Abstract

With the demand for economical and high-speed wireless services, Optical Wireless Communication (OWC) has attracted increasing attention in both research and the market. In the past decades, numerous optical-related techniques (e.g., LEDs, displays, cameras) and systems (e.g., VLC, LiFi, LiDAR) have been invented. OWC techniques, which are considered as a competitive mechanics in next-generation networks as an alternative to RF approaches, offer 10,000 times more bandwidth than conventional radio frequency (RF)-based wireless techniques (e.g., WiFi, LoRa, Bluetooth, LTE), as well as tremendous spatial reuse potential with even less interference. Because optical communications have a limited wavelength and travel in the line of sight (LoS) manner, the OWC is commonly thought as a secure wireless approach to confine light transmissions within physical bounds. However, in the real world, it is completely untrue. The privacy leakages and security risks broadly exist in the optical-related wireless applications including OWC networks. These threats and weaknesses have recently been the subject of several initial studies. However, they lack systematic analysis and are isolated. This survey first presents a general workflow of OWC systems, which consists of three stages: before signal emission (BSE), during signal propagation (DSP), and after signal receiving (ASV). For each stage, related risks are reviewed. Then, we summarize existing attacks in optical-related wireless applications and corresponding counter-attack solutions. Finally, we outline the future trends for improving OWC security.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call