The Security in Optical Wireless Communication: A Survey

被引:13
作者
Zhang, Xiao [1 ]
Klevering, Griffin [1 ]
Lei, Xinyu [2 ]
Hu, Yiwen [1 ]
Xiao, Li [1 ]
Tu, Guan-Hua [1 ]
机构
[1] Michigan State Univ, Comp Sci & Engn, 428 S Shaw Lane,Room3115,Engn Bldg, E Lansing, MI 48824 USA
[2] Michigan Technol Univ, Rekhi Hall,1400 Townsend Dr, Houghton, MI 49931 USA
基金
美国国家科学基金会;
关键词
Optical wireless communication; privacy leakage; physical layer attacks; counter-attack solutions; LoS; system security; optical camera communication; VISIBLE-LIGHT COMMUNICATION; PHYSICAL-LAYER SECURITY; NONORTHOGONAL MULTIPLE-ACCESS; SECRECY PERFORMANCE ANALYSIS; NETWORKS; CHALLENGES; SYSTEMS; MIMO; TRANSMISSION; PRINCIPLES;
D O I
10.1145/3594718
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the demand for economical and high-speed wireless services, Optical Wireless Communication (OWC) has attracted increasing attention in both research and the market. In the past decades, numerous optical-related techniques (e.g., LEDs, displays, cameras) and systems (e.g., VLC, LiFi, LiDAR) have been invented. OWC techniques, which are considered as a competitive mechanics in next-generation networks as an alternative to RF approaches, offer 10,000 times more bandwidth than conventional radio frequency (RF)-based wireless techniques (e.g., WiFi, LoRa, Bluetooth, LTE), as well as tremendous spatial reuse potential with even less interference. Because optical communications have a limited wavelength and travel in the line of sight (LoS) manner, the OWC is commonly thought as a secure wireless approach to confine light transmissions within physical bounds. However, in the real world, it is completely untrue. The privacy leakages and security risks broadly exist in the optical-related wireless applications including OWC networks. These threats and weaknesses have recently been the subject of several initial studies. However, they lack systematic analysis and are isolated. This survey first presents a general workflow of OWC systems, which consists of three stages: before signal emission (BSE), during signal propagation (DSP), and after signal receiving (ASV). For each stage, related risks are reviewed. Then, we summarize existing attacks in optical-related wireless applications and corresponding counter-attack solutions. Finally, we outline the future trends for improving OWC security.
引用
收藏
页数:36
相关论文
共 168 条
  • [1] Abd El-Malek AH, 2017, IEEE WCNC
  • [2] Security-Reliability Trade-Off Analysis for Multiuser SIMO Mixed RF/FSO Relay Networks With Opportunistic User Scheduling
    Abd El-Malek, Ahmed H.
    Salhab, Anas M.
    Zummo, Salam A.
    Alouini, Mohamed-Slim
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (09) : 5904 - 5918
  • [3] Abedin S, 2017, 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION ENGINEERING (ECCE), P552, DOI 10.1109/ECACE.2017.7912967
  • [4] Adiono Trio, 2017, T ENERGY WEB, V4, P14
  • [5] Comprehensive Physical Layer Security Analysis of FSO Communications Over Malaga Channels
    Ai, Yun
    Mathur, Aashish
    Verma, Gyan Deep
    Kong, Long
    Cheffena, Michael
    [J]. IEEE PHOTONICS JOURNAL, 2020, 12 (06):
  • [6] Physical Layer Security of Hybrid Satellite-FSO Cooperative Systems
    Ai, Yun
    Mathur, Aashish
    Cheffena, Michael
    Bhatnagar, Manav R.
    Lei, Hongjiang
    [J]. IEEE PHOTONICS JOURNAL, 2019, 11 (01):
  • [7] Improving Availability and Confidentiality via Hyperchaotic Baseband Frequency Hopping Based on Optical OFDM in VLC Networks
    Al-Moliki, Yahya M.
    Alresheedi, Mohammed T.
    Al-Harthi, Yahya
    [J]. IEEE ACCESS, 2020, 8 (08): : 125013 - 125028
  • [8] Secure Real-Time Artificial Intelligence System against Malicious QR Code Links
    Al-Zahrani, Mohammed S.
    Wahsheh, Heider A. M.
    Alsaade, Fawaz W.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [9] An JY, 2016, 2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P19, DOI 10.1109/WF-IoT.2016.7845438
  • [10] Invisible QR code hijacking using smart LED
    Zhou, Anfu
    Su, Guangyuan
    Zhu, Shilin
    Ma, Huadong
    [J]. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2019, 3 (03)