21 research outputs found

    On the Secrecy Performance of Random VLC Networks with Imperfect CSI and Protected Zone

    Full text link
    This paper investigates the physical-layer security for a random indoor visible light communication (VLC) network with imperfect channel state information (CSI) and a protected zone. The VLC network consists of three nodes, i.e., a transmitter (Alice), a legitimate receiver (Bob), and an eavesdropper (Eve). Alice is fixed in the center of the ceiling, and the emitted signal at Alice satisfies the non-negativity and the dimmable average optical intensity constraint. Bob and Eve are randomly deployed on the receiver plane. By employing the protected zone and considering the imperfect CSI, the stochastic characteristics of the channel gains for both the main and the eavesdropping channels is first analyzed. After that, the closed-form expressions of the average secrecy capacity and the lower bound of secrecy outage probability are derived, respectively. Finally, Monte-Carlo simulations are provided to verify the accuracy of the derived theoretical expressions. Moreover, the impacts of the nominal optical intensity, the dimming target, the protected zone and the imperfect CSI on secrecy performance are discussed, respectively.Comment: Accepted by IEEE Systems Joutna

    Visible Light Communication Cyber Security Vulnerabilities For Indoor And Outdoor Vehicle-To-Vehicle Communication

    Get PDF
    Light fidelity (Li-Fi), developed from the approach of Visible Light Communication (VLC), is a great replacement or complement to existing radio frequency-based (RF) networks. Li-Fi is expected to be deployed in various environments were, due to Wi-Fi congestion and health limitations, RF should not be used. Moreover, VLC can provide the future fifth generation (5G) wireless technology with higher data rates for device connectivity which will alleviate the traffic demand. 5G is playing a vital role in encouraging the modern applications. In 2023, the deployment of all the cellular networks will reach more than 5 billion users globally. As a result, the security and privacy of 5G wireless networks is an essential problem as those modern applications are in people\u27s life everywhere. VLC security is as one of the core physical-layer security (PLS) solutions for 5G networks. Due to the fact that light does not penetrate through solid objects or walls, VLC naturally has higher security and privacy for indoor wireless networks compared to RF networks. However, the broadcasting nature of VLC caused concerns, e.g., eavesdropping, have created serious attention as it is a crucial step to validate the success of VLC in wild. The aim of this thesis is to properly address the security issues of VLC and further enhance the VLC nature security. We analyzed the secrecy performance of a VLC model by studying the characteristics of the transmitter, receiver and the visible light channel. Moreover, we mitigated the security threats in the VLC model for the legitimate user, by 1) implementing more access points (APs) in a multiuser VLC network that are cooperated, 2) reducing the semi-angle of LED to help improve the directivity and secrecy and, 3) using the protected zone strategy around the AP where eavesdroppers are restricted. According to the model\u27s parameters, the results showed that the secrecy performance in the proposed indoor VLC model and the vehicle-to-vehicle (V2V) VLC outdoor model using a combination of multiple PLS techniques as beamforming, secure communication zones, and friendly jamming is enhanced. The proposed model security performance was measured with respect to the signal to noise ratio (SNR), received optical power, and bit error rate (BER) Matlab simulation results

    Physical Layer Security for Visible Light Communication Systems:A Survey

    Get PDF
    Due to the dramatic increase in high data rate services and in order to meet the demands of the fifth-generation (5G) networks, researchers from both academia and industry are exploring advanced transmission techniques, new network architectures and new frequency spectrum such as the visible light spectra. Visible light communication (VLC) particularly is an emerging technology that has been introduced as a promising solution for 5G and beyond. Although VLC systems are more immune against interference and less susceptible to security vulnerabilities since light does not penetrate through walls, security issues arise naturally in VLC channels due to their open and broadcasting nature, compared to fiber-optic systems. In addition, since VLC is considered to be an enabling technology for 5G, and security is one of the 5G fundamental requirements, security issues should be carefully addressed and resolved in the VLC context. On the other hand, due to the success of physical layer security (PLS) in improving the security of radio-frequency (RF) wireless networks, extending such PLS techniques to VLC systems has been of great interest. Only two survey papers on security in VLC have been published in the literature. However, a comparative and unified survey on PLS for VLC from information theoretic and signal processing point of views is still missing. This paper covers almost all aspects of PLS for VLC, including different channel models, input distributions, network configurations, precoding/signaling strategies, and secrecy capacity and information rates. Furthermore, we propose a number of timely and open research directions for PLS-VLC systems, including the application of measurement-based indoor and outdoor channel models, incorporating user mobility and device orientation into the channel model, and combining VLC and RF systems to realize the potential of such technologies

    Design and performance analysis of optical attocell networks

    Get PDF
    The exponentially increasing demand for high-speed wireless communications will no longer be satisfied by the traditional radio frequency (RF) in the near future due to its limited spectrum and overutilization. To resolve this imminent issue, industrial and research communities have been looking into alternative technologies for communication. Among them, visible light communication (VLC) has attracted much attention because it utilizes the unlicensed, free and safe spectrum, whose bandwidth is thousand times larger than the entire RF spectrum. Moreover, VLC can be integrated into existing lighting systems to offer a dual-purpose, cost-effective and energy-efficient solution for next-generation small-cell networks (SCNs), giving birth to the concept of optical attocell networks. Most relevant works in the literature rely on system simulations to quantify the performance of attocell networks, which suffer from high computational complexity and provide limited insights about the network. Mathematical tools, on the other hand, are more tractable and scalable and are shown to closely approximate practical systems. The presented work utilizes stochastic geometry for downlink evaluation of optical attocell networks, where the co-channel interference (CCI) surpasses noise and becomes the limiting factor of the link throughput. By studying the moment generating function (MGF) of the aggregate interference, a theoretical framework for modeling the distribution of signal-to-interference-plus-noise ratio (SINR) is presented, which allows important performance metrics such as the coverage probability and link throughput to be derived. Depending on the source of interference, CCI can be classified into two categories: inter-cell interference (ICI) and intra-cell interference. In this work, both types of interference are characterized, based on which effective interference mitigation techniques such as the coordinated multipoint (CoMP), power-domain multiplexing and successive interference cancellation (SIC) are devised. The proposed mathematical framework is applicable to attocell networks with and without such interference mitigation techniques. Compared to RF networks, optical attocell networks are inherently more secure in the physical layer because visible light does not penetrate through opaque walls. This work analytically quantifies the physical-layer security of attocell networks from an information-theoretic point of view. Secrecy enhancement techniques such as AP cooperation and eavesdropper-free protected zones are also discussed. It is shown that compared to AP cooperation, implementing secrecy protected zones is more effective and it can contribute significantly to the network security

    Optical wireless communications for cyber-secure ubiquitous wireless networks

    Get PDF
    Wireless connectivity is no longer limited to facilitating communications between individuals, but is also required to support diverse and heterogeneous applications, services and infrastructures. Internet of things (IoT) systems will dominate future technologies, allowing any and all devices to create, share and process data. If artificial intelligence resembles the brain of IoT, then high-speed connectivity forms the nervous system that connects the devices. For IoT to safely operate autonomously, it requires highly secure and reliable wireless links. In this article, we shed light on the potential of optical wireless communications to provide high-speed secure and reliable ubiquitous access as an enabler for fifth generation and beyond wireless networks

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    Impact of Vehicle Headlights Radiation Pattern on Dynamic Vehicular VLC Channel

    Get PDF
    This article develops a statistical large-scale fading (path loss) model of a dynamic vehicular visible light communication (VVLC) system. The proposed model combines the impact of inter-vehicle spacing and the radiation intensity distribution as a function of the irradiance angle which changes with the traffic conditions. Three models (Lambertian, Gaussian, and empirical) are utilized to examine the impact of vehicles headlights radiation pattern on the statistical path loss of VVLC system. The analytical model of channel path loss is validated by Monte Carlo simulation with the headlight model simulated with a raytracing software. The path loss values of the Gaussian model differ by 2 dB compared to the Lambertian model, irrespective of the traffic conditions while it differs by 24.6 dB during late night and 8.15 dB during rush hours compared to the empirical model of a Toyota Altis headlight. This variation shows that the radiation intensity distribution should be modelled for each vehicle's headlights from each manufacturer to ensure accurate VVLC channel model. The proposed Gaussian model provides a close approximation to describe such radiation pattern and can easily be adapted to model for different manufacturers' headlights

    Enhancing physical layer security in wireless networks with cooperative approaches

    Get PDF
    Motivated by recent developments in wireless communication, this thesis aims to characterize the secrecy performance in several types of typical wireless networks. Advanced techniques are designed and evaluated to enhance physical layer security in these networks with realistic assumptions, such as signal propagation loss, random node distribution and non-instantaneous channel state information (CSI). The first part of the thesis investigates secret communication through relay-assisted cognitive interference channel. The primary and secondary base stations (PBS and SBS) communicate with the primary and secondary receivers (PR and SR) respectively in the presence of multiple eavesdroppers. The SBS is allowed to transmit simultaneously with the PBS over the same spectrum instead of waiting for an idle channel. To improve security, cognitive relays transmit cooperative jamming (CJ) signals to create additional interferences in the direction of the eavesdroppers. Two CJ schemes are proposed to improve the secrecy rate of cognitive interference channels depending on the structure of cooperative relays. In the scheme where the multiple-antenna relay transmits weighted jamming signals, the combined approach of CJ and beamforming is investigated. In the scheme with multiple relays transmitting weighted jamming signals, the combined approach of CJ and relay selection is analyzed. Numerical results show that both these two schemes are effective in improving physical layer security of cognitive interference channel. In the second part, the focus is shifted to physical layer security in a random wireless network where both legitimate and eavesdropping nodes are randomly distributed. Three scenarios are analyzed to investigate the impact of various factors on security. In scenario one, the basic scheme is studied without a protected zone and interference. The probability distribution function (PDF) of channel gain with both fading and path loss has been derived and further applied to derive secrecy connectivity and ergodic secrecy capacity. In the second scenario, we studied using a protected zone surrounding the source node to enhance security where interference is absent. Both the cases that eavesdroppers are aware and unaware of the protected zone boundary are investigated. Based on the above scenarios, further deployment of the protected zones at legitimate receivers is designed to convert detrimental interference into a beneficial factor. Numerical results are investigated to check the reliability of the PDF for reciprocal of channel gain and to analyze the impact of protected zones on secrecy performance. In the third part, physical layer security in the downlink transmission of cellular network is studied. To model the repulsive property of the cellular network planning, we assume that the base stations (BSs) follow the Mat´ern hard-core point process (HCPP), while the eavesdroppers are deployed as an independent Poisson point process (PPP). The distribution function of the distances from a typical point to the nodes of the HCPP is derived. The noise-limited and interference-limited cellular networks are investigated by applying the fractional frequency reuse (FFR) in the system. For the noise-limited network, we derive the secrecy outage probability with two different strategies, i.e. the best BS serve and the nearest BS serve, by analyzing the statistics of channel gains. For the interference-limited network with the nearest BS serve, two transmission schemes are analyzed, i.e., transmission with and without the FFR. Numerical results reveal that both the schemes of transmitting with the best BS and the application of the FFR are beneficial for physical layer security in the downlink cellular networks, while the improvement du
    corecore