Cargando…
Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment
Visible Light Communications (VLC) is a cutting edge technology for data communication that is being considered to be implemented in a wide range of applications such as Inter-vehicle communication or Local Area Network (LAN) communication. As a novel technology, some aspects of the implementation o...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5706727/ https://www.ncbi.nlm.nih.gov/pubmed/29186184 http://dx.doi.org/10.1371/journal.pone.0188759 |
_version_ | 1783282278221217792 |
---|---|
author | Marin-Garcia, Ignacio Chavez-Burbano, Patricia Guerra, Victor Rabadan, Jose Perez-Jimenez, Rafael |
author_facet | Marin-Garcia, Ignacio Chavez-Burbano, Patricia Guerra, Victor Rabadan, Jose Perez-Jimenez, Rafael |
author_sort | Marin-Garcia, Ignacio |
collection | PubMed |
description | Visible Light Communications (VLC) is a cutting edge technology for data communication that is being considered to be implemented in a wide range of applications such as Inter-vehicle communication or Local Area Network (LAN) communication. As a novel technology, some aspects of the implementation of VLC have not been deeply considered or tested. Among these aspects, security and its implementation may become an obstacle for VLCs broad usage. In this article, we have used the well-known Risk Matrix methodology to determine the relative risk that several common attacks have in a VLC network. Four examples: a War Driving, a Queensland alike Denial of Service, a Preshared Key Cracking, and an Evil Twin attack, illustrate the utilization of the methodology over a VLC implementation. The used attacks also covered the different areas delimited by the attack taxonomy used in this work. By defining and determining which attacks present a greater risk, the results of this work provide a lead into which areas should be invested to increase the safety of VLC networks. |
format | Online Article Text |
id | pubmed-5706727 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2017 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-57067272017-12-08 Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment Marin-Garcia, Ignacio Chavez-Burbano, Patricia Guerra, Victor Rabadan, Jose Perez-Jimenez, Rafael PLoS One Research Article Visible Light Communications (VLC) is a cutting edge technology for data communication that is being considered to be implemented in a wide range of applications such as Inter-vehicle communication or Local Area Network (LAN) communication. As a novel technology, some aspects of the implementation of VLC have not been deeply considered or tested. Among these aspects, security and its implementation may become an obstacle for VLCs broad usage. In this article, we have used the well-known Risk Matrix methodology to determine the relative risk that several common attacks have in a VLC network. Four examples: a War Driving, a Queensland alike Denial of Service, a Preshared Key Cracking, and an Evil Twin attack, illustrate the utilization of the methodology over a VLC implementation. The used attacks also covered the different areas delimited by the attack taxonomy used in this work. By defining and determining which attacks present a greater risk, the results of this work provide a lead into which areas should be invested to increase the safety of VLC networks. Public Library of Science 2017-11-29 /pmc/articles/PMC5706727/ /pubmed/29186184 http://dx.doi.org/10.1371/journal.pone.0188759 Text en © 2017 Marin-Garcia et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. |
spellingShingle | Research Article Marin-Garcia, Ignacio Chavez-Burbano, Patricia Guerra, Victor Rabadan, Jose Perez-Jimenez, Rafael Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment |
title | Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment |
title_full | Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment |
title_fullStr | Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment |
title_full_unstemmed | Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment |
title_short | Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment |
title_sort | considerations on visible light communication security by applying the risk matrix methodology for risk assessment |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5706727/ https://www.ncbi.nlm.nih.gov/pubmed/29186184 http://dx.doi.org/10.1371/journal.pone.0188759 |
work_keys_str_mv | AT maringarciaignacio considerationsonvisiblelightcommunicationsecuritybyapplyingtheriskmatrixmethodologyforriskassessment AT chavezburbanopatricia considerationsonvisiblelightcommunicationsecuritybyapplyingtheriskmatrixmethodologyforriskassessment AT guerravictor considerationsonvisiblelightcommunicationsecuritybyapplyingtheriskmatrixmethodologyforriskassessment AT rabadanjose considerationsonvisiblelightcommunicationsecuritybyapplyingtheriskmatrixmethodologyforriskassessment AT perezjimenezrafael considerationsonvisiblelightcommunicationsecuritybyapplyingtheriskmatrixmethodologyforriskassessment |