Design of Probabilistic Constellation Shaping for Physical Layer Security in Visible Light Communications

被引:0
作者
Pham, Thanh V. [1 ]
Ishihara, Susumu [1 ]
机构
[1] Shizuoka Univ, Dept Math & Syst Engn, Shizuoka, Japan
来源
2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024 | 2024年
关键词
Visible light communications; probabilistic constellation shaping; physical layer security; BROADCAST CHANNELS; PERFORMANCE; AMPLITUDE;
D O I
10.1109/WCNC57260.2024.10570694
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a practical design of probabilistic constellation shaping (PCS) for physical layer security in visible light communications. In particular, the M-ary PAM symbol distribution is optimized to maximize the secrecy capacity given constraints on the legitimate user's bit error rate (BER) and flickering mitigation. For this purpose, an approximate closed-form expression for the BER of M-ary PAM under an arbitrary symbol probability is derived and the issue of flickering caused by the channel-dependent solution is described. The design problem is shown to be non-convex due to the non-convex BER constraint. Thus, a suboptimal solution based on successive convex approximation (SCA) is presented. Our findings reveal that while the uniform signaling and PCS design without BER constraint can only satisfy the BER constraint when the optical power is beyond a certain value, the proposed PCS design works in all regions of the optical power. Some insights into the optimal symbol distribution with respect to the optical power are also discussed.
引用
收藏
页数:6
相关论文
共 16 条
[1]  
[Anonymous], 2008, Digital Communications
[2]   Secrecy Performance of Multi-User MISO VLC Broadcast Channels With Confidential Messages [J].
Arfaoui, Mohamed Amine ;
Ghrayeb, Ali ;
Assi, Chadi M. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (11) :7789-7800
[3]   Massive MIMO Systems With Non-Ideal Hardware: Energy Efficiency, Estimation, and Capacity Limits [J].
Bjornson, Emil ;
Hoydis, Jakob ;
Kountouris, Marios ;
Debbah, Merouane .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (11) :7112-7139
[4]  
Boyd S., 2004, CONVEX OPTIMIZATION
[5]   On the general BER expression of one- and two-dimensional amplitude modulations [J].
Cho, KK ;
Yoon, D .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2002, 50 (07) :1074-1080
[6]   Zero-Forcing Beamforming for Active and Passive Eavesdropper Mitigation in Visible Light Communication Systems [J].
Cho, Sunghwan ;
Chen, Gaojie ;
Coon, Justin P. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :1495-1505
[7]   On Symbol Error Performance of Probabilistic Shaping in Noise-Limited and Fading Channels [J].
Gutema, Tilahun Zerihun ;
Haas, Harald ;
Popoola, Wasiu O. .
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2023, 4 :1218-1228
[8]   Fundamental analysis for visible-light communication system using LED lights [J].
Komine, T ;
Nakagawa, M .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) :100-107
[9]   Visible Light Communication: Concepts, Applications and Challenges [J].
Matheus, Luiz Eduardo Mendes ;
Vieira, Alex Borges ;
Vieira, Luiz F. M. ;
Vieira, Marcos A. M. ;
Gnawali, Omprakash .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3204-3237
[10]   Gaussian Wiretap Channel With Amplitude and Variance Constraints [J].
Ozel, Omur ;
Ekrem, Ersen ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (10) :5553-5563