Physical-Layer Security in Multiuser Visible Light Communication Networks

In this paper, we study the physical-layer security in a 3-D multiuser visible light communication (VLC) network. The locations of access points (APs) and mobile users are modeled as two 2-D, independent and homogeneous Poisson point processes at distinct heights. Using mathematical tools from stochastic geometry, we provide a new analytical framework to characterize the secrecy performance in multiuser VLC networks. Closed-form results for the outage probability and the ergodic secrecy rate are derived for networks without AP cooperation. Considering the cooperation among APs, we give tight lower and upper bounds on the secrecy outage probability and the ergodic secrecy rate. To further enhance the secrecy performance at the legitimate user, a disk-shaped secrecy protected zone is implemented in the vicinity of the transmit AP. Based on the obtained results, it is shown that cooperating neighboring APs in a multiuser VLC network can bring performance gains on the secrecy rate, but only to a limited extent. We also show that building an eavesdropper-free protected zone around the AP significantly improves the secrecy performance of legitimate users, which appears to be a promising solution for the design of multiuser VLC networks with high security requirements.

[1]  S. Randel,et al.  Broadband Information Broadcasting Using LED-Based Interior Lighting , 2008, Journal of Lightwave Technology.

[2]  Masao Nakagawa,et al.  Fundamental analysis for visible-light communication system using LED lights , 2004, IEEE Transactions on Consumer Electronics.

[3]  H. Haas,et al.  Information Rate of OFDM-Based Optical Wireless Communication Systems With Nonlinear Distortion , 2013, Journal of Lightwave Technology.

[4]  Dominic C. O'Brien,et al.  High data rate multiple input multiple output (MIMO) optical wireless communications using white led lighting , 2009, IEEE Journal on Selected Areas in Communications.

[5]  Liang Yin,et al.  Performance Evaluation of Non-Orthogonal Multiple Access in Visible Light Communication , 2016, IEEE Transactions on Communications.

[6]  Svilen Dimitrov,et al.  Principles of LED Light Communications: Towards Networked Li-Fi , 2015 .

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[9]  Jeffrey B. Carruthers,et al.  Wireless infrared communications , 2003, Proc. IEEE.

[10]  Onur Ozan Koyluoglu,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.

[11]  Sennur Ulukus,et al.  Gaussian wiretap channel with an amplitude constraint , 2012, 2012 IEEE Information Theory Workshop.

[12]  D. Stoyan,et al.  Stochastic Geometry and Its Applications , 1989 .

[13]  Harald Haas,et al.  What is LiFi? , 2015, 2015 European Conference on Optical Communication (ECOC).

[14]  Mohamed-Slim Alouini,et al.  Free-Space Optical Communications: Capacity Bounds, Approximations, and a New Sphere-Packing Perspective , 2016, IEEE Transactions on Communications.

[15]  Moe Z. Win,et al.  Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusion , 2012, IEEE Transactions on Information Forensics and Security.

[16]  Lutz H.-J. Lampe,et al.  Physical-Layer Security for MISO Visible Light Communication Channels , 2015, IEEE Journal on Selected Areas in Communications.

[17]  Zhiguo Ding,et al.  On Secure VLC Systems With Spatially Random Terminals , 2017, IEEE Communications Letters.

[18]  Dominic C. O'Brien,et al.  Wireless Myths, Realities, and Futures: From 3G/4G to Optical and Quantum Wireless , 2012, Proceedings of the IEEE.

[19]  Xiangyun Zhou,et al.  Physical Layer Security in Cellular Networks: A Stochastic Geometry Approach , 2013, IEEE Transactions on Wireless Communications.

[20]  Lutz H.-J. Lampe,et al.  Optimal and Robust Beamforming for Secure Transmission in MISO Visible-Light Communication Links , 2016, IEEE Transactions on Signal Processing.

[21]  Amos Lapidoth,et al.  On the Capacity of Free-Space Optical Intensity Channels , 2008, IEEE Transactions on Information Theory.

[22]  Jiangzhou Wang,et al.  Tight Bounds on Channel Capacity for Dimmable Visible Light Communications , 2013, Journal of Lightwave Technology.

[23]  Martin Haenggi,et al.  Distance Distributions in Finite Uniformly Random Networks: Theory and Applications , 2008, IEEE Transactions on Vehicular Technology.

[24]  Jeffrey G. Andrews,et al.  On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[25]  Lutz H.-J. Lampe,et al.  Coordinated Broadcasting for Multiuser Indoor Visible Light Communication Systems , 2015, IEEE Transactions on Communications.

[26]  Ananthram Swami,et al.  PHY Layer Security Based on Protected Zone and Artificial Noise , 2013, IEEE Signal Processing Letters.

[27]  Can Emre Koksal,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.

[28]  Moe Z. Win,et al.  Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.

[29]  Martin Haenggi,et al.  On distances in uniformly random networks , 2005, IEEE Transactions on Information Theory.

[30]  Lajos Hanzo,et al.  Users First: User-Centric Cluster Formation for Interference-Mitigation in Visible-Light Networks , 2016, IEEE Transactions on Wireless Communications.

[31]  Stefan Videv,et al.  Fractional Frequency Reuse in DCO-OFDM-Based Optical Attocell Networks , 2015, Journal of Lightwave Technology.

[32]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[33]  Martin Haenggi The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.