A novel binary encryption algorithm for navigation control of robotic vehicles through visible light communication

被引:0
作者
Parthasaradi V. [1 ]
Kailasapathi P. [1 ]
机构
[1] Department of Electrical Engineering, Annamalai University, Annamalai Nagar, Tamil Nadu
关键词
Encryption; Key; Light fidelity; Navigation control; Robotic vehicle;
D O I
10.1504/IJICS.2021.113172
中图分类号
学科分类号
摘要
Scarcity in radio frequency spectrum has increased the demands for alternate sources of communication medium out which visible light communication (VLC) is quite notable. VLC works by exploiting the abundance in availability of light as an effective means of communication medium. This principle known as Li-Fi or light fidelity conveys information in the form of light pulses modulated with information signals collected by a suitable detector. The objective of this research article is to ensure a secured wireless communication channel using light as the medium. Communication through a wireless medium necessitates appropriate security mechanisms for data being transmitted. In the proposed work, a binary encryption algorithm (BEA) has been tested in a multi-node environment using a mobile robotic vehicle. Data transmitted through the medium contain instructions to navigate the motion of the vehicle. The algorithm simple yet powerful with precise encryption observed from the results. Copyright © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:160 / 170
页数:10
相关论文
共 17 条
[1]  
Alam M.I., Khan M.R., Performance and efficiency analysis of different block cipher algorithms of symmetric key cryptography, International Journal of Advanced Research in Computer Science and Software Engineering, 3, 10, pp. 713-720, (2013)
[2]  
Apoorva Y.K., Comparative study of different symmetric key cryptography algorithms, International Journal of Application or Innovation in Engineering and Management, 2, 7, pp. 204-206, (2013)
[3]  
Charbathia S., Sharma S., A comparative study of Rivest cipher algorithms, International Journal of Information & Computation Technology, 4, 171, pp. 1831-1838, (2014)
[4]  
Chugh S., Kamal, Securing data transmission over wireless LAN (802.11) by redesigning RC4 algorithm, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 1436-1441, (2015)
[5]  
Elminaam D.S.A., Kader H.M.A., Hadhoud M.M., Performance evaluation of symmetric encryption algorithms, International Journal of Computer Science and Network Security, 8, 12, pp. 280-286, (2008)
[6]  
Giradkar S.S., Bhattacharya A., Securing compressed video streams using RC4 encryption scheme, 2015 Global Conference on Communication Technologies (GCCT), pp. 640-644, (2015)
[7]  
Kandar S., Maiti A., Variable length key based visual cryptography scheme for color image using random number, International Journal of Computer Applications, 19, 4, pp. 35-40, (2011)
[8]  
Koko S.O.A.F.M., Babiker A., Comparison of various encryption algorithms and techniques for improving secured data communication, IOSR Journal of Computer Engineering (IOSR-JCE), 17, 1, pp. 62-69, (2015)
[9]  
Kumar A., Jakhar D.S., Makkar M.S., Comparative analysis between DES and RSA algorithm's, International Journal of Advanced Research in Computer Science and Software Engineering, 2, 7, pp. 386-391, (2012)
[10]  
Lian S.G., Liu Z.X., Ren Z., Wang H.L., Secure advanced video coding based on selective encryption algorithms, IEEE Trans. Consumer Electron, 52, 2, pp. 621-629, (2006)