Secrecy Analysis and Optimization for IRMA- and Jammer-Aided Visible Light Communications
This letter investigates the physical-layer security (PLS) of an indoor visible light communication system having a transmitter, a jammer, an intelligent reflecting mirror array (IRMA), a legitimate user, and an eavesdropper. Two scenarios are investigated for the non-negative input: one is having a...
Gespeichert in:
Veröffentlicht in: | IEEE wireless communications letters 2024-07, Vol.13 (7), p.1908-1912 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1912 |
---|---|
container_issue | 7 |
container_start_page | 1908 |
container_title | IEEE wireless communications letters |
container_volume | 13 |
creator | Wang, Jin-Yuan Hong, Li-Hua Liu, Na Yang, Hao-Nan Feng, Pan Ren, Jiawei |
description | This letter investigates the physical-layer security (PLS) of an indoor visible light communication system having a transmitter, a jammer, an intelligent reflecting mirror array (IRMA), a legitimate user, and an eavesdropper. Two scenarios are investigated for the non-negative input: one is having an average optical intensity constraint only, and the other is with both average and peak optical intensity constraints. By the entropy-power inequality and variational method, we derive closed-form expressions of secrecy-capacity lower bounds for the two scenarios, respectively. Based on the derived lower bound, we formulate a constrained secrecy-capacity maximization problem to further improve the PLS performance, and then transform it into a tractable problem by objective function approximation. After that, an optimization algorithm is proposed to solve the problem. Numerical results show the necessity of considering both IRMA and jammer, and also verify the effectiveness of the proposed algorithm. |
doi_str_mv | 10.1109/LWC.2024.3395667 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_3078078512</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10516681</ieee_id><sourcerecordid>3078078512</sourcerecordid><originalsourceid>FETCH-LOGICAL-c245t-55f4a184131733817e556d075068529560d3bb25834ffa51d44b53c5c03adc233</originalsourceid><addsrcrecordid>eNpNkMtLxDAQxoMouKx79-Ah4LlrJq92j6X4WKkIPvEU0jTVLNt2TbqH9a83-0AcBmZgvm_g-yF0DmQKQGZX5XsxpYTyKWMzIWV6hEYUJE0o4-L4b2fpKZqEsCCxJAEK2Qh9PFvjrdngvNPLTXAB667Gj6vBte5HD67vcNN7PH96yJPd6V63rfVJ7mpb4zcXXLW0uHSfXwMu-rZdd87sbOEMnTR6GezkMMfo9eb6pbhLysfbeZGXiaFcDIkQDdeQcWCQMpZBaoWQNUkFkZmgMQ2pWVVRkTHeNFpAzXklmBGGMF2bGGqMLvd_V77_XtswqEW_9jFNUIykWWwBNKrIXmV8H4K3jVp512q_UUDUlqGKDNWWoTowjJaLvcVZa__JBUiZAfsFH9xqrw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3078078512</pqid></control><display><type>article</type><title>Secrecy Analysis and Optimization for IRMA- and Jammer-Aided Visible Light Communications</title><source>IEEE Electronic Library (IEL)</source><creator>Wang, Jin-Yuan ; Hong, Li-Hua ; Liu, Na ; Yang, Hao-Nan ; Feng, Pan ; Ren, Jiawei</creator><creatorcontrib>Wang, Jin-Yuan ; Hong, Li-Hua ; Liu, Na ; Yang, Hao-Nan ; Feng, Pan ; Ren, Jiawei</creatorcontrib><description>This letter investigates the physical-layer security (PLS) of an indoor visible light communication system having a transmitter, a jammer, an intelligent reflecting mirror array (IRMA), a legitimate user, and an eavesdropper. Two scenarios are investigated for the non-negative input: one is having an average optical intensity constraint only, and the other is with both average and peak optical intensity constraints. By the entropy-power inequality and variational method, we derive closed-form expressions of secrecy-capacity lower bounds for the two scenarios, respectively. Based on the derived lower bound, we formulate a constrained secrecy-capacity maximization problem to further improve the PLS performance, and then transform it into a tractable problem by objective function approximation. After that, an optimization algorithm is proposed to solve the problem. Numerical results show the necessity of considering both IRMA and jammer, and also verify the effectiveness of the proposed algorithm.</description><identifier>ISSN: 2162-2337</identifier><identifier>EISSN: 2162-2345</identifier><identifier>DOI: 10.1109/LWC.2024.3395667</identifier><identifier>CODEN: IWCLAF</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; Artificial interference ; Communications systems ; Constraints ; Interference ; IRMA ; Jammers ; Jamming ; Lower bounds ; Luminous intensity ; Mirrors ; Optical transmitters ; Optimization ; physical-layer security ; Secrecy aspects ; secrecy capacity ; Security ; Visible light communication ; visible light communications</subject><ispartof>IEEE wireless communications letters, 2024-07, Vol.13 (7), p.1908-1912</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><orcidid>0009-0005-0381-9120 ; 0000-0001-5745-4554</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10516681$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10516681$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Wang, Jin-Yuan</creatorcontrib><creatorcontrib>Hong, Li-Hua</creatorcontrib><creatorcontrib>Liu, Na</creatorcontrib><creatorcontrib>Yang, Hao-Nan</creatorcontrib><creatorcontrib>Feng, Pan</creatorcontrib><creatorcontrib>Ren, Jiawei</creatorcontrib><title>Secrecy Analysis and Optimization for IRMA- and Jammer-Aided Visible Light Communications</title><title>IEEE wireless communications letters</title><addtitle>LWC</addtitle><description>This letter investigates the physical-layer security (PLS) of an indoor visible light communication system having a transmitter, a jammer, an intelligent reflecting mirror array (IRMA), a legitimate user, and an eavesdropper. Two scenarios are investigated for the non-negative input: one is having an average optical intensity constraint only, and the other is with both average and peak optical intensity constraints. By the entropy-power inequality and variational method, we derive closed-form expressions of secrecy-capacity lower bounds for the two scenarios, respectively. Based on the derived lower bound, we formulate a constrained secrecy-capacity maximization problem to further improve the PLS performance, and then transform it into a tractable problem by objective function approximation. After that, an optimization algorithm is proposed to solve the problem. Numerical results show the necessity of considering both IRMA and jammer, and also verify the effectiveness of the proposed algorithm.</description><subject>Algorithms</subject><subject>Artificial interference</subject><subject>Communications systems</subject><subject>Constraints</subject><subject>Interference</subject><subject>IRMA</subject><subject>Jammers</subject><subject>Jamming</subject><subject>Lower bounds</subject><subject>Luminous intensity</subject><subject>Mirrors</subject><subject>Optical transmitters</subject><subject>Optimization</subject><subject>physical-layer security</subject><subject>Secrecy aspects</subject><subject>secrecy capacity</subject><subject>Security</subject><subject>Visible light communication</subject><subject>visible light communications</subject><issn>2162-2337</issn><issn>2162-2345</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkMtLxDAQxoMouKx79-Ah4LlrJq92j6X4WKkIPvEU0jTVLNt2TbqH9a83-0AcBmZgvm_g-yF0DmQKQGZX5XsxpYTyKWMzIWV6hEYUJE0o4-L4b2fpKZqEsCCxJAEK2Qh9PFvjrdngvNPLTXAB667Gj6vBte5HD67vcNN7PH96yJPd6V63rfVJ7mpb4zcXXLW0uHSfXwMu-rZdd87sbOEMnTR6GezkMMfo9eb6pbhLysfbeZGXiaFcDIkQDdeQcWCQMpZBaoWQNUkFkZmgMQ2pWVVRkTHeNFpAzXklmBGGMF2bGGqMLvd_V77_XtswqEW_9jFNUIykWWwBNKrIXmV8H4K3jVp512q_UUDUlqGKDNWWoTowjJaLvcVZa__JBUiZAfsFH9xqrw</recordid><startdate>20240701</startdate><enddate>20240701</enddate><creator>Wang, Jin-Yuan</creator><creator>Hong, Li-Hua</creator><creator>Liu, Na</creator><creator>Yang, Hao-Nan</creator><creator>Feng, Pan</creator><creator>Ren, Jiawei</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope><orcidid>https://orcid.org/0009-0005-0381-9120</orcidid><orcidid>https://orcid.org/0000-0001-5745-4554</orcidid></search><sort><creationdate>20240701</creationdate><title>Secrecy Analysis and Optimization for IRMA- and Jammer-Aided Visible Light Communications</title><author>Wang, Jin-Yuan ; Hong, Li-Hua ; Liu, Na ; Yang, Hao-Nan ; Feng, Pan ; Ren, Jiawei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c245t-55f4a184131733817e556d075068529560d3bb25834ffa51d44b53c5c03adc233</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Algorithms</topic><topic>Artificial interference</topic><topic>Communications systems</topic><topic>Constraints</topic><topic>Interference</topic><topic>IRMA</topic><topic>Jammers</topic><topic>Jamming</topic><topic>Lower bounds</topic><topic>Luminous intensity</topic><topic>Mirrors</topic><topic>Optical transmitters</topic><topic>Optimization</topic><topic>physical-layer security</topic><topic>Secrecy aspects</topic><topic>secrecy capacity</topic><topic>Security</topic><topic>Visible light communication</topic><topic>visible light communications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, Jin-Yuan</creatorcontrib><creatorcontrib>Hong, Li-Hua</creatorcontrib><creatorcontrib>Liu, Na</creatorcontrib><creatorcontrib>Yang, Hao-Nan</creatorcontrib><creatorcontrib>Feng, Pan</creatorcontrib><creatorcontrib>Ren, Jiawei</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE wireless communications letters</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wang, Jin-Yuan</au><au>Hong, Li-Hua</au><au>Liu, Na</au><au>Yang, Hao-Nan</au><au>Feng, Pan</au><au>Ren, Jiawei</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secrecy Analysis and Optimization for IRMA- and Jammer-Aided Visible Light Communications</atitle><jtitle>IEEE wireless communications letters</jtitle><stitle>LWC</stitle><date>2024-07-01</date><risdate>2024</risdate><volume>13</volume><issue>7</issue><spage>1908</spage><epage>1912</epage><pages>1908-1912</pages><issn>2162-2337</issn><eissn>2162-2345</eissn><coden>IWCLAF</coden><abstract>This letter investigates the physical-layer security (PLS) of an indoor visible light communication system having a transmitter, a jammer, an intelligent reflecting mirror array (IRMA), a legitimate user, and an eavesdropper. Two scenarios are investigated for the non-negative input: one is having an average optical intensity constraint only, and the other is with both average and peak optical intensity constraints. By the entropy-power inequality and variational method, we derive closed-form expressions of secrecy-capacity lower bounds for the two scenarios, respectively. Based on the derived lower bound, we formulate a constrained secrecy-capacity maximization problem to further improve the PLS performance, and then transform it into a tractable problem by objective function approximation. After that, an optimization algorithm is proposed to solve the problem. Numerical results show the necessity of considering both IRMA and jammer, and also verify the effectiveness of the proposed algorithm.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/LWC.2024.3395667</doi><tpages>5</tpages><orcidid>https://orcid.org/0009-0005-0381-9120</orcidid><orcidid>https://orcid.org/0000-0001-5745-4554</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2162-2337 |
ispartof | IEEE wireless communications letters, 2024-07, Vol.13 (7), p.1908-1912 |
issn | 2162-2337 2162-2345 |
language | eng |
recordid | cdi_proquest_journals_3078078512 |
source | IEEE Electronic Library (IEL) |
subjects | Algorithms Artificial interference Communications systems Constraints Interference IRMA Jammers Jamming Lower bounds Luminous intensity Mirrors Optical transmitters Optimization physical-layer security Secrecy aspects secrecy capacity Security Visible light communication visible light communications |
title | Secrecy Analysis and Optimization for IRMA- and Jammer-Aided Visible Light Communications |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T15%3A54%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secrecy%20Analysis%20and%20Optimization%20for%20IRMA-%20and%20Jammer-Aided%20Visible%20Light%20Communications&rft.jtitle=IEEE%20wireless%20communications%20letters&rft.au=Wang,%20Jin-Yuan&rft.date=2024-07-01&rft.volume=13&rft.issue=7&rft.spage=1908&rft.epage=1912&rft.pages=1908-1912&rft.issn=2162-2337&rft.eissn=2162-2345&rft.coden=IWCLAF&rft_id=info:doi/10.1109/LWC.2024.3395667&rft_dat=%3Cproquest_RIE%3E3078078512%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3078078512&rft_id=info:pmid/&rft_ieee_id=10516681&rfr_iscdi=true |