SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014
DOI : 10.5121/ijasuc.2014.5302 13
THE KEY PROVIDING SYSTEM FOR WIRELESS
LAN USING VISIBLE LIGHT COMMUNICATION
Kuniyoshi Okuda1
, Takuya Yamamoto2
, Tomoo Nakamura1
and Wataru Uemura1
1
Department of Electronics Informatics, Ryukoku University, Shiga, Japan
2
Graduate School for Creative Cities, Osaka City University, Osaka, Japan
ABSTRACT
Public wireless LAN services have been increasing recently. These are convenient services for carrier
companies particularly. And carrier companies and the user can disperse traffic. However in order to
improve the convenience, the services do not often use the encryption key or do not change the encryption
key that has already been set. Therefore, the services have a problem in safety. This paper solves this
problem using the visible light communication.
The visible light communication sends a signal by blinking the light. One of the visible light communication
features is that we can see the transmission area. The visible light communication can use lighting
equipments as the transmitter unlike infrared or conventional radio communications. Further, visible light
communication can separate to clarify the transmission range by using light.
We propose the distribution of the encryption key and the SSID using visible light communication. Visible
light communication can easily prepare a small network, such as a partition or per a room basis. For
malicious users connecting to the network is necessary to enter in the service provided area. Thus the
administrator is able to easily manage legitimate users. In addition, it is possible to update the SSID and
the encryption key by visible light communication easily for an administrator. Thus if malicious users get
the SSID and the encryption key, they cannot use the SSID and the encryption key immediately. Normal
users may only need to run the shell script for receiving information from the receiver. Therefore,
convenience is good.
In order to confirm the improved convenience, we measured the time it takes for a user to connect to the
network. Conventional methods are methods that use or do not use the encryption key. As a result, users
can connect to the network in a short time compared with the conventional methods. The system becomes
stronger than conventional methods because it is possible to update the encryption key and SSID
automatically in the security aspect.
KEYWORDS
Wireless LAN, SSID, encryption key, visible light communication
1. INTRODUCTION
Recently, a network environment has become familiar. Now we can connect to the network
anywhere. Such a condition is called ubiquitous. The ubiquitous means interface, environment,
and technology. It may benefit at any time anyone everywhere. And a ubiquitous mobile
communication is especially important. The traffic is increasing all the time. Carrier companies
have strengthened the network to support the traffic. However it is not enough. So the wireless
LAN has drawn attention. Wireless LAN is a communication system for a small area. Wireless
LAN does not require a line. The user can connect to the network by simply setting the terminal.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014
14
Communication speed of wireless LAN is faster than the line of mobile phones. It is supported by
a wired communication. And the communication speed becomes faster year by year. Effective
speed of the current is approximately 1Gbps or more. Communication speed is reduced by the
user increases. However, it is much faster as compared to the line of mobile phones. Therefore we
can expect high-speed communication in a specific area in the wireless LAN. Therefore carrier
companies have supported the traffic by providing wireless LAN services. This service can be
enjoyed by people who are only contracted with the carrier company basically. And rather than
covering a wide range in a single access point, it is better to cover the specific range of the access
point some better network efficiency [1]. Recently a public wireless LAN service becomes also
popular (Figure 1). The services are provided at the place where many people gather. These are
airports, restaurants and stations. The public wireless LAN service is an important service to
foreigners, because communication of complicated content is the burden for foreigners. In
addition, in some cases network of career companies are not required when the stay is short like
transit. The public wireless LAN service is particularly effective in such case. There is a fee or
free in the public wireless LAN services. This paper focuses on the free wireless LAN service that
anyone can use.
Figure 1: public wireless LAN services
2. PROBLEM OF WIRELESS LAN SERVICES
Some methods are required in order to connect the wireless LAN service. They depend on the
method of service. We describe three procedures.
The first method is the method that does not use the encryption key. It can be connected by
anyone. The procedure of the connection is easy. Users can connect the network by selecting a
SSID (Service Set Identifier).
The second method is the first method with some options. The options require a license
agreement or show them advertising for users. The service requires the same procedure again
after a certain interval time. Convenience of these services is the better than other methods.
However these methods have some problems. Malicious users can easily access to public wireless
LAN, because anyone can connect to the wireless LAN. In addition, this system does not use an
encryption method. Therefore persons who have some techniques can see another person's
communication contents.
The third method is the methods that an administrator gives both the SSID and the encryption key
to users. The SSID and the encryption key are told in the poster for bulletin board. The user can
connect to the network using them. This method is often used at the hotel. The SSID and the
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014
15
encryption key are posted in the private room and lobby. Convenience of this method is worse
than the first method, however security is better. This method essentially does not change the
SSID and the encryption key. If malicious users know the SSID and the encryption key even
once, they can connect to the network easily.
In addition to these methods there is an option that requires a users' authentication. It is necessary
to pre-register for users. Users select the SSID to connect to the network. Then, they are guided to
the top page through the browser. And they will enter a username and a password. The
convenience is bad and the security is good, and to connect the network is difficult for malicious
users. However, if the administrator does not use an encryption key, there is a possibility that the
communication contents are analyzed.
In addition to users authentication, to change the encryption key frequently is effective for
malicious users. Changing the encryption key is not performed basically in the public wireless
LAN service, because the convenience is reduced. However, using network and analysis of
communication content for malicious users is difficult by changing the encryption key frequently.
We show the relationship between the convenience and the encryption key and the security in
Table 1.
Table 1. The relationship between convenience and encryption key and security
Convenience Security
Without encryption key Good Bad
With checking the license
agreement or showed ads
Good Bad
With encryption key Bad Good
In the conventional method, the second method uses the encryption key. By the second method to
change the encryption key frequently, it is possible to achieve both security and convenience. In
this case, the burden of administrators and users must not be small when changing the encryption
key. In addition if the area of transmitted encryption key is minimum, the availability of the
encryption key is difficult to malicious users, because the administrator can easily monitor user.
Therefore, to deliver a new encryption key periodically in limiting the service providing area is
required. There are methods using radio waves, infrared and visible light communication [2-4]
(shown in Figure 2) in the information delivery. The communication area of infrared and radio
waves is unclear, because we cannot see the infrared and radio waves. That is, it is impossible for
the administrator to understand the transmission range of the encryption key. It is a benefit to a
malicious user. Therefore, with the use of a visible light communication, it is possible to lower
the potential to provide an encryption key to the malicious user. Visible light communication
transmits a signal by blinking the visible light. Characteristic of visible light communication is to
look for human eyes. The communication range is illuminated by the transmitter. The
administrator is able to recognize the transmission range easily. Further, the visible light
communication can use the lighting equipment as a transmitter. Recently the lighting equipment
using LEDs has been increasing. A response speed of LEDs is faster than that of the conventional
illumination as incandescent lamps or fluorescent lamps. When the encryption key is delivered by
the visible light communication by the lighting equipment, users in lighting area may be able to
enjoy the service. If this system can send the encryption key, sending SSID is easily. The
selection of SSID is the procedure for connecting to the network.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014
16
Figure 2: Visible light communication
3. THE KEY PROVIDING SYSTEM FOR WIRELESS LAN USING VISIBLE
LIGHT COMMUNICATION
We propose the distribution system of the SSID and the encryption key using visible light
communication. We show the system overview in Figure 3. The proposed system uses the
lighting equipment as a transmitter. In order to use the illumination device as the transmitter, the
brightness should be constant. Therefore, the proposed system uses the PPM (pulse position
modulation) [5-6].
At first the router transmits the SSID and the encryption key to the lighting equipment. The
transmitter distributes the SSID and the encryption key by visible light communication [7].
Therefore users only in the lighting area can get the signal using a receiver of visible light
communication. The receiver gets the signal by the visible light communication and decodes the
signal. In this way users can know the SSID and the encryption key. And the router changes the
SSID and encryption key on a regular basis. In that case, the proposed system repeats from the
first step.
Traditional public wireless LAN services do not use the encryption key, or they continue to use
the encryption key determined once more. Because changing the encryption key is the burden for
the administrator and users. The proposed system can change the encryption key easily, because
the proposed system can change the encryption key without the burden of the administrator and
users. In addition, it is easy for us to set an SSID to each room, because we can block the visible
light communication by providing a partition or a wall easily. The proposed system by preparing
a plurality of small-scale network is expected to be high-speed communication. The proposed
system can be expected to improve convenience and security. And the proposed method can make
multiple small network.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014
17
Figure 3: Overview of proposed system
4. EXPERIMENT
We show whether the proposed system can provide and change the encryption key without the
burden for the administrator and users. We compare the time it takes to connect the network of
proposed method and the two methods in the conventional methods. The first method in the
conventional method is the type that does not use the encryption key. The second method in the
conventional method is the type that uses the encryption key. Last method is our proposed
method. We use fabricated the transmitter and the receiver in the experiment (Figure 4, 5). We
make a shell script that receives the SSID and the encryption key from the receiver. The subjects
are 5 men who are 20 years old are accustomed to the operation of the smart phone and computer.
Figure 4: Visible light transmitter
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014
18
Figure 5: Visible light receiver
Figure 6: Experimental result
We show the experimental results in Figure 6. The vertical axis represents the time it took to
connect the network. The method of shortest time to connect the network was our proposed
method. Time of the method of longest time to connect the network was the method of using the
encryption key. Because this is the labor required for the connection's associated with time. At the
proposed method the computer get the SSID and the encryption key using the shell script from
the receiver connected by USB. The effort of the users is only to connect the receiver and run the
shell script. Time of users touching the keyboard is short. Therefore the time that takes for the
connection is short. Users need only to select the SSID in the method that does not use an
encryption key. However it is necessary to launch a network manager and select the SSID. In
addition to it, the method that uses the encryption key requires the input of the encryption key.
Thus, if time to touch the keyboard is short, we can reduce the time to require for connection.
In addition, the proposed method changes the SSID and the encryption key automatically. We
switched the SSID and the encryption key every 60 seconds in this experiment. WPA2 which is
one of the encryption methods encrypt the information by using the SSID and the encryption key.
If the encryption key and SSID are immutable, WPA2 was weak for attack to prepare a dictionary
in advance. However for changing the SSID and the encryption, the proposed system is strong for
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014
19
such attacks. By using the proposed system and the conventional encryption, we can construct a
secure and convenient network.
5. CONCLUSION
We proposed the distribution of encryption key and SSID using visible light communication. The
public wireless LAN service has been increasing recently. It is a convenient service for short stay
travelers particularly. However in order to improve the convenience, the services do not often use
the encryption key or do not change the encryption key that has already been set. Therefore, the
service has a problem in safety. We solve the problem using the visible light communication.
The visible light communication sends the signal by blinking the light. The visible light commu-
nication sends the signal by blinking the light. The visible light communication can use lighting
equipments as the transmitter unlike infrared or radio communications conventional. Further,
visible light communication can separate to clarify the transmission range by using light.
We proposed the distribution of encryption key and SSID using visible light communication.
Visible light communication can easily prepare a small network, such as the partition or per room
basis. For malicious users to connect the network is necessary to enter in the service provider area.
Thus the administrator is able to easily manage users. In addition, it is possible to update the
SSID and the encryption key by visible light communication easily for the proposed system. Thus
if malicious users get the SSID and the encryption key, they cannot use the SSID and the
encryption key immediately. Normal users may only need to run the shell script. Therefore,
convenience is a good.
We fabricated the transmitter and the receiver in the experiment. In order to confirm the improved
convenience, we measured the time it takes for a user to connect to the network. Comparison
methods are methods that use or do not use the encryption key. As a result, users can to connect
to the network in a short time compared with the conventional method. The system became very
strong because it is possible to update the encryption key and SSID automatically in the security
aspect.
REFERENCES
[1] Mostafa Azami, “Increasing the Network life Time by Simulated Annealing Algorithm in WSN with
Point ", IJASUC Vol.4, No.2, 2013.
[2] S. Haruyama,"Visible light communication", Journal of IEICE, 94(12), D, pp. 1055-1059, 2011.
[3] Rajan Sagotra, "Visible Light Communication", International Journal of Computer Trends and
Technology (IJCTT) volume4 Issue4, pp. 906-910, 2013.
[4] Dominic C. O'Brien, "Visible Light Communications: challenges and possibilities", PIMRC 2008.
IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, pp.15-
18, 2008.
[5] T. Saito, "A Study for flicker on Visible Light Communication", Technical Report of IEICE CS, vol.
106, No. 450, pp. 31-35, 2007.
[6] I. Shouichi, "Reduction of Flicker by Coding and Modulation for Visible-Light Communication"
Technical Report of IEICE OCS, vol. 108, No. 39, pp. 1-4, 2008.
[7]Xin Lin, "Development of Visible-Light Wireless LAN Accesspoint with Illumination Fuction" IEICE
Technical Report 109(245), pp.63-68, 2009.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014
20
AUTHORS
Kuniyoshi Okuda (b.1986) is a student of Ryukoku University in Japan. After studying
Electronics and Informatics at Ryukoku University, he completed his Master of
Engineering at Osaka City University. Now he is a doctor course student at Ryukoku
University.
Takuya Yamamoto received B.E, M.E. and D.E. degrees from Ryukoku University
and Osaka City University, in 2010 and 2012, respectively.
Tomoo Nakamura was born in 1948, and received B.E, M.E. and D.E. degrees from
Kyoto University, in 1970, 1972, and 1988. He is a professor of Ryukoku University in
Shiga, Japan.
Wataru Uemura was born in 1977, and received B.E, M.E. and D.E. degrees
from Osaka City University, in 2000, 2002, and 2005. He is an associate
professor of the Department of Electronics and Informatics, Faculty of
Engineering Science, Ryukoku University in Shiga, Japan. He is a member of
IEEE, RoboCup and others.

Contenu connexe

Tendances

A survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringA survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringeSAT Journals
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues andijfcstjournal
 
AndriodMobileComputingAssignment
AndriodMobileComputingAssignmentAndriodMobileComputingAssignment
AndriodMobileComputingAssignmentRebecca Patient
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoTIJCERT
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
 
IRJET- LIFI Based Smart Library System
IRJET- LIFI Based Smart Library SystemIRJET- LIFI Based Smart Library System
IRJET- LIFI Based Smart Library SystemIRJET Journal
 
5G MOBILE TECHNOLOGY AND EVOLUTION OF MOBILE TECHNOLOGY
5G MOBILE TECHNOLOGY AND EVOLUTION OF MOBILE TECHNOLOGY5G MOBILE TECHNOLOGY AND EVOLUTION OF MOBILE TECHNOLOGY
5G MOBILE TECHNOLOGY AND EVOLUTION OF MOBILE TECHNOLOGYSuswara Goli
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesYogesh Kumar
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...IRJET Journal
 
15 13248 telecommunication mamana aji
15 13248 telecommunication mamana aji15 13248 telecommunication mamana aji
15 13248 telecommunication mamana ajiIAESIJEECS
 
Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam EmailsStudy of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam EmailsIRJET Journal
 
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...IJERA Editor
 
Pppppppppttttttttttttttttttttt
PpppppppptttttttttttttttttttttPppppppppttttttttttttttttttttt
PpppppppptttttttttttttttttttttRahul kulshrestha
 
ComputerNetworksAssignment
ComputerNetworksAssignmentComputerNetworksAssignment
ComputerNetworksAssignmentRebecca Patient
 
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET Journal
 
Automatic recognition of the digital modulation types using the artificial ne...
Automatic recognition of the digital modulation types using the artificial ne...Automatic recognition of the digital modulation types using the artificial ne...
Automatic recognition of the digital modulation types using the artificial ne...IJECEIAES
 
Wireless vs mobile computing
Wireless vs mobile computingWireless vs mobile computing
Wireless vs mobile computingaazeem689
 

Tendances (20)

A survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringA survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clustering
 
ActivFi
ActivFiActivFi
ActivFi
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues and
 
AndriodMobileComputingAssignment
AndriodMobileComputingAssignmentAndriodMobileComputingAssignment
AndriodMobileComputingAssignment
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
 
Bb4101307311
Bb4101307311Bb4101307311
Bb4101307311
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...
 
IRJET- LIFI Based Smart Library System
IRJET- LIFI Based Smart Library SystemIRJET- LIFI Based Smart Library System
IRJET- LIFI Based Smart Library System
 
5G MOBILE TECHNOLOGY AND EVOLUTION OF MOBILE TECHNOLOGY
5G MOBILE TECHNOLOGY AND EVOLUTION OF MOBILE TECHNOLOGY5G MOBILE TECHNOLOGY AND EVOLUTION OF MOBILE TECHNOLOGY
5G MOBILE TECHNOLOGY AND EVOLUTION OF MOBILE TECHNOLOGY
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
 
15 13248 telecommunication mamana aji
15 13248 telecommunication mamana aji15 13248 telecommunication mamana aji
15 13248 telecommunication mamana aji
 
Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam EmailsStudy of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam Emails
 
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
 
Pppppppppttttttttttttttttttttt
PpppppppptttttttttttttttttttttPppppppppttttttttttttttttttttt
Pppppppppttttttttttttttttttttt
 
ComputerNetworksAssignment
ComputerNetworksAssignmentComputerNetworksAssignment
ComputerNetworksAssignment
 
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
 
Automatic recognition of the digital modulation types using the artificial ne...
Automatic recognition of the digital modulation types using the artificial ne...Automatic recognition of the digital modulation types using the artificial ne...
Automatic recognition of the digital modulation types using the artificial ne...
 
IoT Network Technologies
IoT Network TechnologiesIoT Network Technologies
IoT Network Technologies
 
Wireless vs mobile computing
Wireless vs mobile computingWireless vs mobile computing
Wireless vs mobile computing
 

En vedette

Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...ijwmn
 
Ctcp a cross layer information based tcp for manet
Ctcp  a cross layer information based tcp for manetCtcp  a cross layer information based tcp for manet
Ctcp a cross layer information based tcp for manetijasuc
 
Enmat v2.2 presentation september 2014
Enmat v2.2 presentation september  2014Enmat v2.2 presentation september  2014
Enmat v2.2 presentation september 2014ENMAT Energy
 
A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...ijwmn
 
Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm U...
Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm U...Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm U...
Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm U...ijwmn
 
Macro with pico cells (hetnets) system behaviour using well known scheduling ...
Macro with pico cells (hetnets) system behaviour using well known scheduling ...Macro with pico cells (hetnets) system behaviour using well known scheduling ...
Macro with pico cells (hetnets) system behaviour using well known scheduling ...ijwmn
 
Design and performance evaluation of
Design and performance evaluation ofDesign and performance evaluation of
Design and performance evaluation ofijwmn
 
Stochastic analysis of random ad hoc networks with maximum entropy deployments
Stochastic analysis of random ad hoc networks with maximum entropy deploymentsStochastic analysis of random ad hoc networks with maximum entropy deployments
Stochastic analysis of random ad hoc networks with maximum entropy deploymentsijwmn
 
Performance analysis of voip traffic over integrating wireless lan and wan us...
Performance analysis of voip traffic over integrating wireless lan and wan us...Performance analysis of voip traffic over integrating wireless lan and wan us...
Performance analysis of voip traffic over integrating wireless lan and wan us...ijwmn
 
A novel energy efficient routing algorithm for wireless sensor networks using...
A novel energy efficient routing algorithm for wireless sensor networks using...A novel energy efficient routing algorithm for wireless sensor networks using...
A novel energy efficient routing algorithm for wireless sensor networks using...ijwmn
 
Data mining of ns 2 trace file
Data mining of ns 2 trace fileData mining of ns 2 trace file
Data mining of ns 2 trace fileijwmn
 
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Sns
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W SnsE NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Sns
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Snsijwmn
 
Energy harvesting wireless sensor
Energy harvesting wireless sensorEnergy harvesting wireless sensor
Energy harvesting wireless sensorijwmn
 
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...ijwmn
 
Performance analysis of fls, exp, log and
Performance analysis of fls, exp, log andPerformance analysis of fls, exp, log and
Performance analysis of fls, exp, log andijwmn
 
Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...ijwmn
 
Zigbee based voice controlled wireless smart home system
Zigbee based voice controlled wireless smart home systemZigbee based voice controlled wireless smart home system
Zigbee based voice controlled wireless smart home systemijwmn
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networksijwmn
 
Tollan xicocotitlan a reconstructed city by augmented reality ( extended )
Tollan xicocotitlan  a reconstructed city by augmented reality ( extended )Tollan xicocotitlan  a reconstructed city by augmented reality ( extended )
Tollan xicocotitlan a reconstructed city by augmented reality ( extended )ijdms
 

En vedette (20)

Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
 
Ctcp a cross layer information based tcp for manet
Ctcp  a cross layer information based tcp for manetCtcp  a cross layer information based tcp for manet
Ctcp a cross layer information based tcp for manet
 
Enmat v2.2 presentation september 2014
Enmat v2.2 presentation september  2014Enmat v2.2 presentation september  2014
Enmat v2.2 presentation september 2014
 
A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...
 
Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm U...
Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm U...Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm U...
Improving Performance of Ieee 802.11 by a Dynamic Control Backoff Algorithm U...
 
Macro with pico cells (hetnets) system behaviour using well known scheduling ...
Macro with pico cells (hetnets) system behaviour using well known scheduling ...Macro with pico cells (hetnets) system behaviour using well known scheduling ...
Macro with pico cells (hetnets) system behaviour using well known scheduling ...
 
Z-Yachting Kiinteistönvälitys
Z-Yachting KiinteistönvälitysZ-Yachting Kiinteistönvälitys
Z-Yachting Kiinteistönvälitys
 
Design and performance evaluation of
Design and performance evaluation ofDesign and performance evaluation of
Design and performance evaluation of
 
Stochastic analysis of random ad hoc networks with maximum entropy deployments
Stochastic analysis of random ad hoc networks with maximum entropy deploymentsStochastic analysis of random ad hoc networks with maximum entropy deployments
Stochastic analysis of random ad hoc networks with maximum entropy deployments
 
Performance analysis of voip traffic over integrating wireless lan and wan us...
Performance analysis of voip traffic over integrating wireless lan and wan us...Performance analysis of voip traffic over integrating wireless lan and wan us...
Performance analysis of voip traffic over integrating wireless lan and wan us...
 
A novel energy efficient routing algorithm for wireless sensor networks using...
A novel energy efficient routing algorithm for wireless sensor networks using...A novel energy efficient routing algorithm for wireless sensor networks using...
A novel energy efficient routing algorithm for wireless sensor networks using...
 
Data mining of ns 2 trace file
Data mining of ns 2 trace fileData mining of ns 2 trace file
Data mining of ns 2 trace file
 
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Sns
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W SnsE NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Sns
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Sns
 
Energy harvesting wireless sensor
Energy harvesting wireless sensorEnergy harvesting wireless sensor
Energy harvesting wireless sensor
 
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
 
Performance analysis of fls, exp, log and
Performance analysis of fls, exp, log andPerformance analysis of fls, exp, log and
Performance analysis of fls, exp, log and
 
Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...Advanced antenna techniques and high order sectorization with novel network t...
Advanced antenna techniques and high order sectorization with novel network t...
 
Zigbee based voice controlled wireless smart home system
Zigbee based voice controlled wireless smart home systemZigbee based voice controlled wireless smart home system
Zigbee based voice controlled wireless smart home system
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
 
Tollan xicocotitlan a reconstructed city by augmented reality ( extended )
Tollan xicocotitlan  a reconstructed city by augmented reality ( extended )Tollan xicocotitlan  a reconstructed city by augmented reality ( extended )
Tollan xicocotitlan a reconstructed city by augmented reality ( extended )
 

Similaire à The key providing system for wireless

Computer network notes
Computer network notesComputer network notes
Computer network notesLakshmiSamivel
 
Performance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax TestbedPerformance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax TestbedAlison Reed
 
The Quality on 4G Networks Is Like an Attractive Person Nobody Wants to Date ...
The Quality on 4G Networks Is Like an Attractive Person Nobody Wants to Date ...The Quality on 4G Networks Is Like an Attractive Person Nobody Wants to Date ...
The Quality on 4G Networks Is Like an Attractive Person Nobody Wants to Date ...Cisco Service Provider Mobility
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationeSAT Publishing House
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationeSAT Journals
 
Computer networking For Class XII
Computer networking For Class XIIComputer networking For Class XII
Computer networking For Class XIIFernando Torres
 
The Quest for Wireless QOS within a Network Neutrality Framework
The Quest for Wireless QOS within a Network Neutrality FrameworkThe Quest for Wireless QOS within a Network Neutrality Framework
The Quest for Wireless QOS within a Network Neutrality FrameworkCisco Service Provider Mobility
 
Wireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly EssayWireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly EssayApril Dillard
 
AUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONAUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONNaveen Sampath
 
A survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDA survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDEditor IJCATR
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1paolo374233
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoceSAT Publishing House
 
Automatic Detection of Stronger Wi-Fi Networks
Automatic Detection of Stronger Wi-Fi NetworksAutomatic Detection of Stronger Wi-Fi Networks
Automatic Detection of Stronger Wi-Fi NetworksIRJET Journal
 

Similaire à The key providing system for wireless (20)

Punit kumar
Punit kumarPunit kumar
Punit kumar
 
Computer network notes
Computer network notesComputer network notes
Computer network notes
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
D4461045416
D4461045416D4461045416
D4461045416
 
4G.ppt
4G.ppt4G.ppt
4G.ppt
 
Performance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax TestbedPerformance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax Testbed
 
The Quality on 4G Networks Is Like an Attractive Person Nobody Wants to Date ...
The Quality on 4G Networks Is Like an Attractive Person Nobody Wants to Date ...The Quality on 4G Networks Is Like an Attractive Person Nobody Wants to Date ...
The Quality on 4G Networks Is Like an Attractive Person Nobody Wants to Date ...
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
 
Computer networking For Class XII
Computer networking For Class XIIComputer networking For Class XII
Computer networking For Class XII
 
C04941721
C04941721C04941721
C04941721
 
The Quest for Wireless QOS within a Network Neutrality Framework
The Quest for Wireless QOS within a Network Neutrality FrameworkThe Quest for Wireless QOS within a Network Neutrality Framework
The Quest for Wireless QOS within a Network Neutrality Framework
 
Redtacton
Redtacton Redtacton
Redtacton
 
Wireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly EssayWireless Communication Systems Are Developing Rapidly Essay
Wireless Communication Systems Are Developing Rapidly Essay
 
AUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONAUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTION
 
A survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDA survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SD
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
 
PhD_Thesis
PhD_ThesisPhD_Thesis
PhD_Thesis
 
Automatic Detection of Stronger Wi-Fi Networks
Automatic Detection of Stronger Wi-Fi NetworksAutomatic Detection of Stronger Wi-Fi Networks
Automatic Detection of Stronger Wi-Fi Networks
 

Dernier

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 

Dernier (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 

The key providing system for wireless

  • 1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014 DOI : 10.5121/ijasuc.2014.5302 13 THE KEY PROVIDING SYSTEM FOR WIRELESS LAN USING VISIBLE LIGHT COMMUNICATION Kuniyoshi Okuda1 , Takuya Yamamoto2 , Tomoo Nakamura1 and Wataru Uemura1 1 Department of Electronics Informatics, Ryukoku University, Shiga, Japan 2 Graduate School for Creative Cities, Osaka City University, Osaka, Japan ABSTRACT Public wireless LAN services have been increasing recently. These are convenient services for carrier companies particularly. And carrier companies and the user can disperse traffic. However in order to improve the convenience, the services do not often use the encryption key or do not change the encryption key that has already been set. Therefore, the services have a problem in safety. This paper solves this problem using the visible light communication. The visible light communication sends a signal by blinking the light. One of the visible light communication features is that we can see the transmission area. The visible light communication can use lighting equipments as the transmitter unlike infrared or conventional radio communications. Further, visible light communication can separate to clarify the transmission range by using light. We propose the distribution of the encryption key and the SSID using visible light communication. Visible light communication can easily prepare a small network, such as a partition or per a room basis. For malicious users connecting to the network is necessary to enter in the service provided area. Thus the administrator is able to easily manage legitimate users. In addition, it is possible to update the SSID and the encryption key by visible light communication easily for an administrator. Thus if malicious users get the SSID and the encryption key, they cannot use the SSID and the encryption key immediately. Normal users may only need to run the shell script for receiving information from the receiver. Therefore, convenience is good. In order to confirm the improved convenience, we measured the time it takes for a user to connect to the network. Conventional methods are methods that use or do not use the encryption key. As a result, users can connect to the network in a short time compared with the conventional methods. The system becomes stronger than conventional methods because it is possible to update the encryption key and SSID automatically in the security aspect. KEYWORDS Wireless LAN, SSID, encryption key, visible light communication 1. INTRODUCTION Recently, a network environment has become familiar. Now we can connect to the network anywhere. Such a condition is called ubiquitous. The ubiquitous means interface, environment, and technology. It may benefit at any time anyone everywhere. And a ubiquitous mobile communication is especially important. The traffic is increasing all the time. Carrier companies have strengthened the network to support the traffic. However it is not enough. So the wireless LAN has drawn attention. Wireless LAN is a communication system for a small area. Wireless LAN does not require a line. The user can connect to the network by simply setting the terminal.
  • 2. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014 14 Communication speed of wireless LAN is faster than the line of mobile phones. It is supported by a wired communication. And the communication speed becomes faster year by year. Effective speed of the current is approximately 1Gbps or more. Communication speed is reduced by the user increases. However, it is much faster as compared to the line of mobile phones. Therefore we can expect high-speed communication in a specific area in the wireless LAN. Therefore carrier companies have supported the traffic by providing wireless LAN services. This service can be enjoyed by people who are only contracted with the carrier company basically. And rather than covering a wide range in a single access point, it is better to cover the specific range of the access point some better network efficiency [1]. Recently a public wireless LAN service becomes also popular (Figure 1). The services are provided at the place where many people gather. These are airports, restaurants and stations. The public wireless LAN service is an important service to foreigners, because communication of complicated content is the burden for foreigners. In addition, in some cases network of career companies are not required when the stay is short like transit. The public wireless LAN service is particularly effective in such case. There is a fee or free in the public wireless LAN services. This paper focuses on the free wireless LAN service that anyone can use. Figure 1: public wireless LAN services 2. PROBLEM OF WIRELESS LAN SERVICES Some methods are required in order to connect the wireless LAN service. They depend on the method of service. We describe three procedures. The first method is the method that does not use the encryption key. It can be connected by anyone. The procedure of the connection is easy. Users can connect the network by selecting a SSID (Service Set Identifier). The second method is the first method with some options. The options require a license agreement or show them advertising for users. The service requires the same procedure again after a certain interval time. Convenience of these services is the better than other methods. However these methods have some problems. Malicious users can easily access to public wireless LAN, because anyone can connect to the wireless LAN. In addition, this system does not use an encryption method. Therefore persons who have some techniques can see another person's communication contents. The third method is the methods that an administrator gives both the SSID and the encryption key to users. The SSID and the encryption key are told in the poster for bulletin board. The user can connect to the network using them. This method is often used at the hotel. The SSID and the
  • 3. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014 15 encryption key are posted in the private room and lobby. Convenience of this method is worse than the first method, however security is better. This method essentially does not change the SSID and the encryption key. If malicious users know the SSID and the encryption key even once, they can connect to the network easily. In addition to these methods there is an option that requires a users' authentication. It is necessary to pre-register for users. Users select the SSID to connect to the network. Then, they are guided to the top page through the browser. And they will enter a username and a password. The convenience is bad and the security is good, and to connect the network is difficult for malicious users. However, if the administrator does not use an encryption key, there is a possibility that the communication contents are analyzed. In addition to users authentication, to change the encryption key frequently is effective for malicious users. Changing the encryption key is not performed basically in the public wireless LAN service, because the convenience is reduced. However, using network and analysis of communication content for malicious users is difficult by changing the encryption key frequently. We show the relationship between the convenience and the encryption key and the security in Table 1. Table 1. The relationship between convenience and encryption key and security Convenience Security Without encryption key Good Bad With checking the license agreement or showed ads Good Bad With encryption key Bad Good In the conventional method, the second method uses the encryption key. By the second method to change the encryption key frequently, it is possible to achieve both security and convenience. In this case, the burden of administrators and users must not be small when changing the encryption key. In addition if the area of transmitted encryption key is minimum, the availability of the encryption key is difficult to malicious users, because the administrator can easily monitor user. Therefore, to deliver a new encryption key periodically in limiting the service providing area is required. There are methods using radio waves, infrared and visible light communication [2-4] (shown in Figure 2) in the information delivery. The communication area of infrared and radio waves is unclear, because we cannot see the infrared and radio waves. That is, it is impossible for the administrator to understand the transmission range of the encryption key. It is a benefit to a malicious user. Therefore, with the use of a visible light communication, it is possible to lower the potential to provide an encryption key to the malicious user. Visible light communication transmits a signal by blinking the visible light. Characteristic of visible light communication is to look for human eyes. The communication range is illuminated by the transmitter. The administrator is able to recognize the transmission range easily. Further, the visible light communication can use the lighting equipment as a transmitter. Recently the lighting equipment using LEDs has been increasing. A response speed of LEDs is faster than that of the conventional illumination as incandescent lamps or fluorescent lamps. When the encryption key is delivered by the visible light communication by the lighting equipment, users in lighting area may be able to enjoy the service. If this system can send the encryption key, sending SSID is easily. The selection of SSID is the procedure for connecting to the network.
  • 4. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014 16 Figure 2: Visible light communication 3. THE KEY PROVIDING SYSTEM FOR WIRELESS LAN USING VISIBLE LIGHT COMMUNICATION We propose the distribution system of the SSID and the encryption key using visible light communication. We show the system overview in Figure 3. The proposed system uses the lighting equipment as a transmitter. In order to use the illumination device as the transmitter, the brightness should be constant. Therefore, the proposed system uses the PPM (pulse position modulation) [5-6]. At first the router transmits the SSID and the encryption key to the lighting equipment. The transmitter distributes the SSID and the encryption key by visible light communication [7]. Therefore users only in the lighting area can get the signal using a receiver of visible light communication. The receiver gets the signal by the visible light communication and decodes the signal. In this way users can know the SSID and the encryption key. And the router changes the SSID and encryption key on a regular basis. In that case, the proposed system repeats from the first step. Traditional public wireless LAN services do not use the encryption key, or they continue to use the encryption key determined once more. Because changing the encryption key is the burden for the administrator and users. The proposed system can change the encryption key easily, because the proposed system can change the encryption key without the burden of the administrator and users. In addition, it is easy for us to set an SSID to each room, because we can block the visible light communication by providing a partition or a wall easily. The proposed system by preparing a plurality of small-scale network is expected to be high-speed communication. The proposed system can be expected to improve convenience and security. And the proposed method can make multiple small network.
  • 5. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014 17 Figure 3: Overview of proposed system 4. EXPERIMENT We show whether the proposed system can provide and change the encryption key without the burden for the administrator and users. We compare the time it takes to connect the network of proposed method and the two methods in the conventional methods. The first method in the conventional method is the type that does not use the encryption key. The second method in the conventional method is the type that uses the encryption key. Last method is our proposed method. We use fabricated the transmitter and the receiver in the experiment (Figure 4, 5). We make a shell script that receives the SSID and the encryption key from the receiver. The subjects are 5 men who are 20 years old are accustomed to the operation of the smart phone and computer. Figure 4: Visible light transmitter
  • 6. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014 18 Figure 5: Visible light receiver Figure 6: Experimental result We show the experimental results in Figure 6. The vertical axis represents the time it took to connect the network. The method of shortest time to connect the network was our proposed method. Time of the method of longest time to connect the network was the method of using the encryption key. Because this is the labor required for the connection's associated with time. At the proposed method the computer get the SSID and the encryption key using the shell script from the receiver connected by USB. The effort of the users is only to connect the receiver and run the shell script. Time of users touching the keyboard is short. Therefore the time that takes for the connection is short. Users need only to select the SSID in the method that does not use an encryption key. However it is necessary to launch a network manager and select the SSID. In addition to it, the method that uses the encryption key requires the input of the encryption key. Thus, if time to touch the keyboard is short, we can reduce the time to require for connection. In addition, the proposed method changes the SSID and the encryption key automatically. We switched the SSID and the encryption key every 60 seconds in this experiment. WPA2 which is one of the encryption methods encrypt the information by using the SSID and the encryption key. If the encryption key and SSID are immutable, WPA2 was weak for attack to prepare a dictionary in advance. However for changing the SSID and the encryption, the proposed system is strong for
  • 7. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014 19 such attacks. By using the proposed system and the conventional encryption, we can construct a secure and convenient network. 5. CONCLUSION We proposed the distribution of encryption key and SSID using visible light communication. The public wireless LAN service has been increasing recently. It is a convenient service for short stay travelers particularly. However in order to improve the convenience, the services do not often use the encryption key or do not change the encryption key that has already been set. Therefore, the service has a problem in safety. We solve the problem using the visible light communication. The visible light communication sends the signal by blinking the light. The visible light commu- nication sends the signal by blinking the light. The visible light communication can use lighting equipments as the transmitter unlike infrared or radio communications conventional. Further, visible light communication can separate to clarify the transmission range by using light. We proposed the distribution of encryption key and SSID using visible light communication. Visible light communication can easily prepare a small network, such as the partition or per room basis. For malicious users to connect the network is necessary to enter in the service provider area. Thus the administrator is able to easily manage users. In addition, it is possible to update the SSID and the encryption key by visible light communication easily for the proposed system. Thus if malicious users get the SSID and the encryption key, they cannot use the SSID and the encryption key immediately. Normal users may only need to run the shell script. Therefore, convenience is a good. We fabricated the transmitter and the receiver in the experiment. In order to confirm the improved convenience, we measured the time it takes for a user to connect to the network. Comparison methods are methods that use or do not use the encryption key. As a result, users can to connect to the network in a short time compared with the conventional method. The system became very strong because it is possible to update the encryption key and SSID automatically in the security aspect. REFERENCES [1] Mostafa Azami, “Increasing the Network life Time by Simulated Annealing Algorithm in WSN with Point ", IJASUC Vol.4, No.2, 2013. [2] S. Haruyama,"Visible light communication", Journal of IEICE, 94(12), D, pp. 1055-1059, 2011. [3] Rajan Sagotra, "Visible Light Communication", International Journal of Computer Trends and Technology (IJCTT) volume4 Issue4, pp. 906-910, 2013. [4] Dominic C. O'Brien, "Visible Light Communications: challenges and possibilities", PIMRC 2008. IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, pp.15- 18, 2008. [5] T. Saito, "A Study for flicker on Visible Light Communication", Technical Report of IEICE CS, vol. 106, No. 450, pp. 31-35, 2007. [6] I. Shouichi, "Reduction of Flicker by Coding and Modulation for Visible-Light Communication" Technical Report of IEICE OCS, vol. 108, No. 39, pp. 1-4, 2008. [7]Xin Lin, "Development of Visible-Light Wireless LAN Accesspoint with Illumination Fuction" IEICE Technical Report 109(245), pp.63-68, 2009.
  • 8. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.3, June 2014 20 AUTHORS Kuniyoshi Okuda (b.1986) is a student of Ryukoku University in Japan. After studying Electronics and Informatics at Ryukoku University, he completed his Master of Engineering at Osaka City University. Now he is a doctor course student at Ryukoku University. Takuya Yamamoto received B.E, M.E. and D.E. degrees from Ryukoku University and Osaka City University, in 2010 and 2012, respectively. Tomoo Nakamura was born in 1948, and received B.E, M.E. and D.E. degrees from Kyoto University, in 1970, 1972, and 1988. He is a professor of Ryukoku University in Shiga, Japan. Wataru Uemura was born in 1977, and received B.E, M.E. and D.E. degrees from Osaka City University, in 2000, 2002, and 2005. He is an associate professor of the Department of Electronics and Informatics, Faculty of Engineering Science, Ryukoku University in Shiga, Japan. He is a member of IEEE, RoboCup and others.