Affiliation:
1. Michigan State University, USA
2. Michigan Technological University, USA
Abstract
With the demand for economical and high-speed wireless services, Optical Wireless Communication (OWC) has attracted increasing attention in both research and the market. In the past decades, numerous optical-related techniques (e.g., LEDs, displays, cameras) and systems (e.g., VLC, LiFi, LiDAR) have been invented. OWC techniques, which are considered as a competitive mechanics in next-generation networks as an alternative to RF approaches, offer 10,000 times more bandwidth than conventional radio frequency (RF)-based wireless techniques (e.g., WiFi, LoRa, Bluetooth, LTE), as well as tremendous spatial reuse potential with even less interference. Because optical communications have a limited wavelength and travel in the line of sight (LoS) manner, the OWC is commonly thought as a secure wireless approach to confine light transmissions within physical bounds. However, in the real world, it is completely untrue. The privacy leakages and security risks broadly exist in the optical-related wireless applications including OWC networks. These threats and weaknesses have recently been the subject of several initial studies. However, they lack systematic analysis and are isolated. This survey first presents a general workflow of OWC systems, which consists of three stages: before signal emission (BSE), during signal propagation (DSP), and after signal receiving (ASV). For each stage, related risks are reviewed. Then, we summarize existing attacks in optical-related wireless applications and corresponding counter-attack solutions. Finally, we outline the future trends for improving OWC security.
Funder
U.S. National Science Foundation
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Theoretical Computer Science
Reference168 articles.
1. IEEE standard for local and metropolitan area networks–part 15.7: Short-range optical wireless communications;IEEE Std 802.15.7-2018 (Revision of IEEE Std 802.15.7-2011),2019
2. Security-reliability trade-off analysis for multiuser SIMO mixed RF/FSO relay networks with opportunistic user scheduling;El-Malek Ahmed H. Abd;IEEE Trans. Wirel. Commun.,2016
3. Ahmed H. Abd El-Malek, Anas M. Salhab, Salam A. Zummo, and Mohamed-Slim Alouini. 2017. Physical layer security enhancement in multiuser mixed RF/FSO relay networks under RF interference. In IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 1–6.
4. Sabrina Abedin, Tasfia Tasbin, and Avijit Hira. 2017. Optical wireless data transmission with enhanced substitution caesar cipher WHEEL encryption. In International Conference on Electrical, Computer and Communication Engineering (ECCE). IEEE, 552–556.
5. MAC layer design for network-enabled visible light communication systems compliant with IEEE 802.15. 7;Adiono Trio;EAI Endors. Trans. Energy Web,2017
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献