On the Secrecy Rate of Spatial Modulation-Based Indoor Visible Light Communications
KAUST DepartmentCommunication Theory Lab
Computer, Electrical and Mathematical Science and Engineering (CEMSE) Division
Electrical and Computer Engineering Program
Physical Science and Engineering (PSE) Division
Permanent link to this recordhttp://hdl.handle.net/10754/667883
MetadataShow full item record
AbstractIn this paper, we investigate the physical-layer security for a spatial modulation (SM)-based indoor visible light communication (VLC) system, which includes multiple transmitters, a legitimate receiver, and a passive eavesdropper (Eve). At the transmitters, the SM scheme is employed, i.e., only one transmitter is active at each time instant. To choose the active transmitter, a uniform selection (US) scheme is utilized. Two scenarios are considered: one is with non-negativity and average optical intensity constraints and the other is with non-negativity, average optical intensity, and peak optical intensity constraints. Then, lower and upper bounds on the secrecy rate are derived for these two scenarios. Besides, the asymptotic behaviors for the derived secrecy rate bounds at high signal-to-noise ratio (SNR) are analyzed. To further improve the secrecy performance, a channel adaptive selection (CAS) scheme and a greedy selection (GS) scheme are proposed to select the active transmitter. Numerical results show that the lower and upper bounds of the secrecy rate are tight. At high SNR, small asymptotic performance gaps exist between the derived lower and the upper bounds. Moreover, the proposed GS scheme has the best performance, followed by the CAS scheme and the US scheme.
CitationWang, J.-Y., Ge, H., Lin, M., Wang, J.-B., Dai, J., & Alouini, M.-S. (2019). On the Secrecy Rate of Spatial Modulation-Based Indoor Visible Light Communications. IEEE Journal on Selected Areas in Communications, 37(9), 2087–2101. doi:10.1109/jsac.2019.2929403
SponsorsThis work was supported in part by the National Natural Science Foundation of China under Grant 61701254 and Grant 61571115, in part by the Natural Science Foundation of Jiangsu Province under Grant BK20170901, in part by the Key International Cooperation Research Project under Grant 61720106003, and in part by the Open Research Fund of the Key Lab of Broadband Wireless Communication and Sensor Network Technology, Nanjing University of Posts and Telecommunications, Ministry of Education, under Grant JZNY201706 and Grant JZNY201701.