Physical-Layer Security for Indoor Visible Light Communications: Secrecy Capacity Analysis

被引:100
作者
Wang, Jin-Yuan [1 ,2 ]
Liu, Cheng [2 ]
Wang, Jun-Bo [2 ]
Wu, Yongpeng [3 ]
Lin, Min [1 ,2 ]
Cheng, Julian [4 ]
机构
[1] Nanjing Univ Posts & Telecommun, Key Lab Broadband Wireless Commun & Sensor Networ, Nanjing 210003, Jiangsu, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Jiangsu, Peoples R China
[3] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200240, Peoples R China
[4] Univ British Columbia, Sch Engn, Kelowna, BC V1V 1V7, Canada
基金
中国国家自然科学基金;
关键词
Gaussian noise; physical-layer security; secrecy capacity; visible light communications; BROADCAST CHANNEL;
D O I
10.1109/TCOMM.2018.2859943
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper investigates the physical-layer security for an indoor visible light communication network consisting of a transmitter, a legitimate receiver, and an eavesdropper. Both the main channel and the wiretapping channel have non-negative inputs, which are corrupted by additive white Gaussian noises. Considering the illumination requirement and the physical characteristics of lighting source, the input is also constrained in both its average and peak optical intensities. Two scenarios are investigated: one is only with an average optical intensity constraint and the other is with both average and peak optical intensity constraints. Based on the information theory, closed-form expressions of the upper and lower bounds on secrecy capacity for the two scenarios are derived. Numerical results show that the upper and lower bounds on secrecy capacity are tight, which validates the derived closed-form expressions. Moreover, the asymptotic behaviors in the high signal-to-noise ratio (SNR) regime are analyzed from the theoretical aspects. At high SNR, when only considering the average optical intensity constraint, a small performance gap exists between the asymptotic upper and lower bounds on secrecy capacity. When considering both average and peak optical intensity constraints, the asymptotic upper and lower bounds on secrecy capacity coincide with each other. These conclusions are also confirmed by numerical results.
引用
收藏
页码:6423 / 6436
页数:14
相关论文
共 37 条
[1]   Capacity Analysis of M-PAM Inverse Source Coding in Visible Light Communications [J].
Ahn, Kang-Il ;
Kwon, Jae Kyun .
JOURNAL OF LIGHTWAVE TECHNOLOGY, 2012, 30 (10) :1399-1404
[2]  
Alfaoui MA, 2016, IEEE GLOB CONF SIG, P970, DOI 10.1109/GlobalSIP.2016.7905986
[3]  
[Anonymous], 2011, Physical-layer security:from information theory to security engineering, DOI DOI 10.1017/CBO9780511977985
[4]  
[Anonymous], 1981, Information Theory: Coding Theorems for Discrete Memoryless Systems
[5]  
[Anonymous], 2016, P IEEE GLOB COMM C G
[6]  
[Anonymous], 2017, PROC 54TH ANNU DESIG
[7]  
Arfaoui M.-A., 2017, P IEEE WCNC, P1
[8]   Adaptive Statistical Bayesian MMSE Channel Estimation for Visible Light Communication [J].
Chen, Xianyu ;
Jiang, Ming .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2017, 65 (05) :1287-1299
[9]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[10]   An Efficient Flicker-Free FEC Coding Scheme for Dimmable Visible Light Communication Based on Polar Codes [J].
Fang, Junbin ;
Che, Zhen ;
Jiang, Zoe Lin ;
Yu, Xiaolong ;
Yiu, Siu-Ming ;
Ren, Kui ;
Tan, Xiaoqing ;
Chen, Zhe .
IEEE PHOTONICS JOURNAL, 2017, 9 (03)