2019 IEEE Global Communications Conference (GLOBECOM) 2019
DOI: 10.1109/globecom38437.2019.9013592
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security in Multiuser VLC Systems with a Randomly Located Eavesdropper

Abstract: This paper proposes a secrecy enhancement mechanism for multiuser visible light communication (VLC) systems. Thanks to the inherent advantages of visible light that it cannot penetrate opaque walls and its channel gain largely depends on the distance, VLC systems can serve multiple users at a time with high security and dense spatial reuse. Nevertheless, in the presence of multiple users, the interference caused by other users' signals should be carefully considered when analyzing the secrecy rate and data rat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…Protected zone [35] Establishing eavesdropping-free zone as protected areas to improve the confidentiality of legitimate users increase when the semiangle of the transmitters increases. Ijaz et al analyzed vulnerability to active attacks by malicious transmitters installed in the VLC system and suggested defensive methods to prevent spoofing and jamming attacks [21].…”
Section: B Vlc Physical Layer Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…Protected zone [35] Establishing eavesdropping-free zone as protected areas to improve the confidentiality of legitimate users increase when the semiangle of the transmitters increases. Ijaz et al analyzed vulnerability to active attacks by malicious transmitters installed in the VLC system and suggested defensive methods to prevent spoofing and jamming attacks [21].…”
Section: B Vlc Physical Layer Securitymentioning
confidence: 99%
“…One of the response methods of VLC eavesdropping is to select an appropriate LED [33]- [35]. Gargetal.…”
Section: B Vlc Physical Layer Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Taking the adopted mathematical tools into account, stochastic geometry theory was used to derive the average secrecy capacity of system while the users were randomly distributed in the room [22]. Optimization theory can also be used to enhance the secrecy performance of VLC systems while satisfying various constraints, such as the LED optical power constraint [23], the peak power constraint to reduce eye damage [16] and the light energy harvesting and dimming control constraint [17]. Taking the eavesdroppers into account, most researches on PLS for VLC networks were performed against external malicious eavesdroppers [16-18, 22, 23], while several have focused on the transmission of confidential information, that is to say, users are kept ignorant about the information not intended for them [19].…”
Section: A Related Workmentioning
confidence: 99%
“…V2V-VLC can be easily implemented through light-emitting diode (LED)-based headlamps, nowadays equipped in most modern cars, for short-range optical wireless communications [ 4 , 7 ]. The line-of-sight (LOS) communication between the transmitter (LED) and receiver (usually a photodetector (PD) or an image sensor) constitutes a channel with considerably reduced possibility of packet collision and/or interference, which in turn improves the security by preventing information theft and interception techniques [ 8 , 9 , 10 ]. The highly directional V2V-VLC, with reduced field-of-view (FOV), also enables the accommodation of a great number of simultaneous communications, using the total bandwidth for each communication link, in comparison to its RF counterpart [ 11 ].…”
Section: Introductionmentioning
confidence: 99%