Abstract

Although visible light communication (VLC) channels are more secure than radio frequency channels, the broadcast nature of VLC links renders them open to eavesdropping. As a result, VLC networks must provide security in order to safeguard the user’s data from eavesdroppers. In the literature, keyless security techniques have been developed to offer security for VLC. Even though these techniques provide strong security against eavesdroppers, they are difficult to deploy. Key generation algorithms are critical for securing wireless connections. Nonetheless, in many situations, the typical key generation methods may be quite complicated and costly. They consume scarce resources, such as bandwidth. In this paper, we propose a novel key extraction procedure that uses error-correcting coding and one time pad (OTP) to improve the security of VLC networks and the validity of data. This system will not have any interference problems with other devices. We also explain error correction while sending a message across a network, and suggest a change to the Berlekamp–Massey (BM) algorithm for error identification and assessment. Because each OOK signal frame is encrypted by a different key, the proposed protocol provides high physical layer security; it allows for key extraction based on the messages sent, so an intruder can never break the encryption system, even if the latter knows the protocol with which we encrypted the message; our protocol also enables for error transmission rate correction and bit mismatch rates with on-the-fly key fetch. The results presented in this paper were performed using MATLAB.

Highlights

  • There is a need to keep information confidential, so that only authorized parties have access to it, and protect the information transmitted over the network [1], which can even cover the backup of files or passwords stored on computers that are connected online, as well as access to computer systems and applications

  • physical layer security (PLS) is a remarkable complement to cryptography-based protection, as it introduces an additional layer of secrecy that is demonstrably unbreakable, regardless of the attackers computing power, as well as an option for standalone privacy solutions for systems that are limited in hardware and/or power, such as in internet of things (IoT) applications [5]

  • To encode our previous message (m), we apply an XOR between m and the key obtained by the BM algorithm that we modified; this key will be on 3 bits, for the digits obtained, different from “0” and “1”

Read more

Summary

Introduction

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. There is a need to keep information confidential, so that only authorized parties have access to it, and protect the information transmitted over the network [1], which can even cover the backup of files or passwords stored on computers that are connected online, as well as access to computer systems and applications. This problem may be solved by requiring users to utilize keys to access their workstations, password secure critical documents, and digitally sign their emails [1]. Even if the approach changes, the error-correcting aspect will not alter

Security of MAC in Li-Fi
Theoretical Basis at the Physical Layer Security
On–Off Keying Modulation and Graduation Methodology
Application and Overview
Results and Discussion
Conclusions and Future Works
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call