Abstract
LED light has many advantages such as power efficient, better quality, long lifespan, and focus emission. LED lighting has been employed in our daily life in various ways, such as car lamps and lights in vehicles, roadside signal lights, indoor lighting systems, etc. The LED light bulbs not only can provide bright but also can be employed for data communication and object positioning, namely visible light communication (VLC). VLC is fast-growing technologies that enable new visible light application such as fast data transmission and indoor positioning. Due to its attractive functionalities, they have draw lots of attention to the wireless communication and indoor navigation systems. Because of its physical characteristics, “what you see is what you send”, VLC has been always considered as a secured communication method. In this work, we analyze the risks of visible light communication signal such as signal jamming, data snooping and modification. In order to effectively protect VLC data communication problems, we design a lightweight stream cypher data communication through the VLC signal to achieve the secure of the data communication. Experimental results of the proposed mechanism show that the WG-8 encryption algorithm can be executed on Raspberry Pi3 Model B, which has limited computing power. The evaluation result shows WG-8 support embedded system and CPU utilization reach up to 49%.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zurawski, R.: Industrial communication systems. In: The Industrial Information Technology Handbook, Sec. 3, pp. 37–47. CRC Press, Boca Raton (2005)
Moyne, J.R., Tilbury, D.M.: The emergence of industrial control networks for manufacturing control diagnostics and safety data. Proc. IEEE 95(1), 29–47 (2007)
Benzi, F., Buja, G., Felser, M.: Communication architectures for electrical drives. IEEE Trans. Ind. Informat. 1(1), 47–53 (2005)
HART Field Communication Protocol Specification: HART Communication Foundation Std., version 7.4 (2007). http://www.hartcomm.org/
Vitturi, S., Peretti, L., Seno, L., Zigliotto, M., Zunino, C.: Real-time Ethernet networks for motion control. Comput. Stand. Interfaces 33(5), 465–476 (2011)
Willig, A.: Recent and emerging topics in wireless industrial communications: a selection. IEEE Trans. Ind. Informat. 4(2), 102–124 (2008)
Wireless Systems for Industrial Automation, Process Control and Related Applications, International Society of Automation (ISA) Standard ISA-100.11a (2009)
Sauter, T.: The continuing evolution of integration in factory automation. Proc. IEEE Ind. Electron. Mag. 1(1), 10–19 (2007)
Sauter, T., Lobashov, M.: How to access factory floor information using Internet technologies and gateways. Proc. IEEE Trans. Ind. Informat. 7(4), 699–712 (2011)
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoTs): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)
Visible Light Communications Consortium. http://www.vlcc.net/
IEEE 802.15 WPAN™ Task Group 7 (TG7) Visible Light Communication. http://www.ieee802.org/15/pub/TG7.html
O’Brien, D., Minh, H.L., Zeng, L., Faulkner, G., Lee, K., Jung, D., Oh, Y., Won, E.T.: Indoor visible light communications: challenges and prospects. In: Proceedings SPIE, vol. 7091 (2008)
Pure VLC, Visible Light Communication: An introductory guide (2012). www.purevlc.net
Rajagopal, S., Roberts, R.D., Lim, S.-K.: IEEE 802.15.7 visible light communication: modulation schemes and dimming support. IEEE Commun. Mag. 50(3), 72–82 (2012)
Adamko, L., Vojvoda, M., Jokay, M.: Statistical analysis of ECRYPT eSTREAM Phase3 Ciphers, EE časopis pre elektrotechniku a energetiku, pp. 193–196 (2008)
Antal, E., Zajac, P.: Analysis of the Fialka M-125 cipher-machine. In: Cryptologia (2013)
Engels, D., Fan, X., Gong, G., Hu, H., Smith, E.M.: Hummingbird: ultra-lightweight cryptography for resource-constrained devices. In: 1st International Workshop on Lightweight Cryptography for Resource-Constrained Devices. Tenerife, Canary Islands, Spain, January 2010
Rukhin, A., et al.: Sp 800-22 Rev. 1a. a Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical report, Gaithersburg, MD, United States (2010)
Grosek, O., Vojvoda, M., Zajac, P.: Classical Ciphers. STU (2007). (in Slovak)
Perera, T., Hamer, D.: General introduction: Russian cold war era M-125 and M125-3MN Fialka cipher machines (2005). http://enigmamuseum.com/mfialka.htm
Reuvers, P., Simons, M.: Fialka M-125: Detailed Description of the Russian Fialka Cipher Machines. PAHJ Reuvers & MJH Simons (2009)
Robshaw, M., Billet, O. (eds.): New Stream Cipher Designs - The eSTREAM Finalists. LNCS, vol. 4986. Springer, Heidelberg (2008)
Nawaz, Y., Gong, G.: WG: a family of stream ciphers with designed randomness properties. Inf. Sci. 178(7), 1903–1916 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Chang, SH., Huang, T., Chen, ML. (2019). A Light Weight Stream Cypher Mechanism for Visible Light Communication. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Web, Artificial Intelligence and Network Applications. WAINA 2019. Advances in Intelligent Systems and Computing, vol 927. Springer, Cham. https://doi.org/10.1007/978-3-030-15035-8_45
Download citation
DOI: https://doi.org/10.1007/978-3-030-15035-8_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15034-1
Online ISBN: 978-3-030-15035-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)