4.7 Article

Relay-Aided Secure Broadcasting for Visible Light Communications

期刊

IEEE TRANSACTIONS ON COMMUNICATIONS
卷 67, 期 6, 页码 4227-4239

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCOMM.2019.2900632

关键词

Visible light communication; LiFi; physical layer security; relays; cooperative jamming; decode-and-forward; amplify-and-forward; amplitude constraint

资金

  1. U.S. National Science Foundation [CCF-093970, CCF1513915]
  2. Turkish Scientific and Research Council (TUBITAK) under the 1003 Primary Subjects R&D Funding Program
  3. KAUST [OSR-2016-CRG5-2958-02]

向作者/读者索取更多资源

A visible light communication broadcast channel is considered, in which a transmitter luminaire communicates with two legitimate receivers in the presence of an external eavesdropper. A number of trusted cooperative half-duplex relay luminaires are deployed to aid with securing the transmitted data. Transmitters are equipped with single light fixtures, containing multiple light emitting diodes, and receiving nodes are equipped with single photo-detectors, rendering the considered setting as a single-input single-output system. Transmission is amplitude-constrained to maintain operation within the light emitting diodes' dynamic range. Achievable secrecy rate regions are derived under such amplitude constraints for this multi-receiver wiretap channel, first for direct transmission without the relays, and then for multiple relaying schemes: cooperative jamming, decode-and-forward, and amplify-and-forward. Superposition coding with uniform signaling is used at the transmitter and the relays. Further, for each relaying scheme, secure beamforming vectors are carefully designed at the relay nodes in order to hurt the eavesdropper and/or benefit the legitimate receivers. Superiority of the proposed relaying schemes, with secure beamforming, is shown over direct transmission. It is also shown that the best relaying scheme depends on how far the eavesdropper is located from the transmitter and the relays, the number of relays, and their geometric layout.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据