Visible to the public Biblio

Filters: Keyword is VLC  [Clear All Filters]
2022-05-10
Pham, Thanh V., Pham, Anh T..  2021.  Energy-Efficient Friendly Jamming for Physical Layer Security in Visible Light Communication. 2021 IEEE International Conference on Communications Workshops (ICC Workshops). :1–6.
This work studies an energy-efficient jamming scheme for enhancing physical layer security in visible light communication (VLC). We consider a VLC system where multiple LED luminaries are deployed together with a legitimate user (i.e., Bob) and passive eavesdroppers (i.e., Eves). In such a scenario, the closest LED luminary to Bob serves as the transmitter while the rest of the luminaries act as jammers transmitting artificial noise (AN) to possibly degrade the quality of Eves' channels. A joint design of precoder and AN is then investigated to maximize the energy efficiency (EE) of the communication channel to Bob while ensuring a certain amount of AN power to confuse Eves. To solve the design problem, we make use of a combination of the Dinkelbach and convex-concave procedure (CCCP), which guarantees to converge to a local optimum.
2021-05-18
Soderi, Simone.  2020.  Enhancing Security in 6G Visible Light Communications. 2020 2nd 6G Wireless Summit (6G SUMMIT). :1–5.
This paper considers improving the confidentiality of the next generation of wireless communications by using the watermark-based blind physical layer security (WBPLSec) in Visible Light Communications (VLCs). Since the growth of wireless applications and service, the demand for a secure and fast data transfer connection requires new technology solutions capable to ensure the best countermeasure against security attacks. VLC is one of the most promising new wireless communication technology, due to the possibility of using environmental artificial lights as data transfer channel in free-space. On the other hand, VLCs are even inherently susceptible to eavesdropping attacks. This work proposes an innovative scheme in which red, green, blue (RGB) light-emitting-diodes (LEDs) and three color-tuned photo-diodes (PDs) are used to secure a VLC by using a jamming receiver in conjunction with the spread spectrum watermarking technique. To the best of the author's knowledge, this is the first work that deals with physical layer security on VLC by using RGB LEDs.
Chu, Wen-Yi, Yu, Ting-Guang, Lin, Yu-Kai, Lee, Shao-Chuan, Hsiao, Hsu-Chun.  2020.  On Using Camera-based Visible Light Communication for Security Protocols. 2020 IEEE Security and Privacy Workshops (SPW). :110–117.
In security protocol design, Visible Light Communication (VLC) has often been abstracted as an ideal channel that is resilient to eavesdropping, manipulation, and jamming. Camera Communication (CamCom), a subcategory of VLC, further strengthens the level of security by providing a visually verifiable association between the transmitter and the extracted information. However, the ideal security guarantees of visible light channels may not hold in practice due to limitations and tradeoffs introduced by hardware, software, configuration, environment, etc. This paper presents our experience and lessons learned from implementing CamCom for security protocols. We highlight CamCom's security-enhancing properties and security applications that it enables. Backed by real implementation and experiments, we also systematize the practical considerations of CamCom-based security protocols.
2021-01-28
Kaftannikov, I. L., Kozlova, A. V., Khlyzov, A. D..  2020.  Prototype of a Li-Fi Communication System for Data Exchange Between Mobile Devices. 2020 Global Smart Industry Conference (GloSIC). :192—198.

This paper deals with the design and development of a Li-Fi (light fidelity) simplex communication system for data exchange between Android mobile devices. Li-Fi is an up-to-date technology in the modern world, since it uses visible light for data exchange, allowing for high-speed communication. The paper includes a brief review of Li-Fi technology, a review of the literature used, and a study of technological methods for implementing such systems, based on scientific sources. We propose the algorithms for data exchange, packet formation, and encryption-decryption. The paper presents the developed mobile application and the transceiver device, the development results, as well as experiments with the developed prototype. The results show that Li-Fi technology is workable and is a good alternative to existing communication methods.

2020-07-13
Ghosh, Debanjana, Chatterjee, Soumyajit, Kothari, Vasudha, Kumar, Aakash, Nair, Mahesh, Lokesh, Ella.  2019.  An application of Li-Fi based Wireless Communication System using Visible Light Communication. 2019 International Conference on Opto-Electronics and Applied Optics (Optronix). :1–3.
This paper attempts to clarify the concept and applications of Li-Fi technology. The current Wi-Fi network use Radio Frequency waves, but the usage of the available RF spectrum is limited. Therefore a new technology, Li-Fi has come into picture. Li-Fi is a recently developed technology. This paper explains how array of LEDs are used to transmit data in the visible light spectrum. This technology has advantages like security, increased accessible spectrum, low latency efficiency and much higher speed as compared to Wi- Fi. The aim of this research paper is to design a Li-Fi transceiver using Arduino which is able to transmit and receive data in binary format. The software coding is done in Arduino- Uno platform. Successful transmission and reception of data(alphanumeric) has been done.
2020-06-15
Khadr, Monette H., Elgala, Hany, Ayyash, Moussa, Little, Thomas, Khreishah, Abdallah, Rahaim, Michael.  2018.  Security Aware Spatial Modulation (SA-SM). 2018 IEEE 39th Sarnoff Symposium. :1–6.
Multiple-input multiple-output (MIMO) techniques are currently the de facto approach for increasing the capacity and reliability of communication systems. Spatial modulation (SM) is presently one of the most eminent MIMO techniques. As, it combines the advantages of having higher spectral efficiency than repetition coding (RC) while overcoming the inter-channel interference (ICI) faced by spatial multiplexing (SMP). Moreover, SM reduces system complexity. In this paper, for the first time in literature, the use of MIMO techniques is explored in Internet-of-Things(IoT) deployments by introducing a novel technique called security aware spatial modulation (SA-SM).SA-SM provides a low complexity, secure and spectrally efficient technique that harvests the advantages of SM, while facing the arising security concerns of IoT systems. Using an undemanding modification at the receiver, SA-SM gives an extra degree of technology independent physical layer security. Our results show that SA-SM forces the bit-error-rate (BER) of an eavesdropper to not exceed the range of 10-2, which is below the forward-error-correction (FEC) threshold. Hence, it eradicates the ability of an eavesdropper to properly decode the transmitted signal. Additionally, the efficiency of SA-SM is verified in both the radio and visible light ranges. Furthermore, SA-SM is capable of reducing the peak-to-average-power-ratio (PAPR) by 26.2%.
2019-01-21
Shahjalal, M., Chowdhury, M. Z., Hasan, M. K., Hossan, M. T., Jang, Y. Min.  2018.  A Generalized SDN Framework for Optical Wireless Communication Networks. 2018 International Conference on Information and Communication Technology Convergence (ICTC). :848–851.
Wireless communication based on optical spectrum has been a promising technology to support increasing bandwidth demand in the recent years. Light fidelity, optical camera communication, visible light communication, underwater optical wireless communication, free space optical communication are such technologies those have been already deployed to support the challenges in wireless communications. Those technologies create massive data traffic as lots of infrastructures and servers are connected with the internet. Software defined optical wireless networks have been introduced in this paper as a solution to this phenomenon. An architecture has been designed where we provide the general software defined networking (SDN) structure and describe the possible tasks which can be performed by the SDN for optical wireless communication.
2018-11-19
Yang, M., Wang, A., Sun, G., Liang, S., Zhang, J., Wang, F..  2017.  Signal Distribution Optimization for Cabin Visible Light Communications by Using Weighted Search Bat Algorithm. 2017 3rd IEEE International Conference on Computer and Communications (ICCC). :1025–1030.
With increasing demand for travelling, high-quality network service is important to people in vehicle cabins. Visible light communication (VLC) system is more appropriate than wireless local area network considering the security, communication speed, and narrow shape of the cabin. However, VLC exhibits technical limitations, such as uneven distribution of optical signals. In this regard, we propose a novel weight search bat algorithm (WSBA) to calculate a set of optimal power adjustment factors to reduce fluctuation in signal distributions. Simulation results show that the fairness of signal distribution in the cabin optimized by WSBA is better than that of the non-optimized signal distribution. Moreover, the coverage rate of WSBA is higher than that of genetic algorithm and particle swarm optimization.
Araya, A., Jirón, I., Soto, I..  2017.  A New Key Exchange Algorithm over a VLC Indoor Channel. 2017 First South American Colloquium on Visible Light Communications (SACVLC). :1–5.
This paper proposes a new cryptosystem that combines Diffie-Hellman protocol implemented with hyperelliptic curves over a Galois field GF(2n) with Tree Parity Machine synchronization for a Visible Light Communication indoor channel. The proposed cryptosystem security focuses on overcoming a weakness of neuronal synchronization; specifically, the stimulus vector that is public, which allows an attacker to try to synchronize with one of the participants of the synchronization. Real data receptions of the Visible Light Communication channel are included. In addition, there is an improvement of 115% over a range of 100 $łeq$ tsync$łeq$ 400 of the average synchronization time t\_sync, compared to the classic Tree Parity Machine synchronization.
Serey, J., Ternero, R., Soto, I., Quezada, L..  2017.  A Competency Model to Help Selecting the Information Security Method for Platforms of Communication by Visible Light (VLC). 2017 First South American Colloquium on Visible Light Communications (SACVLC). :1–6.
It is challenging in Security information and Platforms of Communication by Visible Light (VLC), solutions are made to manage the right Security problems. Several solutions have been developed and evolved constantly to meet complex and ever-changing business needs in the world. In the business context, people who are responsible for a project or an organization undergo professional and emotional stress. This research project has developed a new model which can help decision makers evaluating these alternative methods in relation to articulating different types of Security problems, formulating Security criteria, and simulating expectations of adopting the chosen method for Platforms of Communication by Visible Light (VLC).