2017 IEEE Conference on Communications and Network Security (CNS) 2017
DOI: 10.1109/cns.2017.8228626
|View full text |Cite
|
Sign up to set email alerts
|

Secret key distribution leveraging color shift over visible light channel

Abstract: Given the widely adoption of screen and camera in many electronic devices, the visible light communication (VLC) over screen-to-camera channel emerges as a novel short range communication technique in recent years. Active research explores various ways to convey messages over screen-camera channel, such as barcode and unobtrusive optical pattern. However, with the prevalence of LED screens of wide viewing angles and mobile devices equipped with high standard cameras, the threat of information leakage over scre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…As the user does not need to directly type PINs or confirm the pairing process, these schemes remove the requirement of human intervention for the device pairing process. A common idea of the contextbased key establishment methods is that legitimate devices co-located within the same space may acquire highly similar sensor observations (e.g., ambient light and audio signal [23], acoustic signals [30], color shift observation over light channel [18], wireless signal strength [13] or wireless channel state information [19], [22]). However, these approaches share the following shortcomings: (1) they can be easily affected by environmental interferences (e.g., noise), (2) the user may need to inject artificial events to decrease pairing time.…”
Section: B Context-based Secret Key Establishmentmentioning
confidence: 99%
“…As the user does not need to directly type PINs or confirm the pairing process, these schemes remove the requirement of human intervention for the device pairing process. A common idea of the contextbased key establishment methods is that legitimate devices co-located within the same space may acquire highly similar sensor observations (e.g., ambient light and audio signal [23], acoustic signals [30], color shift observation over light channel [18], wireless signal strength [13] or wireless channel state information [19], [22]). However, these approaches share the following shortcomings: (1) they can be easily affected by environmental interferences (e.g., noise), (2) the user may need to inject artificial events to decrease pairing time.…”
Section: B Context-based Secret Key Establishmentmentioning
confidence: 99%