Skip to main content

A Light Weight Stream Cypher Mechanism for Visible Light Communication

  • Conference paper
  • First Online:
Book cover Web, Artificial Intelligence and Network Applications (WAINA 2019)

Abstract

LED light has many advantages such as power efficient, better quality, long lifespan, and focus emission. LED lighting has been employed in our daily life in various ways, such as car lamps and lights in vehicles, roadside signal lights, indoor lighting systems, etc. The LED light bulbs not only can provide bright but also can be employed for data communication and object positioning, namely visible light communication (VLC). VLC is fast-growing technologies that enable new visible light application such as fast data transmission and indoor positioning. Due to its attractive functionalities, they have draw lots of attention to the wireless communication and indoor navigation systems. Because of its physical characteristics, “what you see is what you send”, VLC has been always considered as a secured communication method. In this work, we analyze the risks of visible light communication signal such as signal jamming, data snooping and modification. In order to effectively protect VLC data communication problems, we design a lightweight stream cypher data communication through the VLC signal to achieve the secure of the data communication. Experimental results of the proposed mechanism show that the WG-8 encryption algorithm can be executed on Raspberry Pi3 Model B, which has limited computing power. The evaluation result shows WG-8 support embedded system and CPU utilization reach up to 49%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zurawski, R.: Industrial communication systems. In: The Industrial Information Technology Handbook, Sec. 3, pp. 37–47. CRC Press, Boca Raton (2005)

    Google Scholar 

  2. Moyne, J.R., Tilbury, D.M.: The emergence of industrial control networks for manufacturing control diagnostics and safety data. Proc. IEEE 95(1), 29–47 (2007)

    Article  Google Scholar 

  3. Benzi, F., Buja, G., Felser, M.: Communication architectures for electrical drives. IEEE Trans. Ind. Informat. 1(1), 47–53 (2005)

    Article  Google Scholar 

  4. HART Field Communication Protocol Specification: HART Communication Foundation Std., version 7.4 (2007). http://www.hartcomm.org/

  5. Vitturi, S., Peretti, L., Seno, L., Zigliotto, M., Zunino, C.: Real-time Ethernet networks for motion control. Comput. Stand. Interfaces 33(5), 465–476 (2011)

    Article  Google Scholar 

  6. Willig, A.: Recent and emerging topics in wireless industrial communications: a selection. IEEE Trans. Ind. Informat. 4(2), 102–124 (2008)

    Article  Google Scholar 

  7. Wireless Systems for Industrial Automation, Process Control and Related Applications, International Society of Automation (ISA) Standard ISA-100.11a (2009)

    Google Scholar 

  8. Sauter, T.: The continuing evolution of integration in factory automation. Proc. IEEE Ind. Electron. Mag. 1(1), 10–19 (2007)

    Article  Google Scholar 

  9. Sauter, T., Lobashov, M.: How to access factory floor information using Internet technologies and gateways. Proc. IEEE Trans. Ind. Informat. 7(4), 699–712 (2011)

    Article  Google Scholar 

  10. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoTs): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)

    Article  Google Scholar 

  11. Visible Light Communications Consortium. http://www.vlcc.net/

  12. IEEE 802.15 WPAN™ Task Group 7 (TG7) Visible Light Communication. http://www.ieee802.org/15/pub/TG7.html

  13. O’Brien, D., Minh, H.L., Zeng, L., Faulkner, G., Lee, K., Jung, D., Oh, Y., Won, E.T.: Indoor visible light communications: challenges and prospects. In: Proceedings SPIE, vol. 7091 (2008)

    Google Scholar 

  14. Pure VLC, Visible Light Communication: An introductory guide (2012). www.purevlc.net

  15. Rajagopal, S., Roberts, R.D., Lim, S.-K.: IEEE 802.15.7 visible light communication: modulation schemes and dimming support. IEEE Commun. Mag. 50(3), 72–82 (2012)

    Article  Google Scholar 

  16. Adamko, L., Vojvoda, M., Jokay, M.: Statistical analysis of ECRYPT eSTREAM Phase3 Ciphers, EE časopis pre elektrotechniku a energetiku, pp. 193–196 (2008)

    Google Scholar 

  17. Antal, E., Zajac, P.: Analysis of the Fialka M-125 cipher-machine. In: Cryptologia (2013)

    Google Scholar 

  18. Engels, D., Fan, X., Gong, G., Hu, H., Smith, E.M.: Hummingbird: ultra-lightweight cryptography for resource-constrained devices. In: 1st International Workshop on Lightweight Cryptography for Resource-Constrained Devices. Tenerife, Canary Islands, Spain, January 2010

    Google Scholar 

  19. Rukhin, A., et al.: Sp 800-22 Rev. 1a. a Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical report, Gaithersburg, MD, United States (2010)

    Google Scholar 

  20. Grosek, O., Vojvoda, M., Zajac, P.: Classical Ciphers. STU (2007). (in Slovak)

    Google Scholar 

  21. Perera, T., Hamer, D.: General introduction: Russian cold war era M-125 and M125-3MN Fialka cipher machines (2005). http://enigmamuseum.com/mfialka.htm

  22. Reuvers, P., Simons, M.: Fialka M-125: Detailed Description of the Russian Fialka Cipher Machines. PAHJ Reuvers & MJH Simons (2009)

    Google Scholar 

  23. Robshaw, M., Billet, O. (eds.): New Stream Cipher Designs - The eSTREAM Finalists. LNCS, vol. 4986. Springer, Heidelberg (2008)

    Google Scholar 

  24. Nawaz, Y., Gong, G.: WG: a family of stream ciphers with designed randomness properties. Inf. Sci. 178(7), 1903–1916 (2008)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ted Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chang, SH., Huang, T., Chen, ML. (2019). A Light Weight Stream Cypher Mechanism for Visible Light Communication. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Web, Artificial Intelligence and Network Applications. WAINA 2019. Advances in Intelligent Systems and Computing, vol 927. Springer, Cham. https://doi.org/10.1007/978-3-030-15035-8_45

Download citation

Publish with us

Policies and ethics