Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/GLOCOM.2016.7842062guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

On the Secrecy Capacity of MISO Visible Light Communication Channels

Published: 04 December 2016 Publication History

Abstract

We study the secrecy capacity of the multiple- input single-output (MISO) Gaussian wiretap visible light communication (VLC) channel. We study a typical VLC scenario with one transmitter, one legitimate receiver, and one eavesdropper. Specifically, we compute the achievable secrecy rate for various input signaling distributions, including the truncated generalized normal (TGN) and uniform distributions. The transmitter is equipped with multiple light sources, while the legitimate and unauthorized receivers are each equipped with a single photodetector. We analyze the achievable secrecy rates via transmit beamforming and artificial noise. In addition, both zero-forcing beamforming and robust beamforming are considered. In the former case, the location of the eavesdropper is assumed to be known, whereas in the latter case, the location of the eavesdropper is unknown. Our numerical results show that the secrecy rate achieved by the TGN distribution is significantly improved as compared to those achieved by the truncated Gaussian and uniform distributions, for both zero-forcing beamforming and robust beamforming. We also derive an upper bound on the achievable secrecy capacity that we used to assess the closeness of the achievable secrecy rates to the derived bound.

References

[1]
A. R. Ndjiongue, H. C. Ferreira, and T. M. N. Ngatched, “Pvisible light communications (vlc) technology,” Wiley Encyclopedia of Electrical and Electronics Engineering, pp. 1–15, Jun 2015.
[2]
S. Gao, “Performance study for indoor visible light communication systems,” Ph.D. dissertation, University of Ottawa, 2013.
[3]
D. K. Borah, A. C. Boucouvalas, C. C. Davis, S. Hranilovic, and K. Yiannopoulos, “A review of communication-oriented optical wireless systems,” EURASIP J. on Wireless Commun. and Networking, vol. 2012, no. 1, pp. 1–28, Mar. 2012.
[4]
H. Elgala, R. Mesleh, and H. Haas, “Indoor optical wireless communication: potential and state-of-the-art,” IEEE Commun. Mag., vol. 49, no. 9, pp. 56–62, Sep 2011.
[5]
S. Wu, H. Wang, and C.-H. Youn, “Visible light communications for 5g wireless networking systems: from fixed to mobile communications,” IEEE Network, vol. 28, no. 6, pp. 41–45, Nov-Dec 2014.
[6]
T. Bilski, “New threats and innovative protection methods in wireless transmission systems,” J. of Telecommun. and Inf. Technology, vol. 3, pp. 26–33, Mar 2014.
[7]
Y.-S. Shiu, S. Y. Chang, H.-C. Wu, S. C.-H. Huang, and H.-H. Chen, “Physical layer security in wireless networks a tutorial,” IEEE Wireless Commun., vol. 18, no. 2, pp. 66–74, Apr 2011.
[8]
G. T. Amariucai, “Physical layer security in wireless networks: Intelligent jamming and eavesdropping,” Ph.D. dissertation, University Politehnica of Bucharest, 2009.
[9]
A. Mostafa and L. Lampe, “Physical-layer security for indoor visible light communications,” in Proc. IEEE InternationalConference on Communications (ICC), Sydney, Australia, Jun 2014, pp. 524–529.
[10]
A. Mostafa and L. Lampe, “Securing visible light communications via friendly jamming,” in Proc. IEEE Global Communications Conference (GLOBECOM) Workshops, Austin, TX, USA, Dec 2014, pp. 524–529.
[11]
H. Zaid, Z. Rezki, A. Chaaban, and M. S. Alouini, “Improved achievable secrecy rate of visible light communication with cooperative jamming,” in Proc. IEEE Global Conference on Signal and Information Processing (GlobalSIP), Orlando, FL, USA, Dec 2015, pp. 1165–1169.
[12]
R. Hettich and K. O. Kortanek, “Semi-infinite programming: Theory, methods, and applications,” Soc. for Ind. and Appl. Math. (SIAM) Review, vol. 35, no. 3, pp. 380–429, Sep 1993.
[13]
M. A. Goberna and M. A. Lopez, “Post-optimal analysis in linear semi-infinite optimization,” SpringerBriefs in Optimization, 2014.
[14]
J. Li and A. Petropulu, “Optimal input covariance for achieving secrecy capacity in gaussian mimo wiretap channels,” in Proc. IEEE InternationalConference on Acoustics, Speech and Signal Processing (ICASSP), Dallas, TX, USA, Mar 2010.

Cited By

View all
  • (2024)Channel-Independent Quantum Mapping-Substitution OFDM-Based Spatial Modulation for Physical-Layer Encryption in VLC NetworksVehicular Communications10.1016/j.vehcom.2023.10070645:COnline publication date: 1-Feb-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
2016 IEEE Global Communications Conference (GLOBECOM)
Dec 2016
5586 pages

Publisher

IEEE Press

Publication History

Published: 04 December 2016

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Channel-Independent Quantum Mapping-Substitution OFDM-Based Spatial Modulation for Physical-Layer Encryption in VLC NetworksVehicular Communications10.1016/j.vehcom.2023.10070645:COnline publication date: 1-Feb-2024

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media