G Assignment
G Assignment
Group Project
LiFi Based Secure Wireless Communication Using AES
Group-4 Members
Name: ID:
Date: 2024
Table of Contents
CHAPTER ONE ...............................................................................................................................................................................1
1. Introduction ..........................................................................................................................................................................1
1.1 Why LiFi? ..............................................................................................................................................................................1
1.2 LiFi Technology .......................................................................................................................................................................1
1.2.1 Applications of LiFi .............................................................................................................................................................1
1.3 Light fidelity (LiFi) Protocols ................................................................................................................................................2
1.3.1 Physical Layer Protocols:....................................................................................................................................................2
1.3.2 Medium Access Control (MAC) Protocols: .........................................................................................................................2
1.3.3 Networking Protocols: .......................................................................................................................................................2
1.3.4 Challenges in LiFi Protocols ...............................................................................................................................................2
CHAPTER TWO ..............................................................................................................................................................................3
2.2. Basic Components of a LiFi System .....................................................................................................................................3
2.2.1 Light Source (Transmitter) .................................................................................................................................................3
2.2.2 Photodetector (Receiver) ..................................................................................................................................................3
2.2.3. Modulation and Demodulation Unit ................................................................................................................................3
2.2.4 Signal Processing Unit: ......................................................................................................................................................4
2.2.5 Power Supply: ....................................................................................................................................................................4
2.2.6 Networking Interface: ........................................................................................................................................................4
2.3. Optional Components: ..........................................................................................................................................................4
2.4. Real-World Example of a LiFi System .................................................................................................................................4
CHAPTER THREE ..........................................................................................................................................................................5
3. Identify the Main LiFi Attacks .....................................................................................................................................................5
3.1. Introduction............................................................................................................................................................................5
3.2. Main LiFi Attacks ..................................................................................................................................................................5
CHAPTER FOUR .............................................................................................................................................................................7
4. Simulate the Cipher (AES) for Secure Communication in LiFi ...........................................................................................7
4.1. Introduction............................................................................................................................................................................7
4.2. Key Features of AES ..............................................................................................................................................................7
4.3. Steps for AES Encryption in LiFi Communication.............................................................................................................7
4.3.1. Data Preparation ..............................................................................................................................................................7
4.3.2. Key Generation .................................................................................................................................................................8
4.3.3. Encryption Process ...........................................................................................................................................................8
4.3.4. Decryption Process ...........................................................................................................................................................8
CHAPTER FIVE...............................................................................................................................................................................9
Summary of LiFi-Based Secure Communication Code .................................................................................................................9
Reference..........................................................................................................................................................................................10
CHAPTER ONE
1. Introduction
Li-Fi stands for Light Fidelity. The technology is very new and was proposed by the German physicist
Harald Haas in 2011 TED (Technology, Entertainment, Design) Global Talk on Visible Light
Communication (VLC). Li-Fi is a wireless optical networking technology that uses light emitting diodes
(LEDs) for transmission of data. The term Li-Fi refers to visible light communication (VLC) technology
that uses light as medium to deliver high-speed communication in a manner similar to Wi-Fi and complies
with the IEEE standard IEEE 802.15.7. The IEEE 802.15.7 is a high-speed, bidirectional and fully
networked wireless communication technology based standard similar to Wi-Fi’s IEEE 802.11[1]. LiFi, or
Light Fidelity, is a wireless communication technology that transmits data using visible light from LEDs.
Unlike traditional WiFi, which relies on radio frequencies, LiFi operates in the visible light spectrum,
offering high-speed, interference-free, and secure communication. LiFi has immense potential in
environments where RF communication is restricted or suffers from interference.
Spectrum Availability: The visible light spectrum is 10,000 times larger than the radio spectrum.
High Data Rates: LiFi can achieve speeds exceeding 100 Gbps under ideal conditions.
Enhanced Security: Light cannot penetrate walls, reducing the risk of unauthorized access or interference.
Energy Efficiency: Dual-purpose LEDs save energy by combining lighting and data communication.
Line-of-Sight Dependency: Communication requires direct or reflected light paths between devices.
Bidirectional Communication: LEDs and photodetectors work in tandem for sending and receiving data.
Low Latency: Ideal for real-time applications like video streaming and gaming.
Smart Cities: Seamless communication between smart devices using streetlights and building LEDs.
1|Page
1.3 Light fidelity (LiFi) Protocols
LiFi relies on specific protocols to ensure efficient data transmission:
On-Off Keying (OOK): A simple binary modulation scheme where LEDs turn ON and OFF to represent binary data
(1 and 0).
Pulse Position Modulation (PPM): Encodes data by varying the position of light pulses within time slots.
Orthogonal Frequency Division Multiplexing (OFDM): Splits data across multiple frequencies to increase data
rates and reduce interference.
Time-Division Multiple Access (TDMA): Allocates time slots to users to share the light medium efficiently.
Carrier Sense Multiple Access (CSMA): Ensures devices wait for the medium to be free before transmitting,
preventing collisions.
Dynamic Bandwidth Allocation: Optimizes channel usage based on traffic demands.
LiFi integrates with existing TCP/IP and UDP networking protocols, ensuring compatibility with current
internet frameworks for routing, error correction, and packet transmission.
Signal Interference: Bright sunlight or other light sources can disrupt LiFi communication.
Handover Mechanism: Seamless transition between LiFi cells (like moving from one room to another) requires
protocol enhancement.
2|Page
CHAPTER TWO
2. Identify the Basic Components of a LiFi System
2. 1. Introduction
LiFi system consists of several essential components that enable the transmission and reception of data
using light. These components work together to ensure efficient and secure wireless communication.
Typically, an LED (Light Emitting Diode), used for both light and data transmission.
The LED modulates light at high speeds, invisible to the human eye, to encode data.
Key Features:
A photodiode or similar device that detects modulated light signals. Converts light signals into electrical
signals for further processing.
Key Features:
Modulation: Encodes data into light signals using schemes like OOK or OFDM. Demodulation: Decodes
received light signals back into data.
Example Techniques:
3|Page
2.2.4 Signal Processing Unit:
Processes the electrical signals from the receiver to extract meaningful data. Includes error correction and
noise reduction algorithms to ensure reliable communication.
Integrates with existing network infrastructures (e.g., Ethernet, WiFi routers) to connect LiFi systems to the
internet or local area networks.
Interface: Data is transmitted from the LED to the laptop via light, processed by a LiFi modem.
4|Page
CHAPTER THREE
Countermeasures:
Countermeasures:
Countermeasures:
5|Page
Cause: Unauthorized physical access to devices.
Countermeasures:
Countermeasures:
Simulate eavesdropping by attempting to decrypt intercepted encrypted data without a valid key.
Use basic traffic patterns to simulate and defend against signal jamming or DoS attacks.
6|Page
CHAPTER FOUR
4. Simulate the Cipher (AES) for Secure Communication in LiFi
4.1. Introduction
The Advanced Encryption Standard (AES) is a widely adopted symmetric encryption algorithm designed
for secure data communication. In the context of LiFi, AES ensures that data transmitted through light
signals is encrypted and cannot be accessed or modified by unauthorized entities.
Apply padding if the message length is not a multiple of the block size (128 bits).
7|Page
4.3.2. Key Generation
8|Page
CHAPTER FIVE
Encryption (AES): Converts plaintext into encrypted ciphertext using the AES algorithm with a 256-bit
symmetric key.
LiFi Transmission Simulation: Mimics the process of transmitting the encrypted message (ciphertext) as
modulated light signals.
LiFi Reception Simulation: Simulates the reception of transmitted light signals and retrieves the ciphertext.
Decryption (AES): Converts the received ciphertext back into plaintext using the same AES symmetric key.
Outcome
This code demonstrates the theoretical process of secure communication in a LiFi system:
LiFi Communication Simulation: Models the transmission and reception of data using light, ensuring
integration with the LiFi framework.
Figure 5. Outcome
9|Page
Reference
[1] T. FN Division, “LiFi (Light Fidelity) & Its Applications,” pp. 1–21, 2015.
10 | P a g e