2014 IEEE International Conference on Communications (ICC) 2014
DOI: 10.1109/icc.2014.6883837
|View full text |Cite
|
Sign up to set email alerts
|

Physical-layer security for indoor visible light communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
59
0
5

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 111 publications
(64 citation statements)
references
References 15 publications
0
59
0
5
Order By: Relevance
“…For a single AU, a large body of work in the literature proposed various PLS techniques that aim to provide secure communications, for both cases of single ED [67]- [81] and multiple EDs [82]- [86]. In the following, both cases of single and multiple EDs will be studied, respectively.…”
Section: A Single Aumentioning
confidence: 99%
See 1 more Smart Citation
“…For a single AU, a large body of work in the literature proposed various PLS techniques that aim to provide secure communications, for both cases of single ED [67]- [81] and multiple EDs [82]- [86]. In the following, both cases of single and multiple EDs will be studied, respectively.…”
Section: A Single Aumentioning
confidence: 99%
“…For the case of continuous signaling schemes, beamforming was employed in [67]- [70]. With beamforming, the transmitted signal is expressed as s = vu, where u denotes the confidential message intended to the AU and v denotes its associated beamforming vector.…”
Section: A Single Aumentioning
confidence: 99%
“…Problem lainnya adalah ketika jumlah LED pada ruangan lebih dari satu dan kesemuanya memanfaatkan enkripsi data sehingga daerah antar LED atau interseption area tidak dapat perform dengan baik, ilustrasi ditunjukkan pada Gambar 20 [31] Berikutnya Y. Liu, dkk [38] melakukan penelitian dengan skema LED ke mobile device dengan memanfaatkan kamera pada ponsel, pada skema tersebut diatur bagaimana agar data-data informasi hanya dapat diterima oleh user yang memiliki key. Data yang dikirim adalah berupa image dengan metode pemisahan pixel dan grayscale level.…”
Section: F Penggunaan Kriptografi Untuk Mengamankanunclassified
“…Mostafa and Lampe addressed secure VLC link at the physical layer [10] by investigating the achievable secrecy rates of a Gaussian wiretap channel. Cho et al [11] investigated secrecy outage probability of the downlink for VLC.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%