Figure - available from: Wireless Communications and Mobile Computing
This content is subject to copyright. Terms and conditions apply.
The wireless device initialization procedure: (a) the user enters SSID and password of the access point the wireless device connects to; (b) user places the device on the top of the screen at designated area; (c) after the device initialization is over, the wireless device initiates the connection to the access point; and (d) wireless device sends sensor data (temperature and humidity) for visualization in real-time in the browser.

The wireless device initialization procedure: (a) the user enters SSID and password of the access point the wireless device connects to; (b) user places the device on the top of the screen at designated area; (c) after the device initialization is over, the wireless device initiates the connection to the access point; and (d) wireless device sends sensor data (temperature and humidity) for visualization in real-time in the browser.

Source publication
Article
Full-text available
Many applications from the Internet of Things (IoT) domain used in healthcare, smart homes, and cities involve a large number of interconnected wireless devices. To ensure privacy, confidentiality, and integrity of the information, devices should be initialized prior to any communication. In this paper, we present a secure initialization method for...

Similar publications

Article
Full-text available
The architectural framework of Fog and edge computing reveals that the network components which lie between the cloud and devices computes application oriented operations. In this paper, an in-depth review of fog and mist computing in the area of health care informatics is analyzed, classified, and discussed various applications cited in the litera...

Citations

... VLC smart labels have also been proposed as an interesting application, as many devices can be updated simultaneously using the existing lighting system, rather than RF identification or infrared communications [10,11]. In Ref. [12], IoT RF devices can potentially improve security by using VLC to configure the device during initialisation rather than using an unsecure RF channel. Others have proposed VLCbased IoT devices with residual power consumption by reflecting a modulated version of an external light source. ...
... Note that τ 1 can be arbitrarily chosen in order to compute K 0 , or vice-versa. Considering the third band, with f c = 253 kHz, and τ 1 = 20 � 10 −6 , the remaining parameters are computed using Equations (10)- (12), and are listed in the Table 2. The F ratio was chosen to be 0.01 in order to provide a phase margin >45°f or loop stability. ...
Article
Full-text available
The technical feasibility of developing an Internet of Things multi‐user communication system is evaluated based on a central digital multiband carrierless amplitude and phase transmitter, which broadcasts data on multiple channels for a number of low‐cost/low‐power devices. It addresses the issue of carrier synchronisation, which is critical in real‐world implementations because of imperfections of devices and the delays of the system. A simulation model for the traditional Costas Loop is presented, along with performance results, which demonstrate the system's ability to synchronise with pull‐in and lock ranges of ±800 and ±900 Hz, respectively. The loop requires 1.194 ms to be in the locked state, allowing the system to lock within 6 symbols period. In addition, the authors measured the performance of the system in the presence of noise and interference from other modulated bands. The results showed that noise and interference did not degrade the system's performance. Although the system was unable to lock when energy was present in adjacent bands, alternative options such as a high order phase‐locked loop and hybrid frequency‐division multiple access and time‐division multiple access, can improve system performance without significantly increasing the cost and complexity of the devices.
... Security is the next major issue in developing the IoT technologies, which is made more critical in the IoT by the VLC technology due to the broadband nature of the lighting infrastructure. As the initialization of IoT devices must be done with ensured security, commercial IoT solutions followed the strategies such as BlinkUp from ElectricImp, flashing displays, and BlinkComm [244]. ...
Article
Full-text available
The Optical Wireless Communication (OWC) offers the high capacity of optical fiber communication with the flexibility of wireless communication. Since it works in the optical region of the ElectroMagnetic (EM) spectrum, it guarantees safety and security which are critical in radio and microwave frequency communication. The principal objective of this paper is to analyze the indoor OWC systems on these guaranteed features, and safety and security are jointly denoted by the term green. The high obstacle impermeability of optical signals and their directivity strengthen the security of indoor OWC data transmission. The confidentiality and authenticity of optical wireless data can also be preserved with the Quantum Key Distribution (QKD). This paper provides a technological overview and a review of literature about the OWC system that helps to identify the challenges in the path of a ubiquitous deployment of green wireless communication systems. Significant advancements in the sources and detectors are discussed together with the coding, modulation and multiplexing techniques for making highly robust OWC links. The ubiquitous deployment of green OWC necessitates the development of optical transmitters and receivers, performance enhancement techniques, incorporation of uplink and energy harvesting abilities, and safety and security enhancement techniques. Hence, a special emphasis is placed on these aspects and their challenges towards the green implementation. Furthermore, the paper explores some significant indoor applications based on the OWC that have great impacts on the Next Generation Networks (NGN) and the Internet of Things (IoT).
... The use of visible light communication (VLC) as an OoB channel for bootstrapping IoT devices (such as WSN devices) presents an acceptable and commercially viable solution, especially for low power and resource constrained wireless devices. The existing solutions use OoB Visible Light Communication channel for information transmission from sender (e.g. by flashing LED or flashing lights on a smartphone/monitor screen) to a low-cost wireless sensor device (equipped with a simple LED or a photodiode as a receiver) [13][14][15]. ...
... Every gray color represents one symbol (''00'', ''01'', ''10'' and ''11''), while every symbol transmission is followed by a delimiter d transmission represented with black color (frame). We used delimiter to recover from intersymbol interference and frame overflow [15]. The average transmission speed for 60 Hz screens using 4-PAM modulation is 60 bps. ...
... Commercial solution BlinkUp from Electric Imp [55] and the Flashing solution [56] also use Visible Light Communication channel to convey information from a transmitter equipped with a screen to a receiver equipped with a photo-receiver, achieving transmission up to 30bps. Recently, Perkovic et al. [15] proposed coding techniques that significantly increase the transmission speed up to 100 bps without any modifications on the receiver side (a simple photodiode). Other solutions such as Zhang et al. [57,58] use VLC channel, in a particular screen to camera channel to convey information from one device to another, while Saxena et al. [59] use VLC channel for mutual authentication of messages exchanged over a radio channel. ...
Article
Future healthcare systems, smart homes, power managementsystems will all involve a large number of smart inter-connected wireless devices (such as wireless sensor and IoT nodes). One of the major challenges to securing these systems presents loading initial cryptographic credentials into a relatively large number of wireless devices. This challenge is further aggravated by the fact that many of these technologies and systems involve low-cost and highly interface constrained devices — lacking usual wired interfaces, displays, keypads, and alike. In this paper we propose two novel multichannel key deployment schemes for wireless (sensor) networks, LISA and LISAT, that only require a presence of a light source device, such as a multi-touch screen, tablet or a smartphone device. Both key deployment schemes are secret key-based multichannel protocols and are suitable for interface/resource constrained wireless devices. We use one-way visible light channel (VLC) of multitouch screens (the flashing displays) to initialize sensor devices in a secure, usable and scalable way. More interestingly, LISAT protocol is suited for initialization of geographically remote devices via a trusted third party device. We provide formal analysis of the proposed protocols using the automated verification tool. From the user's perspective of protocol execution, device initialization is quite simple as user simply places the devices on the top of the multitouch screen after which the remaining process is fully automatized. Indeed, through the experiments with 34 users we showed that our solution is user-friendly and has a good performance concerning the time consumption.
Article
Full-text available
To detect whether people are occupying individual rooms in a smart home, a range of sensors and building automation technologies can be employed. For these technologies to function in tandem and exchange useful data in a smart home environment, they must be interoperable. The article presents a new interoperable solution which combines existing decentralized KNX building automation technology with a KNX/LabVIEW software application gateway using visible light communication to track occupancy in a room. The article also describes a novel KNX/IoT software application gateway which uses an MQTT protocol for interoperability between KNX technology and IBM Watson IoT platform. We conducted an experiment with the originally designed solution to detect occupancy in an office room. We used KNX and BACnet building automation technology to produce an interoperable KNX/BACnet hardware gateway which allowed the application of artificial neural network mathematical methods for CO2 waveform prediction. The best results in detecting occupancy in a room were R = 0.9548 (Levenberg-Marquardt algorithm), R = 0.9872 (Bayesian regularization algorithm), and R = 0.8409 (scaled conjugate gradient algorithm), which correspond to the results obtained by other authors and a minimum system prediction accuracy of 96%.
Article
Full-text available
This paper presents a multi-user Visible Light Communication (VLC)-based Internet of Things (IoT) system using multi band-Carrierless Amplitude and Phase (m-CAP) modulation for IoT applications. The proposed system uses a digital m-CAP modulator embedded in a ceiling LED light fixture and analog receivers, aiming at low-cost, low-power, and small-sized IoT devices. The performance was evaluated in terms of the filtering stage design and the usage of guard bands. Different pairs of emitter and receiver filters were considered. While Bessel and Butterworth analog filters were tested in the analog receiver, the digital m-CAP modulator pulse shaping filter considered raised cosine filters, as well as digital matched filters for the analog Bessel and Butterworth filters. Regarding the guard bands, two approaches were considered: either by using the raised cosine roll-off factor (bandwidth compression) or by suppressing the even bands. The Bit Error Rate (BER) performance was obtained by simulation. The usage of the Bessel filter in the receiver, along with a digital matched filter, proved to be the best solution, achieving a BER lower than 10−3 for an Eb/No of 6 dB, using a third-order filter. Furthermore, guard bands should be used in order to mitigate inter-band interference in order to have improved performance when multiple users intend to simultaneously communicate.