0% found this document useful (0 votes)
5 views

G Assignment

The document discusses a group project focused on LiFi (Light Fidelity) technology, which utilizes visible light for high-speed wireless communication. It covers the components of a LiFi system, potential security attacks, and the implementation of AES encryption for secure data transmission. The project aims to simulate secure communication in a LiFi environment, highlighting the advantages of LiFi over traditional Wi-Fi.

Uploaded by

teddy haile
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

G Assignment

The document discusses a group project focused on LiFi (Light Fidelity) technology, which utilizes visible light for high-speed wireless communication. It covers the components of a LiFi system, potential security attacks, and the implementation of AES encryption for secure data transmission. The project aims to simulate secure communication in a LiFi environment, highlighting the advantages of LiFi over traditional Wi-Fi.

Uploaded by

teddy haile
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

CT-7691: Mobile Wireless Security

Group Project
LiFi Based Secure Wireless Communication Using AES

Group-4 Members
Name: ID:

1. Bazezew Belew ………………RPG/0101/16


2. Bereket Meskele………………RPG/0093/16
3. Tewodross Tadesse……………RPG/0080/16

Date: 2024
Table of Contents
CHAPTER ONE ...............................................................................................................................................................................1
1. Introduction ..........................................................................................................................................................................1
1.1 Why LiFi? ..............................................................................................................................................................................1
1.2 LiFi Technology .......................................................................................................................................................................1
1.2.1 Applications of LiFi .............................................................................................................................................................1
1.3 Light fidelity (LiFi) Protocols ................................................................................................................................................2
1.3.1 Physical Layer Protocols:....................................................................................................................................................2
1.3.2 Medium Access Control (MAC) Protocols: .........................................................................................................................2
1.3.3 Networking Protocols: .......................................................................................................................................................2
1.3.4 Challenges in LiFi Protocols ...............................................................................................................................................2
CHAPTER TWO ..............................................................................................................................................................................3
2.2. Basic Components of a LiFi System .....................................................................................................................................3
2.2.1 Light Source (Transmitter) .................................................................................................................................................3
2.2.2 Photodetector (Receiver) ..................................................................................................................................................3
2.2.3. Modulation and Demodulation Unit ................................................................................................................................3
2.2.4 Signal Processing Unit: ......................................................................................................................................................4
2.2.5 Power Supply: ....................................................................................................................................................................4
2.2.6 Networking Interface: ........................................................................................................................................................4
2.3. Optional Components: ..........................................................................................................................................................4
2.4. Real-World Example of a LiFi System .................................................................................................................................4
CHAPTER THREE ..........................................................................................................................................................................5
3. Identify the Main LiFi Attacks .....................................................................................................................................................5
3.1. Introduction............................................................................................................................................................................5
3.2. Main LiFi Attacks ..................................................................................................................................................................5
CHAPTER FOUR .............................................................................................................................................................................7
4. Simulate the Cipher (AES) for Secure Communication in LiFi ...........................................................................................7
4.1. Introduction............................................................................................................................................................................7
4.2. Key Features of AES ..............................................................................................................................................................7
4.3. Steps for AES Encryption in LiFi Communication.............................................................................................................7
4.3.1. Data Preparation ..............................................................................................................................................................7
4.3.2. Key Generation .................................................................................................................................................................8
4.3.3. Encryption Process ...........................................................................................................................................................8
4.3.4. Decryption Process ...........................................................................................................................................................8
CHAPTER FIVE...............................................................................................................................................................................9
Summary of LiFi-Based Secure Communication Code .................................................................................................................9
Reference..........................................................................................................................................................................................10
CHAPTER ONE
1. Introduction
Li-Fi stands for Light Fidelity. The technology is very new and was proposed by the German physicist
Harald Haas in 2011 TED (Technology, Entertainment, Design) Global Talk on Visible Light
Communication (VLC). Li-Fi is a wireless optical networking technology that uses light emitting diodes
(LEDs) for transmission of data. The term Li-Fi refers to visible light communication (VLC) technology
that uses light as medium to deliver high-speed communication in a manner similar to Wi-Fi and complies
with the IEEE standard IEEE 802.15.7. The IEEE 802.15.7 is a high-speed, bidirectional and fully
networked wireless communication technology based standard similar to Wi-Fi’s IEEE 802.11[1]. LiFi, or
Light Fidelity, is a wireless communication technology that transmits data using visible light from LEDs.
Unlike traditional WiFi, which relies on radio frequencies, LiFi operates in the visible light spectrum,
offering high-speed, interference-free, and secure communication. LiFi has immense potential in
environments where RF communication is restricted or suffers from interference.

1.1 Why LiFi?

Spectrum Availability: The visible light spectrum is 10,000 times larger than the radio spectrum.

High Data Rates: LiFi can achieve speeds exceeding 100 Gbps under ideal conditions.

Enhanced Security: Light cannot penetrate walls, reducing the risk of unauthorized access or interference.

Energy Efficiency: Dual-purpose LEDs save energy by combining lighting and data communication.

1.2 LiFi Technology


Key Features of LiFi

Line-of-Sight Dependency: Communication requires direct or reflected light paths between devices.

Bidirectional Communication: LEDs and photodetectors work in tandem for sending and receiving data.

Low Latency: Ideal for real-time applications like video streaming and gaming.

1.2.1 Applications of LiFi


Healthcare: Safe communication in environments sensitive to radio waves, like hospitals.

Aviation: Providing high-speed internet in aircraft cabins.

Smart Cities: Seamless communication between smart devices using streetlights and building LEDs.

Industrial Automation: Secure and interference-free communication in factories.

1|Page
1.3 Light fidelity (LiFi) Protocols
LiFi relies on specific protocols to ensure efficient data transmission:

1.3.1 Physical Layer Protocols:

On-Off Keying (OOK): A simple binary modulation scheme where LEDs turn ON and OFF to represent binary data
(1 and 0).
Pulse Position Modulation (PPM): Encodes data by varying the position of light pulses within time slots.
Orthogonal Frequency Division Multiplexing (OFDM): Splits data across multiple frequencies to increase data
rates and reduce interference.

1.3.2 Medium Access Control (MAC) Protocols:

Time-Division Multiple Access (TDMA): Allocates time slots to users to share the light medium efficiently.
Carrier Sense Multiple Access (CSMA): Ensures devices wait for the medium to be free before transmitting,
preventing collisions.
Dynamic Bandwidth Allocation: Optimizes channel usage based on traffic demands.

1.3.3 Networking Protocols:

LiFi integrates with existing TCP/IP and UDP networking protocols, ensuring compatibility with current
internet frameworks for routing, error correction, and packet transmission.

1.3.4 Challenges in LiFi Protocols

Signal Interference: Bright sunlight or other light sources can disrupt LiFi communication.

Coverage Area: Limited to areas illuminated by the LED light source.

Handover Mechanism: Seamless transition between LiFi cells (like moving from one room to another) requires
protocol enhancement.

2|Page
CHAPTER TWO
2. Identify the Basic Components of a LiFi System

2. 1. Introduction

LiFi system consists of several essential components that enable the transmission and reception of data
using light. These components work together to ensure efficient and secure wireless communication.

2.2. Basic Components of a LiFi System

2.2.1 Light Source (Transmitter)

Typically, an LED (Light Emitting Diode), used for both light and data transmission.

The LED modulates light at high speeds, invisible to the human eye, to encode data.

Key Features:

High-frequency switching capability.

Energy efficiency and dual-purpose functionality (lighting + communication).

2.2.2 Photodetector (Receiver)

A photodiode or similar device that detects modulated light signals. Converts light signals into electrical
signals for further processing.

Key Features:

High sensitivity to visible light.

Fast response times for accurate decoding.

2.2.3. Modulation and Demodulation Unit

Modulation: Encodes data into light signals using schemes like OOK or OFDM. Demodulation: Decodes
received light signals back into data.

Example Techniques:

OOK (On-Off Keying): Simple and efficient for binary data.

OFDM: Splits data across multiple channels for high-speed communication.

3|Page
2.2.4 Signal Processing Unit:

Processes the electrical signals from the receiver to extract meaningful data. Includes error correction and
noise reduction algorithms to ensure reliable communication.

2.2.5 Power Supply:

Powers the LED transmitter and other electronic components.

2.2.6 Networking Interface:

Integrates with existing network infrastructures (e.g., Ethernet, WiFi routers) to connect LiFi systems to the
internet or local area networks.

2.3. Optional Components:


Visible Light Communication (VLC) Controller: Controls the modulation of LEDs and manages
communication protocols. Optical Lens or Reflectors: Enhances signal strength and coverage by focusing or
redirecting light.

2.4. Real-World Example of a LiFi System


Transmitter: A ceiling-mounted LED light source in a smart office.

Receiver: A photodiode attached to a laptop, enabling internet connectivity.

Interface: Data is transmitted from the LED to the laptop via light, processed by a LiFi modem.

4|Page
CHAPTER THREE

3. Identify the Main LiFi Attacks


3.1. Introduction
While LiFi offers enhanced security compared to traditional wireless systems, it is not immune to threats.
Understanding the potential attacks is crucial for designing secure LiFi systems.

3.2. Main LiFi Attacks


3.2.1. Eavesdropping
Description: Unauthorized interception of light signals transmitted between devices.

Cause: Light leaking through windows or reflections in mirrors.

Countermeasures:

Encrypt data using robust algorithms like AES.

Use confined areas and black-out curtains to minimize signal leakage.

3.2.2. Signal Jamming


Description: Deliberate interference by sending noise signals to disrupt communication.

Cause: Overlapping light sources or external devices emitting interfering signals.

Countermeasures:

Adaptive modulation techniques like OFDM.

Signal filtering and noise-canceling mechanisms.

3.2.3. Man-in-the-Middle Attack (MITM)


Description: An attacker intercepts and modifies the transmitted data before forwarding it to the receiver.

Cause: Weak or absent authentication protocols.

Countermeasures:

Authenticate devices using cryptographic signatures.

Encrypt data using AES or similar techniques.

3.2.4. Physical Layer Attacks


Description: Exploitation of vulnerabilities in the hardware, such as tampering with LEDs or
photodetectors.

5|Page
Cause: Unauthorized physical access to devices.

Countermeasures:

Use tamper-resistant hardware.

Secure physical access points.

3.2.5. Denial of Service (DoS)


Description: Overloading the system with fake requests to block legitimate communication.

Cause: Excessive data packets or intentionally blocked light signals.

Countermeasures:

Implement rate-limiting mechanisms.

Monitor and filter traffic patterns.

3.2.6. Implementation-Driven Approach to Counter LiFi Attacks


To ensure a secure LiFi system in our project, we will simulate a solution that focuses on:

AES Encryption: To prevent data breaches during transmission.

Error Detection: Validating data integrity to detect tampering.

Authentication Models: Ensuring only legitimate devices can participate in communication.

3.2.7. Practical Connection to Implementation


In Google Colab, we will:

Simulate eavesdropping by attempting to decrypt intercepted encrypted data without a valid key.

Demonstrate how AES encryption secures the transmitted data.

Use basic traffic patterns to simulate and defend against signal jamming or DoS attacks.

6|Page
CHAPTER FOUR
4. Simulate the Cipher (AES) for Secure Communication in LiFi
4.1. Introduction
The Advanced Encryption Standard (AES) is a widely adopted symmetric encryption algorithm designed
for secure data communication. In the context of LiFi, AES ensures that data transmitted through light
signals is encrypted and cannot be accessed or modified by unauthorized entities.

4.2. Key Features of AES


Symmetric Key Algorithm: Uses the same key for encryption and decryption.

Block Cipher: Operates on fixed-size data blocks (128 bits).

Key Sizes: Supports key lengths of 128, 192, or 256 bits.

Security: Resistant to all known cryptographic attacks, including brute force.

4.3. Steps for AES Encryption in LiFi Communication

4.3.1. Data Preparation

Convert the message into a byte format (plaintext).

Apply padding if the message length is not a multiple of the block size (128 bits).

Figure 1. Data Preparation

7|Page
4.3.2. Key Generation

Generate or define a 128-bit, 192-bit, or 256-bit symmetric key.

Share the key securely between the transmitter and receiver.

Figure 2. Key Generation

4.3.3. Encryption Process

Use AES to encrypt the plaintext using the shared key.

Transmit the ciphertext as modulated light signals.

Figure 3. Encryption Process

4.3.4. Decryption Process

At the receiver, use the same key to decrypt the ciphertext.

Verify the integrity and authenticity of the data.

Figure 4. Decryption Process

8|Page
CHAPTER FIVE

Summary of LiFi-Based Secure Communication Code

Encryption (AES): Converts plaintext into encrypted ciphertext using the AES algorithm with a 256-bit
symmetric key.

LiFi Transmission Simulation: Mimics the process of transmitting the encrypted message (ciphertext) as
modulated light signals.

LiFi Reception Simulation: Simulates the reception of transmitted light signals and retrieves the ciphertext.

Decryption (AES): Converts the received ciphertext back into plaintext using the same AES symmetric key.

Outcome

This code demonstrates the theoretical process of secure communication in a LiFi system:

Security Layer: Provided by AES encryption and decryption.

LiFi Communication Simulation: Models the transmission and reception of data using light, ensuring
integration with the LiFi framework.

Figure 5. Outcome

9|Page
Reference
[1] T. FN Division, “LiFi (Light Fidelity) & Its Applications,” pp. 1–21, 2015.

10 | P a g e

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy