SlideShare a Scribd company logo
@ IJTSRD | Available Online @ www.ijtsrd.com
ISSN No: 2456
International
Research
Li-Fi Security Issues and its Measures
Jason John D'souza
1,2
Bharati Vidyapeeth
Navi Mumbai
ABSTRACT
As we see in today's world, all institutes as well as
organizations are planning to shrink the size hardware
and are even trying to make it portable, olden days we
had local area network wires to transmit data over
devices then came in Wi-Fi which didn’t have wires
but was able to transmit data over devices but its
sources are usually wired an sometimes not portable
to every place and then now industries are planning to
implement li-fi which uses a simple light to transmit
data over devices users will just have to carry a small
light source which will transmit the data over devices
but what about the security measures to be taken that
needs to be considered. This paper analysis and
defines measures for those security issues faced in Li
fi technology. [1]
Keywords: LI-FI, network, data, security
I. INTRODUCTION
Wireless communication technology such as WI
very widely used for wireless communication services
and ubiquitous computing systems. These
technologies have evolved drastically which is the
main reason for our motivation. In Early days the
internet was made available to the user using a wired
Modem that used to modulate and de
signals coming from a wired transmission system,
After that came up the wireless technology termed as
Wi-Fi which uses Radio Frequency to transmit data
wirelessly, This technology uses a device known as
router which creates a hotspot area which means the
router becomes a informal data access point for
internet in the form of an invisible cloud. But Wi
generally suffers interference from Bluetooth devices,
microwave oven radiations, cordless telephones etc.
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume
International Journal of Trend in Scientific
Research and Development (IJTSRD)
International Open Access Journal
Security Issues and its Measures
Jason John D'souza1
, Seeza Franklin2
1
Student, 2
Professor
Bharati Vidyapeeth Institute of Management & Information Technology
Navi Mumbai, Maharashtra, India
As we see in today's world, all institutes as well as
to shrink the size hardware
and are even trying to make it portable, olden days we
had local area network wires to transmit data over
Fi which didn’t have wires
but was able to transmit data over devices but its
wired an sometimes not portable
to every place and then now industries are planning to
fi which uses a simple light to transmit
data over devices users will just have to carry a small
light source which will transmit the data over devices
what about the security measures to be taken that
needs to be considered. This paper analysis and
defines measures for those security issues faced in Li-
FI, network, data, security
Wireless communication technology such as WI-FI is
very widely used for wireless communication services
and ubiquitous computing systems. These
technologies have evolved drastically which is the
main reason for our motivation. In Early days the
s made available to the user using a wired
Modem that used to modulate and de-modulate the
signals coming from a wired transmission system,
After that came up the wireless technology termed as
Fi which uses Radio Frequency to transmit data
his technology uses a device known as
router which creates a hotspot area which means the
router becomes a informal data access point for
internet in the form of an invisible cloud. But Wi-Fi
generally suffers interference from Bluetooth devices,
oven radiations, cordless telephones etc.
In spite of several advantages and plus points Due to
disadvantages like the limit in the radio frequency
spectrum and the interference by various things A
new technology based on data transmission using the
light as a source and medium emerged. This
technology is Li-fi. In this paper we are going to talk
about this emerging technology called as light
(Li-fi) which is based of Visible Light
Communication (VLC) with its enhanced features. In
this paper we thoroughly go through the concepts,
security issues, all possible future opportunities of Li
fi technology and measures for the security of this
technology. [5]
II. OBSERVATION
1. The main objective of this paper is to aware about
issues arriving in Li-Fi.
2. Prevention measures taken by user or consumers.
3. Prevention measures taken by developers and
application developers.
4. Prevention measures taken by mobile hardware
companies.
III.CONCEPTS
Li-fi is a technology that is based on wireless optical
networking and it uses the LED's (Light Emitting
Diodes) for transmitting data in the form of light. The
Design of Li-fi has been developed particularly to use
the low power led blub so that its desig
very similar to trending energy
offices. But it works a bit differently. The LED used
in this technology is fitted to a controller chip which
is responsible to modulate the light and make it
suitable for data transmission in
transmitting work is done by the led and on the other
Jun 2018 Page: 2588
6470 | www.ijtsrd.com | Volume - 2 | Issue – 4
Scientific
(IJTSRD)
International Open Access Journal
nformation Technology,
In spite of several advantages and plus points Due to
disadvantages like the limit in the radio frequency
spectrum and the interference by various things A
new technology based on data transmission using the
ht as a source and medium emerged. This
fi. In this paper we are going to talk
about this emerging technology called as light-fidelity
fi) which is based of Visible Light
Communication (VLC) with its enhanced features. In
e thoroughly go through the concepts,
security issues, all possible future opportunities of Li-
fi technology and measures for the security of this
The main objective of this paper is to aware about
Prevention measures taken by user or consumers.
Prevention measures taken by developers and
Prevention measures taken by mobile hardware
fi is a technology that is based on wireless optical
networking and it uses the LED's (Light Emitting
Diodes) for transmitting data in the form of light. The
fi has been developed particularly to use
the low power led blub so that its design becomes
very similar to trending energy - conscious homes and
offices. But it works a bit differently. The LED used
in this technology is fitted to a controller chip which
is responsible to modulate the light and make it
suitable for data transmission in optical format. The
transmitting work is done by the led and on the other
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 2589
hand information is received and captured by
photoreceptors. Light Fidelity is a system including
VLC (visual light communication) that runs wire-free
communications that to at a great speed. The speed
can go up to 224GB (Gigabits) per second. This
Fascinating idea to transfer data using simple led was
first introduced by Harald Haas who was a professor
at University Edinburg in 2011. It is a Bi-Directional
technology and is Like Wi-Fi. It not only uses the
visible light sources but this technology can also make
use of the invisible but existing Ultraviolet and
infrared radiations. Fig 1 shows the abstract view of
how the data is first converted into bits and then
transferred in the form of zeros and ones.
Li-Fi operating range is 380nm to 780 nm Li-Fi
technology has the capacity to transfer data with the
speed which is 10000 times that of the traditional
radio spectrum; this is all achieved due to the use of
visible light spectrum. Li-Fi is just another form of
OWC (Optical Wireless Communication) that uses
only light as a carrier medium in order to provide very
high speed, networked and mobile communication
which sounds very similar to Wi-Fi. This technology
turns the led on to indicate signal 0(Zero) and turns
the led on to indicate the signal 1 (One), Hence the
information is totally converted into binary and
transmitted to the receiver by switching the led on and
off at such a high speed that human eyes cannot
recognize it. As we know the led blubs should be kept
on all the time to transmit data but we can suppress
this by making the light so dim that they are below the
human visibility range. [2]
IV. BENEFITS AND ADVANTAGES
Li-Fi will be used in sensitive electromagnetic areas
like hospitals, airplanes cabins and also the nuclear
plants that do not require any electromagnetic
interference. Li-Fi will also be able to transmit the
data using ultraviolet and infrared which makes it
unique. Li-Fi is limitless when it comes to capacity
whereas Wi-Fi has a limitation of capacity due to the
spectrum crisis. Li-Fi has 10000 times higher data
transfer rate then whole radio frequency band. The
maximum speed achieved by Li-Fi is about 224 Gbs.
Also in terms of cost Li-Fi is 10 times cheaper than
that of the existing Wi-Fi. As all of us use lights in
our daily life, Li-Fi can make use of this light to
transfer data, making it very efficient. Light bulbs are
available everywhere so availability of light bulbs
makes the availability of Li-Fi. One of the most
beautiful advantages of Li-fi is that light cannot pass
through walls and things which are opaque. So
anyone outside the room cannot try to breach the
security. This makes it very secure to limited areas
which will be an internal network. Li-Fi devices
require low power to operate and so they can be used
in vast IOT applications but those IOT must also
consider some security features. As Li-fi uses light it
is not harmful like the radio frequency spectrum. So
there is no issue regarding the health safety concerns
in the systems based on Li-Fi. As less energy is
consumed the amount of heating of devices has been
greatly reduced. These technologies are very easy to
install. Also the maintenance cost is very low as
compared to the Wi-Fi technology. Innumerable
number of streetlights can be converted to Li-Fi
threatening hotspot, also it does not require any
license. It also allows the multi user communication
feature. This technology has a very long service life
(10 years to 15 years). Data Density is very high in
Li-Fi. [3][4]
V. PROBLEMS FACED IN LI-FI
As Wi-Fi security is essential to deny access to the
unauthorized user which doesn’t allow access to them.
In the same way even Li-Fi requires security measures
to be taken care of so that unauthorized users don’t
get access to the data that is being transformed. As we
know that there are various types of securities in Wi-
Fi like WEP, WPA2, etc. Even Li-Fi has to take care
of many issues that can occur during data transfer.
Below are some issues that can be faced during
transfer of Li-Fi with measures to overcome those
issues. [6][7]
 Point To Point Transfer
As we know Led bulbs used for transmission of data
emits more amount of light and has a wider range
compared to other bulbs, hence can be accessible to
many users in that range even to those who doesn't
require it Hence for such scenario Li-Fi process can
use such led bulbs that has straight focus (not a wide
angle range where the transmitter bulbs will be in
point to point focus to the receiver. As the range is
reduced, an only user who wants to receive it will be
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 2590
able to receive it and rest available device won’t be
able to access it
 Login Password credentials
The most commonly used security measure of Wi-Fi
i.e. Authentication, where an individual user gets
username and password where only authorized users
get to access the data. In the same way use such kind
of security for Li-Fi too where a user gets a username
and password to access data from Li-Fi device and
rest who are not authorized doesn't get to access it.
 Specific Light (that differs from other Led Bulbs)
Li-Fi uses the standard led bulb to transfer its data to
other devices where it keeps on changing the
frequencies of the light according to signals that it
wants to send to other devices (the frequencies keeps
or varying by the source behind the bulb from where
the data is being transmitted). The receiver device on
the other end receives the light which it converts into
signals. Here the problem that might occur for
receiver is that suppose there are two led bulbs that
are present, the receiver device might flicker with
other bulb signals which will result to disrupted data
that is being received.
Hence we should take care that there should be a
proper distance between two Led bulbs the one that is
transmitting and the other normal led bulb which isn't,
by these the receiver will be able to receiver light
from one specific led only and will not be deflected
by other bulb.
 Transfer Within Room
Li-Fi cannot transmit within walls the way Wi-Fi
does, this disadvantage of Li-Fi can also be used as an
security measure where transmission will only be
done inside a particular space and the devices which
are not present inside the space will not be able to
access it.
 Encrypting and Decrypting Signals
Encryption and decryption of the data and then
transferring it over the light will be most feasible as
other device will not be able to interpret the data that
is being transferred. Only the device that has the key
to encrypt and decrypt it will be able to interpret it.
VI.Conclusion
Li-fi security is not that easy to achieve, some people
are still trying its implementation and applications
into different field but are not considering security
issues into it. As we know Li-fi security would be
more difficult than Wireless network security. We all
know that Li-fi is coming into existence hence no
protocols have been declared which will keep on
varying until its final application therefore we hope
that these flaws to be considered while creating your
Li-fi device and also its measures.
VII. REFERENCE
1. Whatis
https://whatis.techtarget.com/definition/LiFi
2. Techworld
https://www.techworld.com/data/what-is-li-fi-
everything-you-need-know-3632764/
3. Techopedia
https://www.techopedia.com/7/31772/technology-
trends/what-are-the-advantages-and-
disadvantages-of-li-fi-technology
4. PureLifi
https://purelifi.com/faq/how-is-lifi-more-secure-
than-other-wireless-technologies/
5. Wikipedia
https://en.wikipedia.org/wiki/Li-Fi
6. Cybermatters
https://cybermatters.info/2017/01/10/li-fi-security/
7. Quora
https://www.quora.com/What-are-some-current-
problems-with-Li-Fi-technology-that-need-to-be-
overcome-in-order-for-the-tech-to-become-more-
widespread

More Related Content

What's hot

Light Fidelity ( Li-Fi ) Seminar Report
Light Fidelity ( Li-Fi ) Seminar ReportLight Fidelity ( Li-Fi ) Seminar Report
Light Fidelity ( Li-Fi ) Seminar Report
Shamil Niju
 
Seminar report
Seminar reportSeminar report
Seminar report
Ashish Agarwal
 
Li-Fi kurdish seminar by teacher azad jabre
Li-Fi kurdish seminar by teacher azad jabreLi-Fi kurdish seminar by teacher azad jabre
Li-Fi kurdish seminar by teacher azad jabre
Azad Mzuri
 
Lifi
LifiLifi
The characteristic of li fi technology comparing with wi-fi
The characteristic of li fi technology comparing with wi-fiThe characteristic of li fi technology comparing with wi-fi
The characteristic of li fi technology comparing with wi-fi
zaidinvisible
 
Li Fi Technology
Li Fi TechnologyLi Fi Technology
Li Fi Technology
Sanjush Suresh
 
LI-FI
LI-FILI-FI
Comparison of LI-FI with Wireless Media
Comparison of LI-FI with Wireless MediaComparison of LI-FI with Wireless Media
Comparison of LI-FI with Wireless Media
IRJET Journal
 
LiFi technology
LiFi technologyLiFi technology
LiFi technology
Arunkumar Thangavel
 
Li fi alpna singh
Li fi  alpna singhLi fi  alpna singh
Li fi alpna singh
AlpnaSingh5
 
Li fi
Li fiLi fi
IRJET- Wireless Car using WIFI – IoT – Bluetooth
IRJET-  	  Wireless Car using WIFI – IoT – BluetoothIRJET-  	  Wireless Car using WIFI – IoT – Bluetooth
IRJET- Wireless Car using WIFI – IoT – Bluetooth
IRJET Journal
 
Li fi technology
Li fi technologyLi fi technology
Li fi technology
Chandan Kumar Satapathy
 
LIFI
LIFILIFI
Wifi and Lifi Technology
Wifi and Lifi TechnologyWifi and Lifi Technology
Wifi and Lifi Technology
Ummar Ahmed
 
Li-Fi technology in Wireless Communication
Li-Fi technology in Wireless CommunicationLi-Fi technology in Wireless Communication
Li-Fi technology in Wireless Communication
doddarangaiah
 
Lifi
Lifi Lifi
Seminar Report
Seminar ReportSeminar Report
Seminar Report
Anjeet Kumar
 
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
IRJET Journal
 
LIGHT FIDELITY - POV
LIGHT FIDELITY - POVLIGHT FIDELITY - POV
LIGHT FIDELITY - POV
denothankachan
 

What's hot (20)

Light Fidelity ( Li-Fi ) Seminar Report
Light Fidelity ( Li-Fi ) Seminar ReportLight Fidelity ( Li-Fi ) Seminar Report
Light Fidelity ( Li-Fi ) Seminar Report
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Li-Fi kurdish seminar by teacher azad jabre
Li-Fi kurdish seminar by teacher azad jabreLi-Fi kurdish seminar by teacher azad jabre
Li-Fi kurdish seminar by teacher azad jabre
 
Lifi
LifiLifi
Lifi
 
The characteristic of li fi technology comparing with wi-fi
The characteristic of li fi technology comparing with wi-fiThe characteristic of li fi technology comparing with wi-fi
The characteristic of li fi technology comparing with wi-fi
 
Li Fi Technology
Li Fi TechnologyLi Fi Technology
Li Fi Technology
 
LI-FI
LI-FILI-FI
LI-FI
 
Comparison of LI-FI with Wireless Media
Comparison of LI-FI with Wireless MediaComparison of LI-FI with Wireless Media
Comparison of LI-FI with Wireless Media
 
LiFi technology
LiFi technologyLiFi technology
LiFi technology
 
Li fi alpna singh
Li fi  alpna singhLi fi  alpna singh
Li fi alpna singh
 
Li fi
Li fiLi fi
Li fi
 
IRJET- Wireless Car using WIFI – IoT – Bluetooth
IRJET-  	  Wireless Car using WIFI – IoT – BluetoothIRJET-  	  Wireless Car using WIFI – IoT – Bluetooth
IRJET- Wireless Car using WIFI – IoT – Bluetooth
 
Li fi technology
Li fi technologyLi fi technology
Li fi technology
 
LIFI
LIFILIFI
LIFI
 
Wifi and Lifi Technology
Wifi and Lifi TechnologyWifi and Lifi Technology
Wifi and Lifi Technology
 
Li-Fi technology in Wireless Communication
Li-Fi technology in Wireless CommunicationLi-Fi technology in Wireless Communication
Li-Fi technology in Wireless Communication
 
Lifi
Lifi Lifi
Lifi
 
Seminar Report
Seminar ReportSeminar Report
Seminar Report
 
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
IRJET- Smart Campus an Android and Web based Application using IoT and NFC Te...
 
LIGHT FIDELITY - POV
LIGHT FIDELITY - POVLIGHT FIDELITY - POV
LIGHT FIDELITY - POV
 

Similar to Li-Fi Security Issues and its Measures

study paper on Li-Fi technology
study paper on Li-Fi technologystudy paper on Li-Fi technology
study paper on Li-Fi technology
Showrav Mazumder
 
Li-Fi Is the Next Generation of Secure Data Transmission Using IOT Devices
Li-Fi Is the Next Generation of Secure Data Transmission Using IOT DevicesLi-Fi Is the Next Generation of Secure Data Transmission Using IOT Devices
Li-Fi Is the Next Generation of Secure Data Transmission Using IOT Devices
IRJET Journal
 
Li Fi Technology Report
Li Fi Technology ReportLi Fi Technology Report
Li Fi Technology Report
PunithPrasad
 
SURVEY ON LI-FI TECHNOLOGY AND ITS APPLICATIONS
SURVEY ON LI-FI TECHNOLOGY AND ITS APPLICATIONSSURVEY ON LI-FI TECHNOLOGY AND ITS APPLICATIONS
SURVEY ON LI-FI TECHNOLOGY AND ITS APPLICATIONS
ijistjournal
 
B21CS180_SEMINAR (1).pptx
B21CS180_SEMINAR (1).pptxB21CS180_SEMINAR (1).pptx
B21CS180_SEMINAR (1).pptx
AdvithReddy2
 
LiFi technology
 LiFi technology  LiFi technology
LiFi technology
Brijesh Bharti
 
Li Fi Technology
Li Fi TechnologyLi Fi Technology
Li Fi Technology
PunithPrasad
 
How li fi technology is working is being presented.
How li fi technology is working is being presented.How li fi technology is working is being presented.
How li fi technology is working is being presented.
amanpandey7656
 
li fi ppt.pptx
li fi ppt.pptxli fi ppt.pptx
li fi ppt.pptx
Nandeesh23
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
somshekarkn64
 
Li fi light fidelity for the future generation
Li fi light fidelity for the future generationLi fi light fidelity for the future generation
Li fi light fidelity for the future generation
Sai Kumar
 
Li fi ppt
Li fi pptLi fi ppt
Li fi ppt
vishalhasnani
 
ppt on li-fi technology
ppt on li-fi technologyppt on li-fi technology
ppt on li-fi technology
Deepak Singh
 
Li fi technology
Li fi technologyLi fi technology
Li fi technology
Publicis Sapient
 
LI FI smart technology by DEBRAJ
LI FI smart technology by DEBRAJ LI FI smart technology by DEBRAJ
LI FI smart technology by DEBRAJ
DebrajMajumdar2
 
Li Fi Technology
Li Fi TechnologyLi Fi Technology
Li Fi Technology
PunithPrasad
 
Lifi Technology
Lifi TechnologyLifi Technology
Lifi Technology
Subhrajit Sadhukhan
 
Lifi technology
Lifi technologyLifi technology
Lifi technology
Debabrata Mohanta
 
Li fi by anoop
Li fi by anoopLi fi by anoop
Li fi by anoop
Anoop Kumar
 
Li fi technology by mandaji sai kumar 475
Li fi technology by mandaji sai kumar 475Li fi technology by mandaji sai kumar 475
Li fi technology by mandaji sai kumar 475
Sai Kumar Mandaji
 

Similar to Li-Fi Security Issues and its Measures (20)

study paper on Li-Fi technology
study paper on Li-Fi technologystudy paper on Li-Fi technology
study paper on Li-Fi technology
 
Li-Fi Is the Next Generation of Secure Data Transmission Using IOT Devices
Li-Fi Is the Next Generation of Secure Data Transmission Using IOT DevicesLi-Fi Is the Next Generation of Secure Data Transmission Using IOT Devices
Li-Fi Is the Next Generation of Secure Data Transmission Using IOT Devices
 
Li Fi Technology Report
Li Fi Technology ReportLi Fi Technology Report
Li Fi Technology Report
 
SURVEY ON LI-FI TECHNOLOGY AND ITS APPLICATIONS
SURVEY ON LI-FI TECHNOLOGY AND ITS APPLICATIONSSURVEY ON LI-FI TECHNOLOGY AND ITS APPLICATIONS
SURVEY ON LI-FI TECHNOLOGY AND ITS APPLICATIONS
 
B21CS180_SEMINAR (1).pptx
B21CS180_SEMINAR (1).pptxB21CS180_SEMINAR (1).pptx
B21CS180_SEMINAR (1).pptx
 
LiFi technology
 LiFi technology  LiFi technology
LiFi technology
 
Li Fi Technology
Li Fi TechnologyLi Fi Technology
Li Fi Technology
 
How li fi technology is working is being presented.
How li fi technology is working is being presented.How li fi technology is working is being presented.
How li fi technology is working is being presented.
 
li fi ppt.pptx
li fi ppt.pptxli fi ppt.pptx
li fi ppt.pptx
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
 
Li fi light fidelity for the future generation
Li fi light fidelity for the future generationLi fi light fidelity for the future generation
Li fi light fidelity for the future generation
 
Li fi ppt
Li fi pptLi fi ppt
Li fi ppt
 
ppt on li-fi technology
ppt on li-fi technologyppt on li-fi technology
ppt on li-fi technology
 
Li fi technology
Li fi technologyLi fi technology
Li fi technology
 
LI FI smart technology by DEBRAJ
LI FI smart technology by DEBRAJ LI FI smart technology by DEBRAJ
LI FI smart technology by DEBRAJ
 
Li Fi Technology
Li Fi TechnologyLi Fi Technology
Li Fi Technology
 
Lifi Technology
Lifi TechnologyLifi Technology
Lifi Technology
 
Lifi technology
Lifi technologyLifi technology
Lifi technology
 
Li fi by anoop
Li fi by anoopLi fi by anoop
Li fi by anoop
 
Li fi technology by mandaji sai kumar 475
Li fi technology by mandaji sai kumar 475Li fi technology by mandaji sai kumar 475
Li fi technology by mandaji sai kumar 475
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 

Recently uploaded (20)

How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 

Li-Fi Security Issues and its Measures

  • 1. @ IJTSRD | Available Online @ www.ijtsrd.com ISSN No: 2456 International Research Li-Fi Security Issues and its Measures Jason John D'souza 1,2 Bharati Vidyapeeth Navi Mumbai ABSTRACT As we see in today's world, all institutes as well as organizations are planning to shrink the size hardware and are even trying to make it portable, olden days we had local area network wires to transmit data over devices then came in Wi-Fi which didn’t have wires but was able to transmit data over devices but its sources are usually wired an sometimes not portable to every place and then now industries are planning to implement li-fi which uses a simple light to transmit data over devices users will just have to carry a small light source which will transmit the data over devices but what about the security measures to be taken that needs to be considered. This paper analysis and defines measures for those security issues faced in Li fi technology. [1] Keywords: LI-FI, network, data, security I. INTRODUCTION Wireless communication technology such as WI very widely used for wireless communication services and ubiquitous computing systems. These technologies have evolved drastically which is the main reason for our motivation. In Early days the internet was made available to the user using a wired Modem that used to modulate and de signals coming from a wired transmission system, After that came up the wireless technology termed as Wi-Fi which uses Radio Frequency to transmit data wirelessly, This technology uses a device known as router which creates a hotspot area which means the router becomes a informal data access point for internet in the form of an invisible cloud. But Wi generally suffers interference from Bluetooth devices, microwave oven radiations, cordless telephones etc. @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal Security Issues and its Measures Jason John D'souza1 , Seeza Franklin2 1 Student, 2 Professor Bharati Vidyapeeth Institute of Management & Information Technology Navi Mumbai, Maharashtra, India As we see in today's world, all institutes as well as to shrink the size hardware and are even trying to make it portable, olden days we had local area network wires to transmit data over Fi which didn’t have wires but was able to transmit data over devices but its wired an sometimes not portable to every place and then now industries are planning to fi which uses a simple light to transmit data over devices users will just have to carry a small light source which will transmit the data over devices what about the security measures to be taken that needs to be considered. This paper analysis and defines measures for those security issues faced in Li- FI, network, data, security Wireless communication technology such as WI-FI is very widely used for wireless communication services and ubiquitous computing systems. These technologies have evolved drastically which is the main reason for our motivation. In Early days the s made available to the user using a wired Modem that used to modulate and de-modulate the signals coming from a wired transmission system, After that came up the wireless technology termed as Fi which uses Radio Frequency to transmit data his technology uses a device known as router which creates a hotspot area which means the router becomes a informal data access point for internet in the form of an invisible cloud. But Wi-Fi generally suffers interference from Bluetooth devices, oven radiations, cordless telephones etc. In spite of several advantages and plus points Due to disadvantages like the limit in the radio frequency spectrum and the interference by various things A new technology based on data transmission using the light as a source and medium emerged. This technology is Li-fi. In this paper we are going to talk about this emerging technology called as light (Li-fi) which is based of Visible Light Communication (VLC) with its enhanced features. In this paper we thoroughly go through the concepts, security issues, all possible future opportunities of Li fi technology and measures for the security of this technology. [5] II. OBSERVATION 1. The main objective of this paper is to aware about issues arriving in Li-Fi. 2. Prevention measures taken by user or consumers. 3. Prevention measures taken by developers and application developers. 4. Prevention measures taken by mobile hardware companies. III.CONCEPTS Li-fi is a technology that is based on wireless optical networking and it uses the LED's (Light Emitting Diodes) for transmitting data in the form of light. The Design of Li-fi has been developed particularly to use the low power led blub so that its desig very similar to trending energy offices. But it works a bit differently. The LED used in this technology is fitted to a controller chip which is responsible to modulate the light and make it suitable for data transmission in transmitting work is done by the led and on the other Jun 2018 Page: 2588 6470 | www.ijtsrd.com | Volume - 2 | Issue – 4 Scientific (IJTSRD) International Open Access Journal nformation Technology, In spite of several advantages and plus points Due to disadvantages like the limit in the radio frequency spectrum and the interference by various things A new technology based on data transmission using the ht as a source and medium emerged. This fi. In this paper we are going to talk about this emerging technology called as light-fidelity fi) which is based of Visible Light Communication (VLC) with its enhanced features. In e thoroughly go through the concepts, security issues, all possible future opportunities of Li- fi technology and measures for the security of this The main objective of this paper is to aware about Prevention measures taken by user or consumers. Prevention measures taken by developers and Prevention measures taken by mobile hardware fi is a technology that is based on wireless optical networking and it uses the LED's (Light Emitting Diodes) for transmitting data in the form of light. The fi has been developed particularly to use the low power led blub so that its design becomes very similar to trending energy - conscious homes and offices. But it works a bit differently. The LED used in this technology is fitted to a controller chip which is responsible to modulate the light and make it suitable for data transmission in optical format. The transmitting work is done by the led and on the other
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 2589 hand information is received and captured by photoreceptors. Light Fidelity is a system including VLC (visual light communication) that runs wire-free communications that to at a great speed. The speed can go up to 224GB (Gigabits) per second. This Fascinating idea to transfer data using simple led was first introduced by Harald Haas who was a professor at University Edinburg in 2011. It is a Bi-Directional technology and is Like Wi-Fi. It not only uses the visible light sources but this technology can also make use of the invisible but existing Ultraviolet and infrared radiations. Fig 1 shows the abstract view of how the data is first converted into bits and then transferred in the form of zeros and ones. Li-Fi operating range is 380nm to 780 nm Li-Fi technology has the capacity to transfer data with the speed which is 10000 times that of the traditional radio spectrum; this is all achieved due to the use of visible light spectrum. Li-Fi is just another form of OWC (Optical Wireless Communication) that uses only light as a carrier medium in order to provide very high speed, networked and mobile communication which sounds very similar to Wi-Fi. This technology turns the led on to indicate signal 0(Zero) and turns the led on to indicate the signal 1 (One), Hence the information is totally converted into binary and transmitted to the receiver by switching the led on and off at such a high speed that human eyes cannot recognize it. As we know the led blubs should be kept on all the time to transmit data but we can suppress this by making the light so dim that they are below the human visibility range. [2] IV. BENEFITS AND ADVANTAGES Li-Fi will be used in sensitive electromagnetic areas like hospitals, airplanes cabins and also the nuclear plants that do not require any electromagnetic interference. Li-Fi will also be able to transmit the data using ultraviolet and infrared which makes it unique. Li-Fi is limitless when it comes to capacity whereas Wi-Fi has a limitation of capacity due to the spectrum crisis. Li-Fi has 10000 times higher data transfer rate then whole radio frequency band. The maximum speed achieved by Li-Fi is about 224 Gbs. Also in terms of cost Li-Fi is 10 times cheaper than that of the existing Wi-Fi. As all of us use lights in our daily life, Li-Fi can make use of this light to transfer data, making it very efficient. Light bulbs are available everywhere so availability of light bulbs makes the availability of Li-Fi. One of the most beautiful advantages of Li-fi is that light cannot pass through walls and things which are opaque. So anyone outside the room cannot try to breach the security. This makes it very secure to limited areas which will be an internal network. Li-Fi devices require low power to operate and so they can be used in vast IOT applications but those IOT must also consider some security features. As Li-fi uses light it is not harmful like the radio frequency spectrum. So there is no issue regarding the health safety concerns in the systems based on Li-Fi. As less energy is consumed the amount of heating of devices has been greatly reduced. These technologies are very easy to install. Also the maintenance cost is very low as compared to the Wi-Fi technology. Innumerable number of streetlights can be converted to Li-Fi threatening hotspot, also it does not require any license. It also allows the multi user communication feature. This technology has a very long service life (10 years to 15 years). Data Density is very high in Li-Fi. [3][4] V. PROBLEMS FACED IN LI-FI As Wi-Fi security is essential to deny access to the unauthorized user which doesn’t allow access to them. In the same way even Li-Fi requires security measures to be taken care of so that unauthorized users don’t get access to the data that is being transformed. As we know that there are various types of securities in Wi- Fi like WEP, WPA2, etc. Even Li-Fi has to take care of many issues that can occur during data transfer. Below are some issues that can be faced during transfer of Li-Fi with measures to overcome those issues. [6][7]  Point To Point Transfer As we know Led bulbs used for transmission of data emits more amount of light and has a wider range compared to other bulbs, hence can be accessible to many users in that range even to those who doesn't require it Hence for such scenario Li-Fi process can use such led bulbs that has straight focus (not a wide angle range where the transmitter bulbs will be in point to point focus to the receiver. As the range is reduced, an only user who wants to receive it will be
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 2590 able to receive it and rest available device won’t be able to access it  Login Password credentials The most commonly used security measure of Wi-Fi i.e. Authentication, where an individual user gets username and password where only authorized users get to access the data. In the same way use such kind of security for Li-Fi too where a user gets a username and password to access data from Li-Fi device and rest who are not authorized doesn't get to access it.  Specific Light (that differs from other Led Bulbs) Li-Fi uses the standard led bulb to transfer its data to other devices where it keeps on changing the frequencies of the light according to signals that it wants to send to other devices (the frequencies keeps or varying by the source behind the bulb from where the data is being transmitted). The receiver device on the other end receives the light which it converts into signals. Here the problem that might occur for receiver is that suppose there are two led bulbs that are present, the receiver device might flicker with other bulb signals which will result to disrupted data that is being received. Hence we should take care that there should be a proper distance between two Led bulbs the one that is transmitting and the other normal led bulb which isn't, by these the receiver will be able to receiver light from one specific led only and will not be deflected by other bulb.  Transfer Within Room Li-Fi cannot transmit within walls the way Wi-Fi does, this disadvantage of Li-Fi can also be used as an security measure where transmission will only be done inside a particular space and the devices which are not present inside the space will not be able to access it.  Encrypting and Decrypting Signals Encryption and decryption of the data and then transferring it over the light will be most feasible as other device will not be able to interpret the data that is being transferred. Only the device that has the key to encrypt and decrypt it will be able to interpret it. VI.Conclusion Li-fi security is not that easy to achieve, some people are still trying its implementation and applications into different field but are not considering security issues into it. As we know Li-fi security would be more difficult than Wireless network security. We all know that Li-fi is coming into existence hence no protocols have been declared which will keep on varying until its final application therefore we hope that these flaws to be considered while creating your Li-fi device and also its measures. VII. REFERENCE 1. Whatis https://whatis.techtarget.com/definition/LiFi 2. Techworld https://www.techworld.com/data/what-is-li-fi- everything-you-need-know-3632764/ 3. Techopedia https://www.techopedia.com/7/31772/technology- trends/what-are-the-advantages-and- disadvantages-of-li-fi-technology 4. PureLifi https://purelifi.com/faq/how-is-lifi-more-secure- than-other-wireless-technologies/ 5. Wikipedia https://en.wikipedia.org/wiki/Li-Fi 6. Cybermatters https://cybermatters.info/2017/01/10/li-fi-security/ 7. Quora https://www.quora.com/What-are-some-current- problems-with-Li-Fi-technology-that-need-to-be- overcome-in-order-for-the-tech-to-become-more- widespread