A Mini Review of Lifi Technology : Security Issue
Abstract
Full Text:
PDFReferences
H. Haas, L. Yin, Y. Wang, and C. Chen, “What is LiFi?,” J. Light. Technol., vol. 34, pp. 1533–1544, 2016, doi: 10.1109/JLT.2015.2510021.
D. Tsonev, S. Videv, and H. Haas, “Light Fidelity (Li-Fi): Towards All-Optical Networking”, Accessed: Feb. 02, 2018. [Online]. Available: http://www.homepages.ed.ac.uk/hxh/Li-Fi_PAPERS/14_optical_attocells.pdf
G. J. Blinowski, “Practical Aspects of Physical and MAC Layer Security in Visible Light Communication Systems,” Int. J. Electron. Telecommun., 2016, doi: 10.1515/eletel-2016-0001.
H. Haas, “LiFi is a paradigm-shifting 5G technology,” Rev. Phys., vol. 3, pp. 26–31, Nov. 2018, doi: 10.1016/J.REVIP.2017.10.001.
L. U. Khan, “Visible light communication: Applications, architecture, standardization and research challenges,” Digit. Commun. Networks, vol. 3, no. 2, pp. 78–88, 2016, doi: 10.1016/j.dcan.2016.07.004.
S. Alfattani, “Review of LiFi Technology and Its Future Applications,” J. Opt. Commun., vol. 42, Jun. 2018, doi: 10.1515/joc-2018-0025.
Latif, U. Khan, V. Leds, L.-F. Ook, and P. P. Csk, “Visible light communication_ applications, architecture, standardization and research challenges,” 2017, doi: 10.1016/j.dcan.2016.07.004.
R. George, S. Vaidyanathan, A. S. Rajput, and K. Deepa, “LiFi for Vehicle to Vehicle Communication - A Review,” Procedia Comput. Sci., vol. 165, pp. 25–31, 2019, doi: 10.1016/J.PROCS.2020.01.066.
S. Dimitrov and H. Haas, “Principles of LED Light Communications Towards Networked Li-Fi”, Accessed: Feb. 12, 2018. [Online]. Available: http://aksitha.com/Future Technology/Principles of LED Light Communications Towards Networked Li-Fi - Svilen Dimitrov, Harald Haas - 2015.pdf
G. Blinowski, “The feasibility of launching physical layer attacks in visible light communication networks”, Accessed: Feb. 13, 2018. [Online]. Available: https://arxiv.org/ftp/arxiv/papers/1608/1608.07146.pdf
A. Mostafa and L. Lampe, “Physical-layer security for indoor visible light communications,” in 2014 IEEE International Conference on Communications (ICC), Jun. 2014, pp. 3342–3347. doi: 10.1109/ICC.2014.6883837.
J. Classen, D. Steinmetzer, and M. Hollick, “Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer,” in Proceedings of the 3rd Workshop on Visible Light Communication Systems, 2016, pp. 19–24. doi: 10.1145/2981548.2981551.
J. Classen, J. Chen, D. Steinmetzer, M. Hollick, and E. Knightly, “The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications”, doi: 10.1145/2801073.2801075.
A. Mostafa and L. Lampe, “Securing visible light communications via friendly jamming,” in 2014 IEEE Globecom Workshops (GC Wkshps), Dec. 2014, pp. 524–529. doi: 10.1109/GLOCOMW.2014.7063485.
M. Spuhler, D. Giustiniano, V. Lenders, M. Wilhelm, and J. B. Schmitt, “IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION Detection of Reactive Jamming in DSSS-based Wireless Communications”, doi: 10.1109/TWC.2013.131037.
V. Guerra, J. Rabadan, L. Palmas, and D. G. Canaria, “Data Sniffing Over an Open VLC Channel,” pp. 1–6.
S. L. Hansman, “A Taxonomy of Network and Computer Attack Methodologies,” 2003. Accessed: May 01, 2022. [Online]. Available: https://ir.canterbury.ac.nz/handle/10092/11201
DOI: https://doi.org/10.29040/ijcis.v3i3.74
Article Metrics
Abstract view : 746 timesPDF - 790 times
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 4.0 International License
















