2020
DOI: 10.1109/jsyst.2019.2947614
|View full text |Cite
|
Sign up to set email alerts
|

On the Secrecy Performance of Random VLC Networks With Imperfect CSI and Protected Zone

Abstract: This paper investigates the physical-layer security for a random indoor visible light communication (VLC) network with imperfect channel state information (CSI) and a protected zone. The VLC network consists of three nodes, i.e., a transmitter (Alice), a legitimate receiver (Bob), and an eavesdropper (Eve). Alice is fixed in the center of the ceiling, and the emitted signal at Alice satisfies the non-negativity and the dimmable average optical intensity constraint. Bob and Eve are randomly deployed on the rece… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 24 publications
0
12
0
Order By: Relevance
“…Based on the Laplace distribution for θ, it is shown that the channel gain follows a truncated Laplace distribution as follows [18]: (11) where h min ≤ h ≤ h max . The mean and scale parameter of the channel gain are given as:…”
Section: Random Orientationmentioning
confidence: 99%
See 2 more Smart Citations
“…Based on the Laplace distribution for θ, it is shown that the channel gain follows a truncated Laplace distribution as follows [18]: (11) where h min ≤ h ≤ h max . The mean and scale parameter of the channel gain are given as:…”
Section: Random Orientationmentioning
confidence: 99%
“…2. Note that in (11), F θ (θ 0 ) = θ0 0 f(θ)dθ, where θ ≤ θ 0 results in ψ ≤ Ψ c , and therefore, the channel gain becomes zero. The angle θ 0 is given as [21]:…”
Section: Random Orientationmentioning
confidence: 99%
See 1 more Smart Citation
“…limited hardware and restricted computing power [6] . Hence, physical layer security (PLS) techniques might found a new horizon on 6G to provide security by efficiently exploiting the randomness of wireless channels.In this regard, there exists special interest in investigating PLS techniques on VLC networks under secrecy constraints [7], [8]. Particularly, in [7], upper and lower bounds for the secrecy capacity of an indoor VLC network in the presence of an eavesdropper were derived.…”
Section: Introductionmentioning
confidence: 99%
“…[8] ignores the constraints of visible-light signals in indoor environments. In [9], the secrecy performance for a random VLC system with a transmitter, a legitimate user and an eavesdropper was investigated and the effects of the imperfect channel state information and the protected zone on security performance were discussed. Note that only lightwave information transmission is considered in [2]- [9], the possibility of harvesting energy in the VLC system is not discussed.…”
Section: Introductionmentioning
confidence: 99%