Conference PaperPDF Available

Securing visible light communications via friendly jamming

Authors:

Abstract and Figures

Despite offering higher security than radio frequency (RF) channels, the broadcast nature of the visible light communication (VLC) channel makes VLC links inherently susceptible to eavesdropping by unauthorized users. In this work, we consider the physical-layer security of VLC links aided by friendly jamming. The jammer has multiple light sources, but does not have access to the data transmitted. The eavesdropper's reception is degraded by a jamming signal that causes no interference to the legitimate receiver. Due to the limited dynamic range of typical light-emitting diodes (LEDs), both the data and jamming signals are subject to amplitude constraints. Therefore, we begin with deriving a closed-form secrecy rate expression for the corresponding wiretap channel, and adopt secrecy rate as the performance measure. Then, we formulate a linear programming problem to maximize the secrecy rate when the eavesdropper's channel is accurately known to the jammer. Finally, we consider robust beamforming to maximize the worst-case secrecy rate when information about the eavesdropper's channel is uncertain due to location uncertainty. The robust scheme makes use of simple linear programming, making real-time implementation feasible in a variety of real-world scenarios.
Content may be subject to copyright.
Securing Visible Light Communications via Friendly
Jamming
Ayman Mostafa and Lutz Lampe
Department of Electrical and Computer Engineering
The University of British Columbia, Vancouver, BC, V6T 1Z4, Canada
Email: {amostafa,lampe}@ece.ubc.ca
Abstract—Despite offering higher security than radio fre-
quency (RF) channels, the broadcast nature of the visible light
communication (VLC) channel makes VLC links inherently
susceptible to eavesdropping by unauthorized users. In this work,
we consider the physical-layer security of VLC links aided by
friendly jamming. The jammer has multiple light sources, but
does not have access to the data transmitted. The eavesdropper’s
reception is degraded by a jamming signal that causes no
interference to the legitimate receiver. Due to the limited dynamic
range of typical light-emitting diodes (LEDs), both the data and
jamming signals are subject to amplitude constraints. Therefore,
we begin with deriving a closed-form secrecy rate expression for
the corresponding wiretap channel, and adopt secrecy rate as the
performance measure. Then, we formulate a linear programming
problem to maximize the secrecy rate when the eavesdropper’s
channel is accurately known to the jammer. Finally, we consider
robust beamforming to maximize the worst-case secrecy rate
when information about the eavesdropper’s channel is uncertain
due to location uncertainty. The robust scheme makes use of
simple linear programming, making real-time implementation
feasible in a variety of real-world scenarios.
I. INTRODUCTION
Visible light communication (VLC) refers to the wire-
less transmission of information by the means of intensity-
modulating light sources. VLC systems utilize solid-state illu-
mination devices, typically inexpensive, high-brightness light-
emitting diodes (LEDs), to establish high-speed, short-range
wireless communication links. Such VLC links benefit from
the license-free light spectrum and immunity to radio fre-
quency (RF) interference, making VLC a potential technology
to complement Wi-Fi networks and mitigate the degradation
in quality-of-service caused by the congested industrial, scien-
tific, and medical (ISM) radio bands.
The broadcast nature of the wireless medium gives rise
to concerns about the privacy and confidentiality of wireless
networks. Compared to RF channels, VLC links offer better
signal confinement and reduced probability of interception
due to line-of-sight (LoS) propagation and confinement of
light waves by opaque surfaces. Nevertheless, the security of
VLC links is still a concern, especially when the physical
area illuminated by the transmitter is accessible to, or shared
by, multiple users and, consequently, potential eavesdroppers.
Examples include classrooms, meeting rooms, public libraries,
and airplanes to name a few.
During the last few years, physical-layer security has
evolved as a promising research area to enhance the confi-
This work was supported by the Natural Sciences and Engineering Research
Council of Canada (NSERC).
dentiality of wireless networks and complement encryption
techniques typically applied at higher layers of the network
stack. The framework of physical-layer security was pioneered
by Wyner in his celebrated paper [1] when he proposed the
wiretap channel model and secrecy capacity as an information-
theoretic security measure. Since then, physical-layer security
has attracted much interest from researchers in information
theory and signal processing. The secrecy capacity of the Gaus-
sian single-input, single-output (SISO) channel was considered
in [2], the single-input, multiple-output (SIMO) channel in [3],
the multiple-input, single-output (MISO) channel in [4], and
the multiple-input, multiple-output (MIMO) channel in [5], [6].
With the absence of multiple antennas at the transmitter, or the
lack of accurate information about the eavesdropper’s channel,
the use of jamming signals, also known as artificial noise, was
proposed in [7], [8] to degrade the eavesdropper’s reception
and improve the security of the source-destination link.
In this paper, we consider secure transmission over the
VLC channel with the help of a friendly jammer. The sender
transmits data via a single light source, typically a group
of LEDs, while the receiver and eavesdropper have a single
photodetector, each. The jammer is equipped with multiple
light sources, without having access to the transmitted data. A
jamming signal is transmitted to increase the interference seen
by the eavesdropper, resulting in higher secrecy rates over the
legitimate channel.
Typical LEDs have a limited dynamic range, which im-
poses an amplitude constraint on the data and jamming sig-
nals. Hence, we derive a closed-form secrecy rate expression
for the corresponding wiretap channel, subject to amplitude
constraints, and adopt secrecy rate as our performance metric.
Given accurate eavesdropper’s channel state information (CSI),
we formulate a simple linear programming problem to design
the optimal jamming beamformer that maximizes the achiev-
able secrecy rate. In addition, we adopt a bounded uncertainty
model about the eavesdropper’s channel, and consider robust
beamforming, via linear semi-infinite programming, to maxi-
mize the worst-case secrecy rate over all the admissible chan-
nels. We use grid-discretization to approximate the problem
into an ordinary linear program, and characterize worst-case
secrecy rates. The robust scheme, aided by implementation
simplicity, has the potential to mitigate performance degrada-
tion caused by inaccurate CSI in practical scenarios.
We use the following notation throughout the paper. The
set of n-dimensional real-valued numbers is denoted by R
n
,
and the set of n-dimensional non-negative real-valued numbers
is denoted by R
n
+
. Bold characters denote column vectors, and
vector transposition is denoted by the superscript {·}
T
. The all-
ones column vector is denoted by , and its dimension will
be clear from the context. The curled inequality symbol
between two vectors denotes componentwise inequality. We
use |·| around a vector to denote componentwise absolute
value, and use the same symbol around a set to denote the
cardinality of the set. The logarithm of base 2 is denoted
by log(·). A lower-case character x denotes one realization
of the random variable X. Differential entropy and mutual
information are denoted by (·) and I(·; ·), respectively.
The remainder of the paper is organized as follows. The
channel and system models are presented in Section II. In
Section III, we derive the closed-form secrecy rate expres-
sion, and consider optimal and robust jamming beamforming.
Simulation and numerical results are presented in Section IV.
Finally, we conclude the paper in Section V.
II. CHANNEL AND SYSTEM MODELS
A. VLC Channel Model
We consider a DC-biased pulse-amplitude modulation
(PAM) scheme. The transmit element is an illumination LED
driven by a fixed bias I
DC
. A zero-mean current signal x R is
superimposed on I
DC
, and imperceptibly modulates the output
intensity via an appropriate driver circuit. Typical LEDs have
a limited dynamic range, and, therefore, x must satisfy an
amplitude constraint expressed by |x| A, A = αI
DC
,
where α [0, 1] is the modulation index. At the receiver,
a photodiode (PD) converts the incident optical power into a
proportional current. Then, the DC bias is removed, and the
signal is amplified via a transimpedance amplifier to produce
a voltage signal y R.
Such a VLC channel is conventionally modelled by
y = hx + w (1)
where h R
+
is the channel gain and w is a zero-mean,
additive white Gaussian noise (AWGN) term. Assuming an
LED with Lambertian emission pattern, the channel gain is
given by [9], [10]
h =
1
2π
(m + 1) cos
m
(φ)
A
RX
d
2
cos(ψ)R |ψ| ψ
FoV
0 |ψ| > ψ
FoV
(2)
where m = 1/log
cos φ
1
2
is the order of Lambertian
emission with half irradiance at φ
1
2
(measured from the optical
axis of the LED), φ is the angle of irradiance, A
RX
is the
receiver collection area, d is the LoS distance between the
LED and PD, ψ is the angle of incidence (measured from the
axis normal to the receiver surface), R is the PD responsivity,
and ψ
FoV
is the receiver field-of-view (FoV). The receiver
collection area is given by [10]
A
RX
=
n
2
sin
2
(ψ
FoV
)
A
PD
(3)
where n is the refractive index of the optical concentrator and
A
PD
is the PD area.
h
JB
h
JE
Eve
Bob
Jammer
Jammer
JammerJammer Alice
h
AB
h
AE
Jamming
Data
Fig. 1. A VLC network with one transmitter (Alice), one receiver (Bob), one
eavesdropper (Eve), and one jammer equipped with multiple light sources.
B. System Model
We consider the VLC scenario illustrated in Fig. 1. The
room is illuminated by N
J
+ 1 identical light fixtures. Each
fixture consists of a group of LEDs modulated by the same
current signal. Alice, the transmitter, sends her data via a single
fixture. On the other hand, the jammer is equipped with N
J
fixtures but does not have access to the data transmitted by
Alice. The legitimate receiver, Bob, and the eavesdropper, Eve,
are equipped with a single PD, each.
Our goal is to secure the communication link between Alice
and Bob, by hiding information from Eve, without reliance
on encryption techniques probably applied at upper layers.
Without help from the jammer, securing the connection be-
tween Alice and Bob, both having a single transmit or receive
element, will not be possible unless Bob is closer to Alice than
Eve. On the other hand, a jammer equipped with multiple light
sources, and without having access to the transmitted data,
can help secure the connection by transmitting an intelligently-
designed jamming signal which increases the interference seen
by Eve and degrades her signal-to-interference-plus-noise ratio
(SINR) while causing minimum or no interference to Bob.
Utilizing the VLC channel model in (1), the signals re-
ceived by Bob and Eve, respectively, are given by
y = h
AB
x + h
T
JB
s + w
B
(4a)
z = h
AE
x + h
T
JE
s + w
E
(4b)
where h
AB
, h
AE
R
+
are the channel gains from Alice to
Bob and Eve, respectively, h
JB
, h
JE
R
N
J
+
are the channel
gain vectors form the jammer to Bob and Eve, respectively,
x R is the data signal, s R
N
J
is the jamming signal,
and w
B
, w
E
are zero-mean AWGN samples with variance σ
2
.
Similar to x, each entry of s assumes a zero-mean distribution
and, therefore, the illumination level remains unaffected. The
system of equations in (4) describes a SISO wiretap channel.
Due to the limited dynamic range of the LEDs, both the
data and jamming signals must satisfy an amplitude constraint,
as expressed by
|x| A, (5a)
|s| A. (5b)
To simplify the wiretap channel model in (4), we impose
the following restrictions. First, the jamming signal should
cause no interference to Bob, i.e., s is restricted to be in the
W
B
~ (0,σ
2
)
(AWGN)
W
E
~ (0,σ
2
)
(AWGN)
J ~

( A,A)
(Jamming signal)
X Y
Z
Alice Bob
Eve
V
h
AB
h
AE
h
T
JE
w
X ~

( A,A)
(Data signal)
Fig. 2. The wiretap channel corresponding to (6).
nullspace of h
T
JB
. Such a restriction is not necessarily optimum
as it might be possible that allowing some interference at
Bob would cause higher interference at Eve and probably
higher secrecy rate. The problem is further simplified when
the jammer adopts a potentially sub-optimal beamforming
strategy, i.e., the jammer chooses s = wj, where w R
N
J
,
|w| , is a deterministic vector, i.e., a beamformer, while
j R, |j| A, is a zero-mean random jamming symbol.
Beamforming is preferred as it permits simple implementation,
however it might be an inappropriate jamming strategy if
multiple eavesdroppers are existent with probably orthogonal
or near-orthogonal channels. Finally, to simplify deriving a
closed-form secrecy rate expression, we assume that both x
and j are uniformly distributed over the interval [A, A].
Therefore, (4) simplifies to
y = h
AB
x + w
B
, (6a)
z = h
AE
x + h
T
JE
wj + w
E
, (6b)
and a block diagram illustrating (6) is shown in Fig. 2.
III. SECRECY RATE ANALYSIS
A. Secrecy Rate Expression
Theorem 1: An achievable secrecy rate, in (bits/sec/Hz),
for the wiretap channel in (6) is max(R
s
, 0), where R
s
is
given by
R
s
=
1
2
log
1 +
2h
2
AB
A
2
π
2
log
h
AE
|
h
T
JE
w
|
+
|
h
T
JE
w
|
h
AE
log
e
|
h
T
JE
w
|
h
AE
1
h
AE
|
h
T
JE
w
|
log
e
|
h
T
JE
w
|
h
AE
> 1
=
1
2
log
1 +
2h
2
AB
A
2
π
2
min
log
h
AE
h
T
JE
w
+
h
T
JE
w
h
AE
log
e,
h
AE
h
T
JE
w
log
e
!
.
(7)
0 1 2 3 4 5 6 7 8 9 10
0
0.5
1
1.5
2
2.5
3
3.5
4
h
T
JE
w × 10
4
Secrecy rate (bits/sec/Hz)
h
AE
= 0.1000 × 10
4
h
AE
= 0.2154 × 10
4
h
AE
= 0.4642 × 10
4
h
AE
= 1.0000 × 10
4
h
AE
= 2.1544 × 10
4
h
AE
= 4.6416 × 10
4
h
AE
= 10.000 × 10
4
h
AB
= 10
4
A = 0.1
σ
2
= 10
13
Fig. 3. The secrecy rate of Theorem 1.
Proof: See Appendix A.
Figure 3 depicts R
s
as a function of h
T
JE
w for dif-
ferent values of h
AE
. Notice that R
s
is upper-bounded by
1
2
log
1 +
2h
2
AB
A
2
π
2
, which is an achievable rate over Alice-
Bob channel subject to |x| A [11, Theorem 5]. Notice also
that R
s
is a monotonically-increasing function of h
T
JE
w over
the open interval (0, ), while it is a monotonically-decreasing
function of h
AE
over the same interval.
B. Eve’s Channel Perfectly Known to the Jammer
In general, it is unreasonable to assume that Eve’s CSI is
accurately known to Alice or the jammer as Eve is typically a
passive attacker or a malicious user, and will not feed back
her CSI. Nevertheless, there exist certain scenarios where
such an assumption is justifiable. For example, Eve might
be a registered user in the network and her CSI is known
to the jammer, however, in a certain transmission session,
confidential messages shall be delivered from Alice to Bob
and kept hidden from Eve. Alternatively, the jammer might
be able to accurately determine Eve’s location and map the
location information into CSI using (2). Nevertheless, even
in practical scenarios, the assumption of accurate Eve’s CSI
is worth investigation as it provides an upper bound on the
performance in more realistic scenarios.
If h
JE
is perfectly known to the jammer, then the opti-
mal jamming beamformer w
that maximizes the achievable
secrecy rate is given by
w
= arg max
w
R
s
= arg max
w
h
T
JE
w (8a)
s.t.
h
T
JB
w = 0,
|w| .
(8b)
The maximization problem in (8) is a linear program which
can be efficiently solved.
C. Bounded Uncertainty about Eve’s Channel
In this scenario, we consider a bounded uncertainty model
about Eve’s channel. Such a model would naturally arise
if the jammer is aware of Eve’s physical location, with
some uncertainty, and uses the location information to get
an estimate of Eve’s channel. Alternatively, Eve might be
expected or permitted to exist within a certain bounded area
known to the jammer. For simplicity, we consider only two-
dimensional location uncertainty, and assume that Eve’s height
is fixed and accurately known. Extension to three-dimensional
location uncertainty should be straightforward. Let A
E
denote
the area bounding Eve’s location, and let H
A
E
be the set of all
admissible channel realizations for Eve within A
E
. Our goal is
to design the beamformer w so as to maximize the worst-case
secrecy rate over all the channel realizations in H
A
E
. That is
max
w
min
h
h
AE
h
JE
i
∈H
A
E
R
s
(9a)
s.t.
h
T
JB
w = 0,
|w| .
(9b)
Since R
s
is a monotonically-increasing function of h
T
JE
w/h
AE
over the open interval (0, ), the max-min problem can be
written as
max
w
min
h
h
AE
h
JE
i
∈H
A
E
h
T
JE
w
h
AE
(10)
subject to the constraints in (9b).
By introducing the auxiliary variable t, the problem can be
reformulated as
max
w,t
t (11a)
s.t.
h
AE
t h
T
JE
w 0
h
AE
h
JE
H
A
E
,
h
T
JB
w = 0,
|w| .
(11b)
Since the uncertainty set H
A
E
is continuous, i.e., an infinite set,
the problem in (11) is a linear semi-infinite program. One ap-
proach to tackle such a problem is to consider the approximate
problem obtained by grid-discretization [12], [13]. Hence, we
approximate the area A
E
by a two-dimensional grid A
E
A
E
,
A
E
= K < , to impose a finite uncertainty set H
A
E
with
cardinality
H
A
E
= K.
Thus, the approximate problem can be written as
max
w,t
t (12a)
s.t.
h
AE
i
t h
T
JE
i
w 0 1 i K,
h
T
JB
w = 0,
|w| .
(12b)
The maximization in (12) is an ordinary, i.e., finite, linear pro-
gramming problem and can be efficiently solved. Obviously,
the accuracy of such an approximate problem depends on the
discretization resolution.
IV. SIMULATION RESULTS
In this section, we provide numerical results by simulating
a typical indoor VLC scenario. The problem geometry is
876
54
321
x
y
5 m
1⅔ m
Alice
5 m
1⅔ m
Fig. 4. Problem geometry
TABLE I. SIMULATION PARAMETERS.
Problem geometry
Room dimensions (W × L × H) (5 × 5 × 3) m
3
Light fixtures height (Alice and the jammer) 3 m
Receivers height (Bob and Eve) 0.85 m
Total number of light fixtures N
J
+ 1 9
Transmitter characteristics
Number of LEDs per fixture 7
Average optical power per LED 1 W
Modulation index α 10%
LED half luminous intensity semi-angle φ
1
2
60
Receiver characteristics
Receiver FoV ψ
FoV
70
Lens refractive index n 1.5
PD responsivity R 0.54 (A/W)
PD geometrical area A
PD
1 cm
2
Average noise power σ
2
98.39 dBm
illustrated in Fig. 4, and the simulation parameters are provided
in Table I. The room has a size of 5 × 5 × 3 m
3
, and it
is illuminated by nine identical light fixtures. Every fixture
consists of seven LEDs, and every LED radiates one Watt of
optical power. The fixture in the center is modulated by Alice
for data transmission, while the remaining eight fixtures are
exploited for jamming. The modulation index for all the LEDs
is 10%. Bob and Eve are located at height 0.85 m above the
floor level, and their receivers have a 70
FoV and a single PD,
each. We use a two-dimensional coordinate system (x, y) to
identify the receivers locations. The origin (0, 0) corresponds
to the room center at the receivers level. Noise power is
calculated using [10, Eqn. (6) and Table I] with a receiver
bandwidth of 70 MHz, and the result is averaged over the
entire room area. The average noise power is 98.39 dBm.
In Fig. 5, we plot the secrecy rate of Theorem 1
as a function of Eve’s location when Bob is located at
(0.70 m, 0.90 m), while in Fig. 6, we fix Eve’s location
at (0.30 m, 1.50 m) and plot the secrecy rate as a function
of Bob’s location. In both figures, Bob’s and Eve’s channels
are perfectly known to the jammer, and the beamformer in
(8) is applied. When Eve is located in the vicinity of Bob,
jamming is restrained by the nullspace of Bob, resulting in
considerably reduced secrecy rates. On the other hand, when
Bob and Eve are sufficiently separated, the jammer is able to
significantly degrade Eve’s reception, and the resulting secrecy
rate is almost independent of Eve’s channel and is upper-
bounded by the achievable rate between Alice and Bob.
In Fig. 7, we consider the robust beamforming problem.
−2
−1
0
1
2
−2
−1
0
1
2
0
0.5
1
1.5
2
2.5
x (m)
y (m)
Secrecy rate (bits/sec/Hz)
0
0.5
1
1.5
2
Fig. 5. Secrecy rate achieved via the jamming beamformer in (8) as a function
of Eve’s location. Bob is located at (0.70 m, 0.90 m).
−2
−1
0
1
2
−2
−1
0
1
2
0
0.5
1
1.5
2
2.5
3
x (m)
y (m)
Secrecy rate (bits/sec/Hz)
0
0.5
1
1.5
2
2.5
Fig. 6. Secrecy rate achieved via the jamming beamformer in (8) as a function
of Bob’s location. Eve is located at (0.30 m, 1.50 m).
Bob is located at (0.70 m, 0.90 m) and his channel is
perfectly known to the jammer. The room area is divided into
16 squares, each of area 1.25 × 1.25 m
2
. The area of each
square represents uncertainty about Eve’s location. The jammer
knows the index of the square surrounding Eve, but does not
know her exact location, i.e., Eve’s location information is
quantized into 16 squares. The problem is to design the optimal
jamming beamformer for each square in order to maximize
the worst-case secrecy rate. Every square is discretized into
a 26 × 26 grid, i.e., with a resolution of 5 × 5 cm
2
, and the
beamformer obtained by (12) is applied. The resulting secrecy
rate is shown as a function of Eve’s actual location within
every square, and worst-case secrecy rates are also shown.
V. CONCLUSION
In this paper, we proposed securing VLC links with the
help of friendly jammers. This approach is particularly useful
Fig. 7. Secrecy rate as a function of Eve’s location when the robust beam-
former obtained via (12) is applied. Bob is located at (0.70 m, 0.90 m).
Eve’s location information is quantized into 16 squares, each of area 1.25 ×
1.25 m
2
. The jammer is aware which square bounds Eve’s location. Worst-
case secrecy rates (bits/sec/Hz) are shown within each square.
when multiple antennas are not available to the data transmit-
ter, e.g., due to hardware or wiring limitations. We derived a
closed-form secrecy rate expression for the wiretap channel
to serve as the design equation. We formulated simple linear
programming problems to maximize achievable secrecy rates
with perfect and imperfect eavesdropper’s CSI. Of particular
interest is the robust scheme as it directly addresses a major
drawback of physical-layer security approaches, namely, per-
formance sensitivity to CSI assumptions.
APPENDIX A
PROOF OF THEOREM 1
A. The Trapezoidal Distribution
Let a and b be two positive real numbers, and X and
Y be two independent random variables uniformly distributed
over the intervals [a, a] and [b, b], respectively. Then, the
density function of the sum Z = X + Y is obtained by
the convolution f
Z
(z) = (f
X
f
Y
)(z), giving rise to the
trapezoidal distribution
f
Z
(z) =
z+a+b
4ab
a b z −|a b|,
min
1
2a
,
1
2b
−|a b| z |a b|,
z+a+b
4ab
|a b| z a + b,
0 otherwise,
(13)
as illustrated in Fig. 8 for b a. Thus, the differential entropy
of Z (in bits) is given by
(Z) =
Z
f
Z
(z) log f
Z
(z)dz
=
log 2a +
b
a
log
e b a
log 2b +
a
b
log
e b > a
= min
log 2a +
b
a
log
e , log 2b +
a
b
log
e
.
(14)
A plot of (14) as a function of b, for a = 2, is shown in Fig.
9. Notice that (Z) is differentiable b > 0, including b = a.
a a
1/2a
f
X
(x)
x
b b
1/2b
f
Y
(y)
y
(a+b) (a b) a b a+b
1/2a
f
Z
(z) = (f
X
*f
Y
)(z)
z
Fig. 8. The trapezoidal distribution (b a).
0 1 2 3 4 5 6 7 8 9 10
2
3
4
5
6
7
8
b
Dierential entropy (bits)
log 2a +
b
a
log
e
log 2b +
a
b
log
e
min(log 2a +
b
a
log
e , log 2b +
a
b
log
e)
a = 2
Fig. 9. Differential entropy of the trapezoidal distribution (a = 2).
B. Derivation of the Secrecy Rate Expression in (7)
Without loss of generality, in the following we assume that
h
T
JE
w is non-negative. For the case h
T
JE
w < 0, w is simply
replaced with w without violating the amplitude constraints
or changing the secrecy rate results.
First, we recall our assumption in Section II-B that both
x and j are uniformly distributed over the interval [A, A].
Thus,
(h
AB
X) = log 2h
AB
A, (15a)
(h
AE
X) = log 2h
AE
A, (15b)
h
T
JE
wJ
= log 2h
T
JE
wA. (15c)
Then, using (14), (15b), and (15c), the differential entropy of
V (see Fig. 2) is given by
(V ) = min
log 2h
AE
A +
h
T
JE
w
h
AE
log
e ,
log 2h
T
JE
wA +
h
AE
h
T
JE
w
log
e
. (16)
Therefore, the secrecy capacity of the wiretap channel in (6)
can be lower-bounded as
C
s
= max
p
X
(I(X; Y ) I(X; Z))
(a)
I(X; Y ) I(X; Z)
(b)
I(X; Y ) I(X; V )
= (Y ) (Y |X) (V ) + (V |X)
(c)
1
2
log
2
2 (h
AB
X)
+ 2
2 (W
B
)
(W
B
) (V )
+
h
T
JE
wJ
(d)
=
1
2
log
4h
2
AB
A
2
+ 2π
2
1
2
log 2π
2
(V )
+ log 2h
T
JE
wA
(e)
=
1
2
log
1 +
2h
2
AB
A
2
π
2
min
log
h
AE
h
T
JE
w
+
h
T
JE
w
h
AE
log
e ,
h
AE
h
T
JE
w
log
e
(17)
where (a) follows from dropping the maximization, (b) from
the data-processing inequality [14, Theorem 2.8.1], (c) from
lower-bounding (Y ) using the entropy-power inequality [14,
Theorem 17.7.3], (d) by substituting from (15a) and (15c), and
(e) by substituting from (16).
REFERENCES
[1] A. D. Wyner, “The wire-tap channel, The Bell System Technical
Journal, vol. 54, pp. 1355–1387, 1975.
[2] S. Leung-Yan-Cheong and M. Hellman, “The Gaussian wire-tap chan-
nel, IEEE Transactions on Information Theory, vol. 24, no. 4, pp.
451–456, 1978.
[3] P. Parada and R. Blahut, “Secrecy capacity of SIMO and slow fading
channels, in Proceedings of International Symposium on Information
Theory, ISIT 2005, Sept 2005, pp. 2152–2155.
[4] A. Khisti and G. W. Wornell, “Secure transmission with multiple
antennas I: The MISOME wiretap channel, IEEE Transactions on
Information Theory, vol. 56, no. 7, pp. 3088–3104, 2010.
[5] ——, “Secure transmission with multiple antennas—part II: The MI-
MOME wiretap channel, IEEE Transactions on Information Theory,
vol. 56, no. 11, pp. 5515–5532, 2010.
[6] F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap
channel, IEEE Transactions on Information Theory, vol. 57, no. 8, pp.
4961–4972, Aug 2011.
[7] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,IEEE
Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180–2189,
June 2008.
[8] A. Swindlehurst, “Fixed SINR solutions for the MIMO wiretap chan-
nel, in IEEE International Conference on Acoustics, Speech and Signal
Processing (ICASSP), April 2009, pp. 2437–2440.
[9] J. Kahn and J. Barry, “Wireless infrared communications, Proceedings
of the IEEE, vol. 85, no. 2, pp. 265–298, Feb 1997.
[10] L. Zeng et al., “High data rate multiple input multiple output (MIMO)
optical wireless communications using white LED lighting, IEEE
Journal on Selected Areas in Communications, vol. 27, no. 9, pp. 1654–
1662, 2009.
[11] A. Lapidoth, S. Moser, and M. Wigger, “On the capacity of free-space
optical intensity channels, IEEE Transactions on Information Theory,
vol. 55, no. 10, pp. 4449–4461, Oct 2009.
[12] R. Hettich and K. O. Kortanek, “Semi-infinite programming: Theory,
methods, and applications, Society for Industrial and Applied Mathe-
matics (SIAM) Review, vol. 35, no. 3, pp. 380–429, Sep 1993.
[13] M. A. Goberna and M. A. L
´
opez, Post-Optimal Analysis in Linear Semi-
Infinite Optimization, ser. Briefs in Optimization. Springer, 2014.
[14] T. Cover and J. Thomas, Elements of Information Theory. Wiley, 2006.
... Specifically, the use of precoding techniques to improve the PLS performance has been studied in [15]- [20] and references therein. The benefit of AN in enhancing the achievable secrecy rate has also been intensively investigated in the literature [21]- [26]. It should be noted that AN is often utilized in combination with precoding to fully exploit the benefit of the spatial degrees of freedom available at the transmitters. ...
... It is well-known that LEDs have specific input ranges over which the emitted optical power is linearly related to the amplitude of the input drive current. Due to this characteristic, previous works in [21]- [26] assumed that the AN and information-bearing signals are selected from amplitude-constrained constellations (e.g., pulse amplitude modulation -PAM) to ensure that the amplitude of the LED input drive current can be properly constrained within the LED linear range. However, the assumption of amplitude-constrained signals does not apply to multicarrier signals such as orthogonal frequency division multiplexing (OFDM), which are expected to be widely employed for high data-rates VLC systems [27]. ...
Preprint
Full-text available
Though visible light communication (VLC) systems are contained to a given room, improving their security is an important criterion in any practical deployment. In this paper, the design of artificial noise (AN) to enhance physical layer security in VLC systems is studied in the context of input signals with no explicit amplitude constraint (e.g., multicarrier systems). In such systems, clipping is needed to constrain the input signals within the limited linear ranges of the LEDs. However, this clipping process gives rise to non-linear clipping distortion, which must be incorporated into the AN design. To facilitate the solution of this problem, a sub-optimal design approach is presented using the Charnes-Cooper transformation and the convex-concave procedure (CCP). Then, a novel AN transmission scheme is proposed to reduce the impact of clipping distortion, thus improving the secrecy performance. The proposed scheme exploits the common structure of LED luminaries that they are often composed of several light-emitting chips. Capitalizing on this property, LED chips in each luminaire are divided into two groups driven by separate driver circuits. One group is used to transmit the information-bearing signal, while the other group transmits the AN. Numerical results show that the clipping distortion significantly reduces the secrecy level, and using AN is advantageous over the no-AN scheme in improving the secrecy performance. Moreover, the proposed AN transmission scheme is shown to achieve considerable secrecy improvements compared with the traditional transmission approaches (e.g., about 1 bit/s/Hz improvement in the achievable secrecy rate when the standard deviation of the LEDs' modulating current is 0.25 A and the signal-to-interference-plus-noise ratio of the eavesdropper's received signal is limited to $0$ dB).
... Hence, the AN-aided transmission reduces to the precoding transmission [16]- [18] when no power is allocated to AN generation. Initial research on the topic considered systems where a fixed LED luminaire transmits the information-bearing signal while the rest broadcast jamming signals [22], [23]. We term this scheme as ANaided SISO transmission. ...
Article
This paper studies the design of energy-efficient artificial noise (AN) schemes in the context of physical layer security in visible light communications (VLC). Two different transmission schemes termed selective AN-aided single-input single-output (SISO) and AN-aided multiple-input single-output (MISO) are examined and compared in terms of secrecy energy efficiency (SEE). In the former, the closest LED luminaire to the legitimate user (Bob) is the information-bearing signal’s transmitter. At the same time, the rest of the luminaries act as jammers transmitting AN to degrade the channels of eavesdroppers (Eves). In the latter, the information-bearing signal and AN are combined and transmitted by all luminaries. When Eves’ CSI is unknown, an indirect design to improve the SEE is formulated by maximizing Bob’s channel’s energy efficiency. A low-complexity design based on the zero-forcing criterion is also proposed. In the case of known Eves’ CSI, we study the design that maximizes the minimum SEE among those corresponding to all eavesdroppers. At their respective optimal SEEs, simulation results reveal that when Eves’ CSI is unknown, the selective AN-aided SISO transmission can archive twice as good SEE as the AN-aided MISO does. In contrast, when Eves’ CSI is known, the AN-aided MISO outperforms by 30%.
... Different from the traditional security techniques at application layer, physical-layer security (PLS) technology can provide information-theoretic security by utilizing the inherent random characteristics and noise of a channel to limit the amount of information eavesdroppers can intercept [6], using techniques such as beamforming [7], jamming [8,9], physical-layer key generation [10], physical-layer security coding [11], etc. [12]. To design PLS communication schemes, it is essential to possess knowledge of the channel characteristics and noise properties. ...
Article
Full-text available
Visible light communication (VLC) with physical-layer security can provide information-theoretic security for the optical wireless channel based on the characteristics of the channel instead of encryption algorithms and secret keys at application layer. Since precise location information of communication parties is crucial for estimating channel states and designing secure communication schemes, this paper proposes an integrated visible light communication and positioning system which provides triple functionalities of high-accuracy indoor positioning, physical-layer secure visible light communication, and flicker mitigation illumination. A heterogeneous signal hybrid line coding scheme is proposed for the transmitter to converge the high-speed communication data signals and the low-speed positioning data signals, and a hybrid heterogeneous signal extraction scheme is proposed for the receiver to separate the hybrid heterogeneous signals with a high-bandwidth photodetector and a low-pass complementary metal-oxide-semiconductor (CMOS) image sensor. Based on the positioning information and the communication scheme, a polar codes-based forward error correction coding scheme is designed to achieve physical-layer security and transmission reliability simultaneously. Numerical results show that the proposed system can reach a secrecy code rate of 0.76 for a single-input single-output indoor VLC channel and a transmission efficiency of 0.38 without perceivable flicker. Experimental results show that the proposed system can achieve an average positioning accuracy of 3.35 cm and decrease the bit error rate of a legitimate receiver to a near error-free level (lower than 10⁻⁷) while keeping the bit error rate of an eavesdropper at 0.4887 (nearly 0.5) with a transmission data rate of 1 Mbps, resulting in near-zero suppression of the eavesdropped information and a high secrecy capacity of 0.9994.
... Due to its efficiency in terms of computation and energy, various emerging technologies, such as 5G [1], [2], Industrial IoT (Internet of Things) [3], IoT [4], Visible Light Communication (VLC) [5], [6], and Wireless Sensor Networks (WSNs) [7] exploit the friendly jamming approach. However, the mentioned models above have to tackle the following challenges • Compliance with real-world conditions, such as Rayleigh fading and shadowing ...
Article
Full-text available
Wireless networks are inherently more susceptible to attacks than their wired counterparts. The easiness of transmitting and receiving messages for legitimate users is also valid for attackers, and traditionally cryptographic methods have been exploited to provide security and privacy. However, these are far from fulfilling the needs of current technologies, such as IoT devices with limited computation and energy sources. Therefore, friendly jamming (FJ) emerges as a promising solution to this problem due to being a computationally cheap and energy-efficient operation. However, one of the tradeoffs of FJ is its viability. Although some studies try to cope with this challenge, they are complicated and focus on old technologies. This study proposes a lightweight and flexible FJ scheme to address these challenges. We also demonstrate that our model has the same performance as one of the mentioned studies above in a more straightforward way.
... The complexity-based (key) approaches extract random keys from the legitimate channel to encipher data at the upper layers [13], [14], which is being increasingly challenged with the rapid development of computational power [15]. Existing physical layer security schemes for VLC systems mainly focused on beamforming [16], [17] or artificial noise generation [18], [19] with multiple LEDs in indoor static channels, which cannot be directly applied to dynamic W2A scenarios. To the best of the authors' knowledge, the security scheme for W2A-VLC has not been systematically investigated in previous studies. ...
Article
Full-text available
In this paper, we propose a physical layer security (PLS) scheme based on superposition modulation for water-to-air (W2A) visible light communication (VLC) systems. We characterize the high correlation between W2A and air-to-water (A2W) link gains from ray tracing simulation and experiments. The proposed scheme selects the modulation order and superposition parameter based on the high correlation between the W2A and A2W link gains. The scheme performance is studied by exploring its immunity against different types of attacks. The symbol error rates (SERs) are analyzed for both random and correlated attacks. Based on the link gains from real measurements, it is shown that under random attack Eve's SER exceeds 0.77 when Eve's signal-to-noise ratio (SNR) varies from 5 dB to 30 dB, and under correlated attack Eve's SER decreases only for a high correlation coefficient when Eve is close enough to Bob, which is unrealistic for eavesdropping. In addition, the entropy of potential set under post-processing attack is derived and the complexity of successful cracking increases with the modulation set size. For intelligent attack, two unsupervised algorithms, namely K-means clustering and expectation maximization (EM) algorithm, are adopted for modulation identification. The distributions of Eve' SER under all four attacks are investigated based on the measured link gains in the laboratory environment, which demonstrates that intelligent attack with K-means clustering possesses the highest eavesdropping capability. However, more numerical results show that for intelligent attack with K-means clustering under wavy water surface, the proportion of the case where Eve has a higher SER than Bob is lower than 0.5 only when Eve lies between Alice and Bob with small horizontal distance, which is unrealistic for eavesdropping operation.
Article
With the demand for economical and high-speed wireless services, Optical Wireless Communication (OWC) has attracted increasing attention in both research and the market. In the past decades, numerous optical-related techniques (e.g., LEDs, displays, cameras) and systems (e.g., VLC, LiFi, LiDAR) have been invented. OWC techniques, which are considered as a competitive mechanics in next-generation networks as an alternative to RF approaches, offer 10,000 times more bandwidth than conventional radio frequency (RF)-based wireless techniques (e.g., WiFi, LoRa, Bluetooth, LTE), as well as tremendous spatial reuse potential with even less interference. Because optical communications have a limited wavelength and travel in the line of sight (LoS) manner, the OWC is commonly thought as a secure wireless approach to confine light transmissions within physical bounds. However, in the real world, it is completely untrue. The privacy leakages and security risks broadly exist in the optical-related wireless applications including OWC networks. These threats and weaknesses have recently been the subject of several initial studies. However, they lack systematic analysis and are isolated. This survey first presents a general workflow of OWC systems which consists of three stages: before signal emission (BSE), during signal propagation (DSP), and after signal receiving (ASV). For each stage, related risks are reviewed. Then, we summarize existing attacks in optical-related wireless applications and corresponding counter-attack solutions. Finally, we outline the future trends for improving OWC security.
Article
Visible light communication (VLC) is a promising technology for next-generation indoor wireless broadband communication systems. Physical layer security (PLS) is one proposed method to ensure data security for VLC in public areas. However, most PLS studies in the literature neglect the reflections in the VLC channel and do not consider inter-symbol interference (ISI). This paper investigates the ISI effects on the secrecy rate in multiple-input single-output VLC systems where the reflections are not neglected for the cases of perfect and imperfect knowledge of the eavesdropper’s channel state information. We aim to compensate for the ISI effects by designing zero-forcing (ZF) and artificial noise (AN) beamformers. In addition, we formulate optimization problems to maximize the secrecy rate resulting in non-convex and NP-hard problems. Thus, we utilize the particle swarm optimization algorithm for solutions and also convert non-convex optimization problems into easily solvable linear problems. Furthermore, robust ZF and AN beamformers for the worst-case scenario are considered for the cases of ISI and no ISI. The results reveal that ISI severely degrades the secrecy rate; however, well-designed beamformers can reverse the ISI effects.
Article
This study aims to design, implement, and demonstrate a one-way real-time VLC system through DCO-OFDM using QAM–16 as the Mapper (Modulator). The system was divided into two units, namely VLC Server (transmitter) and Client (receiver), based on a low-bit rate transmission applications with running text, which is often found in digital signage. The uniqueness of this report focuses on the use of low-cost components for VLC transceivers, including DSP and ASP. In this condition, DCO-OFDM digital blocks were embedded within the generic-purpose Microcontroller as DSP (STM32F4 Development board), with available and widely assessed libraries being utilized for implementation in the proposed system, to speed up the DSP development process. Meanwhile, the ASP contained a linear LED driver as a substitute for the commercial Bias-T function, as well as the AFE receiver with the Op-Amps circuit blocks. The developmental approach of the VLC system was also carried out by simulation and realistic implementation, where the productions of the DSP and ASP sections, especially the DCO-OFDM with the QAM–16 mapper and the AFE receiver, were performed on MATLAB® and SPICE®, respectively. Additionally, the transfer of QAM–16 modulated data was realistically performed by observing the impact of the optical channel distance changes on the behavior of the constellation diagram.
Article
Full-text available
New upper and lower bounds are presented on the capacity of the free-space optical intensity channel. This channel is characterized by inputs that are nonnegative (representing the transmitted optical intensity) and by outputs that are corrupted by additive white Gaussian noise (because in free space the disturbances arise from many independent sources). Due to battery and safety reasons the inputs are simultaneously constrained in both their average and peak power. For a fixed ratio of the average power to the peak power the difference between the upper and the lower bounds tends to zero as the average power tends to infinity, and the ratio of the upper and lower bounds tends to one as the average power tends to zero. The case where only an average-power constraint is imposed on the input is treated separately. In this case, the difference of the upper and lower bound tends to 0 as the average power tends to infinity, and their ratio tends to a constant as the power tends to zero.
Article
Full-text available
We consider the MIMO wiretap channel, that is a MIMO broadcast channel where the transmitter sends some confidential information to one user which is a legitimate receiver, while the other user is an eavesdropper. Perfect secrecy is achieved when the transmitter and the legitimate receiver can communicate at some positive rate, while insuring that the eavesdropper gets zero bits of information. In this paper, we compute the perfect secrecy capacity of the multiple antenna MIMO broadcast channel, where the number of antennas is arbitrary for both the transmitter and the two receivers. Our technique involves a careful study of a Sato-like upper bound via the solution of a certain algebraic Riccati equation.
Article
Full-text available
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at the sender, intended receiver and eavesdropper. The associated channel matrices are fixed and known to all the terminals. A computable characterization of the secrecy capacity is established as the saddle point solution to a minimax problem. The converse is based on a Sato-type argument used in other broadcast settings, and the coding theorem is based on Gaussian wiretap codebooks. At high signal-to-noise ratio (SNR), the secrecy capacity is shown to be attained by simultaneously diagonalizing the channel matrices via the generalized singular value decomposition, and independently coding across the resulting parallel channels. The associated capacity is expressed in terms of the corresponding generalized singular values. It is shown that a semi-blind "masked" multi-input multi-output (MIMO) transmission strategy that sends information along directions in which there is gain to the intended receiver, and synthetic noise along directions in which there is not, can be arbitrarily far from capacity in this regime. Necessary and sufficient conditions for the secrecy capacity to be zero are provided, which simplify in the limit of many antennas when the entries of the channel matrices are independent and identically distributed. The resulting scaling laws establish that to prevent secure communication, the eavesdropper needs three times as many antennas as the sender and intended receiver have jointly, and that the optimum division of antennas between sender and intended receiver is in the ratio of 2:1.
Book
Post-Optimal Analysis in Linear Semi-Infinite Optimizationexamines the following topicsin regards tolinear semi-infinite optimization: modeling uncertainty, qualitative stability analysis, quantitative stability analysis and sensitivity analysis. Linear semi-infinite optimization (LSIO) deals with linear optimization problems where the dimension of the decision space or the number of constraints is infinite. The authors compare the post-optimal analysis with alternative approaches to uncertain LSIO problems and providereaders withcriteria to choose the best way to model a given uncertain LSIO problem depending on the nature and quality of the data along withthe available software. Thiswork also contains open problems which readers will find intriguing a challenging. Post-Optimal Analysis in Linear Semi-Infinite Optimization is aimed towardresearchers, graduate and post-graduate students of mathematics interested in optimization, parametric optimization and related topics.
Article
Upper and lower bounds are derived on the capacity of the free-space optical intensity channel. This channel has a nonnegative input (representing the transmitted optical intensity), which is corrupted by additive white Gaussian noise. To preserve the battery and for safety reasons, the input is constrained in both its average and its peak power. For a fixed ratio of the allowed average power to the allowed peak power, the difference between the upper and the lower bound tends to zero as the average power tends to infinity and their ratio tends to one as the average power tends to zero. When only an average power constraint is imposed on the input, the difference between the bounds tends to zero as the allowed average power tends to infinity, and their ratio tends to a constant as the allowed average power tends to zero.
Article
We consider the situation in which digital data is to be reliably transmitted over a discrete, memoryless channel (DMC) that is subjected to a wire-tap at the receiver. We assume that the wire-tapper views the channel output via a second DMC. Encoding by the transmitter and decoding by the receiver are permitted. However, the code books used in these operations are assumed to be known by the wire-tapper. The designer attempts to build the encoder-decoder in such a way as to maximize the transmission rate R, and the equivocation d of the data as seen by the wire-tapper. In this paper, we find the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission. In particular, if d is equal to H s, the entropy of the data source, then we consider that the transmission is accomplished in perfect secrecy. Our results imply that there exists a C8 > 0, such that reliable transmission at rates up to CS is possible in approximately perfect secrecy.
Article
Starting from a number of motivating and abundant applications in Section 2, including control of robots, eigenvalue computations, mechanical stress of materials, and statistical design, the authors describe a class of optimization problems which are referred to as semi-infinite, because their constraints bound functions of a finite number of variables on a whole region. In Sections 3-5, first- and second-order optimality conditions are derived for general non-linear problems as well as a procedure for reducing the problem locally to one with only finitely many constraints. Another main effort for achieving simplification is through duality in Section 6. There, algebraic properties of finite linear programming are brought to bear on theory in semi-infinite programming. Section 7 treats numerical methods based on either discretization or local reduction with the emphasis on the design of superlinearly convergent (SQP-type) methods. Taking this differentiable point of view, this paper can be considered to be complementary to the review of given by Polak [SIAM Rev., 29 (1987), pp. 21-89] on the nondifferentiable approach. The last, short section briefly reviews some work done on parametric problems.
Chapter
Half-title pageSeries pageTitle pageCopyright pageDedicationPrefaceAcknowledgementsContentsList of figuresHalf-title pageIndex
Chapter
Information theory answers two fundamental questions in communication theory: what is the ultimate data compression (answer: the entropy H), and what is the ultimate transmission rate of communication (answer: the channel capacity C). For this reason some consider information theory to be a subset of communication theory. We will argue that it is much more. Indeed, it has fundamental contributions to make in statistical physics (thermodynamics), computer science (Kolmogorov complexity or algorithmic complexity), statistical inference (Occam's Razor: “The simplest explanation is best”) and to probability and statistics (error rates for optimal hypothesis testing and estimation). The relationship of information theory to other fields is discussed. Information theory intersects physics (statistical mechanics), mathematics (probability theory), electrical engineering (communication theory) and computer science (algorithmic complexity). We describe these areas of intersection in detail.
Conference Paper
We present a single letter characterization of the secrecy capacity of the single-input multiple-outputs (SIMO) channel under Gaussian (and possibly colored) noise. To do so, we transform the channel into a scalar Gaussian wiretap channel using standard techniques of communications theory. The result is used to study the impact of slow fading on the secrecy capacity of the channel, and how the use of multiple receive antennas could improve the performance of the system