210 research outputs found

    Optical wireless communication systems

    Get PDF
    The emerging field of optical wireless communication (OWC) systems is seen as potential complementary technology to the radio frequency wireless communications in certain applications. It is deemed as a possible technology in the future 5th Generation communication networks to address the spectrum congestion and improve the system's capacity. More research and developments in OWC is still needed in order for it to be adopted in current and future communication systems. This special issue brings together research papers on OWC covering free space optic, visible communications and ultraviolet communications

    Visible Light Communication Cyber Security Vulnerabilities For Indoor And Outdoor Vehicle-To-Vehicle Communication

    Get PDF
    Light fidelity (Li-Fi), developed from the approach of Visible Light Communication (VLC), is a great replacement or complement to existing radio frequency-based (RF) networks. Li-Fi is expected to be deployed in various environments were, due to Wi-Fi congestion and health limitations, RF should not be used. Moreover, VLC can provide the future fifth generation (5G) wireless technology with higher data rates for device connectivity which will alleviate the traffic demand. 5G is playing a vital role in encouraging the modern applications. In 2023, the deployment of all the cellular networks will reach more than 5 billion users globally. As a result, the security and privacy of 5G wireless networks is an essential problem as those modern applications are in people\u27s life everywhere. VLC security is as one of the core physical-layer security (PLS) solutions for 5G networks. Due to the fact that light does not penetrate through solid objects or walls, VLC naturally has higher security and privacy for indoor wireless networks compared to RF networks. However, the broadcasting nature of VLC caused concerns, e.g., eavesdropping, have created serious attention as it is a crucial step to validate the success of VLC in wild. The aim of this thesis is to properly address the security issues of VLC and further enhance the VLC nature security. We analyzed the secrecy performance of a VLC model by studying the characteristics of the transmitter, receiver and the visible light channel. Moreover, we mitigated the security threats in the VLC model for the legitimate user, by 1) implementing more access points (APs) in a multiuser VLC network that are cooperated, 2) reducing the semi-angle of LED to help improve the directivity and secrecy and, 3) using the protected zone strategy around the AP where eavesdroppers are restricted. According to the model\u27s parameters, the results showed that the secrecy performance in the proposed indoor VLC model and the vehicle-to-vehicle (V2V) VLC outdoor model using a combination of multiple PLS techniques as beamforming, secure communication zones, and friendly jamming is enhanced. The proposed model security performance was measured with respect to the signal to noise ratio (SNR), received optical power, and bit error rate (BER) Matlab simulation results

    Performance Analysis of RIS-Assisted FSO Communications over Fisher-Snedecor F Turbulence Channels

    Get PDF
    The Fisher Snedecor (F-S) F distribution has recently been introduced as a tractable turbulence-induced (TI) fading model that fits well with the experimental data. This paper provides a performance evaluation of a free-space optical (FSO) re-configurable intelligent surface (RIS)-assisted communications (ACs) link over the F-S F TI fading channels, assuming the intensity modulation direct detection (IM DD) technique. In particular, novel and closed-form (C-F) analytical expressions for the probability density function (PDF) and cumulative distribution function (CDF) of the end-toend signal-to-noise ratio (SNR) in terms of Gaussian hyper-geometric functions are efficiently derived. Capitalizing on the obtained results, novel C-F analytical expressions for the moment generating function (MMGF), outage probability (OP), average bit error rate (BER) and ergodic channel capacity (Cgamma) of the FSO RIS-ACs system over the F-S F TI fading channels are provided and numerically evaluated under the various TI fading severity conditions. Furthermore, the second-order (S-O) statistical expressions for the level crossing rate (LCR) and average fade duration (AFD) are obtained and thoroughly examined for various FSO RIS-ACs system model parameters.This research was funded by funding from UC3M and the European Unions Horizon 2020 programme under the Marie Skodowska-Curie grant agreement no. 801538 and by project IRENE-EARTH (PID2020-115323RB-C33/AEI/10.13039/501100011033

    Security performance and protocol consideration in optical communication system with optical layer security enabled by optical coding techniques

    Get PDF
    With the fast development of communication systems, network security issues have more and more impact on daily life. It is essential to construct a high degree of optical layer security to resolve the security problem once and for all. Three different techniques which can provide optical layer security are introduced and compared. Optical chaos can be used for fast random number generation. Quantum cryptography is the most promising technique for key distribution. And the optical coding techniques can be deployed to encrypt the modulated signal in the optical layer. A mathematical equation has been derived from information theory to evaluate the information-theoretic security level of the wiretap channel in optical coding schemes. And the merits and limitation of two coherent optical coding schemes, temporal phase coding and spectral phase coding, have been analysed. The security scheme based on a reconfigurable optical coding device has been introduced, and the corresponding security protocol has been developed. By moving the encryption operation from the electronic layer to the optical layer, the modulated signals become opaque to the unauthorised users. Optical code distribution and authentication is the one of the major challenges for our proposed scheme. In our proposed protocol, both of the operations are covered and defined in detail. As a preliminary draft of the optical code security protocol, it could be a useful guidance for further research
    • …
    corecore