Secrecy Analysis and Optimization for IRMA- and Jammer-Aided Visible Light Communications

This letter investigates the physical-layer security (PLS) of an indoor visible light communication system having a transmitter, a jammer, an intelligent reflecting mirror array (IRMA), a legitimate user, and an eavesdropper. Two scenarios are investigated for the non-negative input: one is having a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE wireless communications letters 2024-07, Vol.13 (7), p.1908-1912
Hauptverfasser: Wang, Jin-Yuan, Hong, Li-Hua, Liu, Na, Yang, Hao-Nan, Feng, Pan, Ren, Jiawei
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1912
container_issue 7
container_start_page 1908
container_title IEEE wireless communications letters
container_volume 13
creator Wang, Jin-Yuan
Hong, Li-Hua
Liu, Na
Yang, Hao-Nan
Feng, Pan
Ren, Jiawei
description This letter investigates the physical-layer security (PLS) of an indoor visible light communication system having a transmitter, a jammer, an intelligent reflecting mirror array (IRMA), a legitimate user, and an eavesdropper. Two scenarios are investigated for the non-negative input: one is having an average optical intensity constraint only, and the other is with both average and peak optical intensity constraints. By the entropy-power inequality and variational method, we derive closed-form expressions of secrecy-capacity lower bounds for the two scenarios, respectively. Based on the derived lower bound, we formulate a constrained secrecy-capacity maximization problem to further improve the PLS performance, and then transform it into a tractable problem by objective function approximation. After that, an optimization algorithm is proposed to solve the problem. Numerical results show the necessity of considering both IRMA and jammer, and also verify the effectiveness of the proposed algorithm.
doi_str_mv 10.1109/LWC.2024.3395667
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_3078078512</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10516681</ieee_id><sourcerecordid>3078078512</sourcerecordid><originalsourceid>FETCH-LOGICAL-c245t-55f4a184131733817e556d075068529560d3bb25834ffa51d44b53c5c03adc233</originalsourceid><addsrcrecordid>eNpNkMtLxDAQxoMouKx79-Ah4LlrJq92j6X4WKkIPvEU0jTVLNt2TbqH9a83-0AcBmZgvm_g-yF0DmQKQGZX5XsxpYTyKWMzIWV6hEYUJE0o4-L4b2fpKZqEsCCxJAEK2Qh9PFvjrdngvNPLTXAB667Gj6vBte5HD67vcNN7PH96yJPd6V63rfVJ7mpb4zcXXLW0uHSfXwMu-rZdd87sbOEMnTR6GezkMMfo9eb6pbhLysfbeZGXiaFcDIkQDdeQcWCQMpZBaoWQNUkFkZmgMQ2pWVVRkTHeNFpAzXklmBGGMF2bGGqMLvd_V77_XtswqEW_9jFNUIykWWwBNKrIXmV8H4K3jVp512q_UUDUlqGKDNWWoTowjJaLvcVZa__JBUiZAfsFH9xqrw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3078078512</pqid></control><display><type>article</type><title>Secrecy Analysis and Optimization for IRMA- and Jammer-Aided Visible Light Communications</title><source>IEEE Electronic Library (IEL)</source><creator>Wang, Jin-Yuan ; Hong, Li-Hua ; Liu, Na ; Yang, Hao-Nan ; Feng, Pan ; Ren, Jiawei</creator><creatorcontrib>Wang, Jin-Yuan ; Hong, Li-Hua ; Liu, Na ; Yang, Hao-Nan ; Feng, Pan ; Ren, Jiawei</creatorcontrib><description>This letter investigates the physical-layer security (PLS) of an indoor visible light communication system having a transmitter, a jammer, an intelligent reflecting mirror array (IRMA), a legitimate user, and an eavesdropper. Two scenarios are investigated for the non-negative input: one is having an average optical intensity constraint only, and the other is with both average and peak optical intensity constraints. By the entropy-power inequality and variational method, we derive closed-form expressions of secrecy-capacity lower bounds for the two scenarios, respectively. Based on the derived lower bound, we formulate a constrained secrecy-capacity maximization problem to further improve the PLS performance, and then transform it into a tractable problem by objective function approximation. After that, an optimization algorithm is proposed to solve the problem. Numerical results show the necessity of considering both IRMA and jammer, and also verify the effectiveness of the proposed algorithm.</description><identifier>ISSN: 2162-2337</identifier><identifier>EISSN: 2162-2345</identifier><identifier>DOI: 10.1109/LWC.2024.3395667</identifier><identifier>CODEN: IWCLAF</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; Artificial interference ; Communications systems ; Constraints ; Interference ; IRMA ; Jammers ; Jamming ; Lower bounds ; Luminous intensity ; Mirrors ; Optical transmitters ; Optimization ; physical-layer security ; Secrecy aspects ; secrecy capacity ; Security ; Visible light communication ; visible light communications</subject><ispartof>IEEE wireless communications letters, 2024-07, Vol.13 (7), p.1908-1912</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><orcidid>0009-0005-0381-9120 ; 0000-0001-5745-4554</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10516681$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10516681$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Wang, Jin-Yuan</creatorcontrib><creatorcontrib>Hong, Li-Hua</creatorcontrib><creatorcontrib>Liu, Na</creatorcontrib><creatorcontrib>Yang, Hao-Nan</creatorcontrib><creatorcontrib>Feng, Pan</creatorcontrib><creatorcontrib>Ren, Jiawei</creatorcontrib><title>Secrecy Analysis and Optimization for IRMA- and Jammer-Aided Visible Light Communications</title><title>IEEE wireless communications letters</title><addtitle>LWC</addtitle><description>This letter investigates the physical-layer security (PLS) of an indoor visible light communication system having a transmitter, a jammer, an intelligent reflecting mirror array (IRMA), a legitimate user, and an eavesdropper. Two scenarios are investigated for the non-negative input: one is having an average optical intensity constraint only, and the other is with both average and peak optical intensity constraints. By the entropy-power inequality and variational method, we derive closed-form expressions of secrecy-capacity lower bounds for the two scenarios, respectively. Based on the derived lower bound, we formulate a constrained secrecy-capacity maximization problem to further improve the PLS performance, and then transform it into a tractable problem by objective function approximation. After that, an optimization algorithm is proposed to solve the problem. Numerical results show the necessity of considering both IRMA and jammer, and also verify the effectiveness of the proposed algorithm.</description><subject>Algorithms</subject><subject>Artificial interference</subject><subject>Communications systems</subject><subject>Constraints</subject><subject>Interference</subject><subject>IRMA</subject><subject>Jammers</subject><subject>Jamming</subject><subject>Lower bounds</subject><subject>Luminous intensity</subject><subject>Mirrors</subject><subject>Optical transmitters</subject><subject>Optimization</subject><subject>physical-layer security</subject><subject>Secrecy aspects</subject><subject>secrecy capacity</subject><subject>Security</subject><subject>Visible light communication</subject><subject>visible light communications</subject><issn>2162-2337</issn><issn>2162-2345</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkMtLxDAQxoMouKx79-Ah4LlrJq92j6X4WKkIPvEU0jTVLNt2TbqH9a83-0AcBmZgvm_g-yF0DmQKQGZX5XsxpYTyKWMzIWV6hEYUJE0o4-L4b2fpKZqEsCCxJAEK2Qh9PFvjrdngvNPLTXAB667Gj6vBte5HD67vcNN7PH96yJPd6V63rfVJ7mpb4zcXXLW0uHSfXwMu-rZdd87sbOEMnTR6GezkMMfo9eb6pbhLysfbeZGXiaFcDIkQDdeQcWCQMpZBaoWQNUkFkZmgMQ2pWVVRkTHeNFpAzXklmBGGMF2bGGqMLvd_V77_XtswqEW_9jFNUIykWWwBNKrIXmV8H4K3jVp512q_UUDUlqGKDNWWoTowjJaLvcVZa__JBUiZAfsFH9xqrw</recordid><startdate>20240701</startdate><enddate>20240701</enddate><creator>Wang, Jin-Yuan</creator><creator>Hong, Li-Hua</creator><creator>Liu, Na</creator><creator>Yang, Hao-Nan</creator><creator>Feng, Pan</creator><creator>Ren, Jiawei</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope><orcidid>https://orcid.org/0009-0005-0381-9120</orcidid><orcidid>https://orcid.org/0000-0001-5745-4554</orcidid></search><sort><creationdate>20240701</creationdate><title>Secrecy Analysis and Optimization for IRMA- and Jammer-Aided Visible Light Communications</title><author>Wang, Jin-Yuan ; Hong, Li-Hua ; Liu, Na ; Yang, Hao-Nan ; Feng, Pan ; Ren, Jiawei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c245t-55f4a184131733817e556d075068529560d3bb25834ffa51d44b53c5c03adc233</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Algorithms</topic><topic>Artificial interference</topic><topic>Communications systems</topic><topic>Constraints</topic><topic>Interference</topic><topic>IRMA</topic><topic>Jammers</topic><topic>Jamming</topic><topic>Lower bounds</topic><topic>Luminous intensity</topic><topic>Mirrors</topic><topic>Optical transmitters</topic><topic>Optimization</topic><topic>physical-layer security</topic><topic>Secrecy aspects</topic><topic>secrecy capacity</topic><topic>Security</topic><topic>Visible light communication</topic><topic>visible light communications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, Jin-Yuan</creatorcontrib><creatorcontrib>Hong, Li-Hua</creatorcontrib><creatorcontrib>Liu, Na</creatorcontrib><creatorcontrib>Yang, Hao-Nan</creatorcontrib><creatorcontrib>Feng, Pan</creatorcontrib><creatorcontrib>Ren, Jiawei</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE wireless communications letters</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wang, Jin-Yuan</au><au>Hong, Li-Hua</au><au>Liu, Na</au><au>Yang, Hao-Nan</au><au>Feng, Pan</au><au>Ren, Jiawei</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secrecy Analysis and Optimization for IRMA- and Jammer-Aided Visible Light Communications</atitle><jtitle>IEEE wireless communications letters</jtitle><stitle>LWC</stitle><date>2024-07-01</date><risdate>2024</risdate><volume>13</volume><issue>7</issue><spage>1908</spage><epage>1912</epage><pages>1908-1912</pages><issn>2162-2337</issn><eissn>2162-2345</eissn><coden>IWCLAF</coden><abstract>This letter investigates the physical-layer security (PLS) of an indoor visible light communication system having a transmitter, a jammer, an intelligent reflecting mirror array (IRMA), a legitimate user, and an eavesdropper. Two scenarios are investigated for the non-negative input: one is having an average optical intensity constraint only, and the other is with both average and peak optical intensity constraints. By the entropy-power inequality and variational method, we derive closed-form expressions of secrecy-capacity lower bounds for the two scenarios, respectively. Based on the derived lower bound, we formulate a constrained secrecy-capacity maximization problem to further improve the PLS performance, and then transform it into a tractable problem by objective function approximation. After that, an optimization algorithm is proposed to solve the problem. Numerical results show the necessity of considering both IRMA and jammer, and also verify the effectiveness of the proposed algorithm.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/LWC.2024.3395667</doi><tpages>5</tpages><orcidid>https://orcid.org/0009-0005-0381-9120</orcidid><orcidid>https://orcid.org/0000-0001-5745-4554</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2162-2337
ispartof IEEE wireless communications letters, 2024-07, Vol.13 (7), p.1908-1912
issn 2162-2337
2162-2345
language eng
recordid cdi_proquest_journals_3078078512
source IEEE Electronic Library (IEL)
subjects Algorithms
Artificial interference
Communications systems
Constraints
Interference
IRMA
Jammers
Jamming
Lower bounds
Luminous intensity
Mirrors
Optical transmitters
Optimization
physical-layer security
Secrecy aspects
secrecy capacity
Security
Visible light communication
visible light communications
title Secrecy Analysis and Optimization for IRMA- and Jammer-Aided Visible Light Communications
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T15%3A54%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secrecy%20Analysis%20and%20Optimization%20for%20IRMA-%20and%20Jammer-Aided%20Visible%20Light%20Communications&rft.jtitle=IEEE%20wireless%20communications%20letters&rft.au=Wang,%20Jin-Yuan&rft.date=2024-07-01&rft.volume=13&rft.issue=7&rft.spage=1908&rft.epage=1912&rft.pages=1908-1912&rft.issn=2162-2337&rft.eissn=2162-2345&rft.coden=IWCLAF&rft_id=info:doi/10.1109/LWC.2024.3395667&rft_dat=%3Cproquest_RIE%3E3078078512%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3078078512&rft_id=info:pmid/&rft_ieee_id=10516681&rfr_iscdi=true