1,128 research outputs found

    Spatial Interference Detection for Mobile Visible Light Communication

    Full text link
    Taking advantage of the rolling shutter effect of CMOS cameras in smartphones is a common practice to increase the transfered data rate with visible light communication (VLC) without employing external equipment such as photodiodes. VLC can then be used as replacement of other marker based techniques for object identification for Augmented Reality and Ubiquitous computing applications. However, the rolling shutter effect only allows to transmit data over a single dimension, which considerably limits the available bandwidth. In this article we propose a new method exploiting spacial interference detection to enable parallel transmission and design a protocol that enables easy identification of interferences between two signals. By introducing a second dimension, we are not only able to significantly increase the available bandwidth, but also identify and isolate light sources in close proximity

    An Optical Design Configuration for Wireless Data Transmission

    Get PDF
    The concept of 2D barcodes is of great relevance for use in wireless data transmission between handheld electronic devices. In a typical setup, any file on a cell phone for example can be transferred to a second cell phone through a series of images on the LCD which are then captured and decoded through the camera of the second cell phone. In this research, a new approach for data modulation in 2D barcodes is introduced, and its performance is evaluated in comparison to other standard methods of barcode modulation. In the proposed method, Orthogonal Frequency Division Multiplexing (OFDM) modulation is used together with Differential Phase Shift Keying (DPSK) over adjacent frequency domain elements to modulate intensity of individual pixels. It is shown that the bit error rate performance of the proposed system is superior to the current state of the art in various scenarios. A specific aim of this study is to establish a system that is proven tolerant to camera motion, picture blur and light leakage within neighboring pixels of an LCD. Furthermore, intensity modulation requires the input signal used to modulate a light source to be positive, which requires the addition of a dc bias. In the meantime, the high crest factor of OFDM requires a lower modulation index to limit clipping distortion. These two factors result in poor power efficiency in radio over fiber applications in which signal bandwidth is generally much less than the carrier frequency. In this study, it is shown that clipping a bipolar radio frequency signal at zero level, when it has a carrier frequency sufficiently higher than its bandwidth, results in negligible distortion in the pass band and most of the distortion power is concentrated in the baseband. Consequently, with less power provided to the optical carrier, higher power efficiencies and better receiver sensitivity will result. Finally, a more efficient optical integrated system is introduced to implement the proposed intensity modulation method which is optimized for radio over fiber applications

    Survey and Systematization of Secure Device Pairing

    Full text link
    Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices. Comparison and assessment of SDP schemes is troublesome, because each scheme makes different assumptions about out-of-band channels and adversary models, and are driven by their particular use-cases. A conceptual model that facilitates meaningful comparison among SDP schemes is missing. We provide such a model. In this article, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards. A system model and consistent terminology for SDP schemes are built on the foundation of this survey, which are then used to classify existing SDP schemes into a taxonomy that, for the first time, enables their meaningful comparison and analysis.The existing SDP schemes are analyzed using this model, revealing common systemic security weaknesses among the surveyed SDP schemes that should become priority areas for future SDP research, such as improving the integration of privacy requirements into the design of SDP schemes. Our results allow SDP scheme designers to create schemes that are more easily comparable with one another, and to assist the prevention of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications Surveys & Tutorials 2017 (Volume: PP, Issue: 99

    Secret key distribution leveraging color shift over visible light channel

    Get PDF
    Given the widely adoption of screen and camera in many electronic devices, the visible light communication (VLC) over screen-to-camera channel emerges as a novel short range communication technique in recent years. Active research explores various ways to convey messages over screen-camera channel, such as barcode and unobtrusive optical pattern. However, with the prevalence of LED screens of wide viewing angles and mobile devices equipped with high standard cameras, the threat of information leakage over screen-to-camera channel becomes in-negligible. Few studies have discussed how to ensure the security of data transmission over screen-to-camera channel. In this paper, we propose a secret key distribution system leveraging the unique color shift property over visible light channel. To facilitate such design, we develop a practical secret key matching based method to map the secret key into gridded optical patterns on screen, which can only be correctly recognized by the legitimate user through an accessible region and allow regular data stream transmission through valid grids. The proposed system is prototyped with off-the-shelf devices and validated under various experimental scenarios. The results show that our system can achieve high bit-decoding accuracy for the legitimate users while maintaining comparable data throughput as regular unobtrusive VLC systems with very low recovery accuracy of the encrypted data for the attackers

    Unsynchronized 4D Barcodes

    Get PDF
    We present a novel technique for optical data transfer between public displays and mobile devices based on unsynchronized 4D barcodes. We assume that no direct (electromagnetic or other) connection between the devices can exist. Time-multiplexed, 2D color barcodes are displayed on screens and recorded with camera equipped mobile phones. This allows to transmit information optically between both devices. Our approach maximizes the data throughput and the robustness of the barcode recognition, while no immediate synchronization exists. Although the transfer rate is much smaller than it can be achieved with electromagnetic techniques (e.g., Bluetooth or WiFi), we envision to apply such a technique wherever no direct connection is available. 4D barcodes can, for instance, be integrated into public web-pages, movie sequences or advertisement presentations, and they encode and transmit more information than possible with single 2D or 3D barcodes

    Near Field Communication: From theory to practice

    Get PDF
    This book provides the technical essentials, state-of-the-art knowledge, business ecosystem and standards of Near Field Communication (NFC)by NFC Lab - Istanbul research centre which conducts intense research on NFC technology. In this book, the authors present the contemporary research on all aspects of NFC, addressing related security aspects as well as information on various business models. In addition, the book provides comprehensive information a designer needs to design an NFC project, an analyzer needs to analyze requirements of a new NFC based system, and a programmer needs to implement an application. Furthermore, the authors introduce the technical and administrative issues related to NFC technology, standards, and global stakeholders. It also offers comprehensive information as well as use case studies for each NFC operating mode to give the usage idea behind each operating mode thoroughly. Examples of NFC application development are provided using Java technology, and security considerations are discussed in detail. Key Features: Offers a complete understanding of the NFC technology, including standards, technical essentials, operating modes, application development with Java, security and privacy, business ecosystem analysis Provides analysis, design as well as development guidance for professionals from administrative and technical perspectives Discusses methods, techniques and modelling support including UML are demonstrated with real cases Contains case studies such as payment, ticketing, social networking and remote shopping This book will be an invaluable guide for business and ecosystem analysts, project managers, mobile commerce consultants, system and application developers, mobile developers and practitioners. It will also be of interest to researchers, software engineers, computer scientists, information technology specialists including students and graduates.Publisher's Versio

    Energy Harvesting: RF for RFID tag

    Get PDF
    RFID is an acronym for Radio Frequency Identification, which is a wireless communication technology that enables users to uniquely identify tagged objects or people via radio frequency waves. It is rapidly becoming a costeffective technology for various sectors like the supply chains, livestock management, military’s weapon tracking and the medical industry. In general, there are two types of RFID tags – active and passive. Passive tag has a small physical form factor and does not have an on-board battery. It relies on the RFID reader to supply power to activate the tag. Active tag on the other hand has an onboard battery power which supplies continuous power to the tag. As such, it has greater capability and is advantageous compared to the passive tag. One of the most prominent advantages is in terms of its long range communication distance. However, battery depletes over time and replacing the battery can be tedious, time-consuming and costly. This project aims to enable active RFID tags to harvest energy from surrounding radio frequency (RF) to power and to recharge the on-board battery of the tag

    Smartphone Camera Based Visible Light Communication

    Get PDF
    The paper proposes a novel camera-based receiver for visible light communications for a short range mobile-to-mobile communications link. The receiver captures data from the screen of a transmitting smartphone and uses the speeded up robust features algorithm to effectively detect it. The receiver performs a projective transformation to accurately eliminate perspective distortions caused by the displacement of the devices. The paper also introduces a quantization process in order to suppress the inter-symbol interference resulting from the dynamic nature of the environment. A range of experiments are carried out in order to evaluate the system performance when the position parameters are varied. We show that the proposed system is capable of achieving a very high success rate of 98% in recovering the transmitted images under test conditions
    corecore