Secure Visible Light Communication by Caser Cipher and Spiral Wheel Algorithm

International Journal of Computer Trends and Technology (IJCTT)          
© 2018 by IJCTT Journal
Volume-59 Number-1
Year of Publication : 2018
Authors : Komal Kumari Agrawal , Vishal Shrivastava


Komal Kumari Agrawal , Vishal Shrivastava "Secure Visible Light Communication by Caser Cipher and Spiral Wheel Algorithm". International Journal of Computer Trends and Technology (IJCTT) V59(1):44-51, May 2018. ISSN:2231-2803. Published by Seventh Sense Research Group.

Due to growing congestion of the RF spectrum and its adverse health effects on humans as well as plants and animals, alternate way of communication are constantly sought. Light-Fidelity (Li-Fi) is a Visual Light Communication and has remained a prime research topic over past years. However security aspects related to data transmission are often neglected. The paper proposes a data security algorithm based on Caesar Cipher and novel Spiral wheel algorithm. The new Spiral Wheel encryption technique based on substitution of ASCII value of characters in reliable data transmission across Li-Fi system is successfully implemented on Li-Fi hardware, which is constructed on ArduinoUNO microcontroller .The results convey the reliability and efficiency of developed algorithm.

[1]ThiloFath and Harald Haas, “Performance Comparison of MIMO Techniques for Optical Wireless Communications in Indoor Environments”, IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 2, FEBRUARY 2013.
[2] H.Haas,LiFi is a paradigm-shifting 5G technology,
[3] V.Thayananthan,O. Abdulkader, K. Jambi andK. A. Bamahdi,Analysis of Cybersecurity based on Li-Fi in green data storage environments,978-1-5090-6644-5/17 2017 IEEE.
[4]Yu Gong, MatteoFiorani, and SlavisaAleksic, “Optical Interconnects at the Top of the Rack for Energy-Efficient Data Centers”, IEEE Communications Magazine, pp. 140-148, August 2015
[5]TasfiaTasbin, AvijitHira, “Optical Wireless Data Transmission with Enhanced Substitution Caesar Cipher Wheel Encryption”, International Conference on Electrical, Computer and Communication Engineering (ECCE), February 16-18, 2017.
[6] A. Mishra, “Enhancing Security of Caser Cipher using Different Methods,” in International Journal of Research in Engineering and Technology.
[7] K. Goyal, S. Kinger “Modified Caesar Cipher for Better Security Enhancement” in International Journal of Computer Applications, July 2013.
[8] U. Singh, U. Garg “An ASCII value-based text data encryption System” in International Journal of Scientific and Research Publications, November 2013.
[9] M. Lavanya1, “An Encryption Algorithm Functioning on ASCII Values and Random Number Generation”in Indian Journal of Science and Technology, Vol 8(35), December 2015.
[10] Charru, P. Singh, S. Rani “Efficient Text Data Encryption System to Optimize Execution Time and Data Security” in International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 7, July 2014.
[11] Atish Jain, RonakDedhia, AbhijitPatil “Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication” in International Journal of Computer Applications, November2015.
[12] Satyajeet R. Shinge, Rahul Patil “An Encryption Algorithm Based on ASCII Value of Data” in International Journal ofComputer Science and Information Technologies.
[13]PriyaVerma, Gurjot Singh Gaba “Coherent Caesar Cipher for Resource Constrained Devices” in International Journal of Security and Its Applications, 2016.
[14] Ochoche Abraham, Ganiyu O. Shefiu “An improved Caesar cipher (ICC) algorithm” in International Journal of Engineering Science & Advanced Technology.
[15] S G Srikantaswamy and Dr. H D Phaneendra“ImprovedCaesar cipher with random number generation technique and multi stage encryption” in International Journal on Cryptography and Information Security (IJCIS), December 2012.
[16] Himanshu Gupta and Vinod Kumar Sharma “Multiphase Encryption: A NewConcept in Modern Cryptography” in Multiphase Encryption: A New Concept in Modern Cryptography International Journal of Computer Theory and Engineering, August 2013.
[17]Priyanka V. Deshmukh, Netra R. Bujad,Prof. SachinSonawane “Secure Encryption and Decryption using Play Color Cipher” in National Conference on Technological Advancement and Automatization in Engineering, January 2016.
[18] AsiyaAbdus Salam, Ruba Mahmoud Al Salah “Vertically Scrambled Caesar Cipher Method” in International Journal of Computer Applications, May 2015.
[19]AbikoyeOluwakemi, AdewoleKayode, OladipupoAyotunde “Efficient Data Hiding System using Cryptography and Steganography” in International Journal of Applied Information Systems (IJAIS), ISSN: 2249-0868, December 2012.
[20]WalidAbdallah and NoureddineBoudriga “Enabling 5G Wireless Access Using Li-Fi Technology: An OFDM Based Approach” in Communication Networks and Security Research Lab, 2016.
[21]Shiv Shakti “Encryption Using Different Techniques” in International Journal in Multidisciplinary and Academic Research, February-2013(ISSN 2278 – 5973).
[22]Naoki Nishikawa, Keisuke Iwai and TakakazuKurokawa “High-Performance Symmetric Block Ciphers on CUDA” in Second International Conference on Networking and Computing, 2011.
[23]ManishaYadav, Mauli Joshi, Akshita “Improved Secure Data Transfer Using Tiny Encryption Algorithm and Video Steganography” in International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128, December 2013.
[24]Tang Songsheng, Ma Xianzhen “Research of typical block cipher algorithms” in International Conference on Computer, Mechatronics, Control and Electronic Engineering, 2010.
[25]P. Kuppusamy,S. Muthuraj, and “Survey and Challenges of Li-Fi with Comparison of Wi-Fi”,978-1-4673-9338-6/162016 IEEE.

light fidelity , security, key, encryption, decryption.