TY - JOUR
T1 - Relay-Aided Secure Broadcasting for Visible Light Communications
AU - Arafa, Ahmed
AU - Panayirci, Erdal
AU - Vincent Poor, H.
N1 - Funding Information:
Manuscript received September 7, 2018; revised January 11, 2019; accepted February 9, 2019. Date of publication February 22, 2019; date of current version June 14, 2019. This research was supported in part by the U.S. National Science Foundation under Grant CCF-093970 and Grant CCF-1513915. Erdal Panayirci has been supported by the Turkish Scientific and Research Council (TUBITAK) under the 1003 Primary Subjects R&D Funding Program, and in part by KAUST under Grant No. OSR-2016-CRG5-2958-02. This paper was presented in part at the IEEE Global Conference on Signal and Information Processing, Anaheim, CA, USA, November, 2018 [1]. The associate editor coordinating the review of this paper and approving it for publication was W. Xu. (Corresponding author: Ahmed Arafa.) A. Arafa and H. V. Poor are with the Electrical Engineering Department, Princeton University, Princeton, NJ 08544 USA (e-mail: aarafa@princeton.edu; poor@princeton.edu).
Publisher Copyright:
© 1972-2012 IEEE.
PY - 2019/6
Y1 - 2019/6
N2 - A visible light communication broadcast channel is considered, in which a transmitter luminaire communicates with two legitimate receivers in the presence of an external eavesdropper. A number of trusted cooperative half-duplex relay luminaires are deployed to aid with securing the transmitted data. Transmitters are equipped with single light fixtures, containing multiple light emitting diodes, and receiving nodes are equipped with single photo-detectors, rendering the considered setting as a single-input single-output system. Transmission is amplitude-constrained to maintain operation within the light emitting diodes' dynamic range. Achievable secrecy rate regions are derived under such amplitude constraints for this multi-receiver wiretap channel, first for direct transmission without the relays, and then for multiple relaying schemes: cooperative jamming, decode-and-forward, and amplify-and-forward. Superposition coding with uniform signaling is used at the transmitter and the relays. Further, for each relaying scheme, secure beamforming vectors are carefully designed at the relay nodes in order to hurt the eavesdropper and/or benefit the legitimate receivers. Superiority of the proposed relaying schemes, with secure beamforming, is shown over direct transmission. It is also shown that the best relaying scheme depends on how far the eavesdropper is located from the transmitter and the relays, the number of relays, and their geometric layout.
AB - A visible light communication broadcast channel is considered, in which a transmitter luminaire communicates with two legitimate receivers in the presence of an external eavesdropper. A number of trusted cooperative half-duplex relay luminaires are deployed to aid with securing the transmitted data. Transmitters are equipped with single light fixtures, containing multiple light emitting diodes, and receiving nodes are equipped with single photo-detectors, rendering the considered setting as a single-input single-output system. Transmission is amplitude-constrained to maintain operation within the light emitting diodes' dynamic range. Achievable secrecy rate regions are derived under such amplitude constraints for this multi-receiver wiretap channel, first for direct transmission without the relays, and then for multiple relaying schemes: cooperative jamming, decode-and-forward, and amplify-and-forward. Superposition coding with uniform signaling is used at the transmitter and the relays. Further, for each relaying scheme, secure beamforming vectors are carefully designed at the relay nodes in order to hurt the eavesdropper and/or benefit the legitimate receivers. Superiority of the proposed relaying schemes, with secure beamforming, is shown over direct transmission. It is also shown that the best relaying scheme depends on how far the eavesdropper is located from the transmitter and the relays, the number of relays, and their geometric layout.
KW - LiFi
KW - Visible light communication
KW - amplify-and-forward
KW - amplitude constraint
KW - cooperative jamming
KW - decode-and-forward
KW - physical layer security
KW - relays
UR - http://www.scopus.com/inward/record.url?scp=85067577340&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85067577340&partnerID=8YFLogxK
U2 - 10.1109/TCOMM.2019.2900632
DO - 10.1109/TCOMM.2019.2900632
M3 - Article
AN - SCOPUS:85067577340
SN - 1558-0857
VL - 67
SP - 4227
EP - 4239
JO - IEEE Transactions on Communications
JF - IEEE Transactions on Communications
IS - 6
M1 - 8649747
ER -