請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/67075完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 蔡欣穆(Hsin-Mu Tsai) | |
| dc.contributor.author | You-Ren Huang | en |
| dc.contributor.author | 黃佑仁 | zh_TW |
| dc.date.accessioned | 2021-06-17T01:19:13Z | - |
| dc.date.issued | 2017 | |
| dc.date.submitted | 2017-08-11 | |
| dc.identifier.citation | [1] A. Mostafa and L. Lampe, “Physical-layer security for indoor visible light communications,” in Proc. IEEE International Conference on Communications (ICC),pp. 3342–3347, June 2014.
[2] M. E. Hellman, “An overview of public key cryptography,” IEEE Communications Magazine, vol. 40, pp. 42–49, May 2002. [3] S. V. Kartalopoulos, “A primer on cryptography in communications,” IEEE Communications Magazine, vol. 44, pp. 146–151, April 2006. [4] J. Classen, J. Chen, D. Steinmetzer, M. Hollick, and E. Knightly, “The spy next door: Eavesdropping on high throughput visible light communications,” in Proc. ACM International Workshop on Visible Light Communications Systems (VLCS), pp. 9–14, 2015. [5] Z. Yang, Z. Wang, J. Zhang, C. Huang, and Q. Zhang, “Wearables can afford: Light-weight indoor positioning with visible light,” in Proc. ACM Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), (New York,NY, USA), pp. 317–330, ACM, 2015. [6] Y.-L. Wei, C.-J. Huang, H.-M. Tsai, and K. C.-J. Lin, “CELLI: Indoor positioning using polarized sweeping light beams,” in Proc. ACM Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 136–147, 2017. [7] Y. Zou, J. Zhu, X. Wang, and V. C. M. Leung, “Improving physical-layer security in wireless communications using diversity techniques,” IEEE Network, vol. 29,pp. 42–48, Jan 2015. [8] R. F. Schaefer and H. Boche, “Robust broadcasting of common and confidential messages over compound channels: Strong secrecy and decoding performance,” IEEE Transactions on Information Forensics and Security, vol. 9, pp. 1720–1732, Oct 2014. [9] C.-W. Chow, Y. Liu, C.-H. Yeh, C.-Y. Chen, C.-N. Lin, and D.-Z. Hsu, “Secure communication zone for white-light led visible light communication,” Optics Communications, vol. 344, pp. 81 – 85, 2015. [10] B. Zhang, K. Ren, G. Xing, X. Fu, and C. Wang, “Sbvlc: Secure barcode-based visible light communication for smartphones,” IEEE Transactions on Mobile Computing, vol. 15, pp. 432–446, Feb 2016. [11] Y.-L. Wei, H.-I. Wu, H.-C. Wang, H.-M. Tsai, K. C.-J. Lin, R. Boubezari, H. Le Minh, and Z.Ghassemlooy, “LiCompass: extracting orientation from polarized light,” in Proc. IEEE Conference on Computer Communications (INFOCOM), (Atlanta,USA), May 2017. [12] L.-T. D. AB, “Fos/fos-ar product specification http://www.lc-tec.se/wp-content/uploads/2016/02/FOS_FOS-AR-specification-1602.pdf,” 2016. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/67075 | - |
| dc.description.abstract | 本論文呈獻使用偏振光之短距離安全通訊系統—LightLock。由於偏振光之偏振狀態在反射後就幾乎被破壞,因此本系統能夠有效限縮具備直射性之傳送端及接收端通訊中可能被竊聽並竄改訊號之範圍。此外,LightLock 要求使用者必須額外旋轉出角度金鑰,以此作為輔助且獨立於數位金鑰之驗證因素,這提供了額外的安全性。我們以市場現成的元件實作 LightLock,包括感光二極體、線性偏振片以及液晶元件。實驗結果顯示,由於反射後的偏振光不再維持經偏振調變之原偏振性,可接收資料之距離被限縮到 7 公分且入射角必須在 30◦以內才能成功解碼。經實際使用者測試,使用者使用此具備雙因素驗證之系統僅有 4.76 % 的失誤率。 | zh_TW |
| dc.description.abstract | In this work, we propose LightLock, a short-range secure communication system leveraging polarized light. The polarization state of a polarized light wave is mostly destroyed after reflected off a surface. As a result, our system limits the possible locations for attacks such as eavesdropping and falsified transmission to those with a line-of-sight path to the transmitter or the receiver. In addition to support secure transmission of a key sequence, as a second and independent factor for authentication, LightLock also requires the user to rotate the device according to an authenticating angle sequence, providing added security. We implemented LightLock with off-the-shelf components, including LED, linear polarizers, and a liquid crystal cell. Evaluation results show that successful reception of data is limited to a short distance of 7 cm and incidence angle within 30◦ in line-of-sight scenario, while reflected transmission no longer maintain the modulated polarization states for successful demodulation. The user study shows that a user can successfully perform the two-factor authentication with a low 4.76% failure rate. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-17T01:19:13Z (GMT). No. of bitstreams: 1 ntu-106-R04922002-1.pdf: 3784795 bytes, checksum: ac2b09e2e14cad51d50ec10ace2ff1dc (MD5) Previous issue date: 2017 | en |
| dc.description.tableofcontents | 誌謝 iii
摘要 iv Abstract v 1 Introduction 1 2 Related Work 5 3 Preliminary 7 3.1 Polarized Light and Linear Polarizer 7 3.2 Reflection of Polarized Light 8 3.3 Liquid Crystal and its Response 8 4 System Design 10 4.1 Overview 10 4.2 Polarized Differential Pulse Position Modulation 12 4.2.1 Transmission 12 4.2.2 Reception 14 4.3 Transmitter Rotation Estimation 16 4.3.1 Transmission 16 4.3.2 Reception and Rotation Estimation 16 5 Implementation 19 5.1 Transmitter 19 5.2 Receiver 19 6 Evaluation 21 6.1 Benchmark 21 6.1.1 LC Response Time 21 6.1.2 Relative Rotation Angle 22 6.1.3 SNR measurement: line-of-sight versus reflected 23 6.1.4 SNR measurement: intensity modulation versus polarization modulation 25 6.2 Component Performance 25 6.2.1 P-DPPM Symbol Correct Rate 25 6.2.2 Chip Duration to Cover Accuracy Test 27 6.2.3 Accuracy of Rotation Estimation 28 6.3 LightLock performance 29 6.3.1 Lock opening 30 6.3.2 Resilience to lock cracking 30 7 Conclusion 32 Bibliography 34 | |
| dc.language.iso | en | |
| dc.subject | 可見光通訊 | zh_TW |
| dc.subject | 實體層安全 | zh_TW |
| dc.subject | 偏振光 | zh_TW |
| dc.subject | Visible Light Communication | en |
| dc.subject | Physical Layer Security | en |
| dc.subject | Polarization | en |
| dc.title | 使用偏振光之短距離安全通訊系統 | zh_TW |
| dc.title | Secure Short Range Communication System
using Polarized Light | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 105-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 逄愛君(Ai-Chun Pang),蕭旭君(Hsu-Chun Hsiao),林靖茹(Ching-Ju Lin) | |
| dc.subject.keyword | 可見光通訊,實體層安全,偏振光, | zh_TW |
| dc.subject.keyword | Visible Light Communication,Physical Layer Security,Polarization, | en |
| dc.relation.page | 35 | |
| dc.identifier.doi | 10.6342/NTU201703080 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2017-08-11 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
| 顯示於系所單位: | 資訊工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-106-1.pdf 未授權公開取用 | 3.7 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
