PLoS ONE (Jan 2017)

Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment.

  • Ignacio Marin-Garcia,
  • Patricia Chavez-Burbano,
  • Victor Guerra,
  • Jose Rabadan,
  • Rafael Perez-Jimenez

DOI
https://doi.org/10.1371/journal.pone.0188759
Journal volume & issue
Vol. 12, no. 11
p. e0188759

Abstract

Read online

Visible Light Communications (VLC) is a cutting edge technology for data communication that is being considered to be implemented in a wide range of applications such as Inter-vehicle communication or Local Area Network (LAN) communication. As a novel technology, some aspects of the implementation of VLC have not been deeply considered or tested. Among these aspects, security and its implementation may become an obstacle for VLCs broad usage. In this article, we have used the well-known Risk Matrix methodology to determine the relative risk that several common attacks have in a VLC network. Four examples: a War Driving, a Queensland alike Denial of Service, a Preshared Key Cracking, and an Evil Twin attack, illustrate the utilization of the methodology over a VLC implementation. The used attacks also covered the different areas delimited by the attack taxonomy used in this work. By defining and determining which attacks present a greater risk, the results of this work provide a lead into which areas should be invested to increase the safety of VLC networks.