Performance Analysis on Visible Light Communications With Multi-Eavesdroppers and Practical Amplitude Constraint

10/12/2019
by   Xiaodong Liu, et al.
0

In this paper the secure performance for the visible light communication (VLC) system with multiple eavesdroppers is studied. By considering the practical amplitude constraint instead of an average power constraint in the VLC system, the closed-form expressions for the upper and the lower bounds of the secrecy outage probability and the average secrecy capacity are derived. Since the locations for both legitimate receiver and eavesdroppers are unknown as well as random, the stochastic geometry method is introduced for problem formulation. Moreover, accurate expressions with a low computational complexity are obtained with the rigorous derivation. Simulation results verify the correctness of our theoretical analysis.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/26/2018

Physical-layer Security for Indoor Visible Light Communications: Secrecy Capacity Analysis

This paper investigates the physical-layer security for an indoor visibl...
research
09/23/2021

Secrecy Capacity Bounds for Visible Light Communications With Signal-Dependent Noise

In physical-layer security, one of the most fundamental issues is the se...
research
08/12/2022

Exploiting Gold Nanoparticles for Secure Visible Light Communications

Visible light is a proper spectrum for secure wireless communications be...
research
10/13/2019

On the Secrecy Performance of Random VLC Networks with Imperfect CSI and Protected Zone

This paper investigates the physical-layer security for a random indoor ...
research
11/22/2021

Scalar Gaussian Wiretap Channel with Peak Amplitude Constraint: Numerical Computation of the Optimal Input Distribution

This paper studies a scalar Gaussian wiretap channel where instead of an...
research
12/28/2021

Robust Security Analysis Based on Random Geometry Theory for Satellite-Terrestrial-Vehicle Network

Driven by B5G and 6G technologies, multi-network fusion is an indispensa...
research
03/23/2018

Cooperative Secure Transmission by Exploiting Social Ties in Random Networks

Social awareness and social ties are becoming increasingly popular with ...

Please sign up or login with your details

Forgot password? Click here to reset