Electronics: The Concept Regarding Vehicular Communications Based On Visible Light Communication and The Iot
Electronics: The Concept Regarding Vehicular Communications Based On Visible Light Communication and The Iot
Article
The Concept regarding Vehicular Communications Based on
Visible Light Communication and the IoT
Eduard Zadobrischi 1,2
1 Integrated Center for Research, Development and Innovation in Advanced Materials, Nanotechnologies,
and Distributed Systems for Fabrication and Control, Stefan cel Mare University of Suceava,
720229 Suceava, Romania; [email protected]
2 Department of Computers, Electronics and Automation, Stefan cel Mare University of Suceava,
720229 Suceava, Romania
Figureof1.the
Figure 1. Illustration Illustration of the mostscenarios
most representative representative scenarios and
and applications applications
that use visiblethat use visible
light
communication.
communication.
wireless communications. The activation of 5G wireless access using Li-Fi technology was
addressed in [25] based on OFDM, demonstrating speeds of 200–300 kbps. Many of the
challenges related to VLC, as well as the potential it has for industrial applications, were
presented in [26], along with other concepts. Another review can be found in [27] that
discusses various aspects and contributions, as well as providing an ensemble presentation,
including aspects related to the optical IoT (OIoT). One new approach in V2V technology
is the use of light fidelity (Li-Fi), which is an alternative medium in data transmission.
The capacity of this technology to send data over an optical medium wirelessly using
light-emitting diodes that propagate the signal makes it very promising. In the case of Li-Fi
technology, data are extracted from the vehicle and spread via headlights or stoplights
to other traffic participants or infrastructure, but there are many challenges related to
bandwidth and data latencies. As shown in Figure 2, Li-Fi systems are composed of
luminous media (LEDs) that transmit data and information, and the receiving system is
based on a photo-detector that processes the data and analyzes the obtained signal. It is
imperative to implement systems of this type because the actions that traffic participants
take are based on information obtained from other vehicles and involve short durations of
time and extremely low-validity data. Thus, in the case of systems of this type, GPS and
Wi-Fi units are not necessary because Li-Fi technology can use interface or PIC controllers
Electronics 2023, 12, x FOR PEER REVIEW 6
to emit tiny pulses of sound, which can penetrate barriers and be employed with straight
roads or those of the T-junction type [24].
Figure
Figure 2. Illustration 2. Illustration
regarding regarding
the fields the fields of within
of communication communication
VANETs.within VANETs.
commercial implementation, it is clear that the terahertz (THz) band is the next frontier of
communications. Summaries of all the RF techniques are provided in Table 1, where we
show how they can be used under different traffic density conditions, and in Table 2, where
other related work is addressed.
The proposed solution could make major contributions to the emergency transmission
of priority messages, the avoidance of road accidents, and the safety and security of data.
In all these processes, it is extremely important to also consider the adoption of vehicular
ad hoc network (VANET) technology, which can guarantee the safety of vehicles and
transmits information through central roadside units (RSUs) or electronic control units
(ECUs) that can pre-secure data with up to six encryption cycles [42]. With vehicular ad hoc
networks (VANETs), it is possible to manage multiple vehicles that have on-board units
or roadside units, as illustrated in Figure 2. Further measures at the security level could
involve Euclidean distance calculation components, which can provide data on the distance
between vehicles and RSUs or on the occurrence of adverse events at the edge of the road
surface. Therefore, the protocols used to secure data could be based on event detection
crawling and information filtering procedures, sending the data only through repetitive
loops to the RSU-type units or concatenating the input data with the output data to encrypt
them. If an accident is detected, the system sends the information to nearby vehicles and,
through a filtering process that also uses an advanced driver-assistance system (ADAS),
implements assistance processes, even providing traffic updates. Data are pre-swapped
and routed through band-switching to ensure security and privacy, then initialized and
keyed into the cloud. Any sudden change in the amount of data or any data modification
result in a software trigger that processes each routine and compares it with the additional
sets [43,44].
Electronics 2023, 12, 1359 6 of 17
2.1.
2.1. Li-Fi
Li-Fi Communication
Communication System
SystemProposal
Proposal
The
The most
most important
important advantage
advantage that that this
this new
new Li-Fi
Li-Fi technology
technology brings
brings toto the
the field
field of
of
communications
communicationsisisgreater
greatersecurity
securitythrough
throughthe thelower
lowerradius
radiusof ofthe
thecoverage
coveragearea,area,asaswell
well
as
asdata
dataencoding.
encoding. AsAs aa consequence
consequence of of limiting
limiting thethecoverage
coverage area,
area,VLC
VLCcannot
cannotpenetrate
penetrate
opaque
opaque surfaces or obstacles, even when geographically limited. In addition, VLC systems
surfaces or obstacles, even when geographically limited. In addition, VLC systems
can
canemploy
employconnectivity
connectivity based
based ononunique
unique IDsIDs to
toencrypt
encryptthe theinformation
information in in aa format
format that
that
can
can only be decoded
only be decoded withwithananadapted
adaptedreceiver.
receiver.Therefore,
Therefore, thisthis approach
approach is extremely
is extremely im-
important
portant inin termsofofthe
terms thesecurity
securityandandintegrity
integrityof ofdata
data communication,
communication, both both for
for users
users and
and
within
withinvehicular
vehicularnetworks.
networks. In In the
the design
design process
process forforaaVLC
VLCsystem,
system,thethetransmitter
transmitter isisnot not
necessarily the central component, although it is important for the communication
necessarily the central component, although it is important for the communication pro- process,
but
cess,anbut
extremely volatile
an extremely and important
volatile and importantpart of theofsystem
part restsrests
the system on the
onshoulders
the shoulders of the
of
receiver. This idea was deduced from the specialized literature [45,46] (see
the receiver. This idea was deduced from the specialized literature [45,46] (see Figure 3). Figure 3).
Figure3.3. Illustration
Figure Illustrationpresenting
presentingLi-Fi
Li-Fitechnology
technologyand
andits
itsgeneral
generalutility.
utility.
The IEEE
The IEEE 802.15.7
802.15.7 standard
standard provides
provides additional
additional functions,
functions, some of which are com-
plementary to lighting
plementary lighting devices,
devices,and,
and,ininthis case,
this they
case, do do
they notnot
negatively influence
negatively influencethe pro-
the
cess [47].[47].
process EvenEven
if these systems
if these have to
systems be able
have to betoable
provide both lighting
to provide and dataand
both lighting commu-
data
nication, they must
communication, theynot
mustinduce a flickering
not induce effecteffect
a flickering perceptible to thetohuman
perceptible eye, eye,
the human and and
it is
itnecessary
is necessary to implement
to implement functions
functions capable
capable ofof diminishingthe
diminishing thelight
lightintensity
intensityifif this
this is re-
quired.
quired.Hardware
Hardwareand andsoftware
software solutions have
solutions beenbeen
have found for this
found forproblem. Figure Figure
this problem. 4 shows4
a complete VLC diagram, as well as a way to secure the communication. The diagram
includes an ARM Cortex M7 microcontroller component with a frequency of 1008 MHz,
which is the central element around which the entire system gravitates. The basic function
of the microcontroller is to transmit the data and transform/demodulate them to obtain a
continuous stream of information/bitstream [48,49].
Thus, the microcontroller facilitates the processing, encoding, modulation, and con-
touring of bit matrices to expose them and transmit them further. Through the prism of its
versatility, its performance and data security can be substantially improved, including by
using on–off keying (OOK) at the emission and modulation side. The improved security
process is also based on the central anti-flicker aspect; the VLC transmitter runs a code
based on unique IDs and a run-length-limited (RLL) code, which can overlap the logic
levels “1” and “0” at the same light intensity. Encrypting data by using security keys with
unique IDs assigned to each data matrix also increases the data transmission speed and the
instantiation capacity; in some cases, the speeds are around 250–300 kb/s [50]. To validate
the security process carried out, the GVLC comparator structured based on the message
intent iterates a log with the purpose of validating the receiver as a part of the system;
everything is undertaken based on unique IDs. Subsequently, the message header provides
the VLC receiver with information regarding the modulation technique, coding, transfer
rate, and length of the message, aspects that ultimately validate the communication and
security process. The instance frame contains all the transmitted data, and it is followed
As shown by communications tests, the intermittency of the signals between data
frames also facilitates the implementation of an additional security protocol. The top mi-
crocontroller component can generate data and transmit them to other devices, but, at the
same time, it can be interfaced with other devices through CAN, I2C, or SPI ports, which
increases the safety and veracity of the information [51]. Regarding the level of frame data
Electronics 2023, 12, 1359 7 of 17
and the data quantity, solutions related to the cadence of the data transmission can be
established with the help of an LED driver. The generation of the light beam that contains
that data is related to the dynamics of the environment and the data quantity; the light
by a stop and
contains validate
the data that header,
must bethe purposetoofthe
provided which is to and
receiver, inform
thethe VLC
data takereceiver
a path that the
through
data have arrived.
the optical channel in free space (see Figure 4).
the identifiers being encrypted at the level of the internal stack without generating an exact
reference to a specific device and constantly reinitialized every time they are reintegrated
into the system. Regarding the security protocol for VLC-based networks such as Li-Fi,
the process by which this occurs takes places in several stages. Devices are verified before
connecting to the network and, if a device is in range, it receives a query asking for an
access code and its verification leads to the first process. When the code is valid, the data
are checked for identifiers and for whether there have been any previous logins. When
the device authenticates and authorizes itself, the data are encrypted and sent within the
network, with the traffic on that network being constantly monitored. In addition to these
aspects, there are functions dedicated to the additional protection of the network from
possible external attacks or penetrations.
Therefore, encrypting and transmitting data through a Li-Fi-type network can be
achieved using a symmetric encryption algorithm. A symmetric encryption algorithm
is based on the use of unique keys that encrypt and decrypt data. In a Li-Fi network,
these keys are generated and distributed across the network to all devices. One example
of an algorithm based on symmetric encryption is the advanced encryption standard
(AES). According to specialist studies, it is considered one of the most viable and powerful
algorithmic structures in terms of symmetric encryption, and it is used in more and more
security standards and, now, in VLC [54].
The structure in this case could be implemented according to the following steps:
(a) The header is initialized and a cryptographic key is generated for each ID (i.e., for
each device on the network or each device that should connect to it);
(b) The AES algorithm is used to encrypt the data and transmit them via the Li-Fi network;
(c) The unique cryptographic keys are then sent to the connected devices to enable the
decryption of the received data. Their form being that of the MD5 hash function,
the unique identifier generated for each vehicle in the network can be inserted into
their headers;
(d) The keys are used to decrypt the data when they are received by the connected device.
The existence of new technologies dedicated to cryptography has a direct connection
with quantum cryptography, which is advancing quickly around the world. Specifically,
quantum cryptography involves quantum key distribution (QKD) and subsequent redistri-
bution of a cryptographic key. Later, the degree of security can be proven by using new
instantiations on the bases of computational complexity and processing with emerging
quantum computers [55]. In QKD, the quantum key can be exchanged between network
users in the form of light to increase security. When quantum sequences are iterated, they
are measured post-processing to generate identical keys on both sides of the network. A
first step in this direction is the QuINSiDa project, which is the first to incorporate a “QKD
over Li-Fi”-type system [56]. This aspect makes QKD data transfer possible, which is
more widely used in communications between buildings and offices. The project aims to
demonstrate that a quantization-based data communication network can be flexible in its
secure backbone infrastructure and can make the step to the vehicular area. In summary,
the project aims to realize wireless data communication in a point-to-point scenario but,
at the same time, simultaneously secure all individual communication channels through
quantum keys [57].
An extremely important aspect in any network is maintaining the confidentiality of
the generated key at all times and, in cases where new external connections are introduced,
generating authentication keys after a certain time interval. The security of wireless
networks and their data security routines are based on encrypted connections centered
on protocols for data transmission, such as WPA2 or WP3. Another aspect of security is
related to the use of firewalls, which limit access to networks and, at the same time, do not
let external entities connect. In addition, two- or three-step authentication systems can be
used to increase safety.
For our proposal regarding securing Li-Fi data communication networks for vehicles,
we considered aspects related to the creation of an encryption and decryption algorithm
Electronics 2023, 12, 1359 9 of 17
to limit access to the infrastructure created. Li-Fi networks offer a high degree of security
because this technology is bidirectional and can only be accessed through certain decoding
procedures with dedicated systems. There are no generally valid programming languages
that can be used to create security protocols in Li-Fi networks or to define a security standard
to date. Therefore, this approach is extremely important for the scientific environment and,
as a result of the experience accumulated in this field, presents a viable alternative through
which this technology will soon be able to branch out into more fields. Even if technological
advances favor communication based on the 802.11 p/a standard, 4G, 5G, and even 6G, the
complementarity and usefulness of VLC are undeniable [58,59].
The encryption and formation of a security protocol at the physical level in a data
network based on VLC could have the following structure (Algorithm 1).
Algorithm 1: Pseudocode for the encryption process for data at the physical level of the network.
from vlc_supp
import SEC1_SUPP
vlc = SEC1_SUPP(lifi0)
vlc.set_network(‘usr’, ‘pass’, Li-Fi1#!2)
vlc.enable_network()
Algorithm 2: Pseudocode for the import and filtering of access data for the generated address.
from ipvlctables import Iptablesvlc
ipt = Ipvlctables()
ipt.block_all_trafficvlc()
ipt.allow_traffic(100.100.1.0/88)
Analysis of the Security Process and the Threats to Which the Network Is Exposed
When there are security and privacy concerns, in order to ensure reliable communica-
tion between the sender and the recipient, we need to perform certain tests that can give
us feedback on the VLC’s compliance with the requirements imposed by other wireless
systems. Therefore, the system proposed in this study aims to provide protection against
external connections and rejects data assignment to other users outside the network or
who may compromise the network. The proposed system does not fully behave like a
commercial Internet network but, as shown by the simulation process, it provides the most
important features: authenticity, confidentiality, integrity, and availability.
The authenticity feature aims to limit the introduction of messages into the communi-
cation channel that may disturb the receivers and prevent them from transmitting messages.
The privacy feature imposes limits on data access to prevent disclosure of communication
routes or routes created between senders and receivers. The integrity feature maintains the
accuracy of content throughout its transmission from source to destination. If available, it
prevents authentication from being given to unauthorized users, while for others, it requires
access keys, in addition to the username and password. For such a system based on VLC
to meet the mandatory requirements, several critical issues must be addressed in the final
implementation. In the case of much more established communications, the network layer
assumes all responsibilities of protecting the data and keeping them private from all points
of view, including the legal and the commercial perspectives. In terms of the VLC channel,
it can be vulnerable to attacks within vehicular networks, and the confidentiality of the
Electronics 2023, 12, 1359 11 of 17
data transmitted between the vehicles may be endangered. The measurements and tests
presented here were carried out to track how a VLC system can be protected from various
types of attacks in the network, such as flooding attacks, poisoning attacks, and cache
attacks. These types are the ones that could endanger the integrity of the system, and this
Electronics 2023, 12, x FOR PEER REVIEW
study proves that the security breaches in the case of VLC are much more critical than12inof 18
the case of standard VANET communications (Figure 5).
Figure 5. 5.Analyses
Figure Analysesregarding
regarding the
the risk to which
risk to whichthe
theinfrastructure
infrastructure is exposed.
is exposed.
According
Accordingtotothetheresearch carried out,
research carried out,the
thesources
sourcesofof
andand exposure
exposure to external
to external risksrisks
can only come about when there are failures in the physical infrastructure
can only come about when there are failures in the physical infrastructure or the system or the system
itself.Matrix
itself. Matrixdata
dataapproaches
approaches andandevolutionary
evolutionary determinants
determinantsof attacks within
of attacks the physical
within the phys-
layers have been considered and these threats to VLC do not compromise
ical layers have been considered and these threats to VLC do not compromise data data security andsecu-
integrity. To penetrate a VLC network or a communication system based on this technology,
rity and integrity. To penetrate a VLC network or a communication system based on this
dedicated modules and receivers are needed, and if the communication system behaves
technology, dedicated modules and receivers are needed, and if the communication sys-
like a classic wireless network, the penetration procedure is difficult and the contamination
tem behaves
time like along
is relatively classic
(seewireless
Figures 6network,
and 7). the penetration procedure is difficult and the
contamination time is relatively long
Regarding the connectivity of such (see Figures 6the
a network, andinsertion
7). of data packets capable
of providing a perspective on the network through their iteration was also considered.
Therefore, cascading data templates were used, and these were split into multiple data
matrices that randomly populated the network. A premature conclusion regarding their
capacity and accuracy should not be drawn, but, regarding the main aspect of security,
there were many indications that confirmed that the data were in a network capable of
providing them with a high degree of protection. As shown by Figure 8, no technical
problems were encountered, and the data packet penetration process, which was constantly
monitored, could not be derailed.
can only come about when there are failures in the physical infrastructure or the system
itself. Matrix data approaches and evolutionary determinants of attacks within the phys-
ical layers have been considered and these threats to VLC do not compromise data secu-
rity and integrity. To penetrate a VLC network or a communication system based on this
technology, dedicated modules and receivers are needed, and if the communication sys-
Electronics 2023, 12, 1359 12 of 17
tem behaves like a classic wireless network, the penetration procedure is difficult and the
contamination time is relatively long (see Figures 6 and 7).
Regarding the connectivity of such a network, the insertion of data packets capable
of providing a perspective on the network through their iteration was also considered.
Therefore, cascading data templates were used, and these were split into multiple data
matrices that randomly populated the network. A premature conclusion regarding their
capacity and accuracy should not be drawn, but, regarding the main aspect of security,
there were many indications that confirmed that the data were in a network capable of
providing them with a high degree of protection. As shown by Figure 8, no technical prob-
lems were encountered, and the data packet penetration process, which was constantly
monitored, could not be derailed.
Therefore, cascading data templates were used, and these were split into multiple data
matrices that randomly populated the network. A premature conclusion regarding their
capacity and accuracy should not be drawn, but, regarding the main aspect of security,
there were many indications that confirmed that the data were in a network capable of
Electronics 2023, 12, 1359
providing them with a high degree of protection. As shown by Figure 8, no technical13
prob-
of 17
lems were encountered, and the data packet penetration process, which was constantly
monitored, could not be derailed.
Figure
Figure 8.
8. Communication
Communication testing
testing with
with aa dataset
dataset created
created in
in order to validate
order to validate its
its reliability.
reliability.
4. Discussion
Following the analysis of the proposal offered as a communication and security
alternative, new directions were generated, especially concerning the use of VLC-RF and
the two systems’ integration in lighting systems, both in public and in vehicle lighting
systems, to achieve communication of permanent data and in complete safety. These new
approaches can address extremely pressing problems in today’s society. It should not be
overlooked that pollution and congestion are causes of traffic and mismanagement. The
purpose of the proposal was to highlight the usefulness of VLC in systems other than
the standard ones while, at the same time, indicating the high degree of security offered
by the new standard compared to the existing ones. The communication through visible
light employed in the proposed approach is performed in the PHY layers, resulting in
unidirectional UDP connections in the first instance. The tests are in the early stages and
have not passed the first stages where addresses are generated and packets with digital
samples and minimal processing blocks are sent. Various parameters, sample rates, data
rates, and modulation schemes have been studied, but no conclusions have yet been
drawn, as these digital samples are routed internally without processing. An outline of a
GNURadio-type processing block can be proposed that targets a future direction of being
able to modulate the transmission bandwidth in both directions of the optical channel.
When the intensity of the transmitted light is detected by a receiver and converted into an
electrical current, unforeseen effects can occur. In this case, a file-type protection board on
the transmitter–receiver path that can demodulate the received carrier signal is imperative.
Thus, the data in Table 3 were extracted from the first stage of analysis of the presented
proposal. The sources were retrieved and identified as the main data providers within
the network, while the nodes represented the control units with destinations and sources.
Figure 8 presents the degree of security of the data exposed in the information transmission
process, showing that they do not deviate in the process they follow, nor do they present
certain violations.
Electronics 2023, 12, 1359 14 of 17
5. Conclusions
When resource-intensive computing services employing big data are used and they
contain location data or large-scale derivations, query requests also arise. They are en-
crypted and transmitted to vehicles to efficiently manage the processes carried out by the
RSUs. The roadside control and management units can calculate the shortest routes to
the desired destinations, a feature that transforms the network into a continuous flow of
variants. In addition to these features, distance and location data are only captured at the
user’s physical level of inquiry and are shown in standard CPSs. The transfer of informa-
tion and its sharing between vehicles is undertaken through a different environment that
can control each physical level and a layer of the sharable service query. When the data are
collected, they are adjusted with on-board units capable of branching the information into
distinct stages and iterative processes through which the filtering of the usual information
from that of control and management is distinctly achieved. Regardless of the area in
which communications are used or their type, keeping personal information confidential
and encrypting it are of paramount importance. The future is extremely promising for
the application and development of such systems but, at the same time, the accumulation
of factors and the dangers to which individuals and users are exposed can create more
identity and authentication intrusions. Location and destination monitoring may make new
systems veritable maps of possible targets for malicious individuals. Another approach
that the scientific community can consider is that of generating fake data for the external
environment and constantly updating IDs, producing a model capable of maintaining some
degree of discretion in terms of safety and security.
References
1. Chowdhury, M.Z.; Hossan, M.T.; Islam, A.; Jang, Y.M. A Comparative Survey of Optical Wireless Technologies: Architectures and
Applications. IEEE Access 2018, 6, 9819–9840. [CrossRef]
2. Matheus, L.E.M.; Vieira, A.B.; Vieira, L.F.M.; Vieira, M.A.M.; Gnawali, O. Visible Light Communication: Concepts, Applications
and Challenges. IEEE Commun. Surv. Tutor. 2019, 21, 3204–3237. [CrossRef]
3. WHO. Global Status Report on Road Safety 2021 (World Health Organization, 2021), 138. 2021. Available online: https:
//www.who.int/violence_injury_prevention/road_safety_status/2021/en/ (accessed on 12 January 2023).
4. Amani, A.S.; Hesham, A.E.Z.; Sadek, A.A.-S. Secure and intelligent road trafc management system based on rfd technology.
In Proceedings of the World Symposium on Computer Applications and Reserch (WSCAR), Cairo, Egypt, 12–14 March 2016;
pp. 41–46.
5. Jungnickel, V.; Uysal, M.; Serafimovski, N.; Baykas, T.; O’Brien, D.; Ciaramella, E.; Ghassemlooy, Z.; Green, R.; Haas, H.; Haigh,
P.A.; et al. A European view on the next generation optical wireless communication standard. In Proceedings of the 2015 IEEE
Conference on Standards for Communications and Networking (CSCN), Tokyo, Japan, 28–30 October 2015; pp. 106–111.
6. Ifada, E.; Surajudeen-Bakinde, N.T.; Faruk, N.; Abubakar, A.; Mohammed, O.O.; Otuoze, A.O. Implementation of a data
transmission system using Li-Fi technology. In Proceedings of the 2nd International Conference of the IEEE Nigeria Computer
Chapter (NigeriaComputConf), Zaria, Nigeria, 14–17 October 2019; pp. 1–7.
7. IEEE Std 802.15.7-2018 (Revision of IEEE Std 802.15.7-2011); IEEE Standard for Local and Metropolitan Area Networks-Part 15.7:
Short-Range Optical Wireless Communications. IEEE: Piscataway, NJ, USA, 2019; pp. 1–407.
8. Shi, D.; Zhang, X.; Shi, L.; Vladimirescu, A.; Mazurczyk, W.; Cabaj, K.; Meunier, B.; Ali, K.; Cosmas, J.; Zhang, Y. On Improving
5G Internet of Radio Light Security Based on LED Fingerprint Identification Method. Sensors 2021, 21, 1515. [CrossRef]
9. Maia, G.; Aquino, A.L.L.; Viana, A.C.; Boukerche, A.; Loureiro, A.A.F. HyDi: A hybrid data dissemination protocol for highway
scenariosin vehicular ad hoc networks. In Proceedings of the second ACMinternational Symposium on Design and Analysis of
Intelligentvehicular Networks and Applications, Paphos, Cyprus, 21–25 October 2012; pp. 15–122.
10. Alraih, S.; Shayea, I.; Behjati, M.; Nordin, R.; Abdullah, N.F.; Abu-Samah, A.; Nandi, D. Revolution or Evolution? Technical
Requirements and Considerations towards 6G Mobile Communications. Sensors 2022, 22, 762. [CrossRef]
11. Desai, V. Design and implementation of GSM and GPS based vehicle accident detection system. Int. J. Technol. Sci. 2014, 1,
306–3014.
Electronics 2023, 12, 1359 16 of 17
12. Abdelhady, A.M.; Amin, O.; Chaaban, A.; Shihada, B.; Alouini, M. Spectral-Efficiency—Illumination Pareto Front for Energy
Harvesting Enabled VLC Systems. IEEE Trans. Commun. 2019, 67, 8557–8572. [CrossRef]
13. Abdillah, M.I.; Darlis, D. Distance measurement implementation for VLC-based V2V communication on motorbike platooning.
In Proceedings of the International Conference of Engineering Technology Entrepreneurship, Bandung, India, 13–15 August 2019.
14. Căilean, A.-M.; Dimian, M.; Popa, V. Noise-Adaptive Visible Light Communications Receiver for Automotive Applications: A
Step Toward Self-Awareness. Sensors 2020, 20, 3764. [CrossRef]
15. Delgado-Rajo, F.; Melian-Segura, A.; Guerra, V.; Perez-Jimenez, R.; Sanchez-Rodriguez, D. Hybrid RF/VLC Network Architecture
for the Internet of Things. Sensors 2020, 20, 478. [CrossRef]
16. Alin-Mihai, C.; Barthélemy, C.; Luc, C.; Suat, T.; Yasser, A.; JeanMarc, B. Visible light communications: Application to cooperation
between vehicles and road infrastructures. In Proceedings of the IEEE Intelligent Vehicles International Symposium, Alcalá de
Henares, Spain, 3–7 June 2012.
17. Marabissi, D.; Mucchi, L.; Caputo, S.; Nizzi, F.; Pecorella, T.; Fantacci, R.; Nawaz, T.; Seminara, M.; Catani, J. Experimental
Measurements of a Joint 5G-VLC Communication for Future Vehicular Networks. J. Sens. Actuator Netw. 2020, 9, 32. [CrossRef]
18. de Oliveira, M.A.; Lima, E.S.; Cunha, M.S.P.; Abreu, M.; Arismar Cerqueira, S. RGB-based VLC system using 5G NR standard.
Opt. Commun. 2021, 481. [CrossRef]
19. Hammouda, M.; Akın, S.; Vegni, A.M.; Haas, H.; Peissig, J. Link Selection in Hybrid RF/VLC Systems Under Statistical Queueing
Constraints. IEEE Trans. Wirel. Commun. 2018, 17, 2738–2754. [CrossRef]
20. Khalifeh, A.F.; AlFasfous, N.; Theodory, R.; Giha, S.; Darabkh, K.A. An experimental evaluation and prototyping for visible light
communication. Comput. Electr. Eng. 2018, 72, 248–265. [CrossRef]
21. Cevik, T.; Yilmaz, S. An overview of visible light communication systems. arXiv 2015, arXiv:1512.03568. [CrossRef]
22. Chen, Q.; Wen, H.; He, J.; Deng, R.; Chen, M.; Zhou, Z.; Ma, J.; Zong, T. Performance enhancement of OFDM-VLC system using
joint preprocessing scheme. Opt. Commun. 2019, 451, 111–115. [CrossRef]
23. Chen, C.-W.; Wang, W.-C.; Wu, J.-T.; Chen, H.-Y.; Liang, K.; Wei, L.-Y.; Hsu, Y.; Hsu, C.-W.; Chow, C.-W.; Yeh, C.-H.; et al. Visible
light communications for the implementation of internet-of-things. Opt. Eng. 2016, 55, 060501. [CrossRef]
24. Mohsin, M.J.; Murdas, I.A. Performance analysis of an outdoor Li-Fi system-based AO-OFDM architecture under different FSO
turbulence and weather conditions. Optik 2023, 273, 170427. [CrossRef]
25. Abdallah, W.; Boudriga, N. Enabling 5G wireless access using Li-Fi technology: An OFDM based approach. In Proceedings of the
2016 18th International Conference on Transparent Optical Networks (ICTON), Trento, Italy, 10–14 July 2016; pp. 1–6. [CrossRef]
26. Durgun, M.; Gokrem, L. VLC4WoT: Visible Light Communication for Web of Things. KSII Trans. Internet Inf. Syst. (TIIS) 2020, 14,
1502–1519. [CrossRef]
27. Yu, T.-C.; Huang, W.-T.; Lee, W.-B.; Chow, C.-W.; Chang, S.-W.; Kuo, H.-C. Visible Light Communication System Technology
Review: Devices, Architectures, and Applications. Crystals 2021, 11, 1098. [CrossRef]
28. Khan, L.U. Visible light communication: Applications, architecture, standardization and research challenges. Digit. Commun.
Netw. 2017, 3, 78–88. [CrossRef]
29. Hoffmann, M.; Kryszkiewicz, P.; Kliks, A. Frequency Selection for Platoon Communications in Secondary Spectrum Using Radio
Environment Maps. IEEE Trans. Intell. Transp. Syst. 2022, 23, 2637–2650. [CrossRef]
30. Renzler, T.; Stolz, M.; Watzenig, D. Feudalistic Platooning: Subdivide Platoons, Unite Networks, and Conquer Efficiency and
Reliability. Sensors 2022, 22, 4484. [CrossRef]
31. Căilean, A.-M.; Beguni, C.; Avătămănit, ei, S.-A.; Dimian, M.; Popa, V. Design, Implementation and Experimental Investigation of
a Pedestrian Street Crossing Assistance System Based on Visible Light Communications. Sensors 2022, 22, 5481. [CrossRef]
32. Căilean, A.-M.; Avătămăniţei, S.-A.; Beguni, C.; Popa, V.; Dimian, M. Experimental Demonstration of a 188 meters Infrastructure-
to-Vehicle Visible Light Communications Link in Outdoor Conditions. In Proceedings of the 2021 IEEE Sensors Applications
Symposium (SAS), Sundsvall, Sweden, 23–25 August 2021; pp. 1–6. [CrossRef]
33. Beguni, C.; Căilean, A.-M.; Avătămănit, ei, S.-A.; Zadobrischi, E.; Stoler, R.; Dimian, M.; Popa, V.; Béchadergue, B.; Chassagne, L.
In-Vehicle Visible Light Communications Data Transmission System Using Optical Fiber Distributed Light: Implementation and
Experimental Evaluation. Sensors 2022, 22, 6738. [CrossRef] [PubMed]
34. Kadam, K.; Dhage, M.R. Visible Light Communication for IoT. In Proceedings of the 2016 2nd International Conference on
Applied and Theoretical Computing and Communication Technology (iCATccT), Bangalore, India, 21–23 July 2016; pp. 275–278.
[CrossRef]
35. Ismail, S.N.; Salih, M.H. A review of visible light communication (VLC) technology. In AIP Conference Proceedings; AIP Publishing
LLC: Melville, NY, USA, 2020; p. 020289.
36. Katz, M.; O’Brien, D. Exploiting novel concepts for visible light communications: From light-based IoT to living surfaces. Optik
2019, 195, 163176. [CrossRef]
37. Teli, S.R.; Zvanovec, S.; Ghassemlooy, Z. Optical internet of things within 5G: Applications and challenges. In Proceedings of the
2018 IEEE International Conference on Internet of Things and Intelligence System (IOTAIS), Bali, Indonesia, 1–3 November 2018;
IEEE: Piscataway, NJ, USA, 2018; pp. 40–45.
38. Almadani, Y.; Plets, D.; Bastiaens, S.; Joseph, W.; Ijaz, M.; Ghassemlooy, Z.; Rajbhandari, S. Visible Light Communications for
Industrial Applications—Challenges and Potentials. Electronics 2020, 9, 2157. [CrossRef]
Electronics 2023, 12, 1359 17 of 17
39. Beguni, C.; Zadobrischi, E.; Avătămăniţei, S.-A.; Căilean, A.-M. Experimental Demonstration of a Visible Light Communications
Crosswalk Assistance System. In Proceedings of the 2022 International Symposium on Electronics and Telecommunications
(ISETC), Timisoara, Romania, 10–11 November 2022; pp. 1–4. [CrossRef]
40. Yang, H.; Zhong, W.-D.; Chen, C.; Alphones, A. Integration of Visible Light Communication and Positioning within 5G Networks
for Internet of Things. IEEE Netw. 2020, 34, 134–140. [CrossRef]
41. Katz, M.; Ahmed, I. Opportunities and challenges for visible light communications in 6G. In Proceedings of the 2020 2nd 6G
wireless summit (6G SUMMIT), Levi, Finland, 17–20 March 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–5.
42. Lee, Y.U. Secure Visible Light Communication Technique Based on Asymmetric Data Encryption for 6G Communication Service.
Electronics 2020, 9, 1847. [CrossRef]
43. Webber, J.; Mehbodniya, A.; Teng, R.; Arafa, A.; Alwakeel, A. Finger-Gesture Recognition for Visible Light Communication
Systems Using Machine Learning. Appl. Sci. 2021, 11, 11582. [CrossRef]
44. Rehman, S.U.; Ullah, S.; Chong, P.H.J.; Yongchareon, S.; Komosny, D. Visible Light Communication: A System Perspective-
Overview and Challenges. Sensors 2019, 19, 1153. [CrossRef]
45. Sharma, P.K.; Ryu, J.H.; Park, K.Y.; Park, J.H.; Park, J.H. Li-Fi based on security cloud framework for future IT environment. Hum.
Cent. Comput. Inf. Sci. 2018, 8, 23. [CrossRef]
46. Perwej, Y. The Next Generation of Wireless Communication Using Li-Fi (Light Fidelity) Technology. J. Comput. Netw. (JCN) 2017,
4, 20–29. [CrossRef]
47. Cailean, A.M.; Dimian, M. Impact of IEEE 802.15.7 Standard on Visible Light Communications Usage in Automotive Applications.
IEEE Commun. Mag. 2017, 55, 169–175. [CrossRef]
48. Sejan, M.A.S.; Rahman, M.H.; Aziz, M.A.; Kim, D.-S.; You, Y.-H.; Song, H.-K. A Comprehensive Survey on MIMO Visible Light
Communication: Current Research, Machine Learning and Future Trends. Sensors 2023, 23, 739. [CrossRef]
49. Shi, J.; Niu, W.; Ha, Y.; Xu, Z.; Li, Z.; Yu, S.; Chi, N. AI-Enabled Intelligent Visible Light Communications: Challenges, Progress,
and Future. Photonics 2022, 9, 529. [CrossRef]
50. Aydin, B.; Duman, Ç. Comparison of OOK-RZ and 4-PPM performances in Li-Fi systems using LED arrays. Opt. Laser Technol.
2022, 153, 108247. [CrossRef]
51. Stoicuta, O.; Riurean, S.; Burian, S.; Leba, M.; Ionica, A. Application of Optical Communication for an Enhanced Health and
Safety System in Underground Mine. Sensors 2023, 23, 692. [CrossRef]
52. Gao, D.; Zhang, J.; Wang, F.; Liang, J.; Wang, W. Design and simulation of ultra-thin and high-efficiency silicon-based trichromatic
PIN photodiode arrays for visible light communication. Opt. Commun. 2020, 475, 126296. [CrossRef]
53. Li, J.; Zou, P.; Ji, X.; Guo, X.; Chi, N. High-speed visible light communication utilizing monolithic integrated PIN array receiver.
Opt. Commun. 2021, 494, 127027. [CrossRef]
54. Qiu, J.; Zhang, L.; Li, D.; Liu, X. High security chaotic multiple access scheme for visible light communication systems with
advanced encryption standard interleaving. Opt. Eng. 2016, 55, 066121. [CrossRef]
55. Zia-Ul-Mustafa, R.; Boroujeni, S.S.; Guerra-Yanez, C.; Ghassemlooy, Z.; Minh, H.L.; Zvanovec, S. Quantum Key Distribution for
Visible Light Communications: A Review. In Proceedings of the 2022 13th International Symposium on Communication Systems,
Networks and Digital Signal Processing (CSNDSP), Porto, Portugal, 20–22 July 2022; pp. 589–594. [CrossRef]
56. Osama, E.; Mohsen, R. Wireless Quantum Key Distribution in Indoor Environments. J. Opt. Soc. Am. B 2018, 35, 197–207.
[CrossRef]
57. Lu, Q.; Wang, F.; Huang, K.; Wu, X.; Wang, S.; He, D.; Yin, Z.; Guo, G.; Chen, W.; Han, Z. Quantum key distribution over scattering
channel. arXiv 2021, arXiv:2109.12282. [CrossRef]
58. Muhammad, T.; Marcos, K. Performance evaluation of IEEE 802.11p, LTE and 5G in connected vehicles for cooperative awareness.
Eng. Rep. 2022, 4, e12467. [CrossRef]
59. Plascencia, E.; Guan, H.; Chassagne, L.; Barrois, O.; Shagdar, O.; Căilean, A.-M. A Comprehensive Investigation on Multi-User
Interference Effects in Vehicular Visible Light Communications. Sensors 2023, 23, 2553. [CrossRef] [PubMed]
60. Wang, Y.; Chen, H.; Jiang, W.; Li, X.; Chen, X.; Meng, X.; Tian, P.; Sun, B. Optical encryption for visible light communication based
on temporal ghost imaging with a micro-LED. Opt. Lasers Eng. 2020, 134, 106290. [CrossRef]
61. Liao, T.-L.; Chen, C.-Y.; Chen, H.-C.; Chen, Y.-Y.; Hou, Y.-Y. Realization of a Secure Visible Light Communication System via
Chaos Synchronization. Math. Probl. Eng. 2021, 2021, 6661550. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.