Practical Aspects of Physical and MAC Layer Security in Visible Light Communication Systems
Journal Title: International Journal of Electronics and Telecommunications - Year 2016, Vol 62, Issue 1
Abstract
Visible light communication (VLC) has been recently proposed as an alternative standard to radio-based wireless networks. Originally developed as a physical media for PANs (Personal area Networks) it evolved into universal WLAN technology with a capability to transport internet suite of network and application level protocols. Because of its physical characteristics, and in line with the slogan "what you see is what you send", VLC is considered a secure communication method. In this work we focus on security aspects of VLC communication, starting from basic physical characteristics of the communication channel. We analyze the risks of signal jamming, data snooping and data modification. We also discuss MAC-level security mechanisms as defined in the IEEE 802.15.7 standard. This paper is an extension of work originally reported in Proceedings of the 13th IFAC and IEEE Conference on Programmable Devices and Embedded Systems — PDES 2015.
Authors and Affiliations
Grzegorz Blinowski
Differential Noise Figure and Gain De-Embedding: the Wave Approach
The paper presents complete analysis of differential amplifier noise figure single-ended measurement setup. The analysis is based on scattering matrix representation for the network and wave representation for noise. As...
An analysis of Chosen Image Formation Algorithms for Synthetic Aperture Radar with FMCW
The modelling of FMCW SAR systems, due to long signal duration time, commonly used start-stop approximation for pulsed radars causes errors in the image. Continuous motion of the radar platform results in additional rang...
Operator o and analysis of harmonic distortion
It has been shown that the description of mildly nonlinear circuits with the use of an operator o introduced by Meyer and Stephens in their paper published more than forty years ago was flawed. The problem now with their...
Performance of IP address auto-configuration protocols in Delay and Disruptive Tolerant Networks
At this moment there is a lack of research respecting Mobile Ad-hoc Networks (MANET) address assignment methods used in Delay Tolerant Networks (DTN). The goal of this paper is to review the SDAD, WDAD and Buddy methods...
Heart-rate Monitoring System Design and Analysis Using a Nios II Soft-core Processor
The heart rate of a person is able to tell whether they are healthy. A heart-rate monitoring device is able to measure or record the heart rate of a person in real time, whether it is an electrocardiogram (ECG) or a phot...