19,511 research outputs found

    Dynamic Physical-Layer Secured Link in a Mobile MIMO VLC System

    Get PDF
    This paper proposes a novel approach to provide a privately secured multiple-input and multiple-output visible light communication (VLC) in the mobility conditions. In the proposed system, a private secured VLC link is adaptively allocated to a mobile user all the time thanks to the movement tracking assistance by a camera-based detection system. The generation of the dynamic location-based scrambling matrix will be introduced providing a secured communication zone within a full normal coverage illumination area. An extensive range of numerical evaluation and practical experiments is carried out to demonstrate and evaluate the proposed system performance in different environment configurations including the mobility, camera resolutions, link range, and environment light intensity. We demonstrate that the proposed system is fully capable of securely steering the information with respect to a receiver location with a high level of reliability

    Visible Light Communication Cyber Security Vulnerabilities For Indoor And Outdoor Vehicle-To-Vehicle Communication

    Get PDF
    Light fidelity (Li-Fi), developed from the approach of Visible Light Communication (VLC), is a great replacement or complement to existing radio frequency-based (RF) networks. Li-Fi is expected to be deployed in various environments were, due to Wi-Fi congestion and health limitations, RF should not be used. Moreover, VLC can provide the future fifth generation (5G) wireless technology with higher data rates for device connectivity which will alleviate the traffic demand. 5G is playing a vital role in encouraging the modern applications. In 2023, the deployment of all the cellular networks will reach more than 5 billion users globally. As a result, the security and privacy of 5G wireless networks is an essential problem as those modern applications are in people\u27s life everywhere. VLC security is as one of the core physical-layer security (PLS) solutions for 5G networks. Due to the fact that light does not penetrate through solid objects or walls, VLC naturally has higher security and privacy for indoor wireless networks compared to RF networks. However, the broadcasting nature of VLC caused concerns, e.g., eavesdropping, have created serious attention as it is a crucial step to validate the success of VLC in wild. The aim of this thesis is to properly address the security issues of VLC and further enhance the VLC nature security. We analyzed the secrecy performance of a VLC model by studying the characteristics of the transmitter, receiver and the visible light channel. Moreover, we mitigated the security threats in the VLC model for the legitimate user, by 1) implementing more access points (APs) in a multiuser VLC network that are cooperated, 2) reducing the semi-angle of LED to help improve the directivity and secrecy and, 3) using the protected zone strategy around the AP where eavesdroppers are restricted. According to the model\u27s parameters, the results showed that the secrecy performance in the proposed indoor VLC model and the vehicle-to-vehicle (V2V) VLC outdoor model using a combination of multiple PLS techniques as beamforming, secure communication zones, and friendly jamming is enhanced. The proposed model security performance was measured with respect to the signal to noise ratio (SNR), received optical power, and bit error rate (BER) Matlab simulation results

    Practical aspects of physical and MAC layer security in visible light communication systems

    Get PDF
    Abstract— Visible light communication (VLC) has been recently proposed as an alternative standard to radio-based wireless networks. Originally developed as a physical media for PANs (Personal area Networks) it evolved into universal WLAN technology with a capability to transport internet suite of network and application level protocols. Because of its physical characteristics, and in line with the slogan "what you see is what you send", VLC is considered a secure communication method. In this work we focus on security aspects of VLC communication, starting from basic physical characteristics of the communication channel. We analyze the risks of signal jamming, data snooping and data modification. We also discuss MAC-level security mechanisms as defined in the IEEE 802.15.7 standard. This paper is an extension of work originally reported in Proceedings of the 13th IFAC and IEEE Conference on Programmable Devices and Embedded Systems — PDES 2015

    SYSTEMS AND METHODS FOR PROTECTING RETAIL DISPLAY MERCHANDISE FROM THEFT

    Get PDF
    Security systems and methods for protecting retail display merchandise from theft are provided. For example, a security system includes a plurality of sensors, each sensor configured to be secured to an item of merchandise. The security system also includes a monitoring device configured to wirelessly communicate with each of the plurality of sensors, wherein the monitoring device and the plurality of sensors are configured to communicate with one another to determine a distance between each of the plurality of sensors and the monitoring device. The monitoring device and/or at least one of the plurality of sensors is configured to initiate a security signal based on the distance between the monitoring device and at least one of the sensor relative to a proximity range

    283110 - Fire Alarm Systems

    Get PDF

    NASA Patent Abstracts bibliography: A continuing bibliography. Section 1: Abstracts (supplement 21) Abstracts

    Get PDF
    Abstracts are cited for 87 patents and applications introduced into the NASA scientific and technical information system during the period of January 1982 through June 1982. Each entry consists of a citation, an abstract, and in mose cases, a key illustration selected from the patent or patent application

    Intelligent intrusion detection in low power IoTs

    Get PDF

    NASA patent abstracts bibliography: A continuing bibliography. Section 1: Abstracts (supplement 30)

    Get PDF
    Abstracts are provided for 105 patents and patent applications entered into the NASA scientific and technical information system during the period July 1986 through December 1986. Each entry consists of a citation, an abstract, and in most cases, a key illustration selected from the patent or patent application
    • …
    corecore