Design and Analysis of Physical Layer Security Based on Ill-Posed Theory for Optical OFDM-Based VLC System Over Real-Valued Visible Light Channel

Due to the broadcast property of the visible light beam, visible light communication (VLC) systems may suffer from malicious attack or eavesdropping in public area. In this paper, we design and analyze the physical layer security mechanism with the aid of ill-posed theory and present a channel determined subcarrier shifting (CDSS) scheme with pre-equalization. The CDSS scheme exploits the real-valued and location-sensitive channel state information (CSI) of VLC channel and performs sorting operations on the CSI, which formulates a shifting matrix with the aid of chaotic sequences, to dynamically change the available subcarrier for the optical orthogonal frequency division multiplex (OOFDM) aided VLC system. Meanwhile, we combine the CDSS scheme with the preequalization module to further improve the bit error rate (BER) performance for legitimate users. Moreover, the analytical physical layer security model for VLC system is presented using ill-posed theory, which removes the requirements of known CSI and worse channel quality of malicious users when evaluating secrecy capacity. Theoretical and simulation results are provided and compared to prove the benefits achieved by the proposed CDSS scheme, which can enhance the security with no loss of BER, while the secrecy capacity performances are also evaluated to verify the effectiveness of our design.

[1]  Steve Hranilovic,et al.  Wireless optical communication systems , 2004 .

[2]  Lutz H.-J. Lampe,et al.  Securing visible light communications via friendly jamming , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[3]  Edward A. Lee,et al.  Simulation of Multipath Impulse Response for Indoor Wireless Optical Channels , 1993, IEEE J. Sel. Areas Commun..

[4]  Yang Liu,et al.  Secure communication zone for white-light LED visible light communication , 2015 .

[5]  Brian L. Evans,et al.  Optimal resource allocation in the OFDMA downlink with imperfect channel knowledge , 2009, IEEE Transactions on Communications.

[6]  Lutz H.-J. Lampe,et al.  Physical-Layer Security for MISO Visible Light Communication Channels , 2015, IEEE Journal on Selected Areas in Communications.

[7]  Lin Zhang,et al.  The practical use of Ill-posed theory: Improved dynamic subcarrier coordinated interleaving OFDM system with pre-equalization , 2015, 2015 IEEE/CIC International Conference on Communications in China (ICCC).

[8]  Zabih Ghassemlooy,et al.  Channel estimation for indoor diffuse optical OFDM wireless communications , 2008, 2008 5th International Conference on Broadband Communications, Networks and Systems.

[9]  Toyoshima Morio,et al.  Physical layer security in free-space optical communications , 2016 .

[10]  J. Armstrong,et al.  Comparison of ACO-OFDM, DCO-OFDM and ADO-OFDM in IM/DD Systems , 2013, Journal of Lightwave Technology.

[11]  P. Hansen Rank-Deficient and Discrete Ill-Posed Problems: Numerical Aspects of Linear Inversion , 1987 .

[12]  Daniele Puccinelli,et al.  Security in Visible Light Communication : Novel Challenges and Opportunities , 2015 .

[13]  Dongweon Yoon,et al.  On the general BER expression of one- and two-dimensional amplitude modulations , 2002, IEEE Trans. Commun..

[14]  Rajendran Parthiban,et al.  LED Based Indoor Visible Light Communications: State of the Art , 2015, IEEE Communications Surveys & Tutorials.

[15]  Ivan B. Djordjevic,et al.  Physical-Layer Security in Orbital Angular Momentum Multiplexing Free-Space Optical Communications , 2016, IEEE Photonics Journal.

[16]  Srdjan Capkun,et al.  Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[17]  Wenyu Luo,et al.  Enhancing wireless security with theory of ill-posed problem: A novel physical-layer encryption mechanism , 2013, 2013 IEEE Third International Conference on Information Science and Technology (ICIST).

[18]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[19]  Y Tang,et al.  Coherent optical OFDM: theory and design. , 2008, Optics express.

[20]  Sennur Ulukus,et al.  Gaussian wiretap channel with an amplitude constraint , 2012, 2012 IEEE Information Theory Workshop.

[21]  Jean Armstrong,et al.  Comparison of Asymmetrically Clipped Optical OFDM and DC-Biased Optical OFDM in AWGN , 2008, IEEE Communications Letters.

[22]  H. Haas,et al.  On the Performance of Different OFDM Based Optical Wireless Communication Systems , 2011, IEEE/OSA Journal of Optical Communications and Networking.

[23]  Tao Yang,et al.  A SURVEY OF CHAOTIC SECURE COMMUNICATION SYSTEMS , 2004 .

[24]  N. Ahmed,et al.  On Matrix Partitioning and a Class of Algorithms , 1970 .

[25]  Lutz H.-J. Lampe,et al.  Physical-layer security for indoor visible light communications , 2014, 2014 IEEE International Conference on Communications (ICC).

[26]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[27]  K. Langer,et al.  Wireless High-Speed Data Transmission with Phosphorescent White-Light LEDs , 2011 .