response to emergencies. This paper proposes a distributed crawler scheme (DiCrawler) for smart surveillance systems deployed on Internet of Video Things (IoVT). The IoVT camera nodes monitor continuous video input, track the object of interest while preserving privacy, and relay correlative information to targeted nodes for constant monitoring. Each IoVT node monitors the space inside its field of view (FoV) and notifies the neighboring nodes about the objects leaving the FoV and heading in their directions. A smart communication algorithm among IoVT nodes is designed to prevent network bandwidth bottlenecks and preserve computational power. The DiCrawler system can corroborate with human operators and assist with decision-making by raising alarms in case of suspicious behavior. The IoVT network is completely decentralized, using only peer-to-peer (P2P) communication. DiCrawler does not rely on a central server for any computations, preventing a potential bottleneck if hundreds of cameras were connected and constantly uploading data to a server. Each module is also in a compact form factor, making it viable to be mounted on traditional security surveillance cameras. Extensive experimental study on a proof-of-concept prototype validated the effectiveness of the DiCrawler design.
- DeFakePro: Decentralized Deepfake Attacks Detection Using ENF AuthenticationDeeraj Nagothu, Ronghua Xu, Yu Chen, and 2 more authorsIT Professional, Sep 2022
Advancements in generative models, such as deepfake, allow users to imitate a targeted person and manipulate online interactions. It has been recognized that disinformation may cause disturbance in society and ruin the foundation of trust. This article presents DeFakePro, a decentralized consensus mechanism-based deepfake detection technique in online video conferencing tools. Leveraging electrical network frequency (ENF), an environmental fingerprint embedded in digital media recording affords a consensus mechanism design called proof-of-ENF (PoENF) algorithm. The similarity in ENF signal fluctuations is utilized in the PoENF algorithm to authenticate the media broadcasted in conferencing tools. By utilizing the video conferencing setup with malicious participants to broadcast deepfake video recordings to other participants, the DeFakePro system verifies the authenticity of the incoming media in both audio and video channels.
- ECOM: Epoch Randomness-Based Consensus Committee Configuration for IoT BlockchainsRonghua Xu, Deeraj Nagothu, and Yu ChenSep 2022
The rapid advancement in Artificial Intelligence (AI) based on large-scale Internet of Things (IoT) networks leads to the proliferation of new smart applications that enable Smart Cities. Since the cryptocurrency Bitcoin, blockchain technology has evolved for extensive applications in various financial services and industrial applications. The increase in research interest from academic and industrial perspectives aims to exploit blockchain technology to enable a decentralized, verifiable, and traceable IoT networks. However, directly integrating cryptocurrency-oriented blockchain technologies into IoT systems faces performance and scalability issues. Splitting the whole blockchain network into multiple independent small-scale consensus networks is promising to overcome performance and scalability problems in heterogeneous IoT networks. In this chapter, following an in-depth review of state-of-the-art solutions for scaling blockchain networks, key design challenges and techniques are identified in terms of epoch randomness generation, network traffic model, and consensus committee configuration. Focusing on scalable and secure random committee selection, this chapter introduces an epoch randomness-enabled consensus committee configuration (ECOM) scheme. A proof-of-concept prototype is implemented and evaluated on a physical network that uses Raspberry Pis to simulate IoT devices. The experimental results show that the proposed ECOM protocol efficiently guarantees unpredictable randomness generation and committee selection under a small-scale byzantine network environment.
- Evolution of Attacks on Intelligent Surveillance Systems and Effective Detection TechniquesDeeraj Nagothu, Nihal Poredi, and Yu ChenAug 2022
Intelligent surveillance systems play an essential role in modern smart cities to enable situational awareness. As part of the critical infrastructure, surveillance systems are often targeted by attackers aiming to compromise the security and safety of smart cities. Manipulating the audio or video channels could create a false perception of captured events and bypass detection. This chapter presents an overview of the attack vectors designed to compromise intelligent surveillance systems and discusses existing detection techniques. With advanced machine learning (ML) models and computing resources, both attack vectors and detection techniques have evolved to use ML-based techniques more effectively, resulting in non-equilibrium dynamics. The current detection techniques vary from training a neural network to detect forgery artifacts to use the intrinsic and extrinsic environmental fingerprints for any manipulations. Therefore, studying the effectiveness of different detection techniques and their reliability against the defined attack vectors is a priority to secure the system and create a plan of action against potential threats.
2021
- EconLedger: A Proof-of-ENF Consensus Based Lightweight Distributed Ledger for IoVT NetworksRonghua Xu, Deeraj Nagothu, and Yu ChenFuture Internet, Oct 2021
The rapid advancement in artificial intelligence (AI) and wide deployment of Internet of Video Things (IoVT) enable situation awareness (SAW). The robustness and security of IoVT systems are essential for a sustainable urban environment. While blockchain technology has shown great potential in enabling trust-free and decentralized security mechanisms, directly embedding cryptocurrency oriented blockchain schemes into resource-constrained Internet of Video Things (IoVT) networks at the edge is not feasible. By leveraging Electrical Network Frequency (ENF) signals extracted from multimedia recordings as region-of-recording proofs, this paper proposes EconLedger, an ENF-based consensus mechanism that enables secure and lightweight distributed ledgers for small-scale IoVT edge networks. The proposed consensus mechanism relies on a novel Proof-of-ENF (PoENF) algorithm where a validator is qualified to generate a new block if and only if a proper ENF-containing multimedia signal proof is produced within the current round. The decentralized database (DDB) is adopted in order to guarantee efficiency and resilience of raw ENF proofs on the off-chain storage. A proof-of-concept prototype is developed and tested in a physical IoVT network environment. The experimental results validated the feasibility of the proposed EconLedger to provide a trust-free and partially decentralized security infrastructure for IoVT edge networks.
- Authenticating Video Feeds Using Electric Network Frequency Estimation at the EdgeDeeraj Nagothu, Yu Chen, Alexander Aved, and 1 more authorEAI Endorsed Transactions on Security and Safety, Feb 2021
- Decentralized Video Input Authentication as an Edge Service for Smart CitiesRonghua Xu, Deeraj Nagothu, and Yu ChenIEEE Consumer Electronics Magazine, Nov 2021
Situational awareness is essential for a safe and sustainable urban environment. While the wide deployment of Internet of Video Things (IoVT) enables efficient monitoring of the footage of the Smart Cities, it also attracts attackers and abusers. Disinformation injected into the IoVT can mislead the city administrations, policy makers, and emergency responders, and lead to disastrous consequences. It is very challenging to timely authenticate each video stream from pervasively deployed IoVT devices. This article presents a Blockchain Enhanced Video input Authentication (BEVA) scheme as an edge service to fight against the visual layer attacks on smart IoVT systems such as online false video injection and offline video streams tampering attacks. The BEVA scheme leverages the electrical network frequency (ENF) embedded in video recordings as an environmental fingerprint for online false frame detection. Blockchain is integrated to enable a decentralized security networking infrastructure, and it empowers an immutable, traceable, and auditable distributed ledger for ENF-based authentication scheme without relying on a third-party trust authority. This secure-by-design solution efficiently provides trust and secure services in IoVT in modern Smart Cities.
- CriPI: An Efficient Critical Pixels Identification Algorithm for Fast One-Pixel AttacksWei Quan, Deeraj Nagothu, Nihal Poredi, and 1 more authorIn Sensors and Systems for Space Applications XIV, Apr 2021
Deep neural networks (DNN) have been studied intensively in recent years, leading to many practical applications. However, there are also concerns about the security problems and vulnerabilities of DNN. Studies on adversarial network development have shown that relatively more minor perturbations can impact the DNN performance and manipulate its outcome. The impacts of adversarial perturbations have led to the development of advanced techniques for generating image-level perturbations. Once embedded in a clean image, these perturbations are not perceptible to human eyes and fool a well-trained deep learning (DL) convolutional neural network (CNN) classifier. This work introduces a new Critical-Pixel Iterative (CriPI) algorithm after a thorough study on critical pixels’ characteristics. The proposed CriPI algorithm can identify the critical pixels and generate one-pixel attack perturbations with a much higher efficiency. Compared to a one-pixel attack benchmark algorithm, the CriPI algorithm significantly reduces the time delay of the attack from seven minutes to one minute with similar success rates.
- DeFake: Decentralized ENF-Consensus Based DeepFake Detection in Video ConferencingDeeraj Nagothu, Ronghua Xu, Yu Chen, and 2 more authorsIn IEEE 23rd International Workshop on Multimedia Signal Processing, Oct 2021
- Detecting Compromised Edge Smart Cameras Using Lightweight Environmental Fingerprint ConsensusDeeraj Nagothu, Ronghua Xu, Yu Chen, and 2 more authorsIn Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems, Nov 2021
Rapid advances in the Internet of Video Things (IoVT) deployment in modern smart cities has enabled secure infrastructures with minimal human intervention. However, attacks on audio-video inputs affect the reliability of large-scale multimedia surveillance systems as attackers are able to manipulate the perception of live events. For example, Deepfake audio/video attacks and frame duplication attacks can cause significant security breaches. This paper proposes a Lightweight Environmental Fingerprint Consensus based detection of compromised smart cameras in edge surveillance systems (LEFC). LEFC is a partial decentralized authentication mechanism that leverages Electrical Network Frequency (ENF) as an environmental fingerprint and distributed ledger technology (DLT). An ENF signal carries randomly fluctuating spatio-temporal signatures, which enable digital media authentication. With the proposed DLT consensus mechanism named Proof-of-ENF (PoENF) as a backbone, LEFC can estimate and authenticate the media recording and detect byzantine nodes controlled by the perpetrator. The experimental evaluation shows feasibility and effectiveness of proposed LEFC scheme under a distributed byzantine network environment.
2020
- BlendSPS: A BLockchain-ENabled Decentralized Smart Public Safety SystemRonghua Xu, Seyed Yahya Nikouei, Deeraj Nagothu, and 2 more authorsSmart Cities, Sep 2020
Due to the recent advancements in the Internet of Things (IoT) and Edge-Fog-Cloud Computing technologies, the Smart Public Safety (SPS) system has become a more realistic solution for seamless public safety services that are enabled by integrating machine learning (ML) into heterogeneous edge computing networks. While SPS facilitates convenient exchanges of surveillance data streams among device owners and third-party applications, the existing monolithic service-oriented architecture (SOA) is unable to provide scalable and extensible services in a large-scale heterogeneous network environment. Moreover, traditional security solutions rely on a centralized trusted third-party authority, which not only can be a performance bottleneck or the single point of failure, but it also incurs privacy concerns on improperly use of private information. Inspired by blockchain and microservices technologies, this paper proposed a BLockchain-ENabled Decentralized Smart Public Safety (BlendSPS) system. Leveraging the hybrid blockchain fabric, a microservices based security mechanism is implemented to enable decentralized security architecture, and it supports immutability, auditability, and traceability for secure data sharing and operations among participants of the SPS system. An extensive experimental study verified the feasibility of the proposed BlendSPS that possesses security and privacy proprieties with limited overhead on IoT based edge networks.
- Enabling Continuous Operations for UAVs with an Autonomous Service Network InfrastructureMichael Rosenberg, John Henry Burns, Deeraj Nagothu, and 1 more authorIn Sensors and Systems for Space Applications XIII, Apr 2020
One of the major restrictions on the practical applications of unmanned aerial vehicles (UAV) is their incomplete self-sufficiency, which makes continuous operations infeasible without human oversights. The more oversight UAVs require, the less likely they are going to be commercially advantageous when compared to their alternatives. As an autonomous system, how much human interaction is needed to function is one of the best indicators evaluating the limitations and inefficiencies of the UAVs. Popular UAV related research areas, such as path planning and computer vision, have enabled substantial advances in the ability of drones to act on their own. This research is dedicated to in-flight operations, in which there is not much reported effort to tackle the problem from the aspect of the supportive infrastructure. In this paper, an Autonomous Service network infrastructure (AutoServe) is proposed. Aiming at increasing the future autonomy of UAVs, the AutoServe system includes a service-oriented landing platform and a customized communication protocol. This supportive AutoServe infrastructure will autonomize many tasks currently done manually by human operators, such as battery replacement. A proof-of-concept prototype has been built and the simulation experimental study validated the design.
- Smart Surveillance for Public Safety Enabled by Edge ComputingDeeraj Nagothu, Ronghua Xu, Seyed Yahya Nikouei, and 2 more authorsApr 2020
2019
- Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency SignalsDeeraj Nagothu, Yu Chen, Erik Blasch, and 2 more authorsSensors (Basel)., Apr 2019
Over the past few years, the importance of video surveillance in securing national critical infrastructure has significantly increased, with applications including the detection of failures and anomalies. Accompanied by the proliferation of video is the increasing number of attacks against surveillance systems. Among the attacks, False Frame Injection (FFI) attacks that replay video frames from a previous recording to mask the live feed has the highest impact. While many attempts have been made to detect FFI frames using features from the video feeds, video analysis is computationally too intensive to be deployed on-site for real-time false frame detection. In this paper, we investigated the feasibility of FFI attacks on compromised surveillance systems at the edge and propose an effective technique to detect the injected false video and audio frames by monitoring the surveillance feed using the embedded Electrical Network Frequency (ENF) signals. An ENF operates at a nominal frequency of 60 Hz/50 Hz based on its geographical location and maintains a stable value across the entire power grid interconnection with minor fluctuations. For surveillance system video/audio recordings connected to the power grid, the ENF signals are embedded. The time-varying nature of the ENF component was used as a forensic application for authenticating the surveillance feed. The paper highlights the ENF signal collection from a power grid creating a reference database and ENF extraction from the recordings using conventional short-time Fourier Transform and spectrum detection for robust ENF signal analysis in the presence of noise and interference caused in different harmonics. The experimental results demonstrated the effectiveness of ENF signal detection and/or abnormalities for FFI attacks.
- A Microservice-Enabled Architecture for Smart Surveillance Using Blockchain TechnologyDeeraj Nagothu, Ronghua Xu, Seyed Y. Nikouei, and 1 more authorIn 2018 IEEE Int. Smart Cities Conf. ISC2 2018, Apr 2019
While the smart surveillance system enhanced by the Internet of Things (IoT) technology becomes an essential part of Smart Cities, it also brings new concerns in security of the data. Compared to the traditional surveillance systems that is built following a monolithic architecture to carry out lower level operations, such as monitoring and recording, the modern surveillance systems are expected to support more scalable and decentralized solutions for advanced video stream analysis at the large volumes of distributed edge devices. In addition, the centralized architecture of the conventional surveillance systems is vulnerable to single point of failure and privacy breach owning to the lack of protection to the surveillance feed. This position paper introduces a novel secure smart surveillance system based on microservices architecture and blockchain technology. Encapsulating the video analysis algorithms as various independent microservices not only isolates the video feed from different sectors, but also improve the system availability and robustness by decentralizing the operations. The blockchain technology securely synchronizes the video analysis databases among microservices across surveillance domains, and provides tamper proof of data in the trustless network environment. Smart contract enabled access authorization strategy prevents any unauthorized user from accessing the microservices and offers a scalable, decentralized and fine-grained access control solution for smart surveillance systems.
- A Study on Smart Online Frame Forging Attacks against Video Surveillance SystemDeeraj Nagothu, Jacob Schwell, Yu Chen, and 2 more authorsIn Proc. SPIE - Int. Soc. Opt. Eng., Apr 2019
Video Surveillance Systems (VSS) have become an essential infrastructural element of smart cities by increasing public safety and countering criminal activities. A VSS is normally deployed in a secure network to prevent the access from unauthorized personnel. Compared to traditional systems that continuously record video regardless of the actions in the frame, a smart VSS has the capability of capturing video data upon motion detection or object detection, and then extracts essential information and send to users. This increasing design complexity of the surveillance system, however, also introduces new security vulnerabilities. In this work, a smart, real-time frame duplication attack is investigated. We show the feasibility of forging the video streams in real-time as the camera’s surroundings change. The generated frames are compared constantly and instantly to identify changes in the pixel values that could represent motion detection or changes in light intensities outdoors. An attacker (intruder) can remotely trigger the replay of some previously duplicated video streams manually or automatically, via a special quick response (QR) code or when the face of an intruder appear in the camera field of view. A detection technique is proposed by leveraging the real-time electrical network frequency (ENF) reference database to match with the power grid frequency.
- Real-Time Index Authentication for Event-Oriented Surveillance Video Query Using BlockchainSeyed Y. Nikouei, Ronghua Xu, Deeraj Nagothu, and 3 more authorsIn 2018 IEEE Int. Smart Cities Conf. ISC2 2018, Apr 2019
Information from surveillance video is essential for situational awareness (SAW). Nowadays, a prohibitively large amount of surveillance data is being generated continuously by ubiquitously distributed video sensors. It is very challenging to immediately identify the objects of interest or zoom in suspicious actions from thousands of video frames. Making the big data indexable is critical to tackle this problem. It is ideal to generate pattern indexes in a real-Time, on-site manner on the video streaming instead of depending on the batch processing at the cloud centers. The modern edge-fog-cloud computing paradigm allows implementation of time sensitive tasks at the edge of the network. The on-site edge devices collect the information sensed in format of frames and extracts useful features. The near-site fog nodes conduct the contextualization and classification of the features. The remote cloud center is in charge of more data intensive and computing intensive tasks. However, exchanging the index information among devices in different layers raises security concerns where an adversary can capture or tamper with features to mislead the surveillance system. In this paper, a blockchain enabled scheme is proposed to protect the index data through an encrypted secure channel between the edge and fog nodes. It reduces the chance of attacks on the small edge and fog devices. The feasibility of the proposal is validated through intensive experimental analysis.
- A Distributed Agent-Based Framework for a Constellation of Drones in a Military OperationAlem H. Fitwi, Deeraj Nagothu, Yu Chen, and 1 more authorIn Proc. - Winter Simul. Conf., Apr 2019
A seamless communication capability is important in military operations. Likewise, enhanced security, increased capacity, and robust communication mechanisms are vital for humanitarian and disaster-response operations. Often, a system of wide-band satellites is employed for real-time exchange of information and over-the-horizon control, but the communications are prone to denial of service (DoS) attacks, and delayed redeployment. Hence, a swarm of drones could be deployed in mission-critical operations in times of urgency for a secured and robust distributed-intercommunication which is essential for survivability and successful completion of missions. In this paper, a distributed-agent-based framework for secure and reliable information exchange between drones in a constellation is proposed. The framework comprises a mechanism for path planning simulation and estimation, a flexible network architecture for improved client-server(C/S) and peer-to-peer (P2P) connectivity, as well as agents for identity authentications and secure communications. The framework has been simulated and verified with results showing promise.
2017
- iCrawl: A Visual High Interaction Web CrawlerDeeraj Nagothu, and Andrey DolgikhIn Lect. Notes Comput. Sci. (Including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), Apr 2017
This paper presents “iCrawl”, a visual high interaction client honeypot system. Web-based cyber-attacks have increased exponentially along with the growth of cloud-based web application technologies. Web browsers provide users with an entry point to these web applications. The iCrawl system is designed to deliver a high interaction honey client that is virtually indistinguishable from a real human-driven client. The system operates by driving an actual web browser in a fashion closely resembling a genuine user’s actions. Unlike most crawlers iCrawl attempts to operate over visual elements on the web page, not code elements. The honeypot system consists of pre-configured decoy virtual machines. Each virtual machine includes spider program, which upon execution automates the process of driving the web browser and crawling the targeted website. It performs browsing by observing the page and simulating human user input through mouse and keyboard activity. The data collected from the crawling is stored in a graph database in the form of nodes and relations. This data captures the context and the changes in system behavior due to interaction with the crawled website. The graph data can be queried and monitored online for structural patterns and anomalies. The iCrawl system is enabling technology for studying sophisticated malicious websites that can avoid detection by the simpler crawlers typically utilized by well-known security companies.
2016
- iCrawl: A High Interaction Client Honeypot SystemDeeraj NagothuDec 2016
This thesis presents “iCrawl”, a high interaction client honeypot system. Web-based cyber-attacks have increased exponentially along with the growth of cloud-based web application technologies. Web browsers provide users with an entry point to these web applications. This makes browsers a valuable target for attackers. The iCrawl system is designed to provide a high interaction honey client that is virtually indistinguishable from a real human driven client. The system operates by driving an actual web browser in a fashion closely resembling a genuine user’s actions. The honeypot system consists of pre-configured decoy virtual machines. Each virtual machine consists of spider programs, which upon execution automate the process of driving the web browser and crawling the targeted website by simulating human user behavior through mouse and keyboard interaction. The data collected from the crawling is stored in a graph database in the form of nodes and relations. This data together in the graph database represents the changes in system behavior due to interaction with the crawled website. The iCrawl system is enabling technology for studying sophisticated malicious websites that are capable of avoiding detection by the simpler crawlers typically utilized by well-known security companies.