Use Cases for Light Communications

Slides:



Advertisements
Similar presentations
Network Vulnerabilities and Attacks Dr. John Abraham UTPA.
Advertisements

NRC Cyber Security Regulatory Program Development Background ANSI Nuclear Energy Standards Coordination Collaborative (NESCC) Meeting November 3, 2014November.
Presenters: Adam Andy Andy Rachel
EMC Technology Roadmapping: A Long-Term Strategy Marcel van Doorn Philips Applied Technologies EM&C Competence Center Eindhoven, The Netherlands, March.
Intelligent Radio Frequency (RF) Monitoring © 2009 Armstrong International, Inc.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Presenters: Adam Andy Andy
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
I & C.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Li-Fi & All about it Light Fidelity & How it will change the way we perform data transfers!!
An overview of I&C Systems in APR 1400 Parvaiz Ahmed Khand December 28, 2007.
Bitwali.com. CONTENTS  Present Scenario  Introduction  How Li-Fi Works  Wi-Fi Vs Li-Fi  Applications  Advantages  Limitations  Conclusion.
Types of Communication Device..
Wi-Fi Technology.
WIRELESS FIRE DETECTION
Wireless Networks Dave Abbott.
IEEE NPEC SC2 Equipment Qualification Electromagnetic Compatibility Compliance Type Test-Design Considerations- Installation and Mitigation Standard/Guidance.
How wi-Fi and Li-Fi are applied in medical environment
Light Communication Use-Cases
Dumps PDF Designing Cisco Wireless Enterprise Networks Exam dumps.html Download Complete PDF File:
Gi-Fi Technology.
CompTIA Security+ Study Guide (SY0-401)
Koji Nakao, Dai Arisue NICT, Japan
ETSI Software Reconfiguration Overview
The University of Adelaide, School of Computer Science
Instructor Materials Chapter 6 Building a Home Network
Testing for wireless coexistence: Methods and tools
Light Communications Experience of a Lighting Systems Manufacturer
SUBMITTED BY DINEEJ A 28 S3 EC
OCC and LiFi based Light Communication for 5G Revolution
Topologies, Protocols and Layers
Wireless Fidelity 1 1.
Professor Robert L. Heider, PE
Three types of wireless technology
Light Communications Experience of a Lighting Systems Manufacturer
OCC and LiFi based Light Communication for 5G Revolution
McGraw-Hill Technology Education
The security and vulnerabilities of IoT devices
IEEE P Working Group for Wireless Personal Area NetworksTM
Overview of CV2X Requirements
NRC Cyber Security Regulatory Overview
Wireless LAN Security 4.3 Wireless LAN Security.
LiFi from the perspective of an enterprise AP vendor
Submission Title: [MAC requirements for the BAN]
16 November 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Call For Applications Response Date.
Network Media, models and number systems
Wireless Industrial Networking Alliance The Promise of Wireless
Wi-Fi Technology By : Pranav Mandora Rikin Mistry LDRP-EC.
Use Cases for Light Communications
OCC and LiFi based Light Communication for 5G Revolution
Internal Automotive Use Cases
Security capabilities for Light Communications
WLAN Security Antti Miettinen.
Light communication Use case: low latency audio in the cockpit
LC Usage Model Date: Authors: May 2018
McGraw-Hill Technology Education
Use Cases for Light Communications
Use Cases for Light Communications
Antti Miettinen (modified by JJ)
Xiuzhen Cheng Csci332 MAS Networks – Challenges and State-of-the-Art Research – Wireless Mesh Networks Xiuzhen Cheng
Light Communications Topic Interest Group July 2017 Closing Report
Developing Vehicular Data Cloud Services in the IoT Environment
Global megatrends (relevant for our business)
Light Communications considerations for lighting manufacturers
3.3 Mobile Digital Communication
Stable connection More secure More vulnerable to hacking Cheap set up costs Generally will have a good quality signal The connection is not as stable.
Security Ad-Hoc Report Draft
Presentation transcript:

Use Cases for Light Communications May 2015 doc.: IEEE 802.11-15/0496r1 November 2017 Use Cases for Light Communications Date: 2017-11-07 Author: Name Company Address Phone Email Mohammad Noshad VLNComm Inc noshad@vlncomm.com Xu Wang wang@vlncomm.com Mohammad Noshad (VLNComm) Edward Au (Marvell Semiconductor)

LC Use Cases Vehicle to Vehicle Communications November 2017 LC Use Cases Vehicle to Vehicle Communications Manufacturing and Harsh Environments Power Plants Nuclear Facilities LC for Secure Offices Some Calculation for the Security Risks of LC Mohammad Noshad (VLNComm)

Weaknesses of RF Networks November 2017 Weaknesses of RF Networks Vulnerable to a variety of cyber attacks such as man-in-the-middle attack (MITM), packet spoofing, packet injection, sniffing, unauthorized tapping and transfer Electromagnetic interference (EMI) in the instrumentation and control system (I&C System) to perform safety function Not reliable in a noisy environment Mohammad Noshad (VLNComm)

LC for V2V and V2X Communications November 2017 LC for V2V and V2X Communications V2V and V2X include inter and intra vehicle networks LC can help to reduce the interference between these networks Mohammad Noshad (VLNComm)

Manufacturing and Harsh Environments November 2017 LC Application in Manufacturing and Harsh Environments Wi-Fi cause interference on RF devices in these environments Large number of users and robots need to be connected to network Even wired networks are not completely practical due to the moving robots or arms Mohammad Noshad (VLNComm)

November 2017 The electro magnetic radiance from power generators, voltage converters and transmission lines cause interference on RF systems in power plants LC can provide a safe and reliable wireless communication technique, specially in emergency LC for Power Plants Mohammad Noshad (VLNComm)

LC for Nuclear Facilities November 2017 There are three major issues Electromagnetic compatibility (EMC) or interference (EMI) issues Cyber security Installation issues due to the type of the building structure In nuclear power plant control rooms, radio devices have been banned because of concerns about interference to the instrumentation and control equipment. NO Wi-Fi or Bluetooth is permitted. Wired network is costly and bulky A mesh network using of LED lights can reduce the pain LC for Nuclear Facilities Mohammad Noshad (VLNComm)

LC-based Wireless Sensor Networks in Nuclear Facilities November 2017 LC-based Wireless Sensor Networks in Nuclear Facilities In 2009, the Nuclear Regulatory Commission (NRC) issued a cyber security rule requiring licensees to provide high assurance that critical systems and networks are adequately protected from cyber attacks [10 CFR 73.54]. Although great effort has been spent to improve cyber security of RF wireless network technology such as Wi-Fi can still not be implemented everywhere in NPP. Mohammad Noshad (VLNComm)

LC-based Wireless Sensor Networks in Nuclear Facilities November 2017 LC-based Wireless Sensor Networks in Nuclear Facilities Measurement and control, condition monitoring, predictive maintenance, and management of operational transients and accidents Integrated networks of wireless sensors that can be used to measure parameters in order to improve process safety and efficiency, increase output, and optimize maintenance activities Mohammad Noshad (VLNComm)

November 2017 LC for Secure Offices LC is a reliable candidate for wireless connectivity in secure buildings The light leaked through windows and doors is can impose a security risk Mohammad Noshad (VLNComm)

SNR for Leaked Signals Through a Window November 2017 SNR for Leaked Signals Through a Window Mohammad Noshad (VLNComm)

SNR for Leaked Signals Through a Window November 2017 SNR for Leaked Signals Through a Window The risk is bigger at night Night Day Mohammad Noshad (VLNComm)

SNR for Leaked Signals Through a Window November 2017 SNR for Leaked Signals Through a Window Eavesdropper would need a huge lens to be able to get information from signals Mohammad Noshad (VLNComm)