2020
DOI: 10.3390/electronics9111847
|View full text |Cite
|
Sign up to set email alerts
|

Secure Visible Light Communication Technique Based on Asymmetric Data Encryption for 6G Communication Service

Abstract: Security in residential and business establishments has become an area of considerable importance. To provide enhanced security using conventional visible light (VL) communication, the characteristics of which allow for easy access by nearby intruders, a new VL communication technique is proposed in this paper. The novel VL communication system is based on a data encryption method using asymmetric encryption, and it is proposed for use in smart indoor services in the 6th generation communication environment. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…Author suggest the use of WBPLSec protocol based VLC can be used transact secret shared key between authentic receiver and devices in an indoor environment. Lee [300] also targeted to improve the security of VLC communication system tailored for smart indoor services in 6G ear. Author proposed the use of asymmetric Rivest-Shamir-Adleman (RSA) encryption for securing data communication and for exchanging secret key.…”
Section: J Visible Light Communication (Vlc)mentioning
confidence: 99%
“…Author suggest the use of WBPLSec protocol based VLC can be used transact secret shared key between authentic receiver and devices in an indoor environment. Lee [300] also targeted to improve the security of VLC communication system tailored for smart indoor services in 6G ear. Author proposed the use of asymmetric Rivest-Shamir-Adleman (RSA) encryption for securing data communication and for exchanging secret key.…”
Section: J Visible Light Communication (Vlc)mentioning
confidence: 99%
“…Therefore, VLC is considered as a potential medium for handling 6G-based high-throughput applications. In [73], the authors suggested use of asymmetric encryption for optimum error rate in comparison to conventional symmetric encryption in 6G-enabled VLC-based indoor applications. 6G technology is being designed with the aim to achieve a 1Tbps throughput with less than 100us latency.…”
Section: Cryptographic-based Countermeasuresmentioning
confidence: 99%
“…Lastly, it is interesting to investigate how an encrypted audio signal is affected by water-waves. It should be mentioned that there are many types of encryption schemes used for WOC and UWOC, such as chaotic maps [19], virtual optical holographic [43], temporal ghost imaging [44], and Rivest-Shamir-Adleman (RSA) [43] [45]. We encrypted the analog audio signal in MATLAB 2021a by using the asymmetric RSA scheme [46], [47] due to its known superior performance in WOC [45].…”
Section: B Water-waves Effect On Encrypted Speech Signals In the Abov...mentioning
confidence: 99%