Covert transmission performance for visible light communications under optical intensity and covert constraints

被引:2
作者
Yu, Peng-Fei [1 ]
Shi, Jia-Wei [1 ]
Su, Dao-Peng [1 ]
Wang, Jin-Yuan [1 ,2 ,3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Commun & Informat Engn, Nanjing 210003, Peoples R China
[2] Anhui Polytech Univ, Automot New Tech Anhui Prov Engn Technol Res Ctr, Wuhu 241000, Peoples R China
[3] Harbin Inst Technol, Guangdong Prov Key Lab Aerosp Commun & Networking, Shenzhen 518055, Peoples R China
关键词
Visible light communication; Covert wireless communication; Input distribution; Fundamental performance limit; PHYSICAL LAYER SECURITY; SYSTEMS;
D O I
10.1016/j.phycom.2023.102156
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper investigates the fundamental performance limit for an indoor covert visible light communication (VLC) system consisting of a transmitter, a receiver, and a warden. In the system, the input signal of VLC is constrained by nonnegativity, peak optical intensity constraint, average optical intensity constraint and covertness constraint. We derive the optimal distribution of the input signal by using the variational method and the entropy power inequality. The allowable maximum peak optical intensity is obtained by substituting the optimal input signal into the covertness constraint. Then, by substituting the maximum peak optical intensity into the lower bound of the maximum mutual information, we derive an upper bound of the information bits that can be covertly transmitted. The asymptotic analysis shows that the upper bound on the transmittable covert information bits tends to a constant when the number of channel uses tends to infinity. These conclusions are also confirmed by numerical results.& COPY; 2023 Elsevier B.V. All rights reserved.
引用
收藏
页数:9
相关论文
共 27 条
[1]   Physical Layer Security for Visible Light Communication Systems: A Survey [J].
Arfaoui, Mohamed Amine ;
Soltani, Mohammad Dehghani ;
Tavakkolnia, Iman ;
Ghrayeb, Ali ;
Safari, Majid ;
Assi, Chadi M. ;
Haas, Harald .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1887-1908
[2]   Covert Communication Gains From Adversary's Ignorance of Transmission Time [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (12) :8394-8405
[3]   Limits of Reliable Communication with Low Probability of Detection on AWGN Channels [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1921-1930
[4]   Covert Communication Over Noisy Channels: A Resolvability Perspective [J].
Bloch, Matthieu R. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (05) :2334-2354
[5]  
Che PH, 2013, IEEE INT SYMP INFO, P2945, DOI 10.1109/ISIT.2013.6620765
[6]  
Cover T. A., 2006, Elements of information theory, V2nd
[7]   Exploring Secure Visible Light Communication in Next-generation (6G) Internet-of-Things [J].
Gupta, Abhishek ;
Fernando, Xavier .
IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, :2090-2097
[8]   On Covert Communication With Noise Uncertainty [J].
He, Biao ;
Yan, Shihao ;
Zhou, Xiangyun ;
Lau, Vincent K. N. .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (04) :941-944
[9]   Covert Communication Achieved by a Greedy Relay in Wireless Networks [J].
Hu, Jinsong ;
Yan, Shihao ;
Zhou, Xiangyun ;
Shu, Feng ;
Li, Jun ;
Wang, Jiangzhou .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (07) :4766-4779
[10]   Achieving Undetectable Communication [J].
Lee, Seonwoo ;
Baxley, Robert J. ;
Weitnauer, Mary Ann ;
Walkenhorst, Brett .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2015, 9 (07) :1195-1205