Enhancement of Physical Layer Security With Simultaneous Beamforming and Jamming for Visible Light Communication Systems

被引:65
作者
Cho, Sunghwan [1 ]
Chen, Gaojie [2 ]
Coon, Justin P. [1 ]
机构
[1] Univ Oxford, Dept Engn Sci, Oxford OX1 3PJ, England
[2] Univ Leicester, Dept Engn, Leicester LE1 7RH, Leics, England
基金
英国工程与自然科学研究理事会;
关键词
Physical layer security; visible light communication; beamforming; jamming; average secrecy rate; BROADCAST CHANNELS; WIRELESS INFORMATION; SELECTION; NETWORKS; RELAY;
D O I
10.1109/TIFS.2019.2904440
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper considers physical layer security enhancement mechanisms that utilize simultaneous beamforming and jamming in visible light communication systems with a randomly located eavesdropper under the assumption that there are multiple light-emitting diode (LED) transmitters and one intended user. When an eavesdropper with an augmented frontend receiver is present, the jamming is very useful for preventing the eavesdropper from wiretapping the information since it is not possible to extract only the information component from the received signal if the jamming signal is random. Thus, in this paper, an optimization problem is formulated with a focus on the signal-to-interference-plus-noise ratio for the legitimate link, and it is solved by a heuristic method called the concave-convex procedure. Then, a ternary scheme is proposed, which is less complicated than the full (joint) scheme, and it is optimized by adopting a formulation based on an assignment problem, the solution of which is effectively obtained by the so-called tabu search procedure. In addition, the problem of maximizing the average secrecy rate is investigated by utilizing a continuous LED model, which significantly relaxes the complication that rises from calculating the expectation with respect to the location of the eavesdropper. Our analysis and simulation results show that the proposed simultaneous beamforming and jamming strategies (both joint and ternary) are good proxies for maximizing the average secrecy rate by utilizing the statistical information on the eavesdropper's random location.
引用
收藏
页码:2633 / 2648
页数:16
相关论文
共 43 条
[1]  
[Anonymous], OPTIMIZING VLC NETWO
[2]  
[Anonymous], 2003, 124641 EN
[3]  
[Anonymous], 2016, P IEEE GLOB COMM C G
[4]   Secrecy Performance of Multi-User MISO VLC Broadcast Channels With Confidential Messages [J].
Arfaoui, Mohamed Amine ;
Ghrayeb, Ali ;
Assi, Chadi M. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (11) :7789-7800
[5]   Coexistence of WiFi and LiFi Toward 5G: Concepts, Opportunities, and Challenges [J].
Ayyash, Moussa ;
Elgala, Hany ;
Khreishah, Abdallah ;
Jungnickel, Volker ;
Little, Thomas ;
Shao, Sihua ;
Rahaim, Michael ;
Schulz, Dominic ;
Hilt, Jonas ;
Freund, Ronald .
IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (02) :64-71
[6]  
Bloch M., 2011, Physical-Layer Security: From Information Theory to Security Engineering
[7]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[8]  
Boggs P. T., 1995, Acta numerica, V4, P1, DOI DOI 10.1017/S0962492900002518
[9]  
Charnes A., 1962, Nav. Res. Logist. Quarter, V9, P181, DOI DOI 10.1002/NAV.3800090303
[10]   Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers [J].
Chen, Gaojie ;
Coon, Justin P. ;
Di Renzo, Marco .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) :1195-1206