Secure Visible Light Communication Technique Based on Asymmetric Data Encryption for 6G Communication Service

: Security in residential and business establishments has become an area of considerable importance. To provide enhanced security using conventional visible light (VL) communication, the characteristics of which allow for easy access by nearby intruders, a new VL communication technique is proposed in this paper. The novel VL communication system is based on a data encryption method using asymmetric encryption, and it is proposed for use in smart indoor services in the 6th generation communication environment. The asymmetric encryption capability is studied by comparison with the conventional technique, the optimum key length for the public or private encryption codes is determined under the criterion of the minimum estimation error. Moreover, the error performance is analyzed with various RSA encryption keys and data lengths to verify the performance of the proposed technique. A real experiment is performed to evaluate the proposed technique using an implemented test bed, and the success rates of the VL communication technique with and without RSA coding are evaluated by a real experiment with a test bed under an indoor laboratory VL channel. We believe it is evident that the VL communication technique based on asymmetric encryption yields superior error performance compared to that without encryption for optimal lengths of the encryption key and data bits.

optimum spread code was investigated in an indoor VL communication system [18]. A stream encryption key utilizing a binary sequence is used instead of a block key for data encryption in wireless communication. It has been established that the stream encryption key exhibits the properties of public and symmetric keys. Furthermore, the VL positioning technique based on pseudo-noise (PN) code has been demonstrated to provide the best encryption capability among the known stream encryption keys (such as PN, Gold or Kasami keys) under normal of the signal-to-noise ratio (SNR) conditions [19]. The asymmetric Rivest-Shamir-Adleman (RSA) encryption technique with public and private keys exhibits superior security performance over the symmetric encryption scheme based solely on a public key [20].
In this study, a VL communication technique using asymmetric data encryption is investigated as a real implementation and an extension of our earlier research [21]. The purpose of this approach is to provide security enhancements to conventional VL communication techniques for smart indoor services under the 6G communication environment, which normally allows easy access to nearby intruders owing to the characteristics of visible signals.
We contend that the asymmetric encryption scheme is preferable for the security enhancement of smart indoor services based on VL communication in the 6G communication environment and proceed accordingly. Asymmetric encryption scenarios for the VL communication system are investigated. Furthermore, the statistical properties of the RSA encryption key (i.e., public key and private key set) are compared under various prime number conditions, the asymmetric encryption capability is studied by comparison with the conventional technique, the optimum key length for the public or private encryption codes is determined under the criterion of the minimum estimation error, the dependence of the security performance on the key and data lengths is analyzed by means of a simulation study, and the success rates of the VL communication technique with and without RSA coding are evaluated by a real experiment with a test bed under an indoor laboratory VL channel.
The remainder of this paper is organized as follows: In Section 2, we discuss the VL communication methodology, a signal model for secure VL communication with data encryption, and the characteristics of the encryption key. In Section 3, we present a real experiment using a specific test bed and performance tests of the proposed technique via computer simulations. Finally, the conclusions of this study are provided in Section 4.

Methodology
In the 6G communication environment illustrated in Figure 1, high-frequency bands are used for ultrafast-speed transmissions, and different frequencies are dynamically used, especially unlicensed bands, to enjoy the benefits of the sharing architecture. For example, VL communication is a promising high-rate technique to replace conventional WLAN, as people spend most of their time (more than 80%) indoors.
In the smart indoor service based on VL communication on the left of Figure 1, the signals generated by two VL transmitters are simultaneously radiated into a VL channel. Several two-dimensional cells are constructed in the VL channel and a VL receiver executes the signal reception on a single predetermined cell. One VL signal is captured by the VL receiver; however, this VL signal can be intercepted by intruders. Therefore, we consider converting the conventional technique into an advanced VL communication technique based on data encryption.
An advanced VL communication system with data encryption can be incorporated to overcome the security weaknesses inherent in the 6G communication smart indoor service. In this work, we focus on asymmetric RSA encryption owing to its superior encryption capabilities over other methods, and the methodology thereof is proposed as follows.
The VL channel depicted in Figure 1 is time invariant and it is based on short-range communication (that is, several meters) via the dominant line-of-sight path and multiple weak reflected paths. The path Electronics 2020, 9, 1847 3 of 16 loss typically has an inverse sixth or higher power attenuation dependence on the communication distance and the fading effect is compensated for by the photodiode diversity effect [22]. In this work, it is assumed that the VL channel contributed by weak reflected paths is negligible in the indoor environment of Figure 1. Thus, the channel impulse response h vlc (t) is approximated as per Equation (1) [23]: where h LOS is the channel gain of the dominant direct path and δ(·) is an impulse response function. The VL transmitters depicted in the top left of Figure 1 generate the sensing control information, encode it with an asymmetric RSA encryption scheme (public key), and radiate it to the VL channel with a low rate and small communication data format for the smart indoor service in the 6G communication environment. The VL receiver subsequently captures the transferred sensing data in the VL channel (that is, receiving cell C i in the center left of Figure 1), decodes the encrypted sensing data with a private RSA key, and recovers the sensing signal.
Even if the sensing data are simultaneously captured by an uninvited intruder within the VL channel, it is difficult to decode the intercepted sensing data without the private RSA key. To overcome these challenges resulting from the security weakness, co-channel interference, and overlapping of reception domains, secure VL communication with an asymmetric RSA encryption scheme is considered herein.

Signal Model
To realize VL communication and asymmetric RSA encryption, we consider the VL communication process illustrated in Figure 2 for the smart indoor service. The signal model suitable for this scheme is described below.
The plain text x s (or control command) in the function diagram of Figure 2 is represented with the binary digital data of L bit frames: where b k is the signal intensity with a value of 1 or 0, p(·) is the binary digital pulse shape, and T is the time of one bit. The plain text x s (binary digital data) is transformed into different plain text x s10 in decimal form, and a public key set (n 10 , e 10 ) and private key set (n 10 , d 10 ) are assigned by the generation algorithm [24] of the RSA encryption key. This process is completed by considering the Electronics 2020, 9, 1847 4 of 16 random prime numbers p, q and setting n 10 = pq; thereafter, φ(n) = (p − 1) × (q − 1) and a public key e 10 , which is a co-prime for φ(n), are selected such that 1 < e 10 < φ(n), and a private key d 10 is obtained from the equation e 10 d 10 = 1 mod(φ(n)) with the modulo operation in Figure 2. Furthermore, the M-bit public key e 10 is described as and the N-bit private key d 10 is described as where k ie , k jd ∈ {0, 1, · · · , 9} are the amplitudes of the public and private keys, and T e , T d are the bit durations of the public and private RSA keys, respectively. Subsequently, the plain text x s10 is encrypted with the public key e 10 in the VL transmitter of Figure 2. The RSA encrypted text y t10 is determined as follows: where enc(·) represents an encryption operation. The RSA encrypted text in decimal form is converted into the binary encrypted text y t2 again and modulated with the carrier signal; that is, it is modulated by an on/off keying-non-return zero (OOK-NRZ) scheme, as in the conventional VL communication technique. The encrypted and OOK-NRZ-modulated asymmetric RSA signals are radiated into the VL channel in Figure 2. Subsequently, the VL communication signal y t is described as Electronics 2020, 9, 1847 5 of 16 where A, f 0 , and θ are the signal amplitude, frequency, and carrier signal phase, respectively. If a communication signal arrives at the VL receiver through the VL channel, the VL communication signal y r acquired at the VL cell C i in the constructed VL channel is considered to be protected from interception: where θ is the phase component, × is a convolution operator, and η(t) is additive white Gaussian noise. The received signal (or control command) proceeds through a band-pass filter, is OOK demodulated by a non-coherent detection scheme, is received as the demodulated binary digital signal y r2 , and is reconverted into the decimal form during the VL reception process indicated in Figure 2. The encrypted text y r10 is then decrypted with the private key d 10 for the asymmetric RSA decryption process in the VL receiver depicted in Figure 2, and the RSA decrypted text or recovered plain textx r10 is estimated aŝ where dec(·) represents the decryption operation. The text is reconverted into a binary digital signal x r2 , the VL communication process is completed, and the recovered plain textx r is nearly identical to the original plain text x s . Following the RSA encryption process in the VL transmitter illustrated in Figure 2, the power P enc generated from the LED array is usually as follows: The total power P T transferred into the VL channel is expressed by Equation (9): where the light intensity I(φ) is represented by I(φ) = [(1 + m) / 2π] cos m φ with the angle of irradiance φ, assuming that the LED array is diffuse with a Lambertian emission pattern and the emission order is m.
Once the signal received at the photodiode in the VL receiver has been decoded, the recovered power is determined as follows: where P L (φ, ψ, D) = cos φ cos ψT(ψ)g(ψ) S/π yields the path loss through the VL channel, T(ψ), g(ψ) are the characteristic functions of the optical filter and concentrator, respectively, S is the receiving area of the photodiode, D is the distance between the LED array and photodiode, and ψ is the angle of incidence. Then, the reconstructed signal power can be obtained as

RSA Encryption Key
As the security performance of the proposed VL communication system is mainly dependent on the data encryption and decryption processes, we explore the statistical properties of the RSA encryption key in this section. The statistical properties of the public and private keys are directly related to the capabilities of the asymmetric RSA encryption and decryption processes. Figure 3 provides a summary of the key functions for the asymmetric RSA encryption and decryption processes in the proposed technique, which are described in detail in the following. Plain text is used (for example, the text of five characters "VLC" is selected) for VL communication, and according to the ASCII table, these can be expressed as the decimal numbers 34, 118, 108, 99, and 34. If the public key set (that is, (n 10 , e 10 ) = (77, 17)) is given by the key generation function of the VL transmitter and the plain text is encoded by the public key (that is, e 10 = 17) through an asymmetric encryption process in Figure 3, the plain text is converted into encrypted text (that is, the numbers 34, 76, 76, 76, and 34) for secure VL communication.
The asymmetric decryption process in Figure 3 can also be described as follows: the encrypted text (that is, numbers 34, 76, 76, 76, and 34) is transferred to the VL receiver through the VL channel. The private key set, namely (n 10 , d 10 ) = (77, 53), is provided by the generating function of the RSA decryption key in the VL receiver and the encrypted text is decoded by the RSA private key (that is, d 10 = 53) through the asymmetric decryption process.
Thereafter, the encrypted text is reconverted into plain text (the decimal numbers 34, 118, 108, 99, and 34), which is the same as the original plain text ("VLC"). The objective of the asymmetric encryption process is to protect the plain text; that is, to restrict access from adjacent interference or intruders.
It is expected that the statistical performance of the asymmetric encryption process is dependent on the bit number; that is, the length of the encryption key. Table 1 displays various public and private key sets obtained from the RSA key generation process. As an example, using the prime numbers p = 11, q = 7 in Table 1, and given that n 10 = pq = 77; set φ(n) = (p − 1)(q − 1) = 60, then take a public key e 10 = 17, which is a co-prime for φ(n), where 1 < e 10 < 60, and we obtain a private key d 10 = 53 from the relation 17d 10 = 1 mod(60) with the modulo operation. The remaining public and private key sets of Table 1 are obtained via a similar process with various combinations of the prime numbers p = 11, q = 127, 1231, and 12,343.
We can observe from Table 1 that the bit number (length) of the public key or private key increases as the value of the prime number increases, and the bit number of the public key is always not equal to that of the private key. This difference in the bit number of the public or private key between the transmitter and receiver provides a security advantage. Figure 4 presents the autocorrelation function characteristics of the 16-bit public key for the various combinations of the prime numbers (p, q) in Table 1.

of 16
We can observe from Table 1 that the bit number (length) of the public key or private key increases as the value of the prime number increases, and the bit number of the public key is always not equal to that of the private key. This difference in the bit number of the public or private key between the transmitter and receiver provides a security advantage. Figure 4 presents the autocorrelation function characteristics of the 16-bit public key for the various combinations of the prime numbers (p, q) in Table 1.  , 7), (11,127), (11,1231), and (11,12,343). It can be observed from Figure 4 that the autocorrelation function (black solid dotted line) for the public key set (n 10 , e 10 ) = (13,541, 5304) generated by the prime numbers (p, q) = (11, 1231) exhibited the smallest fluctuations among the various combinations of the prime numbers (p, q) of Table 1 under SNR = 20 dB. The interval between the main lobe and side lobe also had the smallest value, indicating the best security performance owing to the orthogonality of the encryption key. Therefore, the small-value public key set (n 10 , e 10 ) = (13,541, 5304) generated by the prime numbers (p, q) = (11, 1231) provided the best security performance for the RSA encryption process under good SNR conditions (i.e., SNR = 20 dB). Figure 5 presents the autocorrelation function characteristics of the private key with respect to the key length for the various combinations of the prime numbers (p, q) in Table 1 and SNR = 20 dB. It can be observed that the autocorrelation of the 16-bits private key exhibited similar fluctuations for the various combinations of the prime numbers (p, q) = (11, 7), (11,127), (11,1231), and (11,12,343) under normal SNR conditions.  Table 1 under SNR = 20 dB. The interval between the main lobe and side lobe also had the smallest value, indicating the best security performance owing to the orthogonality of the encryption key. Therefore, the smallvalue public key set ( , ) = (13,541, 5304) generated by the prime numbers (p, q) = (11, 1231) provided the best security performance for the RSA encryption process under good SNR conditions (i.e., SNR = 20 dB). Figure 5 presents the autocorrelation function characteristics of the private key with respect to the key length for the various combinations of the prime numbers (p, q) in Table 1 and SNR = 20 dB. It can be observed that the autocorrelation of the 16-bits private key exhibited similar fluctuations for the various combinations of the prime numbers ( , ) = (11, 7), (11,127), (11,1231), and (11, 12343) under normal SNR conditions.  , 7), (11,127), (11,1231), and (11,12,343).
This confirms that the 16-bit private key set provided similar security performance for various prime number combinations similar to the characteristic of the 8-bit private key set, compared with a previous research [21].

Numerical Study of Asymmetric Encryption Process
A numerical study was designed to investigate the signal flow of the asymmetric encryption and  (11,127), (11,1231), and (11,12,343).
This confirms that the 16-bit private key set provided similar security performance for various prime number combinations similar to the characteristic of the 8-bit private key set, compared with a previous research [21].

Numerical Study of Asymmetric Encryption Process
A numerical study was designed to investigate the signal flow of the asymmetric encryption and decryption function diagram depicted in Figure 2 by computer simulation. The SNR was 0.27 or −5.68 dB. The normal conditions of the LED transmitted power, the irradiance angle of the LED array, the photodiode incident angle, the photodiode field of view, and the photodiode receiving area were given for numerical simulation study of LED and photodiode characteristic: the LED transmitted power was P enc = 20 mW, the irradiance angle of the LED array was φ = 3 • , the photodiode incident angle was ψ = 10 • , the photodiode field of view was ψ c = 20 • , and the photodiode receiving area was In the simulation study, we set the plain text x s to the ASCII character "U", which is equal to the decimal number "85" or the 16-bit binary number 0000000001010101. The signal output for the generation of plain text in the VL transmitter-based asymmetric encryption scheme in Figure 2a is represented as the binary digital waveform in Figure 6a.
The key generation for the asymmetric RSA encryption process is described as follows: The prime numbers p = 11, q = 7 were selected and generated n 10 = 77, the function φ(n) = 60, and a public key e 10 = 13 that was a co-prime for φ(n), where 1 < e 10 < 60; this resulted in a private key d 10 = 37 from the relation 7d 10 = 1 mod(60) .
The waveform of the public key is illustrated in Figure 6b, where the public key was the 16-bit binary number 0000000000001101. The waveform output of the private key in Figure 2b was equal to that of Figure 7c where the private key was the 16-bit binary number 0000000000100101.
The plain text of the binary number representation 0000000001010101 (the character "U") was encoded into the encrypted signal of the binary number 0000000001001100 (the decimal number "76") by the public key with the binary number 0000000000001101 (the decimal number "13"). The encrypted signal is represented by the waveform in Figure 6c. The encrypted signal was again modulated by the OOK-NRZ scheme following the asymmetric RSA encryption process.
The encrypted and modulated signal was then radiated into the VL channel, and the radiated signal for the VL channel is illustrated in Figure 6d.
In actual VL communication for smart indoor services in the 6G communication environment, the radiated signal may be severely distorted by noise effects or co-channel interference as well as severe path loss. We considered only the channel effect of additive white Gaussian noise in this simulation. The signal received at the photodiode is represented in Figure 7a for the condition of SNR = −5.68 dB.
The received signal was demodulated by the band-pass filter of the non-coherent detector scheme depicted in Figure 2b and decrypted by the private RSA key with the binary number 0000000000100101 (the decimal number "37"), resulting in the waveforms illustrated in Figure 7b,c, respectively. The recovered signal is represented in Figure 7d, which was the binary number 0000000001010101 (the decimal number "85" or the ASCII character "U").
It can be concluded from this simulation study that the proposed VL communication technique and asymmetric RSA encryption process were effectively implemented with the public and private RSA encryption key lengths and 16-bit data length under SNR conditions above −5.68 dB.
Electronics 2020, 9, 1847 9 of 16 0000000000100101 (the decimal number "37"), resulting in the waveforms illustrated in Figures 7b  and (c), respectively. The recovered signal is represented in Figure 7d, which was the binary number 0000000001010101 (the decimal number "85" or the ASCII character "U").
It can be concluded from this simulation study that the proposed VL communication technique and asymmetric RSA encryption process were effectively implemented with the public and private RSA encryption key lengths and 16-bit data length under SNR conditions above −5.68 dB.

Estimation Error Depending on RSA Encryption Key
The performance analysis of the estimation error of the VL communication system with various RSA encryption keys is described in this section. The estimation error calculated for the proposed VL receiver in Figure 2b is described as = | − |, where is the waveform of Figure 7d and is the waveform of Figure 6a. Subsequently, the root mean square error (RMSE) of the signal estimation can be written as where is the number of samples. The simulation studies were performed with the MATLAB software tool to evaluate the performance of the proposed technique. The VL communication simulator was constructed with the same architecture as that in Figure 2, where 8-bit data of plain text or the VL control command were generated, encrypted by an 8-bit public encryption key ( , ) generated under various combinations with four prime numbers ( = 7, 127, 1231, and 12343) and = 7, or with four prime numbers ( = 7, 127, 1231, and 12343) and = 7, and modulated with the OOK-NRZ scheme. Moreover, the modulated and encrypted signals were emitted into the VL channel of the additive

Estimation Error Depending on RSA Encryption Key
The performance analysis of the estimation error of the VL communication system with various RSA encryption keys is described in this section. The estimation error calculated for the proposed VL receiver in Figure 2b is described as = |x r2 − x s |, wherex r2 is the waveform of Figure 7d and x s is the waveform of Figure 6a. Subsequently, the root mean square error (RMSE) of the signal estimation can be written as where n is the number of samples. The simulation studies were performed with the MATLAB software tool to evaluate the performance of the proposed technique. The VL communication simulator was constructed with the same architecture as that in Figure 2, where 8-bit data of plain text or the VL control command x s were generated, encrypted by an 8-bit public encryption key (n 10 , e 10 ) generated under various combinations with four q prime numbers (q = 7, 127, 1231, and 12,343) and p = 7, or with four p prime numbers (p = 7, 127, 1231, and 12,343) and q = 7, and modulated with the OOK-NRZ scheme. Moreover, the modulated and encrypted signals were emitted into the VL channel of the additive white Gaussian noise effect.
The transferred signal was captured by the photodiode of the VL receiver, demodulated by the band-pass filter, decoded with the 8-bit private RSA key (n 10 , d 10 ), and reconverted into 8-bit original plain text. To investigate the dependence of the estimation error on the RSA encryption method, the RMSE of Equation (12) was calculated using the constructed simulator, the results of which are represented in Figures 8 and 9.      Similarly, Figure 9 demonstrates three interesting facts. First, the proposed VL communication technique provided better RMSE performance as the prime number increased. It matches with the previous research result [21]. For example, the RMSE performance for the RSA key set with the prime numbers = 7 and = 1231 (black diamond dotted line in Figure 9) was the best among the RSA   Figure 8) was the best among the RSA keys with p = 7 and q = 7, 11, 127, and 1231. Its result matches with the previous research [21].
Second, the proposed method yielded effective RMSE performance under public and private RSA keys with high values (the 3-and 4-bit decimal numbers in Table 2), as indicated by the black diamond dotted line in Figure 8. Finally, the VL communication technique with or without RSA encoding exhibited similar RMSE performance in the case of RSA keys with two-bit decimal numbers in Table 2 (public and private RSA keys with low values). Similarly, Figure 9 demonstrates three interesting facts. First, the proposed VL communication technique provided better RMSE performance as the p prime number increased. It matches with the previous research result [21]. For example, the RMSE performance for the RSA key set with the prime numbers q = 7 and p = 1231 (black diamond dotted line in Figure 9) was the best among the RSA key sets of Table 3. Second, the proposed method achieved effective RMSE performance under public and private RSA keys of high values (the keys with 4-bit decimal numbers in Table 3). Finally, the proposed technique with and without RSA encoding exhibited similar RMSE performance with RSA keys of 2-bit decimal numbers in Table 3 (public and private RSA keys with low values). It can be observed from the simulation results of Figures 8 and 9 that the proposed VL communication technique based on the asymmetric RSA encryption scheme yielded better RMSE performance with longer RSA key lengths under conditions with the same SNR value.

Estimation Error Depending on Data Bit Length
The estimation error of the proposed VL communication technique was studied for various data lengths (bit numbers). The VL communication simulator was constructed with the same architecture as that depicted in Figure 2, where the plain text x s was generated, encrypted by a public RSA key (n 10 , e 10 ) with q prime numbers (q = 127 and 1231), and modulated with the OOK-NRZ scheme. Furthermore, the modulated and encrypted signals were sequentially emitted into the additive white Gaussian noise VL channel. Figure 10 indicates that the proposed VL communication technique generally exhibited worse RMSE performance as the data bits increased. For example, the performance curve for the 32-bit data VL communication (red cross dotted line of Figure 10) was the worst among the 8-, 16-, and 32-bit data VL communication under the RSA key set with p = 7 and q = 127. Furthermore, the modulated and encrypted signals were sequentially emitted into the additive white Gaussian noise VL channel. Figure 10 indicates that the proposed VL communication technique generally exhibited worse RMSE performance as the data bits increased. For example, the performance curve for the 32bit data VL communication (red cross dotted line of Figure 10) was the worst among the 8, 16, and 32bit data VL communication under the RSA key set with = 7 and = 127.  However, Figure 10 also demonstrates that the proposed technique provided better RMSE performance under the same data bit length conditions as the q prime number increased. For example, the RMSE performance for the RSA key set with the prime numbers q = 1231 and p = 7 (black solid dotted line of Figure 10) was better than that of the RSA key sets with the prime numbers q = 127 and p = 7 (magenta cross dotted line of Figure 10).

Real Experiment with Test Bed
The specific embedded test bed for implementing the VL communication methodology proposed in Section 2.1 was established using two general-purpose embedded boards, an LED array module, and photodiode modules, as illustrated in Figure 11. A real experiment was conducted with the test bed using the proposed technique, as indicated in Figure 11a,d. However, Figure 10 also demonstrates that the proposed technique provided better RMSE performance under the same data bit length conditions as the prime number increased. For example, the RMSE performance for the RSA key set with the prime numbers = 1231 and = 7 (black solid dotted line of Figure 10) was better than that of the RSA key sets with the prime numbers = 127 and = 7 (magenta cross dotted line of Figure 10).

Real Experiment with Test Bed
The specific embedded test bed for implementing the VL communication methodology proposed in Section 2.1 was established using two general-purpose embedded boards, an LED array module, and photodiode modules, as illustrated in Figure 11. A real experiment was conducted with the test bed using the proposed technique, as indicated in Figure 11a,d.
The center of Figure 11a,c presents the specific embedded VL reception system with the photodiode module, where the asymmetric encrypted and OOK-NRZ-modulated signals captured at the VL channel were demodulated and decoded using the private key. Similarly, the center top side of Figure 11a,b shows the prototype of the specific embedded VL transmission system with the LED array module, where the VL communication signal was encoded using the public key and processed by the OOK-NRZ scheme.
The real VL communication experiment based on the asymmetric encryption scheme was conducted under the condition of a distance of 55.2 cm between the two modules (the specific embedded VL reception and transmitter modules), as illustrated in Figure 11d. A laser distance meter and PC system controller (the secure VL transmitter and secure VL receiver in Figure 11a) were used for the distance measurement and 8 or 16bit data generation. The luminance intensity was measured as 1862 lux at the receiving embedded module of the secure VL receiver using a lux meter. The real experiment with the proposed VL communication process based on the asymmetric RSA encryption scheme shown in Figure 2 was executed as follows: The test bed illustrated in Figure  11a was operated, and the encrypted and modulated signals were generated by the secure VL transmitter and radiated into the VL channel. The data were provided as the binary number 01010101 (the decimal number "85"), the 8-bit public key in Table 4 used the binary number 00010001 (the decimal number "17") for the RSA encoding with (11,7) in Table 4, the encoded signal was provided The center of Figure 11a,c presents the specific embedded VL reception system with the photodiode module, where the asymmetric encrypted and OOK-NRZ-modulated signals captured at the VL channel were demodulated and decoded using the private key. Similarly, the center top side of Figure 11a,b shows the prototype of the specific embedded VL transmission system with the LED array module, where the VL communication signal was encoded using the public key and processed by the OOK-NRZ scheme.
The real VL communication experiment based on the asymmetric encryption scheme was conducted under the condition of a distance of 55.2 cm between the two modules (the specific embedded VL reception and transmitter modules), as illustrated in Figure 11d. A laser distance meter and PC system controller (the secure VL transmitter and secure VL receiver in Figure 11a) were used for the distance measurement and 8-or 16-bit data generation. The luminance intensity was measured as 1862 lux at the receiving embedded module of the secure VL receiver using a lux meter.
The real experiment with the proposed VL communication process based on the asymmetric RSA encryption scheme shown in Figure 2 was executed as follows: The test bed illustrated in Figure 11a was operated, and the encrypted and modulated signals were generated by the secure VL transmitter and radiated into the VL channel. The data were provided as the binary number 01010101 (the decimal number "85"), the 8-bit public key in Table 4 used the binary number 00010001 (the decimal number "17") for the RSA encoding with (11,7) in Table 4, the encoded signal was provided as the binary value of 01001100 (the decimal number "76"), and the OOK-NRZ scheme was used for modulation in the transmitting embedded module of the secure VL transmitter. The secure VL receiver captured the encrypted and modulated signals in the VL channel by the photodiode module, decoded these by using the 8-bit private key with a binary value of 00110101 (the decimal number "53") in Table 4 following the demodulation process, and recovered the signals into the data provided as the binary number 01010101 (the decimal number "85"). After 100 trial experiments, the success rate of the proposed VL communication exhibited a maximum value of 80% under an SNR above 5.58 (dB), as indicated in Table 4.
Similarly, the 16-bit public key used the binary number 0000000000001101 (the decimal number "13") for the RSA encryption and the 16-bit private key used the binary number 0000000001100001 (the decimal number "97") for the RSA decoding with the prime numbers (p, q) = (11, 127) in Table 4. After 100 trial experiments, the success rate of the proposed VL communication exhibited a maximum value of 60% under an SNR above 5.08 (dB).
Two interesting points can be observed from Table 4. First, the success rate of the VL communication based on the RSA encryption scheme was better than that of the VL communication without coding, as in the simulation results of Figure 8. Second, the success rate of the VL communication based on the RSA encoding scheme decreased as the data bit length increased, similar to the research results presented in Figure 10.
The results of the real experiment in Table 4 reveal that the success rate of the proposed VL communication technique based on the RSA encoding scheme was superior to that without coding, decreased as the data bit length increased, and exhibited better performance than that without RSA encryption under conditions of the same data length. Moreover, the additional channel coding scheme was naturally required as the data bits increased.

Conclusions
A notable feature of the asymmetric RSA encryption technique with public and private keys is that it provides better security performance; for example, the asymmetric encryption between the transmitter and receiver solves the problem inherent in distributing the secret key. Furthermore, we note that the asymmetric encryption scheme is preferred for security enhancement with smart indoor services using the VL communication technique, which is the key technique of 6G communication. The optimum key length for the public or private encryption code, the security performance of the VL communication as a function of the key and data lengths, and the asymmetric encryption scenario for a system with secure VL control have been studied in detail.
The security performance was found to be primarily dependent on the data encryption process, which was closely related to the statistical properties of the public and private keys in the asymmetric RSA encryption and decryption processes. As such, we could confirm that the public key set with (n 10 , e 10 ) = (13,541, 5304), generated by the prime numbers (p, q) = (11, 1231), provided the best security performance for the RSA encryption process in the VL communication under normal SNR conditions, and the private key set provided similar security performance with various prime number combinations.
In the numerical study of the asymmetric data encryption algorithm, the proposed VL communication technique and asymmetric RSA encryption process were effectively implemented with various RSA key and data lengths under normal SNR conditions. The RMSEs were calculated to investigate the estimation error of the VL communication as a function of the RSA encryption method and the simulation results were presented.
We observed from the simulation studies that the VL communication technique based on the asymmetric encryption usually provided better RMSE performance as the length of the p or q prime number increased, yielded effective RMSE performance under public and private encryption keys of high values, resulted in worse RMSE performance as the data bit increased, and yielded better RMSE performance under the condition of longer encryption keys under the same SNR values.
The real experiment demonstrated that the success rate of the VL communication technique based on RSA encoding was better than that without coding, decreased as the data bit length increased, and exhibited superior performance over that without RSA encryption for conditions of the same data length.
However, it must be acknowledged that, in its current form, the proposed VL communication technique requires higher computation time as well as more number of operations than the conventional technique. Hence, further research is required to optimize it and achieve secure multiband and ultrafast speed communication in the 6G communication environment.