Design and Implementation of A Visible Light-Based Communications System

Keywords

Visible Light Communications
Optical Wireless Communications
Optical Physical Layer
Manchester Coding
OOK Modulation

How to Cite

Caballero Barragan, S., & Guerrero, F. (2019). Design and Implementation of A Visible Light-Based Communications System. Ingeniería Solidaria, 15(28), 1-20. Retrieved from https://revistas.ucc.edu.co/index.php/in/article/view/2746

Abstract

Introduction: The publication is the product of the research “Prototipo de un sistema de telecomunicaciones basado en luz visible”, carried out at Universidad del Valle in 2018. Objective: The objective of this work was to build a functional prototype of a telecommunications system based on visible light through which the study of the most relevant characteristics, elements and behaviors in relation to this technology could be made. Methodology: To study the behavior of the developed prototype, different tests were performed varying some of the variables present in this type of telecommunications system. In addition, the developed prototype was tested in simplex and halfduplex modes. Conclusions: The results obtained when developing this work demonstrated the main characteristics of the prototype, its limitations, as well as the elements and variables that govern the most important aspects of its design. Originality: The presented design proposes the development of a low cost prototype, capable of obtaining the data to be sent through the connection to other devices through different communication peripherals or using the ADC present in the processing device used. Restrictions: Due to the reception elements used in the prototype there is a significant limitation on the maximum achievable transmission rate. In addition, it is important to mention that the conditions in which the prototype is deployed can affect its behavior, for example, elements that impede the line of sight between the telecommunications modules can stop the transmission.

References

[1] M. Sikorski and A. Honig, “Practical Malware Analysis,” vol. 53, no. 9. No Starch Press, San Francisco, pp. 650–652, 2012. doi: 10.1016/s1353-4858(12)70109-5
[2] K. Dunham, S. Hartman, J. Morales, M. Quintans, and T. Strazzere, “Android Malware And Analysis.” CRC Press, p. 232, 2014.[Online]. Available: https://www.crcpress.com/Android-Malware-and-Analysis/Dunham-Hartman-Quintans-Morales-Strazzere/p/book/9781482252194 doi:10.1201/b17598
[3] J. J. Drake, Z. Lanier, C. Mulliner, P. Oliva, S. A. Ridley, and G. Wicherski, “Android hacker’s handbook.” John Wiley & Sons, p. 577, 2014. [Online]. Available: https://www.wiley.com/en-co/Android+Hacker%27s+Handbook-p-9781118922255
[4] Radare, “radare/radare2: unix-like reverse engineering framework and commandline tools security.” [Online]. Available: https://github.com/radare/radare2.
[5] E. Eilam and E. J. Chikofsky, “Reversing: Secrets of Reverse Engineering.” John Wiley & Sons, p. 624, 2011. [Online]. Available: https://www.wiley.com/en-co/Android+Hacker%27s+Handbook-p-9781118922255
[6] A. Singh, “Identifying Malicious code through Reverse Engineering,” vol. 44. Springer Science & Business Media, p. 198, 2009. [Online]. Available: https://www.springer.com/la/book/9780387098241 doi:10.1007/978-0-387-89468-3
[7] D. Oktavianto and I. Muhardianto, “Cuckoo Malware Analysis.” Packt Publishing Ltd, p. 142, 2013. [Online]. Available: https://www.packtpub.com/hardware-and-creative/cuckoo-malware-analysis
[8] C. Elisan, “Advanced Malware Analysis.” McGraw Hill Professional, p. 464, 2015. [Online]. Available: https://www.mhprofessional.com/9780071819749-usa-advanced-malware-analysis-group
[9] M. Ligh, A. Case, J. Levy, and Aa. Walters, “The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory,” vol. 1. John Wiley & Sons, p. 912, 2014. [Online]. Available: https://www.wiley.com/en-co/The+Art+of+Memory+Forensics%3A+Detecting+Malware+and+Threats+in+Windows%2C+Linux%2C+and+Mac+Memory-p-9781118824993
[10] D. Regalado, S. Harris, A. Harper, C. Eagle, and J. Ness, “Gray hat hacking: the ethical hacker’s handbook.” McGraw Hill Professional, p. 577, 2008. [Online]. Available: https://www.mhprofessional.com/9781260108415-usa-gray-hat-hacking-the-ethical-hackers-handbook-fifth-edition-group doi: 10.1036/0071495681
[11] P. Shah, “Security Sandboxing for PC2: Windows Version,” California State University, Sacramento, 2017. [Online]. Available: https://csus-dspace.calstate.edu/bitstream/handle/10211.3/190565/SecuritySandboxingForPC2WindowsVersion.pdf?sequence=1
[12] C. Eagle, “The IDA Pro Book.” No Starch Press, p. 672, 2011. [Online]. Available: https://nostarch.com/idapro2.htm
[13] Aptoide S.A, Aptoide | Descarga, encuentra y comparte los mejores juegos y apps para Android. [Online]. Available: https://es.aptoide.com/.
[14] Klinnerds, “World Cup 2018 Yeah! - Russia 2018 2.2.3 Descargar APK para Android - Aptoide.” [Online]. Available: https://world-cup-2018-yeah-russia-2018.es.aptoide.com/
[15] J. Morris, “Hands-On Android UI Development: Design and develop attractive user interfaces for Android applications.” Packt Publishing Ltd, p. 348, 2017. [Online]. Available: https://www.packtpub.com/application-development/hands-android-ui-development
[16] N. Elenkov, “Android Security Internals: An In-Depth Guide to Android’s Security Architecture.” No Starch Press, p. 432, 2014. [Online]. Available: https://nostarch.com/androidsecurity
[17] A. Dubkey and A. Misra, “Android Security: Attacks and Defenses.” CRC Press, p. 280, 2016. [Online]. Available: https://www.crcpress.com/Android-Security-Attacks-and-Defenses/Misra-Dubey/p/book/9781439896471
[18] K. Dunham, “Mobile Malware Attacks and Defense.” Syngress, p. 440, 2008. [Online]. Available: https://cdn.sonicwall.com/sonicwall.com/media/pdfs/resources/2018-snwl-cyber-threat-report.pdf
[19] K. Mandia, C. Prosise, and M. Pepe, “Incident Response & Computer Forensics.” McGraw Hill Professional, p. 624, 2014. [Online]. Available: https://www.mhprofessional.com/9780071798686-usa-incident-response-computer-forensics-third-edition-group
[20] M. Christodorescu, S. Jha, C. Wang, D. Song, and D. Maughan, “Malware Detection.” Springer Science & Business Media, p. 312, 2007. [Online]. Available: https://www.springer.com/la/book/9780387327204 doi: 10.1007/978-0-387-44599-1
[21] V. Total, “YARA – VirusTotal.” [Online]. Available: https://support.virustotal.com/hc/en-us/articles/115002178945-YARA.
[22] D. Balzarotti, M. Cova, and S. Stolfo, “Research in Attacks, Intrusions, and Defenses,” vol. 7462. Springer, p. 400, 2012. doi: 10.1007/978-3-642-33338-5
[23] M. Spreitzenbarth and J. Uhrmann, “Mastering Python Forensics,” vol. 21. Packt Publishing Ltd, p. 192, 2015. [Online]. Available: https://www.packtpub.com/networking-and-servers/mastering-python-forensics
[24] J. Six, “Application Security for the Android Platform.” O’Reilly Media, p. 97, 2011. [Online]. Available: http://shop.oreilly.com/product/0636920022596.do
[25] M. Goodman, “Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It.” Knopf Doubleday Publishing Group, p. 10100, 2015. [Online]. Available: http://www.futurecrimesbook.com/
[26] T. Intelligence and I. Analysis, “2018 SonicWall Cyber Threat Report,” 2018. [Online]. Available: https://cdn.sonicwall.com/sonicwall.com/media/pdfs/resources/2018-snwl-cyber-threat-report.pdf
[27] C. Abad-Aramburu, “Aplicación de metodología de Análisis de Malware al caso de estudio de la Amenaza Avanzada Persistente (APT) ‘Octubre Rojo.’” España, p. 2, 2015. [Online]. Available: http://reunir.unir.net/handle/123456789/2841
[28] J. Muniz, G. McIntyre, and N. AlFardan, “Security Operations Center: Building, Operating, and Maintaining your SOC,” vol. 2. Cisco Press, p. 21, 2015. [Online]. Available: http://www.ciscopress.com/store/security-operations-center-building-operating-and-maintaining-9780134052014

Cession of rights and ethical commitment

As the author of the article, I declare that is an original unpublished work exclusively created by me, that it has not been submitted for simultaneous evaluation by another publication and that there is no impediment of any kind for concession of the rights provided for in this contract.

In this sense, I am committed to await the result of the evaluation by the journal Ingeniería Solidaría before considering its submission to another medium; in case the response by that publication is positive, additionally, I am committed to respond for any action involving claims, plagiarism or any other kind of claim that could be made by third parties.

At the same time, as the author or co-author, I declare that I am completely in agreement with the conditions presented in this work and that I cede all patrimonial rights, in other words, regarding reproduction, public communication, distribution, dissemination, transformation, making it available and all forms of exploitation of the work using any medium or procedure, during the term of the legal protection of the work and in every country in the world, to the Universidad Cooperativa de Colombia Press.

Downloads

Download data is not yet available.