A Light Weight Stream Cypher Mechanism for Visible Light Communication

  • Shih-Hao Chang
  • Ted HuangEmail author
  • Mei-Lan Chen
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 927)


LED light has many advantages such as power efficient, better quality, long lifespan, and focus emission. LED lighting has been employed in our daily life in various ways, such as car lamps and lights in vehicles, roadside signal lights, indoor lighting systems, etc. The LED light bulbs not only can provide bright but also can be employed for data communication and object positioning, namely visible light communication (VLC). VLC is fast-growing technologies that enable new visible light application such as fast data transmission and indoor positioning. Due to its attractive functionalities, they have draw lots of attention to the wireless communication and indoor navigation systems. Because of its physical characteristics, “what you see is what you send”, VLC has been always considered as a secured communication method. In this work, we analyze the risks of visible light communication signal such as signal jamming, data snooping and modification. In order to effectively protect VLC data communication problems, we design a lightweight stream cypher data communication through the VLC signal to achieve the secure of the data communication. Experimental results of the proposed mechanism show that the WG-8 encryption algorithm can be executed on Raspberry Pi3 Model B, which has limited computing power. The evaluation result shows WG-8 support embedded system and CPU utilization reach up to 49%.


Visible light communication Error propagation Cypher security Stream cypher WG-8 


  1. 1.
    Zurawski, R.: Industrial communication systems. In: The Industrial Information Technology Handbook, Sec. 3, pp. 37–47. CRC Press, Boca Raton (2005)Google Scholar
  2. 2.
    Moyne, J.R., Tilbury, D.M.: The emergence of industrial control networks for manufacturing control diagnostics and safety data. Proc. IEEE 95(1), 29–47 (2007)CrossRefGoogle Scholar
  3. 3.
    Benzi, F., Buja, G., Felser, M.: Communication architectures for electrical drives. IEEE Trans. Ind. Informat. 1(1), 47–53 (2005)CrossRefGoogle Scholar
  4. 4.
    HART Field Communication Protocol Specification: HART Communication Foundation Std., version 7.4 (2007).
  5. 5.
    Vitturi, S., Peretti, L., Seno, L., Zigliotto, M., Zunino, C.: Real-time Ethernet networks for motion control. Comput. Stand. Interfaces 33(5), 465–476 (2011)CrossRefGoogle Scholar
  6. 6.
    Willig, A.: Recent and emerging topics in wireless industrial communications: a selection. IEEE Trans. Ind. Informat. 4(2), 102–124 (2008)CrossRefGoogle Scholar
  7. 7.
    Wireless Systems for Industrial Automation, Process Control and Related Applications, International Society of Automation (ISA) Standard ISA-100.11a (2009)Google Scholar
  8. 8.
    Sauter, T.: The continuing evolution of integration in factory automation. Proc. IEEE Ind. Electron. Mag. 1(1), 10–19 (2007)CrossRefGoogle Scholar
  9. 9.
    Sauter, T., Lobashov, M.: How to access factory floor information using Internet technologies and gateways. Proc. IEEE Trans. Ind. Informat. 7(4), 699–712 (2011)CrossRefGoogle Scholar
  10. 10.
    Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoTs): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRefGoogle Scholar
  11. 11.
    Visible Light Communications Consortium.
  12. 12.
    IEEE 802.15 WPAN™ Task Group 7 (TG7) Visible Light Communication.
  13. 13.
    O’Brien, D., Minh, H.L., Zeng, L., Faulkner, G., Lee, K., Jung, D., Oh, Y., Won, E.T.: Indoor visible light communications: challenges and prospects. In: Proceedings SPIE, vol. 7091 (2008)Google Scholar
  14. 14.
    Pure VLC, Visible Light Communication: An introductory guide (2012).
  15. 15.
    Rajagopal, S., Roberts, R.D., Lim, S.-K.: IEEE 802.15.7 visible light communication: modulation schemes and dimming support. IEEE Commun. Mag. 50(3), 72–82 (2012)CrossRefGoogle Scholar
  16. 16.
    Adamko, L., Vojvoda, M., Jokay, M.: Statistical analysis of ECRYPT eSTREAM Phase3 Ciphers, EE časopis pre elektrotechniku a energetiku, pp. 193–196 (2008)Google Scholar
  17. 17.
    Antal, E., Zajac, P.: Analysis of the Fialka M-125 cipher-machine. In: Cryptologia (2013)Google Scholar
  18. 18.
    Engels, D., Fan, X., Gong, G., Hu, H., Smith, E.M.: Hummingbird: ultra-lightweight cryptography for resource-constrained devices. In: 1st International Workshop on Lightweight Cryptography for Resource-Constrained Devices. Tenerife, Canary Islands, Spain, January 2010Google Scholar
  19. 19.
    Rukhin, A., et al.: Sp 800-22 Rev. 1a. a Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical report, Gaithersburg, MD, United States (2010)Google Scholar
  20. 20.
    Grosek, O., Vojvoda, M., Zajac, P.: Classical Ciphers. STU (2007). (in Slovak)Google Scholar
  21. 21.
    Perera, T., Hamer, D.: General introduction: Russian cold war era M-125 and M125-3MN Fialka cipher machines (2005).
  22. 22.
    Reuvers, P., Simons, M.: Fialka M-125: Detailed Description of the Russian Fialka Cipher Machines. PAHJ Reuvers & MJH Simons (2009)Google Scholar
  23. 23.
    Robshaw, M., Billet, O. (eds.): New Stream Cipher Designs - The eSTREAM Finalists. LNCS, vol. 4986. Springer, Heidelberg (2008)Google Scholar
  24. 24.
    Nawaz, Y., Gong, G.: WG: a family of stream ciphers with designed randomness properties. Inf. Sci. 178(7), 1903–1916 (2008)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Science and Information EngineeringTamkang UniversityNew Taipei CityTaiwan
  2. 2.Chunghwa Telecom LaboratoriesTaipei CityTaiwan
  3. 3.Graduate School of Cultural Creative DesignChungyu University of Film and ArtsKeelung CityTaiwan

Personalised recommendations