Zero-Forcing Beamforming for Active and Passive Eavesdropper Mitigation in Visible Light Communication Systems

This article proposes zero-forcing (ZF) beamforming strategies that can simultaneously deal with active and passive eavesdroppers in visible light communication (VLC) systems. First, we propose a ZF beamforming scheme that steers a transmission beam to the null space of active eavesdroppers’ (AEDs) channel, while simultaneously considering the SNRs for a legitimate user (UE) and passive eavesdroppers (PEDs) residing at unknown locations. To find an eigenmode related to the optimal beamforming vector, we adopt an inverse free preconditioned Krylov subspace projection method. For unfavorable VLC secrecy environments, the proposed ZF beamformer appears to be incapable of effectively coping with the PEDs due to the strict condition that the data transmission must be in the null space of the AEDs’ channel matrix. Hence, an alternative beamforming scheme is proposed by relaxing the constraint on the SNRs of the AEDs. The related optimization problem is formulated to reduce the secrecy outages caused by PEDs, while simultaneously satisfying the target constraints on the SNRs of the UE and the AEDs. To simplify the mathematical complexity of the approach, Lloyd’s algorithm is employed to sample the SNR field, which in turn discretizes the problem, thus making it tractable for practical implementation. The numerical results show that both the exact and relaxed ZF beamforming methods achieve superior performance in the sense of secrecy outage relative to a benchmark ZF scheme. Moreover, the proposed relaxed ZF beamforming method is shown to cope with PEDs better than the exact ZF beamforming approach for unfavorable VLC environments.

[1]  Paul T. Boggs,et al.  Sequential Quadratic Programming , 1995, Acta Numerica.

[2]  Rajendran Parthiban,et al.  LED Based Indoor Visible Light Communications: State of the Art , 2015, IEEE Communications Surveys & Tutorials.

[3]  Mohammad Dehghani Soltani,et al.  Physical Layer Security for Visible Light Communication Systems: A Survey , 2019, IEEE Communications Surveys & Tutorials.

[4]  Franziska Hoffmann,et al.  Spatial Tessellations Concepts And Applications Of Voronoi Diagrams , 2016 .

[5]  Masao Nakagawa,et al.  Fundamental analysis for visible-light communication system using LED lights , 2004, IEEE Transactions on Consumer Electronics.

[6]  Jeffrey G. Andrews,et al.  Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.

[7]  Anh T. Pham,et al.  Multi-User Visible Light Communication Broadcast Channels With Zero-Forcing Precoding , 2017, IEEE Transactions on Communications.

[8]  Qiang Ye,et al.  Algorithm 845: EIGIFP: a MATLAB program for solving large symmetric generalized eigenvalue problems , 2005, TOMS.

[9]  H. Vincent Poor,et al.  Relay-Aided Secure Broadcasting for Visible Light Communications , 2018, IEEE Transactions on Communications.

[10]  Qi Wang,et al.  Multiuser MIMO-OFDM for Visible Light Communications , 2015, IEEE Photonics Journal.

[11]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[12]  Jeffrey B. Carruthers,et al.  Wireless infrared communications , 2003, Proc. IEEE.

[13]  Anh T. Pham,et al.  On the secrecy sum-rate of MU-VLC broadcast systems with confidential messages , 2016, 2016 10th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP).

[14]  Lutz H.-J. Lampe,et al.  Physical-Layer Security for MISO Visible Light Communication Channels , 2015, IEEE Journal on Selected Areas in Communications.

[15]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[16]  Emanuele Giorgi,et al.  Spatial point patterns:methodology and applications with R , 2017 .

[17]  Gene H. Golub,et al.  An Inverse Free Preconditioned Krylov Subspace Method for Symmetric Generalized Eigenvalue Problems , 2002, SIAM J. Sci. Comput..

[18]  Justin P. Coon,et al.  Enhancement of Physical Layer Security With Simultaneous Beamforming and Jamming for Visible Light Communication Systems , 2019, IEEE Transactions on Information Forensics and Security.

[19]  Lutz H.-J. Lampe,et al.  Physical-layer security for indoor visible light communications , 2014, 2014 IEEE International Conference on Communications (ICC).

[20]  Stephen P. Boyd,et al.  Variations and extension of the convex–concave procedure , 2016 .

[21]  Justin P. Coon,et al.  Securing Visible Light Communication Systems by Beamforming in the Presence of Randomly Distributed Eavesdroppers , 2017, IEEE Transactions on Wireless Communications.