Conference PaperPDF Available

Figures

Content may be subject to copyright.
Physical-Layer Security in Visible Light
Communications
Anil Yesilkaya, Tezcan Cogalan, Serhat Erkucuk, Yalcin Sadi,
Erdal Panayirci, Harald Haasand H. Vincent Poor
Institute for Digital Communications, LiFi R&D Centre, The University of Edinburgh, Edinburgh EH9 3JL, UK
Email: {a.yesilkaya, t.cogalan, h.haas}@ed.ac.uk
Department of Electrical and Electronics Engineering Kadir Has University, 34083, Istanbul, Turkey
Email: {serkucuk, yalcin.sadi, eepanay}@khas.edu.tr
Department of Electrical Engineering, Princeton University, NJ-08544, USA
Email: poor@princeton.edu
Abstract—Optical wireless communications (OWC) and its potential
to solve physical layer security (PLS) issues are becoming important
research areas in 6G communications systems. In this paper, an overview
of PLS in visible light communications (VLC), is presented. Then, two
new PLS techniques based on generalized space shift keying (GSSK)
modulation with spatial constellation design (SCD) and non-orthogonal
multiple access (NOMA) cooperative relaying are introduced. In the
first technique, the PLS of the system is enhanced by the appropriate
selection of a precoding matrix for randomly activated light emitting
diodes (LEDs). With the aid of a legitimate user’s (Bob’s) channel
state information (CSI) at the transmitter (CSIT), the bit error ratio
(BER) of Bob is minimized while the BER performance of the potential
eavesdroppers (Eves) is significantly degraded. In the second technique,
superposition coding with uniform signaling is used at the transmitter and
relays. The design of secure beamforming vectors at the relay nodes along
with NOMA techniques is used to enhance PLS in a VLC system. Insights
gained from the improved security levels of the proposed techniques are
used to discuss how PLS can be further improved in future generation
communication systems by using VLC.
Index Terms—Physical-layer security, Visible light communications
(VLC), Generalized space shift keying (GSSK), Non-orthogonal multiple
access (NOMA).
I. INTRODUCTION
The issue of security in wireless communication networks is of
paramount importance due to the widespread use of mobile devices
and their increasing capabilities. In addition, with the advent of ma-
chine type communications (MTC), the importance of physical layer
security (PLS) increase, for example, to prevent autonomous systems
to be turned into weapons. Security functions in a wireless network
are typically provided through each open systems interconnect (OSI)
layer separately to meet the confidentiality, integrity, availability and
non-repudiation requirements. Extensible Authentication Protocol
(EAP), Wired Equivalent Privacy (WEP) and Wireless Application
Protocol (WAP) could be given as example solutions for WiFi security
protocols operating in link and application layers. The confiden-
tiality of information is typically ensured by encryption in modern
wireless networks, which includes secret and public key encryption
This work was supported by the Scientific and Technical Research Coun-
cil of Turkey (TUBITAK) under the 1003-Priority Areas R&D Projects
support Program No. 218E034 and in part by KAUST under Grant No.
OSR-2016-CRG5-2958-02. A. Yesilkaya acknowledges the financial support
from Zodiac Inflight Innovations (TriaGnoSys GmbH). H. Haas acknowl-
edges support from the EPSRC under Established Career Fellowship Grant
EP/R007101/1. He also acknowledges the financial support of his research by
the Wolfson Foundation and the Royal Society.
methods. The theoretical foundations of secrecy by cryptography
were built in Shannon’s 1949 seminal paper [1]. To be specific,
in [1], mathematical foundations for symmetric key encryption are
provided. However, due to the broadcast nature of the wireless
channel, confining information to a specific area is challenging. The
key management in dynamic wireless networks, comprise of many
intermediate terminals between the source and the destination, could
create weaknesses in the entire system’s architecture. The internet-of-
things (IoT), device-to-device (D2D) and MTC applications as well
as ad hoc networks in the new generation wireless communication
systems could be good examples of this phenomena. Furthermore,
the encryption methods mainly rely on the computational hardness
of a mathematical problem and the assumption that the eavesdropper
has limited computational power. However, as cloud radio access
network (C-RAN) is envisioned to be a feasible solution for 5G
and beyond, remote radio heads (RRHs) will not be capable of
meeting the computational expectations. More importantly, by using
cloud/quantum computing and machine learning tools, computational
hardness can easily be overcome. Hence, the secrecy of encryption
based systems are compromised if a method of solving a non-trivial
mathematical problem can be implemented [2].
PLS is an alternative way to achieve information theoretic secrecy
without encryption. The impairments in wireless channels, e.g.,
fading and noise could benefit from PLS systems to achieve better
secrecy. Accordingly, randomness in the channel can be harnessed to
guarantee that the messages are hidden from the adversarial users. In
[3], Wyner pioneered a new information theoretic path by providing
a mathematical description of a wiretap channel. Thus, the secret
key is not needed to ensure secrecy. Later, Csiszar and Korner
showed channel codes exist to simultaneously provide transmission
robustness and secrecy [4]. In 1978, Leung-Yan-Cheong et al. came
up with the notion of secrecy capacity [5]. In 2011, Oggier et al.
derived the secrecy capacity expressions for multiple-input-multiple-
output (MIMO) wiretap channels [6]. Both the legitimate user’s and
eavesdropper’s channel state information (CSI) are assumed to be
known in [6]. It is worth noting that in practical systems, the network
might be completely unaware of the passive eavesdropper’s potential
interceptions. Therefore, sub-optimal secure MIMO transmission is
mainly realized by transmitter preprocessing such as precoding [7],
friendly jamming [8], mapping [9] and selection [10].
In the above studies [1]–[10], radio frequency (RF) based systems
have been considered. In this paper, the concept of PLS will be
considered for visible light communications (VLC) systems. Ini-
tially, an overview of inherent advantages of the VLC for PLS
and some proposed PLS approaches will be presented. Then, two
recent techniques based on generalized space shift keying (GSSK)
modulation and non-orthogonal multiple access (NOMA) cooperative
relaying will be summarized and we will elaborate on the improved
PLS performance that these techniques can achieve. Finally, the
concluding remarks and future research directions will be presented.
II. OVE RVIEW: PHYSICAL LAYER SECURITY IN VISIBLE LIGHT
COMMUNICATIONS SYS TE MS
VLC and light-fidelity (LiFi)1utilize off-the-shelf light emitting
diodes (LEDs) for broadband data transmission. It is seen as an
efficient technology compared to conventional RF systems by means
of energy, deployment and cost. Moreover, the advantages of VLC
over conventional RF systems can be recalled as: (i) unregulated
and larger spectrum; (ii) applicability in electromagnetic interference
limited environments such as chemical plants, hospitals, aircrafts; and
(iii) enhanced security merits inherited from THz frequency band
characteristics.
In VLC, the information is encoded on the instantaneous light
intensity which could be detected at the receiver side by using photo-
diodes (PDs). Due to the spontaneous photon emission characteristics
of the conventional LEDs, the transmission and detection are realized
incoherently which is referred to as intensity-modulation and direct-
detection (IM/DD). Therefore, the transmit signal is limited to be real
and positive valued which restrains the unmodified application of RF
transmission techniques in VLC. In the PHY layer OWC literature,
efficient methods for obtaining both real and unipolar valued signals
are studied extensively. For example, in [11], the authors proposed a
signal shaping framework that considers the limitations imposed by
IM/DD transmission along with constraints based on the optical front-
ends. Accordingly, a comparison between single carrier modulation
techniques and optical orthogonal frequency division multiplexing
(OFDM) (O-OFDM) based multi carrier modulation techniques is
provided. In [12], an efficient MIMO transmission technique, spatial
modulation (SM), is combined with O-OFDM which is referred to
as optical spatial modulation (OSM) [13]. It is shown in [12] that
the Hermitian symmetry as well as unipolarity requirement in the
transmit signal can be mitigated by using LED indexes. In [14],
the effect of user mobility in OSM systems is investigated where
a power allocation is utilized to provide a certain bit error ratio
(BER) for a targeted user. Similarly, the technique proposed in [14]
is generalized to a single carrier MIMO-VLC transmission method
and termed optical GSSK (OGSSK) in [15].
During the last few years, PLS in VLC has become a promising
research area to enhance the privacy of wireless networks and to
complement encryption techniques applied at higher layers of the
network stack. The secrecy capacity of a LiFi network is shown to be
at least an order of magnitude higher than that of a Wireless Fidelity
(WiFi) network due to the inherent characteristics of the THz band
[16]. As light cannot travel through walls, the area spectral efficiency
and secrecy can simply be engineered according to the necessity in
LiFi networks. Furthermore, the lack of small scale fading effects in
OWC also create channel conditions which are mainly determined by
1LiFi extends the concept of VLC and describes a fully wireless network.
It supports bi-directional wireless networking with dense access point (AP)
deployment, multi-user transmission and seamless handover capabilities. In
this paper, LiFi is used interchangeably with VLC to represent an indoor
optical wireless communications (OWC) system that operates on infra-red
(IR) and visible light (VL) bands.
the geometry between the transmit LEDs and receive PDs. Thus, the
channel impulse response (CIR) of the legitimate user (Bob) could
be determined to some extend if the opto-electronic characteristics
of LEDs, PDs and Bob’s 3-D position parameters are known at the
evasdropper’s (Eve’s) side. In the literature, the problem of PLS in
VLC can be handled by, (i) beamforming; (ii) friendly jamming; (iii)
mapping and combinations of these techniques.
The early investigation for beamforming based PLS in VLC
systems is presented by Ayman et al. in [17]. In beamforming,
spatially distributed transmitters are utilized. Each of these have
a power scaling factor namely, the beamforming coefficients. The
emission pattern of the transmitters could be focused on Bob by
selecting the power scaling coefficients with the aid of its CSI at
the transmitter (CSIT). Thus, the confidential information becomes
hidden from Eve as long as the leakage is kept to a minimum. The
maximum secrecy could be achieved if both Bob’s and Eve’s CSIT
is assumed to be known. However, the network might be completely
unaware of malicious users which makes this assumption impractical.
Hence, a sub-optimal beamformer is employed in [15], [18]–[20]. It
can be noted that to apply beamforming, there must be a central
controller to convey necessary information such as user data and
beamforming coefficients to the distributed transmitters. However,
another LiFi-specific beamforming approach exist, named angular
diversity transmitter (ADT) [21]. ADT consists of multiple LEDs
that are directed (with narrow-beam angle) to different orientations.
Therefore, each LED has its own confined coverage area. Activating
a single or set of these narrow-beam LEDs in the transmitter with
the aid of Bob’s CSIT mimics the beamforming and effectively
reduces the leakage of confidential information. Hence, deploying
ADT mitigates the necessity of a central controller that is needed for
applying beamforming and can be seen as one of the LiFi-specific
PLS techniques.
Friendly jamming is another PLS technique that is based on the
transmission of both useful messages and interfering jamming signals,
simultaneously. Since the friendly jamming signal is designed to be in
the null space of the legitimate user’s channel matrix, it only effects
the adversarial user which has its channel spanning on the null space
of the legitimate user’s channel. It is noted in [17], [22] that the
friendly jamming and beamforming systems are only effective in
systems with multiple transmit units. Thus, as an efficient MIMO
transmission alternative, OSM-based VLC security has attracted a
significant attention in the literature [15], [23]–[25].
Transmit signal mapping is another technique which combines
encryption with conventional PLS methods for securing MIMO
transmissions, specifically SM [26]–[29]. In the mapping based PLS
method, a specific rule is devised by using a legitimate user’s CSI
which will be utilized for encoding the message signal. At the
legitimate user’s side, a de-mapping function is applied to obtain the
intended message back. However, it is assumed that the mapping rule
is known in both transmitting AP (Alice) and legitimate user’s (Bob)
sides. Similar to the encryption techniques, this assumption does not
always hold and creates a weakness in the system security. Hence,
beamforming, friendly jamming and a combination of beamforming
and friendly jamming methods are accepted as the main PLS methods
in VLC literature.
To enhance the system security beyond the noted VLC PLS
methods, one can benefit from the accurate localization capabilities of
VLC systems by virtue of the properties of light propagation. Very
precise localization information of mobile devices can be obtained
in indoor VLC systems. Hence, (i) the location of devices can be
continuously recorded; (ii) statistics can be created to establish the
Bob
Eve
Alice
GSSK
Modulation
Spatial
Constellation
Design
Zero
Forcing
Precoder
Power
Scaling
Fig. 1: A block diagram for secure OGSSK transmission technique.
typical movement pattern of the device; and (iii) machine learning
techniques could be developed to flag any anomaly. Furthermore,
as the light signals are significantly better spatially containable
compared to radio signals, it is possible to effectively use the concept
of dual-gate locking. Accordingly, a single username and password
are not sufficient to gain access to the user’s account, whereas a
key is also required. The key is specific to the AP that the user is
assigned to, which generally is the closest AP. Because of the spatial
containment of light, the coverage region could already be within
a few meters from the location of the legitimate user and hence,
dual-gate locking provides an extra level of protection. In order to
support mobility of the legitimate users, typically, the system would
allow handover to the immediate next neighbour APs. This creates a
dynamic geo-fence as some APs will be accessible and others would
be outside the ring of immediate next neighbours. This concept is
referred to as geo-fencing. Depending on the number of legitimate
users and eavesdroppers, different cases in PLS techniques can be
classified as one legitimate user and one eavesdropper in a single
cell VLC system or multi-user in large-scale VLC networks where
multiple legitimate users communicate in the presence of multiple
eavesdroppers scattered randomly in an indoor facility.
III. EFFIC IE NT PHYSICAL LAYE R SECURITY FOR OGSSK
In this section, we present a novel spatial constellation design
(SCD) based PLS technique for OGSSK systems. When the trans-
mitter is equipped with multiple LEDs and the eavesdropper’s CSI is
not known at the transmitter, some of the new modulation techniques
such as OSM and its variants can be employed. OSM is a promising
MIMO transmission method to reduce inter-channel interference de-
tection complexity and power consumption of the system. Our recent
research results have shown that PLS for MIMO-VLC systems could
be ensured by SCD in OGSSK [15], [30]. It has been shown that OSM
along with suitably designed precoding at the transmitter has the
capability to generate very strong interference to the eavesdropper and
zero interference to a legitimate user, without consuming additional
power to generate the jamming signal. Furthermore, in SCD-based
beamforming, the source does not need to know the CSIT of Eve.
In Fig. 1, a single cell VLC system consisting of one legitimate
user and one eavesdropper over a MIMO wiretap channel is shown.
For the given system model, it is assumed that Alice is equipped
with Nttransmit LEDs and both Bob and Eve are equipped with Nr
receive PDs. In conventional GSSK, Naout of NtLEDs are activated
during the transmission period. The active LED index set for the kth
transmission symbol may be given by Ik∈ {Ik,1,Ik,2,· · · ,INa}.
Therefore, the received signal model in conventional GSSK is as
follows:
y=˜
Hk˜
sk+n,(1)
where ˜
skand ˜
HkRNr×Nt
+denotes effective constellation symbols
vector and effective channel matrix for the kth symbol, respectively.
Also, nis the additive white Gaussian noise (AWGN) vector. In order
to achieve secrecy with enhanced error performance on Bob’s side by
using SCD, the transmit signal is chosen to be, ˜
sk=ρPkvk+b. The
parameters ρand bdenote power normalization and DC bias coeffi-
cients, respectively [15]. Furthermore, vkrepresents the transmitted
signal points chosen from a uniform constellation with maximized
minimum Euclidean distance. The design of the precoding matrix for
the kth transmit symbol Pkplays a vital role in the secrecy capacity
of the VLC system. The standard procedure is to use zero forcing
precoding (ZFP) to avoid inter-channel leakages,
Pk=˜
HT
k,B˜
Hk,B1˜
HT
k,Bk. (2)
where ˜
Hk,Brepresents Bob’s effective channel matrix for the kth
transmission signal. Consequently, the receiver signals on both Bob’s
and Eve’s sides is given by
yB=sB+nB,and yE=sB+J+nE,(3)
where sB
=ρ˜
Hk,BPkvk,B=ρvk,B. As can be seen from (3), a
destructive jamming signal vector, J, occurs at Eve’s location that
enhances the PLS of the OGSSK system. The jamming vector could
also be expressed by:
J=sEsB=ρ˜
Hk,E˜
Hk,BPkvk,B(4)
It is important to note from (4) that Jemerges naturally in the
proposed method while SCD for Bob is utilized. Thus, PLS is
achieved without the knowledge of Eve’s CSIT information and
without spending additional power for enhanced secrecy. At the
receiver, the transmitted GSSK symbols can be recovered by detecting
the active LED indexes at both Bob’s and Eve’s sides. Thus, the
maximum-likelihood (ML) detection at Bob and Eve’s sides are as
follows:
b
Ik,B= arg max
IkkyBsBk2},
b
Ik,E= arg max
Ikky
0
Es
0
Ek2}.(5)
Hence, the achievable secrecy capacity bounds for the SCD-based
OGSSK system can be derived as,
CGSSK Nr
2log2 det (Cw)(1/Nr)
σ2
B!ζU,
CGSSK Nr
2log2 det (Cw)(1/Nr)
σ2
B!ζL(6)
where
ζL=Nr
2log2 1 + det Cwσ2
BINr(1/Nr)
σ2
BK(2/Nr)!,(7)
ζU=Nr
2log2 exp(1) det (Dw)(1/Nr)
2σ2
B!log2(K)(8)
+ log21 + (K1) exp ρ2
4σ2
B
d2
min,
and Dw=diag(Cw). Interested readers are referred to [15] for the
proofs and additional details about the notation conventions.
The secrecy performance for the proposed SCD-based OGSSK
PLS technique is investigated for three different scenarios to simulate
various Bob-Eve separations. Accordingly, a 6m×6m×3m
0510 15 20 25 30
SNR [dB]
10-6
10-4
10-2
100
BER
Scenario 1 - Bob
Scenario 1 - Eve
Scenario 2 - Bob
Scenario 2 - Eve
Scenario 3 - Bob
Scenario 3 - Eve
Fig. 2: BER vs. SNR performance of the proposed SCD-based GSSK.
standard room is considered. Moreover, it is assumed that 8LEDs
are uniformly distributed and located on the ceiling of the room. In
Fig. 2, the secrecy performance of the proposed SCD-based OGSSK
technique is evaluated for the low, mid and high separation of Bob-
Eve. As can be seen from the figure, the proposed system reduces
the effective signal-to-noise-ratio (SNR) by introducing jamming
which destructs the achievable BER at Eve’s side. Furthermore, the
maximization of the minimum Euclidean distance by SCD assists Bob
in achieving the minimum BER within transmit power constraints.
Similarly, in Fig. 3, the secrecy performance of the proposed system
is evaluated by the long term average of the BER. Accordingly, the
random mobility of both Bob and Eve are considered in Fig. 3. It can
be inferred from Fig. 3 that the proposed system ensures the BER of
Eve is kept at a fixed level for all the practical SNR regimes even
when the users are mobile.
IV. PHY LAYE R SECURITY FOR MULTI FRIENDLY USE RS W IT H
COO PE RATI VE RE LAYI NG (NOMA AP PRO ACH )
In this section, we investigate the implementation of two possible
key enabling technologies for 6G mobile networks, NOMA and
VLC. Particularly, the application of beamforming to VLC-NOMA
systems is considered for PLS [31]. A number of trusted cooperative
half-duplex relay luminaries are deployed to achieve the secrecy
in the transmitted data. Transmitters are equipped with single light
fixtures, containing multiple LEDs, and receiving nodes are equipped
with single PDs, rendering the considered setting as a single-input-
single-output (SISO) system. Transmission is amplitude constrained
to maintain operation within the LED’s dynamic range. Achievable
secrecy rate regions are derived under such amplitude constraints for
this multi-receiver wiretap channel, initially for direct transmission
without the relays, and then for multiple relaying schemes.
Intensity modulation (IM) is used to superimpose the source’s data
signal xRon top of a fixed positive bias current that drives its
LEDs. Superposition coding is used to convey two messages (x1, x2)
to the legitimate users:
x=αx1+ (1 α)x2,0α1.(9)
The weak user decodes its message first by treating the interference
caused by the other user as noise, whereas the strong user decodes
its message via successive interference cancellation. The amplitude
constraint imposed to maintain operation within LEDs’ dynamic
range is
0510 15 20 25 30
SNR [dB]
10-4
10-3
10-2
10-1
100
BER
Bob
Eve
Fig. 3: Average BER performance of Bob and Eve when they are located
randomly in the room.
source
relays
eavesdropperstrong userweak user
cooperative jamming
Fig. 4: An indoor VLC system model in which a source luminary communi-
cates with two legitimate users in the presence of an eavesdropper.
α|x1|+ (1 α)|x2| ≤ Aa.s.,||d||11.(10)
An illustration of a source communicating with two legitimate users
in the presence of an eavesdropper is depicted in Fig. 4.
The relays cooperatively transmit a jamming signal Jz,simultane-
ously with the source’s transmission. Both the beamforming vector
JRKand relay’s common signal z, which is a random variable,
are chosen to satisfy the following conditions:
|z| ≤ ¯
Aa.s. |J|  1K.(11)
The parameter zis distributed uniformly within ¯
A, ¯
A. In order
not to harm the legitimate users, the beamforming vector should be
chosen in the null spaces of the legitimate users. That is,
gT
1Jo=gT
2Jo= 0 (12)
The achievable secrecy rate pairs via cooperative jamming decode-
and-forward, and amplify-and-forward have been obtained and for
each relaying scheme, secure beamforming signals have been de-
signed to maximize the achievable rates under the relays’ amplitude
constraints [31]. The design of the beamforming signals was based
on formulating optimization problems that were inferred from the
derived achievable secrecy rates. Finally, achievable secrecy regions
of the proposed schemes have been obtained and the effect of the
eavesdropper’s distance from the source on the achievable secrecy
sum rate have been investigated. In Fig. 5, we plot the achievable
secrecy rate regions for the schemes proposed in this paper, along
with the direct transmission scheme. The solid lines are when the
0
0.05
0.1
0.15
0.2
0.25
0.3
0 0.1 0.2 0.3 0.4 0.5 0.6
weak user’s secrecy rate (nats/s/Hz)
strong user’s secrecy rate (nats/s/Hz)
direct transmission
cooperative jamming
decode-and-forward
amplify-and-forward
Fig. 5: The eavesdropper at (0, 1.75, 0.7) [solid] and at (0, 2, 0.7) [dashed].
eavesdropper is located at (0, 1.75, 0.7). We see in this case that
all the proposed schemes perform better than the direct transmission.
The dashed lines in Fig. 5 illustrate when the eavesdropper is located
a bit further away from the source (and the relays) at (0, 2, 0.7).
We see from this that all the achievable secrecy rates are higher, yet
the direct transmission outperforms both the decode-and-forward and
amplify-and-forward schemes, since the channels from the relays to
the eavesdropper are worse. We also notice the slight improvement
of the cooperative jamming scheme in this case over the direct
transmission. It is clear from this figure that the best relaying scheme
depends on both the source-Eve and relay-Eve locations.
V. CONCLUSION
In this paper, PLS has been considered for VLC. Following an
overview of VLC based PLS approaches, two recently proposed
VLC-specific PLS techniques named OGSSK-based modulation with
SCD and superposition coding based NOMA have been elaborated
on. The computer simulations have showed that the proposed tech-
niques effectively enhanced the secrecy of the information transmis-
sion by exploiting the properties of the VLC channel. Therefore,
further enhancements on the PLS performance of VLC systems could
also be achieved by other VLC-specific techniques such as (i) em-
ploying SCD along with IM-based MIMO-NOMA; (ii) manipulating
the geometry of the ADT array to confine each LEDs coverage area;
and (iii) constructing a geo-fenced area to protect the legitimate user.
REFERENCES
[1] C. E. Shannon, “Communication theory of secrecy systems,Bell Syst.
Tech. J., vol. 28, no. 4, pp. 656–715, Oct. 1949.
[2] Q. Wang, K. Xu, and K. Ren, “Cooperative secret key generation from
phase estimation in narrowband fading channels,IEEE J. Sel. Areas
Commun., vol. 30, no. 9, pp. 1666–1674, Oct. 2012.
[3] A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8,
pp. 1355–1387, Oct 1975.
[4] I. Csiszar and J. Korner, “Broadcast channels with confidential mes-
sages,” IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339–348, May 1978.
[5] S. Leung-Yan-Cheong and M. Hellman, “The gaussian wire-tap chan-
nel,” IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451–456, Jul. 1978.
[6] F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap
channel,” IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961–4972, Aug.
2011.
[7] L. Yang, “Transmitter preprocessing aided spatial modulation for
multiple-input multiple-output systems,” in Proc. IEEE Veh. Technol.
Conf. (VTC Spring), May 2011, pp. 1–5.
[8] L. Wang, S. Bashar, Y. Wei, and R. Li, “Secrecy enhancement analysis
against unknown eavesdropping in spatial modulation,IEEE Commun.
Lett., vol. 19, no. 8, pp. 1351–1354, Aug 2015.
[9] Y. Wei, L. Wang, and T. Svensson, “Analysis of secrecy rate against
eavesdroppers in MIMO modulation systems,” in Proc. IEEE Int. Conf.
Wireless Commun. Signal Process. (WCSP), Oct 2015, pp. 1–5.
[10] N. Valliappan, A. Lozano, and R. W. Heath, “Antenna subset modula-
tion for secure millimeter-wave wireless communication,IEEE Trans.
Commun., vol. 61, no. 8, pp. 3231–3245, August 2013.
[11] S. Dimitrov, S. Sinanovic, and H. Haas, “Signal shaping and modulation
for optical wireless communication,” J. Lightw. Technol., vol. 30, no. 9,
pp. 1319–1328, May 2012.
[12] A. Yesilkaya, E. Bas¸ar, F. Miramirkhani, E. Panayirci, M. Uysal, and
H. Haas, “Optical MIMO-OFDM with generalized LED index modula-
tion,” IEEE Trans. Commun., vol. 65, no. 8, pp. 3429–3441, Aug. 2017.
[13] R. Mesleh, H. Elgala, and H. Haas, “Optical spatial modulation,
IEEE/OSA J. Opt. Commun. Netw., vol. 3, no. 3, pp. 234–244, Mar.
2011.
[14] A. Yesilkaya, T. Cogalan, E. Panayirci, H. Haas, and H. V. Poor,
“Achieving minimum error in MISO optical spatial modulation,” in Proc.
IEEE Int. Conf. Commun. (ICC), May 2018, pp. 1–6.
[15] E. Panayirci, A. Yesilkaya, T. Cogalan, H. V. Poor, and H. Haas,
“Physical-layer security with optical generalized space shift keying,
IEEE Trans. Commun., pp. 1–1, Jan. 2020, (Early Access Article).
[16] L. Yin and H. Haas, “Physical-layer security in multiuser visible light
communication networks,” IEEE J. Sel. Areas Commun., vol. 36, no. 1,
pp. 162–174, Jan. 2018.
[17] A. Mostafa and L. Lampe, “Securing visible light communications via
friendly jamming,” in Proc. IEEE Globecom Wkshps. (GC Wkshps), Dec
2014, pp. 524–529.
[18] F. Wu, C. Dong, L. Yang, and W. Wang, “Secure wireless transmission
based on precoding-aided spatial modulation,” in Proc. IEEE Global
Commun. Conf. (GLOBECOM), Dec 2015, pp. 1–6.
[19] Y. Chen, L. Wang, Z. Zhao, M. Ma, and B. Jiao, “Secure multiuser
MIMO downlink transmission via precoding-aided spatial modulation,”
IEEE Commun. Lett., vol. 20, no. 6, pp. 1116–1119, June 2016.
[20] M. A. Arfaoui, A. Ghrayeb, and C. M. Assi, “Secrecy performance of
multi-user MISO VLC broadcast channels with confidential messages,”
IEEE Trans. Wireless Commun., vol. 17, no. 11, pp. 7789–7800, Nov.
2018.
[21] Z. Chen and H. Haas, “Physical layer security for optical attocell
networks,” in Proc. IEEE Int. Conf. Commun. (ICC), May 2017, pp.
1–6.
[22] A. Mostafa and L. Lampe, “Physical-layer security for indoor visible
light communications,” in Proc. IEEE Int. Conf. Commun. (ICC), June
2014, pp. 3342–3347.
[23] F. Wang, C. Liu, Q. Wang, J. Zhang, R. Zhang, L. Yang, and L. Hanzo,
“Optical jamming enhances the secrecy performance of the generalized
space-shift-keying-aided visible-light downlink,IEEE Trans. Commun.,
vol. 66, no. 9, pp. 4087–4102, Sep. 2018.
[24] H. Li, F. Wang, J. Zhang, and C. Liu, “Secrecy performance analysis
of MISO visible light communication systems with spatial modulation,”
Digital Signal Process., vol. 81, pp. 116 – 128, Jul. 2018.
[25] F. Wang, R. Li, J. Zhang, S. Shi, and C. Liu, “Enhancing the secrecy
performance of the spatial modulation aided VLC systems with optical
jamming,” Signal Process., vol. 157, pp. 288 – 302, Dec. 2019.
[26] X. Wang, X. Wang, and L. Sun, “Spatial modulation aided physical layer
security enhancement for fading wiretap channels,” in Proc. IEEE Int.
Conf. Wireless Commun. Signal Process. (WCSP), Oct 2016, pp. 1–5.
[27] S. R. Aghdam and T. M. Duman, “Secure space shift keying transmis-
sion using dynamic antenna index assignment,” in Proc. IEEE Global
Commun. Conf., Dec 2017, pp. 1–6.
[28] Y. Yang and M. Guizani, “Mapping-varied spatial modulation for phys-
ical layer security: Transmission strategy and secrecy rate,IEEE J. Sel.
Areas in Commun., vol. 36, no. 4, pp. 877–889, April 2018.
[29] X. Jiang, M. Wen, H. Hai, J. Li, and S. Kim, “Secrecy-enhancing scheme
for spatial modulation,” IEEE Commun. Lett., vol. 22, no. 3, pp. 550–
553, March 2018.
[30] O. Hassan, E. Panayirci, H. V. Poor, and H. Haas, “Physical-layer
security for indoor visible light communications with space shift keying
modulation,” in Proc. IEEE Global Telecomm. Conf. (GLOBECOM),
Dec. 2018, pp. 1–6.
[31] A. Arafa, E. Panayirci, and H. V. Poor, “Relay-aided secure broadcasting
for visible light communications,” IEEE Trans. Commun., vol. 67, no. 6,
pp. 4227–4239, Jun. 2019.
... Moreover, the imaging capture components, including the complementary metal-oxide-semiconductor (CMOS) and chargecoupled device (CCD), are potential solutions for optical receivers. Generally, the advantages of VLCs [8][9][10] are safety, illumination, low cost, no electromagnetic interference, and a license-free spectrum. Since frequency band competition is increasingly fierce, VLC has become increasingly important. ...
... If the receiver and transmitter are not within the other's coverage angle, then the gain is 0. Eventually, the channel matrix H considered in this paper can be measured in a physical environment. In the SMP system, the M-ary PAM with grayscale mapping is employed, and each intensity can be expressed in (8). The M-level PAM with grayscale intensity equation is: ...
Article
Full-text available
This paper focuses on the hardware components of smartphones, namely, the use of displays and cameras in mobile devices as transmitters and receivers to establish a near-field multiple-input–multiple-output (MIMO) visible light communication (VLC) system. Based on the relationship between the grayscale values of transmitted and received signals, the physical channel responses are detected and approximated with a high-order regression to obtain the channel gain. With the constraint of bit numbers in the MIMO VLC system, an integer-type water-filling scheme was designed for bit allocation to improve transmission efficiency. The physical examinations show that bit error rate (BER) reduction can be 26.4% with Gaussian noise of 30 dB and detected channel gain compared with the equal bit allocation. The optimization of the simulation was confirmed with the bit assignments in real cases.
... In addition to that, the emergence of AI/ML-based attacks, intelligent network management and orchestration, intelligent transceivers, and the development of quantum computing pose greater threats on these technologies [130,131]. While most of the communication technologies are yet to develop defenses against these threats, VLC has seen a significant improvement in security, using physical layer security (PLS) techniques [127,132]. PLS techniques add another layer of security at the physical layer to enhance the overall security of the transmission. Further, OWC also uses PLS, time-slot coding, and chaotic phase techniques to improve the security of the links [133][134][135]. ...
Article
Full-text available
Sixth-generation (6G) mobile technology is currently under development, and is envisioned to fulfill the requirements of a fully connected world, providing ubiquitous wireless connectivity for diverse users and emerging applications. Transformative solutions are expected to drive the surge to accommodate a rapidly growing number of intelligent devices and services. In this regard, wireless local area networks (WLANs) have a major role to play in indoor spaces, from supporting explosive growth in high-bandwidth applications to massive sensor arrays with diverse network requirements. Sixth-generation technology is expected to have a superconvergence of networks, including WLANs, to support this growth in applications in multiple dimensions. To this end, this paper comprehensively reviews the latest developments in diverse WLAN technologies, including WiFi, visible light communication, and optical wireless communication networks, as well as their technical capabilities. This paper also discusses how well these emerging WLANs align with supporting 6G requirements. The analyses presented in the paper provide insight into the research opportunities that need to be investigated to overcome the challenges in integrating WLANs in a 6G ecosystem.
... The fact that light signals cannot penetrate through opaque objects makes OWC systems particularly secure in confined spaces, provided that eavesdroppers are located outside the room [39,40,41,42,43]. This means that OWC systems provide inherent physical layer security (PLS) compared to RF systems where the signals can easily be intercepted by eavesdroppers from behind a wall. ...
Preprint
Full-text available
This chapter is devoted to discussing the integration of intelligent reflecting surfaces (IRSs), or intelligent walls, in optical wireless communication (OWC) systems. IRS technology is a revolutionary concept that enables communication systems to harness the surrounding environment to control the propagation of light signals. Based on this, specific key performance indicators could be achieved by altering the electromagnetic response of the IRSs. In the following, we discuss the background theory and applications of IRSs and present a case study for an IRS-assisted indoor light-fidelity (LiFi) system. We then highlight some of the challenges related to this emerging concept and elaborate on future research directions.
... The fact that light signals cannot penetrate through opaque objects makes OWC systems particularly secure in confined spaces, provided that eavesdroppers are located outside the room [39,40,41,42,43]. This means that OWC systems provide inherent physical layer security (PLS) compared to RF systems where the signals can easily be intercepted by eavesdroppers from behind a wall. ...
Chapter
Full-text available
This chapter is devoted to discussing the integration of intelligent reconfigurable surfaces (IRSs), or intelligent walls, in optical wireless communication (OWC) systems. IRS technology is a revolutionary concept that enables communication systems to harness the surrounding environment to control the propagation of light signals. Based on this, specific key performance indicators could be achieved by altering the electromagnetic response of the IRSs. In the following, we discuss the background theory and applications of IRSs and present a case study for an IRS‐assisted indoor light‐fidelity (LiFi) system. We then highlight some of the challenges related to this emerging concept and elaborate on future research directions.
... Hybrid RF VLC [184,185] • High data rates • Superior user experience • High throughput Security [182,[186][187][188][189] • Physical layer security and confidentiality Fig. 13. Two-user downlink NOMA network. ...
Article
The evolution of the previous mobile communication generations has led to innovative goals of the Internet of Everything (IoE) in the 5G. However, addressing all IoE-associated problems in 5G is difficult and a long-term process. As the key performance indicators (KPIs) of the 5G services are highly diverse, it is an intimidating task to develop a single platform enabling all KPIs. The vision of nextgeneration 6G wireless communications lies not only in enhancing these targets but also in providing new services. Numerous extensively envisaged future services, including lifecritical services and wireless brain-computer interactions, will be critically dependent on an instant, virtually unlimited wireless connectivity. In this direction, the 6G is envisioned to have primely five service objectives; further-enhanced mobile broadband (FeMBB), ultra-massive machine type communication (umMTC), extremely reliable low latency communication (ERLLC), long-distance and high-mobility communications (LDHMC), and extremely low-power communications (ELPC). The 3D global integration of the wireless communication networks is lacking in the 5G, which is targeted by the future 6G. In this paper, we present an exhaustive review of the 6G wireless communication network. We explore the various existing mobile communication generations concerning data rate, frequency band, bandwidth allotted, latency, and applications. We also highlight various current trends and issues in the 5G communication network, which drives research for the 6G communication network. Our focus is to provide a comprehensive survey on the future 6G. So, we explored the objectives and design principles for 6G. This paper highlights the key 6G technology drivers. This paper also proposes an architectural design for 6G. Moreover, we carry out a case-study of 6G architecture operational design and compare the result with previous generation architecture designs. Further, 6G envisioned open research challenges, research directions, and recent advancements are also highlighted in this paper. Furthermore, we discuss possible usecases in terms of real-time interactions of the biological, physical, and digital world, and also how these use-cases are going to serve in 6G.
Article
A visible light communication (VLC) system with an improved noise model applied to physical layer security (PLS) is investigated, where secure beamforming signals with superposition coding are used. In the improved model, the output signal follows Gaussian distribution, but its variance is signal-dependent. Two different methods are proposed to obtain lower and upper bounds on the secrecy rate of the strong user for direct transmission. Under some constraints, closed-form expressions of the lower and upper bounds on secrecy rate regions for various (trusted cooperative half-duplex) relaying schemes are derived. Moreover, the scenarios of blockage/outside coverage are included, and the relevant security performances are discussed. Numerical results show that the lower and upper bounds on secrecy rate regions are tight enough, and the cooperative jamming is superior over other relaying schemes.
Article
With the demand for economical and high-speed wireless services, Optical Wireless Communication (OWC) has attracted increasing attention in both research and the market. In the past decades, numerous optical-related techniques (e.g., LEDs, displays, cameras) and systems (e.g., VLC, LiFi, LiDAR) have been invented. OWC techniques, which are considered as a competitive mechanics in next-generation networks as an alternative to RF approaches, offer 10,000 times more bandwidth than conventional radio frequency (RF)-based wireless techniques (e.g., WiFi, LoRa, Bluetooth, LTE), as well as tremendous spatial reuse potential with even less interference. Because optical communications have a limited wavelength and travel in the line of sight (LoS) manner, the OWC is commonly thought as a secure wireless approach to confine light transmissions within physical bounds. However, in the real world, it is completely untrue. The privacy leakages and security risks broadly exist in the optical-related wireless applications including OWC networks. These threats and weaknesses have recently been the subject of several initial studies. However, they lack systematic analysis and are isolated. This survey first presents a general workflow of OWC systems which consists of three stages: before signal emission (BSE), during signal propagation (DSP), and after signal receiving (ASV). For each stage, related risks are reviewed. Then, we summarize existing attacks in optical-related wireless applications and corresponding counter-attack solutions. Finally, we outline the future trends for improving OWC security.
Article
In this paper, we determine the secrecy performance of a dual-hop hybrid free space optics (FSO)-visible light communication (VLC) system with a randomly located legitimate internet of things (IoT) based receiver in the presence of two distinct eavesdroppers (EDs). We consider one FSO based ED located near the relay, wiretapping the FSO link. However, another ED wiretaps the information from the multiple VLC sources embedded on the ceiling of the room. We consider the three different scenarios for VLC based ED: 1) the effect of uniformly distributed ED in the absence of any secured zone in the VLC coverage area; 2) the impact of uniformly distributed ED in the presence of a VLC secured area; and 3) the effect of random way point (RWP) distribution ED on the system’s security. The secrecy performance of the system is evaluated based on known and unknown instantaneous channel state information (CSI) of EDs. Furthermore, the closed form expression for secrecy outage probability (SOP) in terms of Meijer’s-G and Gauss hypergeometric functions is derived. In order to have a better insight into the system’s performance, analytical results are expressed asymptotically in the high signal-to-noise ratio (SNR) regime. Following that, Monte Carlo simulations are done to validate the theoretical results. Additionally, a secrecy threshold is obtained in order to comprehend the system’s security and reliability.
Article
Full-text available
Spatial modulation (SM) is a promising technique that reduces inter-channel interference while providing high power efficiency and detection simplicity. In order to ensure the secrecy of SM, precoding and friendly jamming are widely adopted in the literature. However, neither of those methods could take the mentioned advantages of SM. In this paper, a novel spatial constellation design (SCD) technique is proposed to enhance the physical layer security (PLS) of optical generalized space shift keying (GSSK), which can retain some benefits of SM. Due to the lack of small-scale fading, the quasi-static characteristics of the optical channel is used to tailor the received signal at the legitimate user’s (Bob’s) side. The PLS of the system is guaranteed by the appropriate selection of the power allocation coefficients for randomly activated light emitting diodes (LEDs). With the aid of Bob’s channel state information at the transmitter, the bit error ratio (BER) of Bob is minimized while the BER performance of the potential eavesdroppers (Eves) is significantly degraded. Monte-Carlo simulation results show that the proposed SCD-zero forcing precoding (ZFP) forces Eve to experience a BER of around 0.5 by outperforming both the conventional and ZFP based GSSK for all practical signal-to-noise-ratio regimes and Bob-Eve separations.
Article
Full-text available
We study in this paper the secrecy performance of a multi-user (MU) multiple-input single-output (MISO) visible light communication (VLC) broadcast channel with confidential messages. The underlying system model comprises K +1 nodes: a transmitter (Alice) equipped with N fixtures of LEDs and K spatially dispersed users, each equipped with a single photodiode (PD). The MU channel is modeled as deterministic and real-valued, and assumed to be perfectly known to Alice since all users are assumed to be active. We consider typical secrecy performance measures, namely, the max-min fairness, the harmonic mean, the proportional fairness and the weighted fairness. For each performance measure, we derive an achievable secrecy rate for the system as a function of the precoding matrix. As such, we propose algorithms that yield the best precoding matrix for the derived secrecy rates, where we analyze their convergence and computational complexity. In contrast, what has been considered in the literature so far is zero-forcing (ZF) precoding, which is suboptimal. We present several numerical examples through which we demonstrate the substantial improvements in the secrecy performance achieved by the proposed techniques compared to those achieved by the conventional ZF. However, this comes at a slight increase in the complexity of the proposed techniques as compared to that of ZF.
Article
A visible light communication broadcast channel is considered, in which a transmitter luminaire communicates with two legitimate receivers in the presence of an external eavesdropper. A number of trusted cooperative half-duplex relay luminaires are deployed to aid with securing the transmitted data. Transmitters are equipped with single light fixtures, containing multiple light emitting diodes, and receiving nodes are equipped with single photo-detectors, rendering the considered setting as a single-input single-output system. Transmission is amplitudeconstrained to maintain operation within the light emitting diodes’ dynamic range. Achievable secrecy rate regions are derived under such amplitude constraints for this multi-receiver wiretap channel, first for direct transmission without the relays, and then for multiple relaying schemes: cooperative jamming, decode-and-forward, and amplify-and-forward. Superposition coding with uniform signaling is used at the transmitter and the relays. Further, for each relaying scheme, secure beamforming vectors are carefully designed at the relay nodes in order to hurt the eavesdropper and/or benefit the legitimate receivers. Superiority of the proposed relaying schemes, with secure beamforming, is shown over direct transmission. It is also shown that the best relaying scheme depends on how far the eavesdropper is located from the transmitter and the relays, the number of relays, and their geometric layout.
Article
In order to enhance the secrecy performance of the spatial modulation (SM) aided visible light communication (VLC) system, an optical jamming aided secrecy enhancement scheme is proposed in this paper, in which transmitter (Alice) sends the optical jamming signals and the confidential signal simultaneously with amplitude and power constraints, wherein the truncated Gaussian distribution is adopted by the optical jamming signals for the considered constraints. Additionally, with finite discrete support set of the channel inputs’ distribution, the corresponding secrecy performance is systematically analyzed for the optical jamming aided SM-VLC system, which includes the average mutual information (AMI), the lower bound on AMI and its closed-form expression approximation and the achievable secrecy rate. Furthermore, the power allocation problem for the proposed SM-VLC systems with optical jamming is considered. Finally, extensive simulation results are presented to validate our analytical results and the secrecy versus bit error ratio (BER) trade-off is characterized.
Article
In order to enhance the secrecy performance of the Generalized Space Shift Keying (GSSK) visible light communication (VLC) system, in this paper, an optical jamming aided secrecy enhancement scheme is proposed, in which the source transmitter (S) simultaneously sends both the confidential desired signal and optical jamming signals under amplitude and power constraints. The optical jamming signals obey the truncated Gaussian distribution for satisfying the constraints. Given the discrete set of channel inputs, the optical jamming aided GSSK-VLC system’s secrecy performance is analyzed. Explicitly, the average mutual information (AMI), the lower bound of AMI and its closed-form approximation as well as the achievable secrecy rate are formulated analytically. Furthermore, the optimal power sharing strategy of the proposed GSSK-VLC systems relying on optical jamming is derived. Closed-form expressions are provided for the optimal power sharing in both the low- and high-SNR regions. Finally, extensive simulation results are presented to validate our analytical results.
Article
In this paper, a novel transmission strategy, referred to as mapping-varied spatial modulation, is proposed for physical layer security, where the transmitter varies mapping patterns for the radiated information and the antenna information of spatial modulation, based on the instantaneous pattern of legitimate channel quality information that is unknown to eavesdroppers. Therefore, eavesdroppers cannot successfully decode the confidential information and the transmission over the legitimate link is secured from the wire-tap of eavesdroppers, without relying on higher-layer encryption. An important virtue of the proposed transmission strategy is that the transmitter does not need to know eavesdroppers’ channels states at all. To further demonstrate the advantage of this scheme, its secrecy rate was formulated for the purpose of facilitating the performance evaluation. Moreover, illustrative numerical results pertaining to the metrics of ergodic secrecy rate and secrecy outage probability not only substantiate the validity of the proposed transmission strategy, but also provide useful references for the system design with the mapping-varied spatial modulation, from the view of physical layer security.