• Login
    View Item 
    •   Home
    • Office of Sponsored Research (OSR)
    • KAUST Funded Research
    • Publications Acknowledging KAUST Support
    • View Item
    •   Home
    • Office of Sponsored Research (OSR)
    • KAUST Funded Research
    • Publications Acknowledging KAUST Support
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of KAUSTCommunitiesIssue DateSubmit DateThis CollectionIssue DateSubmit Date

    My Account

    Login

    Quick Links

    Open Access PolicyORCID LibguideTheses and Dissertations LibguideSubmit an Item

    Statistics

    Display statistics

    Relay-Aided Secure Broadcasting for Visible Light Communications

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Type
    Article
    Authors
    Arafa, Ahmed cc
    Panayirci, Erdal cc
    Poor, H. Vincent cc
    KAUST Grant Number
    OSR-2016-CRG5-2958-02
    Date
    2019-06
    Permanent link to this record
    http://hdl.handle.net/10754/668092
    
    Metadata
    Show full item record
    Abstract
    A visible light communication broadcast channel is considered, in which a transmitter luminaire communicates with two legitimate receivers in the presence of an external eavesdropper. A number of trusted cooperative half-duplex relay luminaires are deployed to aid with securing the transmitted data. Transmitters are equipped with single light fixtures, containing multiple light emitting diodes, and receiving nodes are equipped with single photo-detectors, rendering the considered setting as a single-input single-output system. Transmission is amplitude-constrained to maintain operation within the light emitting diodes' dynamic range. Achievable secrecy rate regions are derived under such amplitude constraints for this multi-receiver wiretap channel, first for direct transmission without the relays, and then for multiple relaying schemes: cooperative jamming, decode-and-forward, and amplify-and-forward. Superposition coding with uniform signaling is used at the transmitter and the relays. Further, for each relaying scheme, secure beamforming vectors are carefully designed at the relay nodes in order to hurt the eavesdropper and/or benefit the legitimate receivers. Superiority of the proposed relaying schemes, with secure beamforming, is shown over direct transmission. It is also shown that the best relaying scheme depends on how far the eavesdropper is located from the transmitter and the relays, the number of relays, and their geometric layout.
    Citation
    Arafa, A., Panayirci, E., & Poor, H. V. (2019). Relay-Aided Secure Broadcasting for Visible Light Communications. IEEE Transactions on Communications, 67(6), 4227–4239. doi:10.1109/tcomm.2019.2900632
    Sponsors
    This research was supported in part by the U.S. National Science Foundation under Grant CCF-093970 and Grant CCF1513915. Erdal Panayirci has been supported by the Turkish Scientific and Research Council (TUBITAK) under the 1003 Primary Subjects R&D Funding Program, and in part by KAUST under Grant No. OSR-2016-CRG5-2958-02. This paper was presented in part at the IEEE Global Conference on Signal and Information Processing, Anaheim, CA, USA, November, 2018 [1]. The associate editor coordinating the review of this paper and approving it for publication was W. Xu
    Publisher
    Institute of Electrical and Electronics Engineers (IEEE)
    Journal
    IEEE Transactions on Communications
    DOI
    10.1109/tcomm.2019.2900632
    arXiv
    1809.03479
    Additional Links
    https://ieeexplore.ieee.org/document/8649747/
    ae974a485f413a2113503eed53cd6c53
    10.1109/tcomm.2019.2900632
    Scopus Count
    Collections
    Publications Acknowledging KAUST Support

    entitlement

     
    DSpace software copyright © 2002-2023  DuraSpace
    Quick Guide | Contact Us | KAUST University Library
    Open Repository is a service hosted by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items. For anonymous users the allowed maximum amount is 50 search results.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.