2021
DOI: 10.1109/tifs.2020.3036806
|View full text |Cite
|
Sign up to set email alerts
|

Zero-Forcing Beamforming for Active and Passive Eavesdropper Mitigation in Visible Light Communication Systems

Abstract: This paper proposes zero-forcing (ZF) beamforming strategies that can simultaneously deal with active and passive eavesdroppers in visible light communication (VLC) systems. First, we propose a ZF beamforming scheme that steers a transmission beam to the null space of active eavesdroppers' (AEDs) channel, while simultaneously considering the SNRs for a legitimate user (UE) and passive eavesdroppers (PEDs) residing at unknown locations. To find an eigenmode related to the optimal beamforming vector, we adopt an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 34 publications
(15 citation statements)
references
References 22 publications
0
15
0
Order By: Relevance
“…Our recent work [13] proposed an enhanced ZF beamforming scheme to mitigate the weakness from the presence of active and passive eavesdroppers; however, it cannot entirely eliminate the dashed area in which the eavesdroppers can achieve higher SNR.…”
Section: Beamformingmentioning
confidence: 99%
See 1 more Smart Citation
“…Our recent work [13] proposed an enhanced ZF beamforming scheme to mitigate the weakness from the presence of active and passive eavesdroppers; however, it cannot entirely eliminate the dashed area in which the eavesdroppers can achieve higher SNR.…”
Section: Beamformingmentioning
confidence: 99%
“…Also, motivated by the PLS schemes of the RF systems, numerous variants of PLS techniques securing indoor VLC systems were also proposed, such as zero-forcing, robust beamforming, artificial jamming, and light emitting diode (LED) selection, generalized space shift keying (GSSK) modulation, etc. [6][7][8][9][10][11][12][13][14]. Yet many intrinsic characteristics of VLC systems are different from RF systems (e.g., the channel, physical properties of the transmitting and receiving devices, and the signal constraints).…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, PLS techniques have been a huge success in improving the security of RF communication networks [164]- [166], and has therefore recently been considered for VLC systems. An in-depth survey of earlier works on PLS-VLC can be found in [161], [167] and the most recent studies in [44], [168]- [175].…”
Section: B Physical Layer Security and Rismentioning
confidence: 99%
“…PLS techniques for Fig. 31 (A) has been studied in [161], [167]- [175] and, hence, is not considered in this survey. On the contrary, there has been no research on exploiting the model in Fig.…”
Section: B Physical Layer Security and Rismentioning
confidence: 99%
“…Quantum mechanics can be used to calculate the probability distribution, such as projection-valued measurement and Hilbert space formulation [26]. A single photon with polarization directions, i.e., 0, + 90, + 45, and − 45, can be encoded in non-orthogonal quantum states, which cannot be easily read or copied by an eavesdropper [27,28] in a transmission channel. Moreover, the eavesdropper cannot gain partial information from the quantum-based encrypted messages.…”
Section: Introductionmentioning
confidence: 99%