Impact of multiple reflections on secrecy capacity of indoor VLC system
J Chen, T Shu - … Security: 21st International Conference, ICICS 2019 …, 2020 - Springer
J Chen, T Shu
Information and Communications Security: 21st International Conference, ICICS …, 2020•SpringerWhile visible light communication (VLC) is expected to have a wide range of applications in
the near future, the security vulnerabilities of this technology have not been well understood
so far. In particular, due to the extremely short wavelength of visible light, the VLC channel
presents several unique characteristics than its radio frequency counterparts, which impose
new features on the VLC security. Taking a physical-layer security perspective, this paper
studies the intrinsic secrecy capacity of VLC as induced by its special channel …
the near future, the security vulnerabilities of this technology have not been well understood
so far. In particular, due to the extremely short wavelength of visible light, the VLC channel
presents several unique characteristics than its radio frequency counterparts, which impose
new features on the VLC security. Taking a physical-layer security perspective, this paper
studies the intrinsic secrecy capacity of VLC as induced by its special channel …
Abstract
While visible light communication (VLC) is expected to have a wide range of applications in the near future, the security vulnerabilities of this technology have not been well understood so far. In particular, due to the extremely short wavelength of visible light, the VLC channel presents several unique characteristics than its radio frequency counterparts, which impose new features on the VLC security. Taking a physical-layer security perspective, this paper studies the intrinsic secrecy capacity of VLC as induced by its special channel characteristics. Different from existing models that only consider the specular reflection in the VLC channel, a modified Monte Carlo ray tracing model is proposed to account for both the specular and the diffusive reflections, which is unique to VLC. Based on this model the upper and the lower bounds of the VLC secrecy capacity are derived, which allow us to evaluate the VLC communication confidentiality against a comprehensive set of factors, including the locations of the transmitter, receiver, and eavesdropper, the VLC channel bandwidth, the ratio between the specular and diffusive reflections, and the reflection coefficient. Our results reveal that due to the different types of reflections, the VLC system becomes more vulnerable at specific locations where strong reflections exist.
Springer
Showing the best result for this search. See all results