Browse > Article
http://dx.doi.org/10.3745/KTCCS.2022.11.1.35

A Study on Secure Encoding for Visible Light Communication Without Performance Degradation  

Kim, Minchul (고려대학교 정보보호학과)
Suh, Taeweon (고려대학교 컴퓨터학과)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.11, no.1, 2022 , pp. 35-42 More about this Journal
Abstract
Visible light communication (VLC) is a method of transmitting data through LED blinking and is vulnerable to eavesdropping because the illumination affects the wide range of area. IEEE standard 802.15.7 defines On-Off Keying (OOK), Variable Pulse Position Modulation (VPPM), and Color Shift Keying (CSK) as modulation. In this paper, we propose an encryption method in VPPM for secure communication. The VPPM uses an encoding method called 4B6B where 16 different outputs are represented with 6-bit. This paper extends the number of outputs to 20, to add complexity while not violating the 4B6B generation conditions. Then each entry in the extended 4B6B table is scrambled using vigenère cipher. The probability of decrypting each 6-bit data is $\frac{1}{20}$. Eavesdropper should perform $\sum\limits_{k=1}^{n}20^k$ number of different trials to decrypt the message if the number of keys is n. The proposed method can be applied to OOK of PHY II and CSK of PHY III. We further discuss the secure encoding that can be used in OOK and CSK without performance degradation.
Keywords
Visible Light Communication; Secure Encoding; Secure Communication; On-off Keying; VPPM(Variable Pulse Position Modulation);
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 J. He, and B. Zhou, "Vehicle positioning scheme based on visible light communication using a CMOS camera," Optics Express, Vol.29, No.17, pp.27278-27290, 2021.   DOI
2 J.-Y. Wang, X.-T. Fu, J.-B. Wang, M. Lin, J. Cheng, and M.-S. Alouini, "Secrecy capacity bounds for visible light communications with signal-dependent noise," arXiv preprint arXiv: 2109.11097. 2021.
3 T. V. Pham, and A. T. Pham, "Energy-Efficient Friendly Jamming for Physical Layer Security in Visible Light Communication," 2021 IEEE International Conference on Communications Workshops (ICC Workshops), 2021.
4 R. Shaaban, and S. Faruque, "An enhanced indoor visible light communication physical-layer security scheme for 5G networks: Survey, security challenges, and channel analysis secrecy performance," International Journal of Communication Systems, Vol.34, No.4, pp.e4726, 2021.
5 N. Su, E. Panayirci, M. Koca, A. Yesilkaya, H. V. Poor, and H. Haas, "Physical layer security for multi-user MIMO visible light communication systems with generalized space shift keying," IEEE Transactions on Communications, Vol.69, No.4, pp.2585-2598, 2021.   DOI
6 C.-W. Chow, Y. Liu, C.-H. Yeh, Y.-H. Chang, Y.-S. Lin, K.-L. Hsu, X.-L. Liao, and K.-H. Lin, "Display light panel and rolling shutter image sensor based optical camera communication (OCC) using frame-averaging background removal and neural network," Journal of Lightwave Technology, Vol.39, No.13, pp.4360-4366, 2021.   DOI
7 Y.-S. Lin, C.-W. Chow, Y. Liu, Y.-H. Chang, K.-H. Lin, Y.-C. Wang, and Y.-Y. Chen, "PAM4 rolling-shutter demodulation using a pixel-per-symbol labeling neural network for optical camera communications," Optics Express, Vol.29, No.20, pp.31680-31688, 2021.   DOI
8 P. Wang, J. Liang, and L. V. Wang, "Single-shot ultrafast imaging attaining 70 trillion frames per second," Nature Communications, Vol.11, No.1, pp.1-9, 2020.   DOI
9 J. F. Kurose, "Computer networking: A top-down approach featuring the internet," 7/E. Pearson Education India. 2017.
10 J. Classen, J. Chen, D. Steinmetzer, M. Hollick, and E. Knightly, "The spy next door: Eavesdropping on high throughput visible light communications," Proceedings of the 2nd International Workshop on Visible Light Communications Systems, 2015.
11 M. Kim and T. Suh, "A low-cost surveillance and information system for museum using visible light communication," IEEE Sensors Journal, Vol.19, No.4, pp.1533-1541, 2018.   DOI
12 D. R. Stinson, "Cryptography: theory and practice," Chapman and Hall/CRC. 2005.
13 A. X. Widmer and P. A. Franaszek, "A DC-balanced, partitioned-block, 8B/10B transmission code," IBM Journal of Research and Development, Vol.27, No.5, pp.440-451, 1983.   DOI
14 H. Lipmaa, P. Rogaway, and D. Wagner, "CTR-mode encryption," First NIST Workshop on Modes of Operation, 2000.
15 "IEEE Standard for Local and metropolitan area networks--Part 15.7: Short-Range Optical Wireless Communications," in IEEE Std 802.15.7-2018 (Revision of IEEE Std 802.15.7-2011), pp.1-407, 23 Apr. 2019.
16 A. Gupta, and X. Fernando, "Exploring secure visible light communication in next-generation (6G) internet-of-things," 2021 International Wireless Communications and Mobile Computing (IWCMC)," 2021.
17 M. Guri, B. Zadov, and Y. Elovici, "LED-it-GO: Leaking (a lot of) data from air-gapped computers via the (small) hard drive LED," International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 2017.