Security issues in visible light communication systems

Grzegorz J. Blinowski


Visible light communication (VLC) has been recently proposed as an alternative standard to radio-based wireless networks. Because of its physical characteristics, and in line with the slogan "what you see is what you send", VLC is considered a secure communication method. In this work we focus on security aspects of VLC communication, starting from basic physical characteristics of the communication channel. We analyze the risks of signal jamming, data snooping and modification. We also discuss MAC-level security mechanisms as defined in the IEEE 802.15.7 standard.
Author Grzegorz J. Blinowski (FEIT / IN)
Grzegorz J. Blinowski,,
- The Institute of Computer Science
Journal seriesIFAC-PapersOnLine, ISSN 2405-8963, (0 pkt)
Issue year2015
Vol48, Issue 4
Publication size in sheets0.5
Conference13th International IFAC Conference on Programmable Devices and Embedded Systems (PDeS 2015), 13-05-2015 - 15-05-2015, Kraków, Polska
Keywords in EnglishWireless networks, visible light communication, wireless network security, industrial wireless standards, IEEE 802.15.7
ASJC Classification2207 Control and Systems Engineering
ProjectDevelopment of new algorithms in the areas of software and computer architecture, artificial intelligence and information systems and computer graphics. Project leader: Rybiński Henryk, , Phone: +48 22 234 7731, start date 05-06-2014, planned end date 31-12-2014, end date 30-11-2015, II/2014/DS/1, Completed
WEiTI Działalność statutowa
Languageen angielski
1-s2.0-S2405896315008149-main.pdf 559.34 KB
Score (nominal)5
Score sourcejournalList
ScoreMinisterial score = 0.0, 01-02-2020, ArticleFromJournalAndMatConfByIndicator
Ministerial score (2013-2016) = 5.0, 01-02-2020, ArticleFromJournalAndMatConfByIndicator
Publication indicators Scopus Citations = 16; WoS Citations = 13; Scopus SNIP (Source Normalised Impact per Paper): 2015 = 0.388
Citation count*
Share Share

Get link to the record

* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.
Are you sure?