2018
DOI: 10.1109/twc.2018.2804390
|View full text |Cite
|
Sign up to set email alerts
|

Securing Visible Light Communication Systems by Beamforming in the Presence of Randomly Distributed Eavesdroppers

Abstract: This paper considers secrecy enhancement mechanisms in visible light communication (VLC) systems with spatially distributed passive eavesdroppers (EDs) under the assumption that there are multiple LED transmitters and one legitimate receiver (UE). Based on certain amplitude constraints, we propose an optimal beamforming scheme to optimize secrecy performance. Contrary to the case where null-steering is made possible by using knowledge of the ED locations, we show that the optimal solution when only statistical… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

1
56
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 67 publications
(57 citation statements)
references
References 31 publications
1
56
0
Order By: Relevance
“…However, only beamforming was employed to secure this class of VLC systems. In [82], [83], the authors proposed a LED selection scheme to improve the secrecy outage probability (SOP) of the system. The SOP represents the probability that the instantaneous secrecy capacity C s falls below a target secrecy rate R th [88], i.e., P (C s ≤ R th ).…”
Section: A Single Aumentioning
confidence: 99%
See 1 more Smart Citation
“…However, only beamforming was employed to secure this class of VLC systems. In [82], [83], the authors proposed a LED selection scheme to improve the secrecy outage probability (SOP) of the system. The SOP represents the probability that the instantaneous secrecy capacity C s falls below a target secrecy rate R th [88], i.e., P (C s ≤ R th ).…”
Section: A Single Aumentioning
confidence: 99%
“…However, due to the amplitude constraint imposed on the transmitted signal, the secrecy capacity is not readily available and a modified SOP was employed as a secrecy performance measure instead. In addition, the authors in [82], [83] assumed that the EDs are not colluding. In this case, only the ED with the strongest SNR is considered as a potential threat.…”
Section: A Single Aumentioning
confidence: 99%
“…With spatially random terminals in VLC, the closed-form expressions for the SOP and the average secrecy capacity (ASC) are derived in [18]. In [19] and [20], the SOP and beamforming are analyzed respectively for VLC with randomly located eavesdroppers. However, the dimming requirement for indoor VLC is not considered in [17]- [20].…”
Section: Introductionmentioning
confidence: 99%
“…In [19] and [20], the SOP and beamforming are analyzed respectively for VLC with randomly located eavesdroppers. However, the dimming requirement for indoor VLC is not considered in [17]- [20]. Moreover, the aforementioned works are carried out by assuming that the channel state information (CSI) is perfect.…”
Section: Introductionmentioning
confidence: 99%
“…Note that the secure analysis and robust beamforming in [6] and [8] were established in the case that the CSI or the locations of the eavesdroppers are known. However, the locations of the eavesdroppers are usually unknown in practice [11]. In this case, the authors have analyzed the secure performance and proposed a new MISO beamforming scheme based on the eavesdropper intensity.…”
mentioning
confidence: 99%