Design and implementation of IR and laser-based electronic ciphering systems

This paper describes the design and implementation of infrared (IR) and laser-based electronic ciphering systems for use in both indoor and outdoor wireless remote control applications. To communicate between a user and a lock module in a secure way, the proposed systems utilize IR and laser frequencies instead of radio frequencies. Each proposed system has its specific security design. A new communication protocol is also generated, which is compatible for use with IR and laser technologies. The proposed electronic ciphering systems' prototypes are realized together with software and hardware components. They are instrumented using the peripheral interface controller series microcontrollers. All of the designs are made effective in terms of cost and size. Widespread and easy applications of the proposed wireless remote control systems will completely meet the security needs of users in daily life, such as home or office security, immobilizer applications, personal computers, and other personnel electronic equipment.

Design and implementation of IR and laser-based electronic ciphering systems

This paper describes the design and implementation of infrared (IR) and laser-based electronic ciphering systems for use in both indoor and outdoor wireless remote control applications. To communicate between a user and a lock module in a secure way, the proposed systems utilize IR and laser frequencies instead of radio frequencies. Each proposed system has its specific security design. A new communication protocol is also generated, which is compatible for use with IR and laser technologies. The proposed electronic ciphering systems' prototypes are realized together with software and hardware components. They are instrumented using the peripheral interface controller series microcontrollers. All of the designs are made effective in terms of cost and size. Widespread and easy applications of the proposed wireless remote control systems will completely meet the security needs of users in daily life, such as home or office security, immobilizer applications, personal computers, and other personnel electronic equipment.

___

  • systems is that they utilize IR and laser frequencies instead of RFs to communicate between the client and server.
  • P. Margaronis, L. Konstantinos, G. Stefanos, A. Emmanouil, C. Ilias, “Design and implementation of a cipher system (LAM) on a FPGA based on PCI architecture?, 6th International Conference on Microelectronics, Nanoelectronics, Optoelectronics, pp. 12–18, 2007.
  • G. Jin, G. Xiang, “Design and simulation of electronic code lock using STC89C52 MCU based on C language, Modern Electronics Technique, doi: CNKI:SUN:XDDJ.0.2010-19-058, 2010.
  • J. Cao, J. Sun, X. Sun, L. Ren, K. Du, “Design of the electronic password locks?, Journal of Chengdu University of Information Technology, doi: CNKI:SUN:CDQX.0.2010-02-004, 2010.
  • G. Zhou, “The design of auto-alarming electronic cipher lock system with AT89C2051?, Journal of Mianyang Normal University, doi: CNKI:SUN:MYSF.0.2007-05-028, 2007.
  • G. Jayendra, S. Kumarawadu, L. Meegahapola, “RFID-based anti-theft auto security system with an immobilizer”, International Conference on Industrial and Information Systems, pp. 441–446, 2007.
  • T. Hamalainen, M. Kivikoski, “Secure infrared control system for automotive applications”, IEEE 22nd International Conference on Industrial Electronics, Control, and Instrumentation, Vol. 2, pp. 852–857, 1996.
  • B. Fung, K. Al-Hussaeni, M. Cao, “Preserving RFID data privacy”, IEEE International Conference on RFID Technologies and Applications, pp. 200–207, 2009.
  • J. Al-Jaroodi, J. Aziz, N. Mohamed, “Middleware for RFID systems an overview”, 33rd Annual IEEE International Computer Software and Applications Conference, Vol. 2, pp. 154–159, 2009.
  • A.I. Alrabady, S.M. Mahmud, “Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved design”, IEEE Transactions on Vehicular Technologies, Vol. 54, pp. 41–50, 2005.
  • K.S. Khangura, N.V. Middleton, M. Ollivier, “Vehicle security systems”, IEE Colloquium, pp. 41–47, 1993.
  • M.J. Conrad, I. Howitt, “Introducing students to communications concepts using optical and low-power wireless devices”, Turkish Journal of Electrical Engineering & Computer Sciences, Vol. 14, pp. 55–66, 2006.
  • L. Wuming, H. Pingyang, Z. Ruilin, “Study on design and application of wireless sensor network based on com- munication of RFID system”, 5th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–6, 2009.
  • J. Landt, Shrouds of Time: The History of RFID, Pennsylvania, Association for Automatic Identification and Mobility, 2001.
  • Y. Yalman, F. Akar, A High Capacity Reversible Data Hiding Method: HCRHide?, Imaging Science Journal, Volume. 62, Issue: 2, pp. 121–126, 2014.
  • S.M. Mahmud, S. Shanker, “In-vehicle secure wireless personal area network (SWPAN)”, IEEE Transactions on Vehicular Technology, Vol. 55, pp. 1051–1061, 2006. [16] F. Zhang, D. Huang, Z. Dong, Y. Huang, “Design and implementation of automatic clearance control system based on RFID”, Proceedings of the 7th World Congress on Intelligent Control and Automation, pp. 6621–6626, 2008.
  • E.E. Aaron, Wireless Security Handbook, Florida, Auerbach Publications, 2006.
  • A. Jain, K. Kant, M.R. Tripathy, “Security solutions for wireless sensor networks”, 2nd International Conference on Advanced Computing and Communication Technologies, pp. 330–333, 2012.
  • V. Aravinthan, V. Namboodiri, S. Sunku, W. Jewell, “Wireless AMI application and security for controlled home area networks”, IEEE Power and Energy Society General Meeting, pp. 1–8, 2011.
  • F. Ari, F. Ozek, O. Ozturk, O. Geren, “Techniques for link security in outdoor mobile laser optical wireless”, International Transparent Optical Networks Conference, Vol. 3, pp. 160–163, 2006.
  • Z. Li, K. Xi-Zheng, L. Jian, “The model and key technique researches of atmosphere laser communication system”, 7th International Symposium on Antennas, Propagation and EM Theory, pp. 1–4, 2006.