The Security in Optical Wireless Communication: A Survey

被引:6
|
作者
Zhang, Xiao [1 ]
Klevering, Griffin [1 ]
Lei, Xinyu [2 ]
Hu, Yiwen [1 ]
Xiao, Li [1 ]
Tu, Guan-Hua [1 ]
机构
[1] Michigan State Univ, Comp Sci & Engn, 428 S Shaw Lane,Room3115,Engn Bldg, E Lansing, MI 48824 USA
[2] Michigan Technol Univ, Rekhi Hall,1400 Townsend Dr, Houghton, MI 49931 USA
基金
美国国家科学基金会;
关键词
Optical wireless communication; privacy leakage; physical layer attacks; counter-attack solutions; LoS; system security; optical camera communication; VISIBLE-LIGHT COMMUNICATION; PHYSICAL-LAYER SECURITY; NONORTHOGONAL MULTIPLE-ACCESS; SECRECY PERFORMANCE ANALYSIS; NETWORKS; CHALLENGES; SYSTEMS; MIMO; TRANSMISSION; PRINCIPLES;
D O I
10.1145/3594718
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the demand for economical and high-speed wireless services, Optical Wireless Communication (OWC) has attracted increasing attention in both research and the market. In the past decades, numerous optical-related techniques (e.g., LEDs, displays, cameras) and systems (e.g., VLC, LiFi, LiDAR) have been invented. OWC techniques, which are considered as a competitive mechanics in next-generation networks as an alternative to RF approaches, offer 10,000 times more bandwidth than conventional radio frequency (RF)-based wireless techniques (e.g., WiFi, LoRa, Bluetooth, LTE), as well as tremendous spatial reuse potential with even less interference. Because optical communications have a limited wavelength and travel in the line of sight (LoS) manner, the OWC is commonly thought as a secure wireless approach to confine light transmissions within physical bounds. However, in the real world, it is completely untrue. The privacy leakages and security risks broadly exist in the optical-related wireless applications including OWC networks. These threats and weaknesses have recently been the subject of several initial studies. However, they lack systematic analysis and are isolated. This survey first presents a general workflow of OWC systems, which consists of three stages: before signal emission (BSE), during signal propagation (DSP), and after signal receiving (ASV). For each stage, related risks are reviewed. Then, we summarize existing attacks in optical-related wireless applications and corresponding counter-attack solutions. Finally, we outline the future trends for improving OWC security.
引用
收藏
页数:36
相关论文
共 50 条
  • [1] Security weaknesses of underwater wireless optical communication
    Kong, Meiwei
    Wang, Jiongliang
    Chen, Yifei
    Ali, Tariq
    Sarwar, Rohail
    Qiu, Yang
    Wang, Shilian
    Han, Jun
    Xu, Jing
    [J]. OPTICS EXPRESS, 2017, 25 (18): : 21509 - 21518
  • [2] Underwater Wireless Optical Communication Systems: A Survey
    Sajmath, P. K.
    Ravi, Renjith, V
    Majeed, Abdul K. K.
    [J]. 2020 7TH IEEE INTERNATIONAL CONFERENCE ON SMART STRUCTURES AND SYSTEMS (ICSSS 2020), 2020, : 83 - 89
  • [3] A Survey of Channel Models for Underwater Optical Wireless Communication
    Johnson, Laura
    Green, Roger
    Leeson, Mark
    [J]. PROCEEDINGS OF THE 2013 2ND INTERNATIONAL WORKSHOP ON OPTICAL WIRELESS COMMUNICATIONS (IWOW 2013), 2013, : 1 - 5
  • [4] On the Physical Layer Security of Underwater Optical Wireless Communication Networks
    Illi, Elmehdi
    Qaraqe, Marwa
    [J]. IEEE JOURNAL OF OCEANIC ENGINEERING, 2024, 49 (02) : 583 - 591
  • [5] Security in Wireless Communication
    Mohammad Ghulam Rahman
    Hideki Imai
    [J]. Wireless Personal Communications, 2002, 22 : 213 - 228
  • [6] Security in wireless communication
    Rahman, MG
    Imai, H
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2002, 22 (02) : 213 - 228
  • [7] Security of Wireless Communication
    Cvrcek, Dan
    [J]. FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2009, : 119 - 134
  • [8] A survey on green communication and security challenges in 5G wireless communication networks
    Gandotra, Pimmy
    Jha, Rakesh Kumar
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 96 : 39 - 61
  • [9] A survey on security analysis and privacy issues of wireless multimedia communication system
    Bharadwaja, A. Vyasa
    Ganesan, V
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2019, 11 (03) : 338 - 346
  • [10] Optical heterodyne AND operation as emulation of physical layer security at wireless communication
    Yamauchi, Kenta
    Kato, Kazutoshi
    [J]. IEICE ELECTRONICS EXPRESS, 2021, 18 (04):