A Mini Review of Lifi Technology : Security Issue

Erika Ramadhani


Visible Light Communication (VLC) is an extension of Light Fidelity (LiFi) that uses full duplex communication or fully networked wireless communication. LiFi is one of the top technologies for solving wireless fidelity (WiFi) issues. Communication over LiFi is one of its major advantages. However, no security system is infallible. The purpose of this paper is to conduct a mini review of LIFI technology in terms of security issues. As a new technology, Lifi is still not widely known for its security issues. Literature reviews are a necessary step to determining the issues related to Lifi technology. A descriptive qualitative approach is used in this paper to describe the data. As a result, several studies have documented security issues related to LiFi technology, including data modification, spoofing, and jamming.

Full Text:



H. Haas, L. Yin, Y. Wang, and C. Chen, “What is LiFi?,” J. Light. Technol., vol. 34, pp. 1533–1544, 2016, doi: 10.1109/JLT.2015.2510021.

D. Tsonev, S. Videv, and H. Haas, “Light Fidelity (Li-Fi): Towards All-Optical Networking”, Accessed: Feb. 02, 2018. [Online]. Available: http://www.homepages.ed.ac.uk/hxh/Li-Fi_PAPERS/14_optical_attocells.pdf

G. J. Blinowski, “Practical Aspects of Physical and MAC Layer Security in Visible Light Communication Systems,” Int. J. Electron. Telecommun., 2016, doi: 10.1515/eletel-2016-0001.

H. Haas, “LiFi is a paradigm-shifting 5G technology,” Rev. Phys., vol. 3, pp. 26–31, Nov. 2018, doi: 10.1016/J.REVIP.2017.10.001.

L. U. Khan, “Visible light communication: Applications, architecture, standardization and research challenges,” Digit. Commun. Networks, vol. 3, no. 2, pp. 78–88, 2016, doi: 10.1016/j.dcan.2016.07.004.

S. Alfattani, “Review of LiFi Technology and Its Future Applications,” J. Opt. Commun., vol. 42, Jun. 2018, doi: 10.1515/joc-2018-0025.

Latif, U. Khan, V. Leds, L.-F. Ook, and P. P. Csk, “Visible light communication_ applications, architecture, standardization and research challenges,” 2017, doi: 10.1016/j.dcan.2016.07.004.

R. George, S. Vaidyanathan, A. S. Rajput, and K. Deepa, “LiFi for Vehicle to Vehicle Communication - A Review,” Procedia Comput. Sci., vol. 165, pp. 25–31, 2019, doi: 10.1016/J.PROCS.2020.01.066.

S. Dimitrov and H. Haas, “Principles of LED Light Communications Towards Networked Li-Fi”, Accessed: Feb. 12, 2018. [Online]. Available: http://aksitha.com/Future Technology/Principles of LED Light Communications Towards Networked Li-Fi - Svilen Dimitrov, Harald Haas - 2015.pdf

G. Blinowski, “The feasibility of launching physical layer attacks in visible light communication networks”, Accessed: Feb. 13, 2018. [Online]. Available: https://arxiv.org/ftp/arxiv/papers/1608/1608.07146.pdf

A. Mostafa and L. Lampe, “Physical-layer security for indoor visible light communications,” in 2014 IEEE International Conference on Communications (ICC), Jun. 2014, pp. 3342–3347. doi: 10.1109/ICC.2014.6883837.

J. Classen, D. Steinmetzer, and M. Hollick, “Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer,” in Proceedings of the 3rd Workshop on Visible Light Communication Systems, 2016, pp. 19–24. doi: 10.1145/2981548.2981551.

J. Classen, J. Chen, D. Steinmetzer, M. Hollick, and E. Knightly, “The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications”, doi: 10.1145/2801073.2801075.

A. Mostafa and L. Lampe, “Securing visible light communications via friendly jamming,” in 2014 IEEE Globecom Workshops (GC Wkshps), Dec. 2014, pp. 524–529. doi: 10.1109/GLOCOMW.2014.7063485.

M. Spuhler, D. Giustiniano, V. Lenders, M. Wilhelm, and J. B. Schmitt, “IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION Detection of Reactive Jamming in DSSS-based Wireless Communications”, doi: 10.1109/TWC.2013.131037.

V. Guerra, J. Rabadan, L. Palmas, and D. G. Canaria, “Data Sniffing Over an Open VLC Channel,” pp. 1–6.

S. L. Hansman, “A Taxonomy of Network and Computer Attack Methodologies,” 2003. Accessed: May 01, 2022. [Online]. Available: https://ir.canterbury.ac.nz/handle/10092/11201


  • There are currently no refbacks.