Cooperative Beamforming and Jamming for Secure VLC System in the Presence of Active and Passive Eavesdroppers

被引:19
作者
Cho, Sunghwan [1 ]
Chen, Gaojie [2 ]
Coon, Justin P. [3 ]
机构
[1] Korea Mil Acad, Dept Elect Engn, Seoul 01809, South Korea
[2] Univ Leicester, Sch Engn, Leicester LE1 7RH, Leics, England
[3] Univ Oxford, Dept Engn Sci, Oxford OX1 3PJ, England
来源
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING | 2021年 / 5卷 / 04期
基金
英国工程与自然科学研究理事会;
关键词
Jamming; Array signal processing; Visible light communication; Interference; Signal to noise ratio; Receivers; Transmitters; physical layer security; cooperative beamforming and jamming; eavesdropper; PHYSICAL LAYER SECURITY; COMMUNICATION; DESIGN;
D O I
10.1109/TGCN.2021.3092146
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper proposes a novel cooperative beamforming and jamming scheme to deal with passive and active eavesdroppers (EDs) in indoor visible light communication (VLC) networks. An ED in VLC systems can augment its front-end receiver by implementing possible device modifications; thus, jamming is very useful for curbing such an enhanced ED since it would be impossible to distinguish between the information and jamming signals. In contrast to the traditional artificial noise strategies for VLC that can only deal with either passive or active EDs, we propose a combined scheme of beamforming and jamming that significantly improves secrecy performance when both types of EDs exist. The proposed scheme is designed to maximize the signal-to-interference-plus-noise ratio (SINR) of the legitimate receiver, entirely suppress the SINRs of the active EDs, and restrict the average SINR of the passive EDs. We apply an inverse free preconditioned Krylov subspace projection method and the convex-concave procedure to obtain the suboptimal beamforming weight and jamming intensity vectors. Also, an optimal power splitter coefficient is found through the golden section search method. The numerical results verify that the proposed scheme shows superior performance compared to the three benchmarks: 1) zero-forcing beamforming; 2) artificial noise scheme; and 3) enhanced zero-forcing beamforming.
引用
收藏
页码:1988 / 1998
页数:11
相关论文
共 44 条
[1]  
Alouini M. S., 2016, P IEEE GLOB COMM C G, P1
[2]  
Aly B, 2016, NAT RADIO SCI CO, P217, DOI 10.1109/NRSC.2016.7450831
[3]  
[Anonymous], 2003, 124641 EN
[4]   Physical Layer Security for Visible Light Communication Systems: A Survey [J].
Arfaoui, Mohamed Amine ;
Soltani, Mohammad Dehghani ;
Tavakkolnia, Iman ;
Ghrayeb, Ali ;
Safari, Majid ;
Assi, Chadi M. ;
Haas, Harald .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1887-1908
[5]  
Baddeley A, 2016, CHAP HALL CRC INTERD, P1
[6]  
Beck M., 2009, P 2 ACM C WIR NETW S, P79, DOI DOI 10.1145/1514274.1514286
[7]  
Bloch M., 2011, PHYS LAYER SECURITY, DOI DOI 10.1017/CBO9780511977985
[8]  
Boggs Paul T., 1995, Nonlinear Optimization with Engineering Applications, V4, P1, DOI DOI 10.1017/S0962492900002518
[9]  
Boyd S., 2014, Convex Optim
[10]   Statistical Modeling and Analysis on the Confidentiality of Indoor VLC Systems [J].
Chen, Jian ;
Shu, Tao .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (07) :4744-4757