• Title/Summary/Keyword: Color Shift Keying (CSK)

Search Result 2, Processing Time 0.016 seconds

Performance of CSK Scheme for V2I Visible Light Communication

  • Kim, Hyeon-Cheol;Kim, Byung Wook;Jung, Sung-Yoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.595-601
    • /
    • 2015
  • These days, research related to Intelligent Transportation System (ITS) technology is being widely considered. ITS is inevitable for future transportation systems to reduce accidents, congestion, and offer a smooth flow of traffic. The use of Visible Light Communication (VLC) in ITS systems has been considered widely because of its EMC/EMI free and LED infrastructure reusable properties. Among the VLC schemes, this study analyzed the performance of the Color Shift Keying (CSK) scheme under a Vehicle-to-Infrastructure (V2I) downlink scenario to verify the capability of CSK as a communication tool for ITS. By modeling daylight noise using the modified Blackbody radiation model, this study examined the performance of V2I VLC under daytime conditions. The relationship between BER, the communication distance, and the amount of ambient-light noises under the pre-described V2I scenario were determined by simulations.

A Study on Secure Encoding for Visible Light Communication Without Performance Degradation (가시광 통신에서 성능 저하 없는 보안 인코딩 연구)

  • Kim, Minchul;Suh, Taeweon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.35-42
    • /
    • 2022
  • Visible light communication (VLC) is a method of transmitting data through LED blinking and is vulnerable to eavesdropping because the illumination affects the wide range of area. IEEE standard 802.15.7 defines On-Off Keying (OOK), Variable Pulse Position Modulation (VPPM), and Color Shift Keying (CSK) as modulation. In this paper, we propose an encryption method in VPPM for secure communication. The VPPM uses an encoding method called 4B6B where 16 different outputs are represented with 6-bit. This paper extends the number of outputs to 20, to add complexity while not violating the 4B6B generation conditions. Then each entry in the extended 4B6B table is scrambled using vigenère cipher. The probability of decrypting each 6-bit data is $\frac{1}{20}$. Eavesdropper should perform $\sum\limits_{k=1}^{n}20^k$ number of different trials to decrypt the message if the number of keys is n. The proposed method can be applied to OOK of PHY II and CSK of PHY III. We further discuss the secure encoding that can be used in OOK and CSK without performance degradation.