|Title:||Data Sniffing Over an Open VLC Channel||Authors:||Marin-Garcia, I.
Ramirez-Aguilera, A. M.
|UNESCO Clasification:||3325 Tecnología de las telecomunicaciones||Keywords:||Systems
Visible Light Communication
|Issue Date:||2016||Journal:||2016 10Th International Symposium On Communication Systems, Networks And Digital Signal Processing (Csndsp)||Conference:||10th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)||Abstract:||The feasibility of using Visible Light Communications (VLC) technology is a reality nowadays. As this technology is being inserted into the mass market, deliberation about the security provided by this technology, which is one of their main selling points, should be taken into consideration. In this paper, different scenarios of VLC sniffing are studied. A physical experiment in laboratory conditions was performed to demonstrate that, without other supported security elements, as cryptography, VLC sniffing is not only a possible but a probable attack. This type of attack could also be exploited in more complex attacks such as Spoofing and Man-in-the-Middle.||URI:||http://hdl.handle.net/10553/74430||Source:||2016 10Th International Symposium On Communication Systems, Networks And Digital Signal Processing (Csndsp), (2016)|
|Appears in Collections:||Actas de congresos|
checked on Sep 20, 2020
Items in accedaCRIS are protected by copyright, with all rights reserved, unless otherwise indicated.