@usmankhawaja

THE KEY PROVIDING SYSTEM FOR WIRELESS LAN USING VISIBLE LIGHT COMMUNICATION

, , , and . International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), 5 (3): 8 (June 2014)
DOI: 10.5121/ijasuc.2014.5302

Abstract

Public wireless LAN services have been increasing recently. These are convenient services for carrier companies particularly. And carrier companies and the user can disperse traffic. However in order to improve the convenience, the services do not often use the encryption key or do not change the encryption key that has already been set. Therefore, the services have a problem in safety. This paper solves this problem using the visible light communication. The visible light communication sends a signal by blinking the light. One of the visible light communication features is that we can see the transmission area. The visible light communication can use lighting equipments as the transmitter unlike infrared or conventional radio communications. Further, visible light communication can separate to clarify the transmission range by using light. We propose the distribution of the encryption key and the SSID using visible light communication. Visible light communication can easily prepare a small network, such as a partition or per a room basis. For malicious users connecting to the network is necessary to enter in the service provided area. Thus the administrator is able to easily manage legitimate users. In addition, it is possible to update the SSID and the encryption key by visible light communication easily for an administrator. Thus if malicious users get the SSID and the encryption key, they cannot use the SSID and the encryption key immediately. Normal users may only need to run the shell script for receiving information from the receiver. Therefore, convenience is good. In order to confirm the improved convenience, we measured the time it takes for a user to connect to the network. Conventional methods are methods that use or do not use the encryption key. As a result, users can connect to the network in a short time compared with the conventional methods. The system becomes stronger than conventional methods because it is possible to update the encryption key and SSID automatically in the security aspect.

Links and resources

Tags