English  |  正體中文  |  简体中文  |  Items with full text/Total items : 57969/91503 (63%)
Visitors : 13694521      Online Users : 56
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/118490


    Title: A Light Weight Stream Cypher Mechanism for Visible Light Communication
    Authors: Chang, Shih-Hao;Huang, Ted;Chen, Mei-Lan
    Keywords: Visible light communication;Error propagation;Cypher security;Stream cypher;WG-8
    Date: 2019-03
    Issue Date: 2020-04-09 12:10:32 (UTC+8)
    Abstract: LED light has many advantages such as power efficient, better quality, long lifespan, and focus emission. LED lighting has been employed in our daily life in various ways, such as car lamps and lights in vehicles, roadside signal lights, indoor lighting systems, etc. The LED light bulbs not only can provide bright but also can be employed for data communication and object positioning, namely visible light communication (VLC). VLC is fast-growing technologies that enable new visible light application such as fast data transmission and indoor positioning. Due to its attractive functionalities, they have draw lots of attention to the wireless communication and indoor navigation systems. Because of its physical characteristics, “what you see is what you send”, VLC has been always considered as a secured communication method. In this work, we analyze the risks of visible light communication signal such as signal jamming, data snooping and modification. In order to effectively protect VLC data communication problems, we design a lightweight stream cypher data communication through the VLC signal to achieve the secure of the data communication. Experimental results of the proposed mechanism show that the WG-8 encryption algorithm can be executed on Raspberry Pi3 Model B, which has limited computing power. The evaluation result shows WG-8 support embedded system and CPU utilization reach up to 49%.
    Relation: The 12th International Workshop on Telecommunication Networking, Applications and Systems (TeNAS-2019)
    DOI: 10.1007/978-3-030-15035-8_45
    Appears in Collections:[Graduate Institute & Department of Computer Science and Information Engineering] Proceeding

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML28View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback