A Light Weight Stream Cypher Mechanism for Visible Light Communication

LED light has many advantages such as power efficient, better quality, long lifespan, and focus emission. LED lighting has been employed in our daily life in various ways, such as car lamps and lights in vehicles, roadside signal lights, indoor lighting systems, etc. The LED light bulbs not only can provide bright but also can be employed for data communication and object positioning, namely visible light communication (VLC). VLC is fast-growing technologies that enable new visible light application such as fast data transmission and indoor positioning. Due to its attractive functionalities, they have draw lots of attention to the wireless communication and indoor navigation systems. Because of its physical characteristics, “what you see is what you send”, VLC has been always considered as a secured communication method. In this work, we analyze the risks of visible light communication signal such as signal jamming, data snooping and modification. In order to effectively protect VLC data communication problems, we design a lightweight stream cypher data communication through the VLC signal to achieve the secure of the data communication. Experimental results of the proposed mechanism show that the WG-8 encryption algorithm can be executed on Raspberry Pi3 Model B, which has limited computing power. The evaluation result shows WG-8 support embedded system and CPU utilization reach up to 49%.

[1]  Richard Zurawski Industrial Communication Systems , 2004 .

[2]  Giuseppe Buja,et al.  Communication architectures for electrical drives , 2005, IEEE Transactions on Industrial Informatics.

[3]  Sridhar Rajagopal,et al.  IEEE 802.15.7 visible light communication: modulation schemes and dimming support , 2012, IEEE Communications Magazine.

[4]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[5]  Richard Zurawski,et al.  The Industrial Communication Technology Handbook , 2005 .

[6]  Dawn M. Tilbury,et al.  The Emergence of Industrial Control Networks for Manufacturing Control, Diagnostics, and Safety Data , 2007, Proceedings of the IEEE.

[7]  Andreas Willig,et al.  Recent and Emerging Topics in Wireless Industrial Communications: A Selection , 2008, IEEE Transactions on Industrial Informatics.

[8]  Claudio Zunino,et al.  Real-time Ethernet networks for motion control , 2011, Comput. Stand. Interfaces.

[9]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[10]  Guang Gong,et al.  Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices , 2010, Financial Cryptography Workshops.

[11]  Grahame Faulkner,et al.  Indoor visible light communications: challenges and prospects , 2008, Optical Engineering + Applications.

[12]  Thilo Sauter,et al.  How to Access Factory Floor Information Using Internet Technologies and Gateways , 2011, IEEE Transactions on Industrial Informatics.

[13]  T. Sauter,et al.  The continuing evolution of integration in manufacturing automation , 2007, IEEE Industrial Electronics Magazine.

[14]  Guang Gong,et al.  WG: A family of stream ciphers with designed randomness properties , 2008, Inf. Sci..