Conference PaperPDF Available

Security and propagation issues and challenges in VLC and OCC systems

Authors:

Abstract and Figures

Both Visible Light Communication (VLC) and Optical Camera Communication (OCC), as technologies and applications of the Optical Wireless Communication (OWC), have been intensely investigated in recent years. Because of their advanced implementations prove to be reliable candidates as partners of the various wireless transmissions based on radio frequency waves, and in some special situations, principal actors for different wireless communication scenarios in particular situations such as the medical field, petrochemical industry or indoor spaces overcrowded where the radio frequency spectrum crunch becomes obvious. We analyze several indoor setups and unique situations that incur alleged security breaches and future challenges in secure VLC and OCC data communication. We also present here an investigation of topologies and transmission scenarios with influences on a secure, reliable wireless transmission system as well as vulnerabilities and threads in VLC and OCC networks. The optical properties of the visible light as a reliable communication medium are explored here, as well. Both VLC and OCC have their own benefits, as well as drawbacks, from the point of view of the overall security and performance, as well as the ability to keep the communication as a continuous operational, intact, and trusty service. An experiment conducted using low frame rate cameras in OCC shown the minimum distance between the centers of the LEDs that still allow an appropriate separation of the frames captured.
Content may be subject to copyright.
Security and propagation issues and challenges in VLC and OCC
systems
Simona Riurean. *a, Robert Alexandru Dobre b, Alina-Elena Marcu b
aComputers, Automation and Electrical Engineering, University of Petroșani, 20 Universitatii Str.,
Petroșani 332006, Romania; bElectronic Technology and Reliability Department, Polytechnic
University of Bucharest, Bucharest, Romania
ABSTRACT
Both Visible Light Communication (VLC) and Optical Camera Communication (OCC), as technologies and applications
of the Optical Wireless Communication (OWC), have been intensely investigated in recent years. Because of their
advanced implementations prove to be reliable candidates as partners of the various wireless transmissions based on
radio frequency waves, and in some special situations, principal actors for different wireless communication scenarios in
particular situations such as the medical field, petrochemical industry or indoor spaces overcrowded where the radio
frequency spectrum crunch becomes obvious. We analyze several indoor setups and unique situations that incur alleged
security breaches and future challenges in secure VLC and OCC data communication. We also present here an
investigation of topologies and transmission scenarios with influences on a secure, reliable wireless transmission system
as well as vulnerabilities and threads in VLC and OCC networks. The optical properties of the visible light as a reliable
communication medium are explored here, as well. Both VLC and OCC have their own benefits, as well as drawbacks,
from the point of view of the overall security and performance, as well as the ability to keep the communication as a
continuous operational, intact, and trusty service. An experiment conducted using low frame rate cameras in OCC shown
the minimum distance between the centers of the LEDs that still allow an appropriate separation of the frames captured.
Keywords: LoS topology, NLoS, secure VLC, signal propagation OCC, eavesdropping
1. INTRODUCTION
Due to the most recent results and technological advances of the optical communication, implementing VLC and OCC
technologies in devices with different applications embedded, such as augmented reality, tracking systems with sensitive
applications, in the traffic as a real-time danger-awareness situation, a network of sensors for the environmental
surveillance in IoT or medical devices, are more worldwide demanded and used than ever. Alternative or partner
technologies have to be searched and implemented to cope with the unprecedented spectrum crunch because of the
growth of the number of systems and platforms with diverse wireless communication technologies embedded, most of
them based on radio frequencies (RF) [1].
Therefore, a general approach of data security during optical communication is required especially for sensitive data
transmitted between medical devices or in case of traffic-context awareness.
Although most of the authors that explore the wireless optical communication, consider the security as being one of its
benefits, when an extensive amount of important data is collected in some sensitive situations, data safety is compulsory
not only necessary. For example, in the case of the implanted medical devices, the networks of sensors placed on the
human body, or local communication of physiological data, there are intrinsic limitations in terms of devices' dimensions
or capabilities or dynamic scenarios in different setups or topologies that have to be taken into consideration along with
advanced safe communication techniques [2,3].
There is a classical, well-known model for information security that is defined by three main objectives: keeping the
confidentiality, integrity, and availability of the data transmitted during a communication session. Confidentiality refers
to protecting data from being accessed by anyone who is unauthorized. Any leak of confidential data is called a breach of
one's privacy, which is highly undesirable especially when sensitive or private information is transferred from source to
destination.
*simonariurean@upet.ro; phone 0040 744 517 396
The integrity of data means that data received at the destination must be the same as the one sent and hence has not been
altered during transmission. Information accessible to all the allowed (authorized) users is the third aim of a secure
transmission and refers to the availability of data.
The transmission security policy aims not only to protect its sensitive information but also its overall performance,
keeping at the same time its most important benefit: the ability to keep the communication as a continuous operational,
intact, and trusty service. A wireless communication is even more vulnerable to data theft, therefore the security
transmission refers to the defense policy adopted, tools and tactics implemented aiming to prevent, monitor, and respond
in due time to any intrusion during data communication while protecting digital assets.
Keeping the entire security strategy of VLC and OCC systems at the physical layer, might be one of the confidentiality
enablers in wireless optical connectivity based on visible light. The present features of the visible-light wireless
communication front-ends hardware, combined with the advances in neural networks or artificial intelligence algorithms,
can be exploited to meet the security requirements when dealing with simple but sensitive devices unable to implement
cryptographic methods, for example, medical nano-devices where the human bodies become nodes of the future
augmented and integrated local and remote medical support systems [4,5].
2. CHARACTERISTICS CONSIDERED FOR SECURE OPTICAL COMMUNICATION
2.1 VLC and OCC setups
There are different topologies (Fig 1) used for communication between transmitter (oTx) and receiver (oRx) for both
VLC and OCC systems, starting with a directed line of sight (LoS), non-directed LOS (NLoS), diffuse or quasi-diffuse
links that are more or less secure. When the security transmission is particularly analyzed from this point of view, there
are several degrees of risk regarding data theft during the data wireless transmission [6].
Figure 1. a. Direct Line of Side (LoS) link, b. NLoS link, c. Diffuse link d. Quasi-diffuse link.
In a multi-channel reflection environment, the total data rate of the VLC link depends on the delay of the propagation
path. Moreover, total power gain can be increased by narrowing the angle of field of view FoV of the LED. The LED’s
radiation light beam-angle (usually VLC systems use Lambertian emitters that, by definition, are LEDs with uniform
luminous distribution of light for all directions) as well as the photodiode’s (PD’s) FoV influence the optical link range
and the optical power for each communication scheme. The PD’s FoV is one of the important characteristics that affect
the optical signal quality at destination, as well as the data theft risk. The larger the beam-angle of LED, its high optical
power, correlated with a high FoV at the PD, and the optical beamforming (focusing light emitted from multiple LEDs
on the active area of a PD [7,8]), the data communication vulnerabilities become possible. Color optical filters can
change the light propagation range, which has an effect on the effective region of the receiver or FoV.
The possible threats in optical wireless communication can be eavesdropping/snooping, jamming and data alteration.
Each threat has different characteristics depending on the communication structure as for example lighting fixture to
mobile device (LFtM), mobile device to lighting fixture (MtLF) or mobile device to mobile device (MtM).
It is easier to eavesdrop on LFtM or MtLF than MtM. A common method of realizing eavesdropping attacks is directly
accessing the VLC or OCC channel link.
Although the current wireless RF communication technologies rely on advanced coded and encrypted communication
methods, the exposure of the optical networks to eavesdropping poses a considerable security vulnerability. The
eavesdropping method aims to gain unauthorized access to data transmitted to collect and/or analyze traffic when attacks
can be with direct access to the non-encrypted optical channel and those based on breaching the encryption key in
encrypted optical systems.
In case of any of the VLC or OCC topology, an unauthorized oRx or more can be easily introduced into the environment
without being recognized. The goal of service degradation attacks is to degrade the quality of optical communication link
or cause service denial, by insertion of additional and/or harmful signals into the network. Snooping on VLC or OCC
wireless transmission is obviously limited by physical factors, and is far more difficult than Wi-Fi snooping, for
example, but there are no evident reasons why it should not be possible. A Men in the Middle (MitM) attack that aims to
actively manipulate transmitted data in addition to the common sniffing and injection of packets is also possible [8].
These MitM type of attack aims to elide the encryption algorithms as well as the handshake used in the security
algorithms of WPA2 like most key reinstallation attacks [9,10]. In practical systems, the network might be completely
unaware of the passive eavesdroppers and potential interceptions.
2.2 Light properties and optical signal quality due to surrounding elements indoor
Light' properties considered in a VLC or OCC wireless system are intrinsic and apparent. The intrinsic optical properties
(IOPs) of light depend exclusively by the communication medium, while its apparent optical Properties (AOPs) are
dependent both of the medium and the environment indoor. The environment indoor refers to the surrounding within its
space particularities: natural and/or artificial light, geometrics, type of materials and color of the objects within the space
where the VLC or OCC wireless systems are considered. The IOPs are conservative properties and hence the magnitude
of the absorption coefficient linearly varies with the concentration of the absorbing material [11,12].
Other important characteristic, indoors, where the VLC system is set-up, that have to be carefully taken into
consideration, refers to the surrounding elements: walls, ceiling, floor and any kind of object/obstacle inside the room.
The light beam invariably suffers, from absorption, reflection, diffraction, scattering. All these physical properties of
light depend on a number of factors. That is why, the type of material the surroundings and objects are made of and their
properties, mate/glossy, smooth/rough as well as their colors, highly influence the optical signals’ quality that reach the
oRx [13,14].
The mobile oRx and/or oTx as well as the moving obstacles can cause the signals to fade randomly due to the multipath
components and their path loss. Additional noises coming from any other source of natural or artificial light, namely the
additional white Gaussian noise (AWGN) can also influence in a negative way the optical signal's quality at the oRx
[15]. As long as the signal power decreases in a long optical link outside of the FoV, the optical network vulnerabilities
decrease as well.
2.3 Optical channel model
In terms of channel modeling approaches, for years already, there are many channel models for conventional wireless
infrared communication, however, channel modeling for VLC or OCC although there are many works on the subject,
because of the system’ complexity, a general model of an optical channel in visible light is not yet defined. The research
in this area is still at an early stage, although have been reported some theoretical works related to VLC / OCC channel
modeling such as Geometry-Based Deterministic or Non Geometry-Based Stochastic Models. Not even the IEEE
802.17.5 standard (2011) dedicated to VLC wireless communication, does not specify any VLC channel models that can
be used for the technology evaluation, hence the security subject was not deep investigated, since it has not been
considered relevant so far.
2.4 Modulation and security techniques
Modulation techniques developed for wireless communication in the radiofrequency (RF) spectrum cannot be applied
straight for optical communication since the optical signal is real and non-negative. Many single carrier modulation
techniques (such as OOK On Off Keying, M-PAM multi level Pulse Amplitude Modulation M-PPM - multi level
Pulse Position Modulation or CAP Carrierless Amplitude Modulation) or multi-carrier modulation techniques (DCO-
OFDM, ACO OFDM, and many others), have been theoretically demonstrated and some of them practically proved.
They all have benefits and drawbacks, depending on many particularities of the VLC and OCC systems that have to be
carefully considered.
The security issues at the physical layer in VLC networks, that has emerged as a promising approach to complement the
conventional encryption techniques used in RF wireless communication, aim to provide a first line of defense against
eavesdropping attacks. The key idea is to use the intrinsic properties of the VLC channel to realize enhanced physical
layer security. The evolution toward 6G wireless communications brings along new and technical challenges that remain
unsolved for physical layer security in VLC research, including physical layer security coding, massive multiple-input
multiple-output, non-orthogonal multiple access, full-duplex technology and so on. Since the most communication
scheme, practically demonstrated, proved to be in VLC systems the intensity modulation and direct detection (IM/DD),
the conventional security techniques used in RF communications is not possible to apply straightforward in wireless
optical communication networks. Moreover, as the main conveyor of data in optical wireless communication is light, due
to its nature, the intensity-modulating data signal must satisfy a positive-valued amplitude constraint [16-20].
A friendly jamming can be used in the optical link channel, aiming to create an artificial noise which included in the null-
space of a legitimate user. The method relies on the confidential information that is combined with the jamming signal at
the oTx side, thus, only the eavesdropper will experience damaging effects from the jamming signal. In this case both the
components of the confidential message (spatial and constellation parts) must be encoded in order to decrease the
network vulnerability. In case of a precoding method, the secrecy lies intrinsically in both domains due to the matrix
multiplication but the spatial information is not hidden from the eavesdropper in jamming systems. Therefore, all the
transmitters are fed with artificial noise to ensure the spatial domain secrecy in jamming based systems. Compared with
the precoding method, friendly jamming can achieve better secrecy because the channel state information of the
legitimate user is not sufficient in avoiding artificial noise [21,22].
3. OCC SETUP AND EXPERIMENTAL RESULTS
Recent results [23,24] have shown that low frame rate cameras can be used in OCC. To achieve automatic code
synchronization and avoid capturing uncertain states of the LEDs caused by capturing a frame exactly in the moment
when the LED is turned on or off, at least two LEDs are used. The same code is used to control both LEDs, but a slight
time difference between the two waveforms is inserted. In this way, if one LED is in an uncertain state when the frame is
captured, the other is clearly on or off. To properly process the captured frames, the two LEDs must be separable in the
images. The cameras featured on smartphones nowadays rarely capture video at a resolution lower than 1080×720 pixels.
Therefore, a certain distance must exist between LEDs, depending on the distance to camera.
In this paper we conducted an experiment to determine the minimum distance between the centers of the LEDs that
would allow to properly separate them in the captured frames, depending on the LEDs to camera distance. For this, a
Nikon D7200 camera was used coupled with a Nikon 18-105 mm f1:3.5-5.6 lens. The video resolution was set to
1080×720, the shutter speed was set to 1/8000, the aperture was set to 1:5, the ISO value to 25,600, and the focal length
was kept 18 mm through all the experiments. Because a camera with an APS-C sensor was used, the full-frame (35 mm
sensor) equivalent focal length is 27 mm.
The LEDs to camera distance was varied from 15 cm to 150 cm with a 15 cm step. The LEDs were fit on a breadboard,
to properly control the distance between them. The distance between their centers was varied between 0.3 inches and 1.7
inches with a step equal to 0.1 inch. The LEDs were driven with the codes presented in [24]. From the experiments, we
have determined that the minimum distance between the edges of the LEDs facing to one-another that allowed a proper
detection was 15 pixels. For each of the LEDs to camera distance we have determined the distance between the LEDs
centers that would determine a distance of at least 15 pixels between the edges of the LEDs facing to one-another in the
captured frames. The distance between the LEDs’ edges was determined by extracting the luminance on a line that
crosses both LEDs, as shown in Fig. 2.
The luminance is further investigated by setting a threshold value equal to 30% of the maximum luminance, then
identifying the LEDs and measure the number of pixels between them where the luminance is below the set threshold, as
shown in Fig. 3. The results are shown in Fig. 4. A linear approximation of the variation was estimated and illustrated on
the same graph. Using these results, an OCC solution can be properly designed, knowing an estimate of the LEDs to
camera distance.
Figure 2. Example of a captured frame. LEDs to camera distance
was 30 cm. Distance between LEDs’ centers was 0.5 inch.
Figure 3. The luminance on the luminance line illustrated in Fig.
2 along with the threshold line.
Figure 4. The required distance between the LEDs’ centers depending on the distance to camera, to assure proper separation
in the captured images.
4. CONCLUSIONS
VLC, as well as OCC networks are vulnerable to various local types of attacks as eavesdropping/snooping, jamming,
data alteration, and service disruption that can, each or all, lead to high data losses. Due to the tendency of shifting the
security issues to the software programmable and flexible node architectures, new security vulnerabilities are created in
optical communication networks. All of these have to be identified and taken into account during network design and
operation. This paper provides an overview of some of the current security vulnerabilities in optical networks and
identifies possible attack methods as well as security techniques to be applied in wireless communication links based on
visible light. The experiment conducted using OCC aims to determine the minimum distance between the centers of the
LEDs that would allow to properly separate the captured frames. The distance between the two LEDs’ edges was
determined by extracting the luminance on a line that crosses both LEDs. Depending on the LEDs to camera distance,
results detection of 15 pixels, reliable for a proper optical communication.
REFERENCES
[1] Ylianttila M., Kantola R., Gurtov A., Mucchi L., Oppermann I. (eds), 6G White paper: Research challenges for
Trust, Security and Privacy. 6G Flagship, University of Oulu, June 2020
[2] Chisci G., Conti A., Mucchi L., and Win M. Z., Intrinsic Secrecy in Inhomogeneous Stochastic Networks,
IEEE/ACM Transactions on Networking, vol. 27, no. 4, Aug. 2019
[3] Riurean, S., Antipova, T., Rocha, Á., Leba, M., Ionica, A., VLC, OCC, IR and LiFi Reliable Optical Wireless
Technologies to be Embedded in Medical Facilities and Medical Devices. J Med Syst 43, 308 (2019).
[4] Mucchi L., Martinelli A., Jayousi S., Caputo S. and Pierobon M., Secrecy Capacity and Secure Distance for
Diffusionbased Molecular Communication Systems, in IEEE Access, Aug. 2019.
[5] Pecorella T., Brilli L., and Mucchi L., The role of physical layer security in IoT: A novel perspective, MDPI
Information, vol. 7, no. 3, pp. 49-66, Sept (2016).
[6] Rahman M. T., Bakaul M. and Parthiban R., Analysis of the effects of multiple reflection paths on high speed
VLC system performance, 28th International Telecommunication Networks and Applications Conference
(ITNAC), Sydney, NSW, 2018, pp. 1-6, doi: 10.1109/ATNAC.2018.8615389 (2018).
[7] Kim Sung-Man and Kim Seong-Min, Wireless visible light communication technology using optical
beamformingm, in Optical Engineering, 52(10), pp. 106101-106101, DOI:10.1117/1.OE.52.10.106101, (2013)
[8] Blinowski J. G., Practical Aspects of Physical and MAC Layer Security in Visible Light Communication
Systems, Intl Journal of Electronics and Telecommunications, VOL. 62, NO. 1, PP. 7-13, (2016).
[9] Rabia, N. A., Shahzaib A., Ahthasham S., Afia Z. A Security Review Over Wi-Fi and Li-Fi, Information
Management and Computer Science, 3(1): 01-09. (2020).
[10] Vanhoef M., Bhandaru N., Derham T., Ouzieli I. and Piessens F., Operating Channel Validation. Proceedings of
the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks - WiSec '18.
10.1145/3212480.3212493. 34-39. (2018).
[11] Riurean S., Leba M., Ionica A., Stoicuta O., and Buioca C., Visible light wireless data communication in
industrial environments, IOP Conference Series: Materials Science and Engineering, Volume 572, International
Conference on Innovative Research - ICIR EUROINVENT 1617 May 2019, Iasi, Romania (2019)
[12] Wen Y. and Liu T., WI-FI Security Certification through Device Information. International Conference on
Sensor Networks and Signal Processing (SNSP). 10.1109/snsp.2018.00065. 302-305, (2018)
[13] Ahmed Al-Kinani, Cheng-Xiang Wang, Li Zhou, and Wensheng Zhang, Optical Wireless Communication
Channel Measurements and Models IEEE Communications Surveys & Tutorials, VOL. XX, NO. X, (2018).
[14] Kwon D. H., Yang S. H. and Han S. K., Modulation bandwidth enhancement of white-LED-based visible light
communications using electrical equalizations, San Francisco, California, U.S SPIE OPTO, Vols. Proc. SPIE
9387, Broadband Access Communication Technologies IX, 938. DOI: 10.1117/12.2078680, (2015).
[15] Ylianttila M., Kantola R., Gurtov A., Mucchi L., Oppermann I., Research Challenges for Trust, Security and
Privacy, 6G WHITE PAPER, https://arxiv.org/ftp/arxiv/papers/2004/2004.11665.pdf, (24 April 2020)
[16] Arafa A., Panayirci E., Poor H. V., Relay-Aided Secure Broadcasting for Visible Light Communications, IEEE
Trans. Commun, 67, no. 6, pp. 4227 -4239, Feb. (2019).
[17] Panayirci E., Yesilkaya A., Cogalan T., Haas H., Poor H. V., Physical-Layer Security with Generalized Space
Shift Keying, Early Accesses IEEE Trans. Commun, pp. 1-1 Jan (2020).
[18] Yin L. and Haas H., Physical-Layer Security in Multiuser Visible Light Communication Networks, IEEE J.
Selec. Areas in Communications, vol. 36, no. 1, Jan. (2018).
[19] Yesilkaya A., Basar E., Miramirkhani F., Panayirci E., Uysal M., Haas H., Optical MIMO-OFDM with
generalized LED index modulation, IEEE Trans. Commun., vol.65, no. 8, pp. 3429-3441, May (2017).
[20] H. V. Poor and R. F. Schaefer, Wireless physical layer security, Proc. National Academy of Sciences of USA,
vol. 114, no. 1, pp. 1926, January 2017
[21] Wu F., Dong C., Yang L., and Wang W., Secure wireless transmission based on precoding-aided spatial
modulation, in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2015, pp. 16.
[22] Wang F.et al., Optical jamming enhances the secrecy performance of the generalized space-shift-keying-aided
visible-light downlink, IEEE Trans. Commun., vol. 66, no. 9, pp. 40874102, Sep. 2018.
[23] Marcu A. E., Dobre R. A., Datcu O., Suciu G., Oh, J., Flicker Free VLC System with Automatic Code
Resynchronization using Low Frame Rate Camera, 2019 42nd International Conference on
Telecommunications and Signal Processing (TSP), pp. 402-405, (2019).
[24] Marcu, A. E., Dobre, R. A., Preda, R. O., Șchiopu, P., Flicker free VLC system with enhanced transmitter and
low frame rate camera, University Politehnica of Bucharest Scientific Bulletin Series C-Electrical Engineering
and Computer Science, pp. 133-144 (2019).
... Hence, no matter the model of business we are involved in, or technology we use [48][49][50] is essential to be aware of treats and follow the experts' advice and the advanced tools available against cyber-attacks. ...
Article
The internet has become more or less, for most of us a dangerous place to live, work and relax when no proper measures are taken, and the response to incidents is not very clear and well implemented, both for organizations and individuals. This paper makes a short overview of current types and incidents of cyber-attacks, as well as the current state of threats, and the grade of awareness worldwide. Some methods to prevent cyber-attacks, malware analysis, and threat hunting, are presented, too. The paper also contains an application developed with a series of APIs that link the application to open-source tools and activate them, hence analyzing the content of the possible malicious files.
... The main reason why this is important is because it represents a solution to making visible light communication available for mobile phones in a robust way. This paper extends the previously published results of [28][29][30][31][32][33][34][35][36]. Compared to the previously published papers, which mainly contained case studies on particular implementations of the system, this paper contains the generalized theoretical aspects of the proposed system (i.e., the detailed mathematical model of the communication and the mathematical expressions of the properties that the symbols require for obtaining the desired communication behavior) and the minimal duration symbols that meet the required properties, which were not previously presented or investigated, thus offering the highest possible bit rate of the system. ...
Article
Full-text available
Light emitting diodes (LED) are becoming the dominant lighting elements due to their efficiency. Optical camera communications (OCC), the branch of visible light communications (VLC) that uses video cameras as receivers, is a suitable candidate in facilitating the development of new communication solutions for the broader public because video cameras are available on almost any smartphone nowadays. Unfortunately, most OCC systems that have been proposed until now require either expensive and specialized high-frame-rate cameras as receivers, which are unavailable on smartphones, or they rely on the rolling shutter effect, being sensitive to camera movement and pointing direction, they produce light flicker when low-frame-rate cameras are used, or they must discern between more than two light intensity values, affecting the robustness of the decoding process. This paper presents in detail the design of an OCC system that overcomes these limitations, being designed for receivers capturing 120 frames per second and being easily adaptable for any other frame rate. The system does not rely on the rolling shutter effect, thus making it insensitive to camera movement during frame acquisition and less demanding about camera resolution. It can work with reflected light, requiring neither a direct line of sight to the light source nor high resolution image sensors. The proposed communication is invariant to the moment when the transmitter and the receiver are started as the communication is self-synchronized, without any other exchange of information between the transmitter and the receiver, without producing light flicker, and requires only two levels of brightness to be detected (light on and light off). The proposed system overcomes the challenge of not producing light flicker even when it is adapted to work with very low-frame-rate receivers. This paper presents the statistical analysis of the communication performance and discusses its implementation in an indoor localization system.
Article
Full-text available
Spatial modulation (SM) is a promising technique that reduces inter-channel interference while providing high power efficiency and detection simplicity. In order to ensure the secrecy of SM, precoding and friendly jamming are widely adopted in the literature. However, neither of those methods could take the mentioned advantages of SM. In this paper, a novel spatial constellation design (SCD) technique is proposed to enhance the physical layer security (PLS) of optical generalized space shift keying (GSSK), which can retain some benefits of SM. Due to the lack of small-scale fading, the quasi-static characteristics of the optical channel is used to tailor the received signal at the legitimate user’s (Bob’s) side. The PLS of the system is guaranteed by the appropriate selection of the power allocation coefficients for randomly activated light emitting diodes (LEDs). With the aid of Bob’s channel state information at the transmitter, the bit error ratio (BER) of Bob is minimized while the BER performance of the potential eavesdroppers (Eves) is significantly degraded. Monte-Carlo simulation results show that the proposed SCD-zero forcing precoding (ZFP) forces Eve to experience a BER of around 0.5 by outperforming both the conventional and ZFP based GSSK for all practical signal-to-noise-ratio regimes and Bob-Eve separations.
Article
Full-text available
New, emerging technologies, transform every day our life and have direct consequence on our health and well-being. More and more wearable medical devices (MD) with wireless communication technologies embedded are being developed by innovative academic community and companies. Optical wireless communication (OWC) consisting of Visible Light Communication (VLC), infrared (IR), Optical Camera Communication (OCC) and Light Fidelity (LiFi) along with the conventional Radio Frequency (RF) wireless communication are suitable technologies to be used for hybrid Wireless Integrated Medical Assistance Systems (WIMAS). The WIMAS addressed in this paper consists of two Wireless Medical Body Area Networks (WMBAN) (an insulin wearable kit and an ECG test device with VLC/OCC are considered) and an Emergency Remote Medical Assistance (ERMA) with LiFi technology embedded. Using RF in medical facilities is subject of strict regulations due to interferences with other RF medical devices, negative effects on human health and lack of security. VLC and OCC are suitable to be embedded in MDs in order to be used by the patients with wearable WMBAN. Research on IR transdermal communication for implantable MDs has also been demonstrated as feasible and both VLC and OCC have promising future, as well. On the other hand, LiFi technology, recently deployed on the market, is mature enough to be integrated in the ERMA system addressed here.
Article
Full-text available
Significant implementations and encouraging results have already been achieved using visible light communication (VLC) technology for different applications from indoor to free space optics (FSO) and even underwater communication. The LED light fixtures are about to be used with dual functionality - illumination and fast wireless data communication - and when the technology will become mature enough, the general costs for both will considerably decrease. However, especially due to a complex multipath channel impulse response (CIR) evaluation, there are few research in VLC applied in industrial environments. At the same time, in the non-Line of Sight (NLoS) VLC setup with mobile optical transmitter (oTx) and fixed optical receiver (oRx) considered here, both the path loss and multipath-induced dispersion significantly limits the link performance. In this paper, we investigate the CIR into indoor industrial environments. We take into consideration both Intrinsic Optical Properties in Industrial Environments (IOPIEs) and Apparent Optical Properties (AOPs) in Industrial Environments. The VLC setup complexity such as oTx and oRx position and orientation, the geometry and the nature of the indoor surfaces (diffuse or specular) and appropriate positioning of both oTx and oRx required for a suitable implementation of the VLC. The VLC system proposed is also investigate in this work based on data acquisition, simulation and analysis according the ARX mathematical model.
Article
Full-text available
The biocompatibility and nanoscale features of Molecular Communication (MC) make this paradigm, based on molecules and chemical reactions, an enabler for communication theory applications in the healthcare at its biological level (e.g., bimolecular disease detection/monitoring and intelligent drug delivery). However, the adoption of MC-based innovative solutions into privacy and security-sensitive areas is opening new challenges for this research field. Despite fundamentals of information theory applied to MC have been established in the last decade, research work on security in MC systems is still limited. In contrast to previous literature focused on challenges, and potential roadmaps to secure MC, this paper presents the preliminary elements of a systematic approach to quantifying information security as it propagates through an MC link. In particular, a closed-form mathematical expression for the secrecy capacity of an MC system based on free molecule diffusion is provided. Numerical results highlight the dependence of the secrecy capacity on the average thermodynamic transmit power, the eavesdropper’s distance, the transmitted signal bandwidth, and the receiver radius. In addition, the concept of secure distance in an MC system is introduced and investigated for two different techniques of signal detection, i.e., based on energy and amplitude. The secrecy capacity can be used to determine how much secure information (bit/sec/Hz) can be exchanged and within which operative range, while the secure distance can be used to set the transmit power to obtain a secure channel at a given distance. We envision these metrics will be of utmost importance for a future design framework tailored to MC systems and their practical applications.
Conference Paper
Full-text available
In the recent past, research in visible light communication (VLC) has gained a lot interest due to its distinct characteristics in supporting high-speed optical wireless communication and illumination simultaneously. To implement a reliable VLC system, few parameters have to be considered for communication channels such as distance between transmitter and receiver, data rate, line of sight (LOS) and non-line of sight (NLOS) communication paths, signal power and delay of the channel. In this paper, we designed and simulated a LOS and NLOS multipath VLC model using single and multiple LEDs. Basic on-off keying (OOK) modulation scheme and available conventional LED configuration have been considered to analyze the effects of field of view (FOV) and the reflection of the light signal on received power level. Moreover, BER and quality of transmission were measured for single and multipath transmissions considering distance, incident and irradiance angles.
Article
With the rapid and continuous development of the LEDs, the conventional lighting solutions are intended to be replaced. The advantages of using LED lighting systems led to the development of Visible Light Communications (VLC). The transmitter in these systems is made using LEDs and the receiver can be a photodetector or, in recent solutions, an image sensor. The current solutions use expensive cameras with high frame rate as receivers. The paper proposes a system that uses generic cameras with common frame rate and can work without an auxiliary synchronization between the transmitter and the receiver. The proposed system can make VLC available to the general public.
Conference Paper
In the recent years, the conventional lighting systems are beginning to be replaced by LED lighting systems. In a Visible Light Communication (VLC) system, the visible light is used to provide a link between a transmitter, who is typically a LED, and a receiver, which is either a photodetector or an image sensor. The VLC can be used, besides illumination, for transferring data by changing very fast the light intensity of the LED and not to be perceived by the human eye as flicker. In recent applications, high frame rate cameras have begun to be used, but their disadvantage is the high cost. This paper proposes and experimentally validates a VLC solution that uses low frame rate camera and does not require a transmitter-receiver synchronization.
Article
Network secrecy is vital for a variety of wireless applications and can be accomplished by exploiting network interference. Recently, interference engineering strategies (IESs) have been developed to harness network interference, depending on the wireless environment (node distribution, transmission policy, and channel conditions). Typically, the node spatial distribution has been modeled according to a homogeneous Poisson point process for mathematical tractability. However, such a model can be inadequate for inhomogeneous (e.g., sensor and vehicular) networks. This paper develops a framework for the design and analysis of inhomogeneous wireless networks with intrinsic secrecy. Based on the characterization of the network interference and received signal-to-interference ratio for different receiver selection strategies. Local and global secrecy metrics are introduced for characterizing the level of intrinsic secrecy in inhomogeneous wireless networks from a link and a network perspective. The benefits of IESs are quantified by simulations in various scenarios, thus corroborating the analysis. Results show that IESs can elevate the network secrecy significantly.
Article
A visible light communication broadcast channel is considered, in which a transmitter luminaire communicates with two legitimate receivers in the presence of an external eavesdropper. A number of trusted cooperative half-duplex relay luminaires are deployed to aid with securing the transmitted data. Transmitters are equipped with single light fixtures, containing multiple light emitting diodes, and receiving nodes are equipped with single photo-detectors, rendering the considered setting as a single-input single-output system. Transmission is amplitudeconstrained to maintain operation within the light emitting diodes’ dynamic range. Achievable secrecy rate regions are derived under such amplitude constraints for this multi-receiver wiretap channel, first for direct transmission without the relays, and then for multiple relaying schemes: cooperative jamming, decode-and-forward, and amplify-and-forward. Superposition coding with uniform signaling is used at the transmitter and the relays. Further, for each relaying scheme, secure beamforming vectors are carefully designed at the relay nodes in order to hurt the eavesdropper and/or benefit the legitimate receivers. Superiority of the proposed relaying schemes, with secure beamforming, is shown over direct transmission. It is also shown that the best relaying scheme depends on how far the eavesdropper is located from the transmitter and the relays, the number of relays, and their geometric layout.
Article
In order to enhance the secrecy performance of the Generalized Space Shift Keying (GSSK) visible light communication (VLC) system, in this paper, an optical jamming aided secrecy enhancement scheme is proposed, in which the source transmitter (S) simultaneously sends both the confidential desired signal and optical jamming signals under amplitude and power constraints. The optical jamming signals obey the truncated Gaussian distribution for satisfying the constraints. Given the discrete set of channel inputs, the optical jamming aided GSSK-VLC system’s secrecy performance is analyzed. Explicitly, the average mutual information (AMI), the lower bound of AMI and its closed-form approximation as well as the achievable secrecy rate are formulated analytically. Furthermore, the optimal power sharing strategy of the proposed GSSK-VLC systems relying on optical jamming is derived. Closed-form expressions are provided for the optimal power sharing in both the low- and high-SNR regions. Finally, extensive simulation results are presented to validate our analytical results.