Cargando…

Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment

Visible Light Communications (VLC) is a cutting edge technology for data communication that is being considered to be implemented in a wide range of applications such as Inter-vehicle communication or Local Area Network (LAN) communication. As a novel technology, some aspects of the implementation o...

Descripción completa

Detalles Bibliográficos
Autores principales: Marin-Garcia, Ignacio, Chavez-Burbano, Patricia, Guerra, Victor, Rabadan, Jose, Perez-Jimenez, Rafael
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5706727/
https://www.ncbi.nlm.nih.gov/pubmed/29186184
http://dx.doi.org/10.1371/journal.pone.0188759
_version_ 1783282278221217792
author Marin-Garcia, Ignacio
Chavez-Burbano, Patricia
Guerra, Victor
Rabadan, Jose
Perez-Jimenez, Rafael
author_facet Marin-Garcia, Ignacio
Chavez-Burbano, Patricia
Guerra, Victor
Rabadan, Jose
Perez-Jimenez, Rafael
author_sort Marin-Garcia, Ignacio
collection PubMed
description Visible Light Communications (VLC) is a cutting edge technology for data communication that is being considered to be implemented in a wide range of applications such as Inter-vehicle communication or Local Area Network (LAN) communication. As a novel technology, some aspects of the implementation of VLC have not been deeply considered or tested. Among these aspects, security and its implementation may become an obstacle for VLCs broad usage. In this article, we have used the well-known Risk Matrix methodology to determine the relative risk that several common attacks have in a VLC network. Four examples: a War Driving, a Queensland alike Denial of Service, a Preshared Key Cracking, and an Evil Twin attack, illustrate the utilization of the methodology over a VLC implementation. The used attacks also covered the different areas delimited by the attack taxonomy used in this work. By defining and determining which attacks present a greater risk, the results of this work provide a lead into which areas should be invested to increase the safety of VLC networks.
format Online
Article
Text
id pubmed-5706727
institution National Center for Biotechnology Information
language English
publishDate 2017
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-57067272017-12-08 Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment Marin-Garcia, Ignacio Chavez-Burbano, Patricia Guerra, Victor Rabadan, Jose Perez-Jimenez, Rafael PLoS One Research Article Visible Light Communications (VLC) is a cutting edge technology for data communication that is being considered to be implemented in a wide range of applications such as Inter-vehicle communication or Local Area Network (LAN) communication. As a novel technology, some aspects of the implementation of VLC have not been deeply considered or tested. Among these aspects, security and its implementation may become an obstacle for VLCs broad usage. In this article, we have used the well-known Risk Matrix methodology to determine the relative risk that several common attacks have in a VLC network. Four examples: a War Driving, a Queensland alike Denial of Service, a Preshared Key Cracking, and an Evil Twin attack, illustrate the utilization of the methodology over a VLC implementation. The used attacks also covered the different areas delimited by the attack taxonomy used in this work. By defining and determining which attacks present a greater risk, the results of this work provide a lead into which areas should be invested to increase the safety of VLC networks. Public Library of Science 2017-11-29 /pmc/articles/PMC5706727/ /pubmed/29186184 http://dx.doi.org/10.1371/journal.pone.0188759 Text en © 2017 Marin-Garcia et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Marin-Garcia, Ignacio
Chavez-Burbano, Patricia
Guerra, Victor
Rabadan, Jose
Perez-Jimenez, Rafael
Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment
title Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment
title_full Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment
title_fullStr Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment
title_full_unstemmed Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment
title_short Considerations on Visible Light Communication security by applying the Risk Matrix methodology for risk assessment
title_sort considerations on visible light communication security by applying the risk matrix methodology for risk assessment
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5706727/
https://www.ncbi.nlm.nih.gov/pubmed/29186184
http://dx.doi.org/10.1371/journal.pone.0188759
work_keys_str_mv AT maringarciaignacio considerationsonvisiblelightcommunicationsecuritybyapplyingtheriskmatrixmethodologyforriskassessment
AT chavezburbanopatricia considerationsonvisiblelightcommunicationsecuritybyapplyingtheriskmatrixmethodologyforriskassessment
AT guerravictor considerationsonvisiblelightcommunicationsecuritybyapplyingtheriskmatrixmethodologyforriskassessment
AT rabadanjose considerationsonvisiblelightcommunicationsecuritybyapplyingtheriskmatrixmethodologyforriskassessment
AT perezjimenezrafael considerationsonvisiblelightcommunicationsecuritybyapplyingtheriskmatrixmethodologyforriskassessment