Security in Visible Light Communication : Novel Challenges and Opportunities

As LED lighting becomes increasingly ubiquitous, Visible Light Communication is attracting the interest of academia and industry as a complement to RF as the physical layer for the Internet of Thin ...

[1]  Guobin Shen,et al.  Epsilon: A Visible Light Based Positioning System , 2014, NSDI.

[2]  N. Asokan,et al.  Secure device pairing based on a visual channel , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[3]  Peter I. Corke,et al.  Data muling over underwater wireless sensor networks using an autonomous underwater vehicle , 2006, Proceedings 2006 IEEE International Conference on Robotics and Automation, 2006. ICRA 2006..

[4]  Dominic O'Brien,et al.  Demonstration of high-speed data transmission using MIMO-OFDM visible light communications , 2010, 2010 IEEE Globecom Workshops.

[5]  Bengt Ahlgren,et al.  Spontnet: experiences in configuring and securing small ad hoc networks , 2002, Proceedings 3rd IEEE International Workshop on System-on-Chip for Real-Time Applications.

[6]  Chunming Hu,et al.  Enhancing reliability to boost the throughput over screen-camera links , 2014, MobiCom.

[7]  Yosuke Kurihara,et al.  Study of visible light communication system using RGB LED lights , 2011, SICE Annual Conference 2011.

[8]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[9]  David Tse,et al.  Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.

[10]  Lutz H.-J. Lampe,et al.  Physical-layer security for indoor visible light communications , 2014, 2014 IEEE International Conference on Communications (ICC).

[11]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[12]  Cong Wang,et al.  SBVLC: Secure barcode-based visible light communication for smartphones , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[13]  David Chaum,et al.  Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.

[14]  Guobin Shen,et al.  Pharos: enable physical analytics through visible light based indoor localization , 2013, HotNets.

[15]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[16]  Gang Chen,et al.  Line-of-sight visible light communication system design and demonstration , 2010, 2010 7th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP 2010).

[17]  K. Langer,et al.  513 Mbit/s Visible Light Communications Link Based on DMT-Modulation of a White LED , 2010, Journal of Lightwave Technology.

[18]  Stefan Schmid,et al.  LED-to-LED visible light communication networks , 2013, MobiHoc '13.

[19]  Michael K. Reiter,et al.  Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[20]  Murat Yuksel,et al.  LIGHTNETs: Smart LIGHTing and Mobile Optical Wireless NETworks — A Survey , 2013, IEEE Communications Surveys & Tutorials.

[21]  Dominic C. O'Brien,et al.  Multiple input multiple output systems for optical wireless: challenges and possibilities , 2006, SPIE Optics + Photonics.

[22]  H. Haas,et al.  A 3-Gb/s Single-LED OFDM-Based Wireless VLC Link Using a Gallium Nitride $\mu{\rm LED}$ , 2014, IEEE Photonics Technology Letters.

[23]  Gang Zhou,et al.  DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[24]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[25]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[26]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[27]  Harald Haas,et al.  Visible light communication using OFDM , 2006, 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006..

[28]  Ronald L. Rivest,et al.  Chaffing and Winnowing: Confidentiality without Encryption , 2012 .

[29]  Kaigui Bian,et al.  Strata: layered coding for scalable visual communication , 2014, MobiCom.

[30]  Guoliang Xing,et al.  COBRA: color barcode streaming for smartphone systems , 2012, MobiSys '12.

[31]  Jin Young Kim,et al.  Mitigation Technique for Receiver Performance Variation of Multi-Color Channels in Visible Light Communication , 2011, Sensors.

[32]  Svilen Dimitrov,et al.  Clipping Noise in OFDM-Based Optical Wireless Communication Systems , 2012, IEEE Transactions on Communications.

[33]  Xia Zhou,et al.  Human Sensing Using Visible Light Communication , 2015, MobiCom.

[34]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[35]  Jens B. Schmitt,et al.  Detection of reactive jamming in DSSS-based wireless networks , 2013, WiSec '13.

[36]  Steve Hanna Configuring Security Parameters in Small Devices , 2002 .

[37]  Harald Haas,et al.  Optical Spatial Modulation , 2011, IEEE/OSA Journal of Optical Communications and Networking.