69
Views
0
CrossRef citations to date
0
Altmetric
Optoelectronics

High-speed VLC Security System Using Two Key Services by Multi-point Analysis

&

References

  • T. S. Asha, and K. Drisya, “Visible light communication and Its applications,” IARJSET, Vol. 6, no. 2, 2019. DOI: 10.17148/IARJSET.2019.6213.
  • A. M. Galefang, R. Reeuben, M. Leatiile, B. Bokamoso, S. K. Amjad, and M. C. Joseph, “Indoor visible light communication: A tutorial & survey. Hindawi,” Wirel. Commun. Mobile Comput., Vol. 2020, no. 8881305, pp. 46, 2020. DOI: 10.11555/2020/8881305.
  • K. O. Akande, P. A. Haigh, and W. O. Popoola, “On the implementation of carrierless amplitude and phase modulation in visible light communication,” IEEE. Access., 1–1, 2018. DOI: 10.1109/access.2018.2876001.
  • Y. C. Chi, and D. H. Hsieh, “Phosphorous diffuser diverged blue laser diode for indoor lighting and communication,” Sci. Rep., Vol. 5, no. 1, pp. 18690, 2016. DOI: 10.1038/srep18690
  • O. A. Kabiru, and W. O. Popoola, “Enhanced subband index carrierless amplitude and phase modulation in visible light communication,” J. Light W. Technol, Vol. 37, no. 23, 2019. DOI: 10.1109/JLT.2019.2941430.
  • P. Chvojka, P. A. Haigh, and A. Minotto, “Expanded multiband super-nyquist CAP modulation for highly bandlimited organic visible light communication,” IEEE Sys. J., Vol. 14, no. 2, 2020. DOI: 10.1109/JSYST.2019.2939026.
  • Y. Almadani, D. Plets, S. Bastiaens, W. Joseph, M. Ijaz, Z. Ghassemlooy, and S. Rajbhanadari, “Visible light communication for industrial applications – challenges & potentials,” Rev. Article MDPI. Electron., Vol. 9, pp. 2157, 2020. DOI:10.3390/electronics9122157.
  • M. Nakajima, and S. Haruyama. “Indoor navigation systems for visually impaired people using visible light communication and compensated geomagnetic sensing,” in 1st IEEE International Conf. on Commn. in China (ICCC 2012), 2012. DOI:10.1109/ICCChina.2012.6356940.
  • J. Grubor, S. Randel, K. D. Langer, and J. W. Walewski, “Broadband information broadcasting using LED-based interior lighting,” J. Light W. Technol, Vol. 26, no. 25, pp. 3883–3892, 2008. DOI: 10.1109/JLT.2008.928525
  • J. Zhao, et al., “High-Security physical layer in CAP-PON system based on floating probability disturbance,” IEEE Photonics Technol. Lett., Vol. 32, no. 7, pp. 367–370, 2020. DOI: 10.1109/LPT.2020.2974661.
  • A. E. Marcu, et al. “Flicker free VLC system with automatic code resynchronization using low frame rate camera,” in 42nd International Conference on Telecommunication and Signal Processing (TSP), pp. 402–405, 2019. DOI: 10.1109/TSP.2019.8768892.
  • C. Rohner, S. Raza, D. Puccinelli, and T. Voigt, “Security in VLC: novel challenges and opportunities,” Sens. Transducers, Vol. 192, no. 9, pp. 9–15, 2015.
  • E. Panayirci, A. Yesilkaya, T. Cogalan, and H. Haas, “Physical-layer security with generalized space shift keying,” Early Accesses IEEE Tras. Commun, 1–1, 2020. DOI: 10.1109/TCOMM.2020.2969867.
  • D. Cafagna, and G. Grassi, “New 3D-scroll attractors in hyperchaotic Chua’s circuits forming a ring,” Int. J. Bifurcation Chaos, Vol. 13, no. 10, pp. 2889–2903, 2003. DOI: 10.1142/S0218127403008284.
  • Z. Elhadj, and J. C. Sprott, “Generating 3-scroll attractors from one chau circuit,” Int. J. Bifurcation Chaos, Vol. 20, no. 1, pp. 135–144, 2010. DOI: 10.1142/S0218127410025454.
  • M. Yan, and H. Xu, “A chaotic system with a non-linear term and multiple coexistance attractors,” Eur. Phys. J. Plus, Vol. 135, no. 452, pp. 1–9, 2020.
  • P. Ding, X. Feng, and L. Fa, “Generating of 3-D grid multi – scroll chaotic attractors based on sign function and sine function,” MDPI- Electronics, Vol. 9, pp. 2145, 2020. DOI: 10.3390/electronics9122145.
  • Y. Al-Moliki, M. T. Alresheedi, and Y. Al-Harthi, “Physical layer security against known/chosen plaintext attacks for OFDM based VLC system,” IEEE Commun. Lett., Vol. 21, no. 12, pp. 2606–2609, 2017. DOI: 10.1109/LCOMM.2017.2747512.
  • A. Arafa, E. Panayirci, and H. V. Poor, “Relay-aided secure broadcasting for visible light communication,” IEEE Transact. Commun., Vol. 67, no. 6, pp. 4227–4239, 2019. DOI: 10.1109/TCOMM.2019.2900632.
  • D. Li, L. Zhang, and J. Qiu, “High security chaotic multiple access scheme for VLC system,” ITNAC 2016-IEEE, 2016. DOI: 10.1109/ATNAC.2016.7878796.
  • A. Soleymani, M. J. Nordin, and E. Sundarajan, “A chaotic cryptosystem for images based on Henon and Arnold cat map,” Scientific World J., Vol. 2014, Article ID 536930, 21 pages, 2014. DOI: 10.1155/2014/536930.
  • Z. Qawaqneh, K. Elleithy, B. Alotaibi, and M. Alotaibi. “A new hardware quantum-based encryption algorithm,” in IEEE Long Island Systems, Applications and Technology (LISAT) Conference. Farmingdale, NY, pp. 1–5, 2014. DOI: 10.1109/LISAT.2014.6845201.
  • Magfirawaty, M. Suryadi, and K. Ramli, “On the design of Henon and logistic map-based random number generator,” J. Phys. Conf. Ser., Vol. 893, pp. 012060, 2017. DOI: 10.1088/1742-6596/893/1/012060.
  • H. Zhu, Y. Zhao, and Y. Song, “2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption,” IEEE. Access., Vol. 7, 2019. DOI: 10.1109/Access.2019.2893538.
  • J. Xu, P. Li, F. Yang, and H. Yan, “High intensity image encryption scheme based on quantum logistic chaotic map and complex hyperchaotic system,” IEEE. Access., Vol. 7, 2019. DOI: 10.1109/Access.2019/2952140.
  • Z. Liu, Q. Guo, L. Xu, M. A. Ahmad, and S. Liu, “Double image encryption by using iterative random binary encoding in gyrator domains,” Opt. Express, Vol. 18, no. 11, pp. 12033–12043, 2010. DOI: 10.1364/OE.18.012033
  • Y. Zhang, “A fast image encryption algorithm based on convolution operation,” IETE. J. Res., Vol. 65, no. 1, pp. 4–18, 2019. DOI: 10.1080/03772063.2017.1400406
  • A. Aliaberi, P. C. Sofotasios, and S. Muhaidat, “Modulation schemes for visible light communications,” Int. Conf. Adv. Commun Technolo. Networking, 2019. DOI: 10.1109/commnet.2019.8742376.
  • V. Prakash, C. T. Manimegalai, S. Gauni, and K. Kalimuthu, “Improved BER performance using novel ELM based demodulator for CAP-VLC system,” IEEE. Access., Vol. 9, Nov 2021. DOI: 10.1109/access.2021.3124968.
  • G. Blinowski, “Security of visible light communication systems – a survey,” Phys. Commun., Vol. 34, pp. 246–260, 2019. DOI: 10.1016/j.phycom.2019.04.003.
  • W. Feng, Y. He, H. Li, and C. Li, “A plain-image-related chaotic image encryption algorithm based on DNA sequence operation and discrete logarithm,” IEEE. Access., Vol. 7, pp. 181589–181609, Dec. 2019. DOI: 10.1109/ACCESS.2019.2959137.
  • C. Song, and Y. Qiao, “A novel image encryption algorithm based on DNA encoding and spatiotemporal chaos,” Entropy, Vol. 17, no. 10, pp. 6954–6968, Oct. 2015. DOI: 10.3390/e17106954.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.