期刊
IEEE TRANSACTIONS ON COMMUNICATIONS
卷 66, 期 12, 页码 6423-6436出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCOMM.2018.2859943
关键词
Gaussian noise; physical-layer security; secrecy capacity; visible light communications
资金
- National Natural Science Foundation of China [61701254, 61571115]
- Natural Science Foundation of Jiangsu Province [BK20170901]
- Key International Cooperation Research Project [61720106003]
- open research fund of the National Mobile Communications Research Laboratory, Southeast University [2017D06]
- open research fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications)
- Ministry of Education [JZNY201701, JZNY201706]
- NUPTSF [NY216009]
This paper investigates the physical-layer security for an indoor visible light communication network consisting of a transmitter, a legitimate receiver, and an eavesdropper. Both the main channel and the wiretapping channel have non-negative inputs, which are corrupted by additive white Gaussian noises. Considering the illumination requirement and the physical characteristics of lighting source, the input is also constrained in both its average and peak optical intensities. Two scenarios are investigated: one is only with an average optical intensity constraint and the other is with both average and peak optical intensity constraints. Based on the information theory, closed-form expressions of the upper and lower bounds on secrecy capacity for the two scenarios are derived. Numerical results show that the upper and lower bounds on secrecy capacity are tight, which validates the derived closed-form expressions. Moreover, the asymptotic behaviors in the high signal-to-noise ratio (SNR) regime are analyzed from the theoretical aspects. At high SNR, when only considering the average optical intensity constraint, a small performance gap exists between the asymptotic upper and lower bounds on secrecy capacity. When considering both average and peak optical intensity constraints, the asymptotic upper and lower bounds on secrecy capacity coincide with each other. These conclusions are also confirmed by numerical results.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据