Proceedings of 2nd International Multi-Disciplinary Conference Theme: Integrated Sciences and Technologies, IMDC-IST 2021, 7-9 2022
DOI: 10.4108/eai.7-9-2021.2314809
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Physical Layer Security for FSO Communication Systems

Abstract: Physical layer security (PLS), which uses information-theoretic techniques to protect data secrecy, has recently received a lot of academic attention. As wireless communications progresses to 5G and beyond, physical layer security research faces new hurdles. Because existing Radio-Frequency (RF) networks are unable to meet increasing data rate demands, optical wireless communication (OWC) based on free-space optical (FSO) techniques has been proposed as a viable approach to overcome RF spectrum limitations. Be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…In Fig. 3, two normalized jitter values (𝜎 Q ∕ 𝑎, 𝜎 p ∕ 𝑎) = {(2, 1), (7,9)} are considered to carefully analyze how 𝑇 → 𝑅 links are affected by generalized pointing errors. As seen from Fig.…”
Section: A Intercept Probability Based On Tas Opportunistic Schemementioning
confidence: 99%
See 1 more Smart Citation
“…In Fig. 3, two normalized jitter values (𝜎 Q ∕ 𝑎, 𝜎 p ∕ 𝑎) = {(2, 1), (7,9)} are considered to carefully analyze how 𝑇 → 𝑅 links are affected by generalized pointing errors. As seen from Fig.…”
Section: A Intercept Probability Based On Tas Opportunistic Schemementioning
confidence: 99%
“…Consequently, physical layer security (PLS) is emerging as a 2 > REPLACE THIS LINE WITH YOUR MANUSCRIPT ID NUMBER (DOUBLE-CLICK HERE TO EDIT) < promising secure wireless communications paradigm relying on exploiting the physical characteristics of wireless channels for protection against eavesdropping attacks. Contrary to the cryptographic techniques with highly complex encryption methods, which require more processing resources for encryption and decryption and increase the latency imposed, PLS takes advantage of the inherent randomness of wireless channels to secure communications between legitimate peers [8], [9]. PLS can be considered the most secure method of communication since security in this context is provable (in the information-theoretic sense).…”
mentioning
confidence: 99%
“…Average probability of error of EGC-DCSK is given as (19) where P eEGC−DCSK (γ ) is given in (15). The PDF of γ as defined in (4), is used to determine the PDF of γ EGC . Then using the methodology in [45], the PDF of SNR for EGC system can be approximated as…”
Section: Error Performance Analysis a Egc-dcskmentioning
confidence: 99%
“…Many researchers are working on physical layer security of the FSO system and employing different methods to enhance security of the systems [4], [5], [6], [7], [8]. In [5], authors analysed physical layer security (PLS) performance of FSO system using partially coherent beam (PCB) under the combined effect of strong turbulence and eavesdropper's location.…”
Section: Introductionmentioning
confidence: 99%
“…transmitted for several kilometers, although the performance of the FSO link degrades significantly when the transmission distance exceeds one kilometer due to environmental effects [6]. In general, FSO communication is more secure than RF communication because the laser beam has a line-ofsight (LOS) nature and high directivity [2]. However, since the laser beam experiences divergence at the receiving end due to light diffraction, the relatively close location of the eavesdropper with respect to the legitimate receiver in the divergence area can cause serious security flaws [7], [8], [9], [10], [11].…”
mentioning
confidence: 99%