Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Sending Location-Based KeysUsing Visible Light Communication
Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology.
2016 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

In this thesis we present a Security Application based on Visible Light Communication(VLC). As VLC continues to develop, the need to protect valuable informationtransmitted using this type of communication is also growing. We aim to protect thisvaluable information by proposing a security application in which the data is encryptedin a multiple-light system and only recoverable in specific locations of a movingpattern within specific time. We use the Shamir Secret Sharing algorithm as basis forthe encryption combined with additional algorithms to provide a more securetransmission. The application is formed by the Physical Layer which is in charge ofproviding the optimal configuration for transmission and the Application Layer inwhich we implement the encryption and decryption algorithms for the application.The Physical Layer is formed by a group of LED bulbs controlled by an FPGA usingPWM to represent the information. We propose a scheduling algorithm in which thelights are scheduled in a bit-by-bit manner. The reception part is formed by theOPT101 optical receiver connected to the ultra-low power TS881 comparator. Asecond FPGA is in charge of demodulating the signals from the comparator bymeasuring the period of each signal to detect the corresponding bit. To evaluate theSecurity Application and to find best configurations for the Physical Layer we performa series of experiments in which we modify the responsivity of the receiver underdifferent scenarios including variations of transmission angles, data rates, and heights.The results show that adjusting the sensitivity of the receiver plays a major role in theapplication as we shows different types of configurations to adjust the areas in whichthe information can be received.

Place, publisher, year, edition, pages
2016. , p. 76
Series
IT ; 16041
National Category
Engineering and Technology
Identifiers
URN: urn:nbn:se:uu:diva-310907OAI: oai:DiVA.org:uu-310907DiVA, id: diva2:1058125
Educational program
Masters Programme in Embedded Systems
Supervisors
Examiners
Available from: 2016-12-20 Created: 2016-12-20 Last updated: 2016-12-20Bibliographically approved

Open Access in DiVA

fulltext(2171 kB)69 downloads
File information
File name FULLTEXT01.pdfFile size 2171 kBChecksum SHA-512
a9d81ebe3af5a07544557438dba51e4092dce40136a729ab56fe11949f0413c1d6b5f549c0428e0362fc56122459bb7440512108ee0651a2f453b66b33603b3a
Type fulltextMimetype application/pdf

By organisation
Department of Information Technology
Engineering and Technology

Search outside of DiVA

GoogleGoogle Scholar
Total: 69 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 466 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf