Design of Energy-Efficient Artificial Noise for Physical Layer Security in Visible Light Communications
Abstract
This paper studies the design of energy-efficient artificial noise (AN) schemes in the context of physical layer security in visible light communications (VLC). Two different transmission schemes termed selective AN-aided single-input single-output (SISO) and AN-aided multiple-input single-output (MISO) are examined and compared in terms of secrecy energy efficiency (SEE). In the former, the closest LED luminaire to the legitimate user (Bob) is the information-bearing signal’s transmitter. At the same time, the rest of the luminaries act as jammers transmitting AN to degrade the channels of eavesdroppers (Eves). In the latter, the information-bearing signal and AN are combined and transmitted by all luminaries. When Eves’ CSI is unknown, an indirect design to improve the SEE is formulated by maximizing Bob’s channel’s energy efficiency. A low-complexity design based on the zero-forcing criterion is also proposed. In the case of known Eves’ CSI, we study the design that maximizes the minimum SEE among those corresponding to all eavesdroppers. At their respective optimal SEEs, simulation results reveal that when Eves’ CSI is unknown, the selective AN-aided SISO transmission can archive twice better SEE as the AN-aided MISO does. In contrast, when Eves’ CSI is known, the AN-aided MISO outperforms by 30%.
Index Terms:
VLC, energy efficiency, physical layer security, jamming, precoding.I Introduction
I-A Background
Indoor wireless activities generate roughly 80% of the total wireless Internet traffic [1]. In the case of indoor scenarios, a standard means of Internet access is Wireless Fidelity (Wi-Fi), which is currently imposed by increasingly stringent requirements for high data rates due to the tremendous growth in the number of mobile devices and data-intensive applications. A great deal of research effort has been devoted to satisfying this increasing demand by exploring new communications technologies, among which visible light communications (VLC) is a promising candidate. Compared to existing wireless systems, VLC offers the unique advantage of simultaneously providing illumination and communication, both essential for indoor activities. Furthermore, the promised high data rate comes at no license-fee spectrum and little infrastructural installation.
Over the years, numerous theoretical and experimental studies on VLC have focused on improving its practicality and data-rate performance (see [2, 3, 4] and references therein) for both indoor and outdoor scenarios. To realize practical VLC systems, one must also incorporate security and privacy in the design. Traditional approaches for acquiring secure transmissions over public communication media are based on well-established key-based cryptographic algorithms. The security of conventional cryptography relies on the extreme computational complexity of solving certain mathematical problems (e.g., the factoring problem). Given the current computing power of the classical computer, it is likely that breaking the secret keys is not feasible within a meaningful amount of time. However, quantum computers, which are expected to be fully functional in the foreseeable future, can threaten the security of current encryption schemes as they are exponentially faster than their classical counterparts [5]. The vulnerability of traditional cryptography to quantum computers has been the primary motivation for researching alternative security measures not based on computational difficulty. In this context, physical layer security (PLS) is a promising approach to complement and/or replace cryptographic techniques as the information confidentiality can be kept perfectly secure regardless of the computational power of the eavesdropper[6].
I-B Related Works
While the literature on PLS in VLC systems is considerably extensive (see [7, 8] and references therein), the existing studies mainly focused on two directions. The first focuses on analyzing different lower and upper bounds on the secrecy capacity of the single-input single-output (SISO) wiretap VLC channels [9, 10, 11]. Compared with the SISO, the multiple-input single-output (MISO) configuration is more relevant in practice, as deploying multiple LED luminaires is a norm in illumination. In the second direction, several studies, therefore, exploited the spatial degree of freedom at the transmitting side to investigate the application of precoding and artificial noise (AN) to improve secrecy performance. Specifically, in the case of precoding, Mostafa studied the designs of zero-forcing (ZF) and general precoders to maximize the achievable secrecy rate for systems with a single legitimate user and a single eavesdropper considering both perfect and uncertain estimation of the channel state information (CSI) [12, 13]. Subsequent works then examined precoding designs for more general system configurations with different objectives, such as multi-eavesdropper with minimizing the total transmitted power [14], multi-legitimate users with maximizing the achievable secrecy sum-rate [15], and multi-user systems, in which each user treats others as eavesdroppers (hence, transmitted messages for users must be kept mutually confidential)[16]. ZF precoding strategies to deal with both active and passive eavesdroppers were also proposed in [17].
In addition to precoding, AN is another approach to enhancing PLS performance [18, 19, 20]. In essence, AN is a jamming signal which is purposely generated and transmitted by the transmitter so that it causes minimal or no interference to the legitimate user while potentially degrading the quality of the eavesdroppers’ channel. Note that AN should be deployed with precoding to fully exploit the available spatial degree of freedom. Hence, precoding can be considered a special case of AN-aided transmission where no power is allocated to AN generation. Initial research on the topic considered systems where a fixed LED luminaire transmits the information-bearing signal while the rest broadcast jamming signals [21, 22]. We term this scheme as AN-aided SISO transmission. Subsequent works then focused on the jamming scheme where the information-bearing signal and AN are combined and transmitted by all luminaires. This scheme is referred to as AN-aided MISO transmission. Joint precoding and AN designs were investigated under different performance criteria. For example, the authors in [23] studied the design that maximizes the signal-to-interference-plus-noise ratio (SINR) of the legitimate user’s channel while constraining that of the eavesdroppers’ channel to a predefined threshold. The study in [24] examined the same objective yet under the constraint on the average SINR of the eavesdroppers’ channel (assuming that eavesdroppers’ CSI is unknown at the transmitters). Considering a multi-Bob VLC system, AN designs to maximize the minimum SINR among Bobs’ channels were investigated in [25]. Given specific constraints on the SINRs of Bob’s and Eves’ channels, our study in [26] AN designs to minimize the total transmitted power considering both perfect and imperfect CSI estimations.
Aside from improving the secrecy rate, there is also a need to optimize energy efficiency (EE), which measures how much energy is consumed per a transmitted information bit [27]. This has been of particular interest in recent years due to the increased effort in reducing energy consumption to combat climate change [28]. Although several studies have been conducted on EE in VLC and hybrid VLC/RF systems [29, 30, 31, 32, 33, 34], little attention has been paid to that in the context of PLS. In fact, to the best of the authors’ knowledge, our previous studies in [35, 36] are the first works concerning the PLS in VLC from the EE perspective. Defining secrecy energy efficiency (SEE) as the consumed energy per a transmitted confidential bit, we designed precoding schemes to maximize the sum SEE for multi-user VLC systems where messages among users are kept mutually confidential.
I-C Contributions
Against the above background, this paper aims to study energy-efficient AN designs for PLS in VLC systems. We consider the systems with a legitimate user (i.e., Bob) and multiple eavesdroppers (i.e., Eves) whose CSI can be known or unknown on the transmitting side. The AN-aided MISO and a refined AN-aided SISO transmission scheme, which we term as selective AN-aided SISO, are investigated and compared in terms of the achievable SEE. Contrary to the original AN-aided SISO, where the information-bearing signal is transmitted by a fixed LED luminaire, in the proposed scheme, that is done by the luminaire, which has the highest channel gain to Bob. The rest of the luminaires act as jammers transmitting AN. By doing so, Bob can enjoy the strongest information-bearing signal while suffering less from the AN. Hence, given the same amount of consumed energy, the proposed scheme should achieve a better achievable secrecy rate, resulting in a higher SEE compared with the original counterpart. In the conference version of this paper [37], the design of the selective AN-aided SISO scheme considering the unavailability of Eves’ CSI was studied. Extending from this, the contributions of this paper are summarized as follows.
-
•
In addition to the presented design in [37], which was solved using the Dinkelbach algorithm and the convex-concave procedure (CCP), a simple and low-complexity ZF AN-aided SISO design is investigated. Simulation results show that this design approach achieves comperable SEE that of the design in [37] with significantly reduced computational time.
-
•
We study an AN design when Eves’ CSI is available at the transmitting side. The presence of multiple Eves results in multiple sub-wiretap channels, each characterized by a different achievable secrecy rate. To ensure that the transmitted information to Bob is secure against all Eves, the system’s achievable secrecy rate is defined as the minimum among all sub-wiretap channels. Then, an AN design is cast as a max-min SEE problem, which requires a different approach to solve. Specifically, we transform the original problem into a feasibility problem, which can then be solved using the bisection method.
-
•
Comprehensive simulations are conducted to compare the complexity and performance of the original AN-aided SISO, the proposed selective AN-aided SISO, and the AN-aided MISO transmissions under various parameter settings. Our main finding is that the selective AN-aided SISO scheme achieves a better SEE than the AN-aided MISO does in the case of unknown Eves’ CSI, while it is the opposite in the case of known Eves’ CSI as the AN-aided MISO scheme is superior.
I-D Organization
The rest of the paper is organized as follows. The system models, including the channel model, signal model, and energy consumption, are described in Section II. Section III presents different AN-aided designs from the perspective of SEE maximization. Numerical results with related discussions are given in Section IV. Finally, Section V concludes the paper.
Notation: The following notations are used in the paper. and denote the set of real and nonnegative real numbers, respectively. Uppercase and lowercase bold letters (e.g., and ) represent matrices and column vectors, respectively. is the transpose of . In addition, , , , and are the absolute value, Euclidean norm, maximum norm, and trace operators, respectively. Finally, is the expected value of , denotes the -th element of and is the all-one column vector of size .
II System Models
We consider a typical room as depicted in Figs. 1(a) and 1(b), where LED luminaries are deployed for both illumination and communications. These LEDs are connected via wired connections to a central processing unit (CPU), which is responsible for signal processing and coordination among LED transmitters. There are one legitimate user (Bob) and multiple eavesdroppers (Eves), who, assuming that, are non-colluding111In practice, Eves can cooperate to maximize their eavesdropped information. This, however, may complicate the analysis of the AN design. Hence, we leave this scenario for future research.. It is assumed Bob feeds its estimated CSI back to the CPU via a wireless uplink (e.g., infrared or Wi-Fi). By comparing the entries of the received CSI vector, the CPU can determine the closest luminaire to Bob. In the selective AN-aided SISO transmission scheme illustrated in Fig. 1(a), the closest luminaire to Bob acts as Alice, who transmits the information-bearing signal. The rest of the luminaries act as jammers transmitting AN. In the AN-aided MISO scheme described in Fig. 1(b), all luminaries act as Alice and jammer to transmit the combined information-bearing signal and AN. We also consider that Eves’s CSI can be either known or unknown on the transmitting side. Accordingly, different design approaches are presented considering the availability of Eves’ CSI.


II-A Channel Model
In indoor environments, the transmitted signal propagates to a user via a direct light-of-sight (LoS) and multiple non-light-of-sight paths (NLoS) (due to reflections of walls and ceiling). Nevertheless, it was experimentally verified that the total received optical power at the receiver is predominantly contributed by the LoS signal. On the other hand, the NLoS channel gain, which accounts for less than 5% of the total received optical power, Therefore, only the LoS propagation path is considered in this work to simplify the analysis.
The LoS channel coefficient between an LED luminaire and a user denoted as is given by [38]
(1) |
where denotes the indicator function, is the active area of the photodiode (PD), is the link length, is the angle of irradiance, is the optical field of view (FOV) of the PD, and is the angle of incidence. Also, is the order of the Lambertian emission where is the LED’s semi-angle for half illuminance. is the gain of the optical filter, and is the gain of the optical concentrator, with being the refractive index of the optical concentrator.
II-B Signal Model
In this section, only the signal model of the selective AN-aided transmission scheme is presented for the sake of conciseness. Without otherwise noted, analysis in the case of the AN-aided MISO transmission scheme follows the same manner. In the following, signal models for the case of unknown and known Eves’s CSI are respectively described.
II-B1 Unknown Eves’ CSI
Let be a -ary pulse amplitude modulation (M-PAM)-modulated information signal intended for Bob. Also, let be a random signal representing the AN. Without loss of generality, it is assumed that and are both zero-mean and normalized and uniformly distributed over , which is notated as . In our proposed scheme, is sent by Alice while is transmitted by the jammers. For Alice, the information-bearing signal is first scaled by a weighting factor (i.e., precoder) and then added by a DC-bias , which specifies the desired illumination level. The resulting LED’s modulating signal is then represented by
(2) |
It is known that there exists a linear range (denoted as, for example, ) for each particular LED in which the output optical signal is linearly proportional to the amplitude of the modulating signal . Therefore, to ensure efficient use of the LEDs, should be constrained within the linear range as
(3) |
As , the following constraint on is needed to satisfy (3)
(4) |
where . When information regarding Eves (e.g., the number of Eves and their positions) is unknown at the transmitters, the use of a single precoder for the AN is appropriate to simplify the design. Similar to (2), it follows that
(5) |
Let and be the channel gain and channel gain vector from Alice and jammers to Bob, respectively222The subscript ‘R’ is used to denote Bob and Eves as receivers in general. When necessary, the subscript ‘B’ is used to refer to Bob while ‘E’ is used to refer to Eve.. If we denote and with being the LED conversion factor as the emitted optical power at Alice and jammers, respectively, the received current signals at Bob and Eves can be written as
(6) |
where is the photo-diode responsivity, , , is the DC-bias vector, and is the receiver noise. It is reasonable to model as a zero-mean additive white Gaussian noise with the variance being given by
(7) |
where is the elementary charge, is the average received optical power, is the modulation bandwidth of the LED, is the ambient light photo-current, and is the pre-amplifier noise current density.
At the receiver, the DC current is filtered out, leaving the AC term for signal demodulation
(8) |
The signal-to-interference-plus-noise ratios (SINRs) of Bob’s and Eves’ received signals are then calculated as
(9) |
where (since , then ).
II-B2 Known Eves’ CSI
In certain scenarios, the information intended for Bob must be kept confidential; thus, any other active users should be treated as Eves. As a result, Eves’ CSI can be assumed to be known on the transmitting side. To better exploit the available spatial information, a separate AN signal should be generated for each Eve. Thus, denote as the AN symbol intended for the -th Eve and as the corresponding precoder. The LED’s modulating current vector at the jammers is then written as
(10) |
where is the number of Eves. Bounding between results in the following constraint on ’s
(11) |
The received AC current signals at Bob and Eves are then given by
(12) |
where in this case with .
II-B3 Signal Model for the AN-aided MISO
In the case of AN-aided MISO, since each luminaire acts as Alice and jammer simultaneously, notations of the channel and the precoder differ slightly from those of the selective AN-aided SISO. These differences are summarized in Table I.
Selective AN-aided SISO | AN-aided MISO | |
---|---|---|
Alice-Receiver’s channel | ||
Jammer-Receiver’s channel | ||
Precoder of information symbol | ||
Precoder of AN |
With this, the LED’s drive current vector in the case of unknown Eves’ CSI and known Eves’ CSI are given by and , respectively. Then, constraints on , , and the received signals at the receiver follow the same analyses presented for the selective AN-aided SISO scheme.
II-C Energy Consumption and Energy Efficiency
II-C1 Unknown Eves’ CSI
Since Alice and jammers have no knowledge about Eves, we consider a worst-case design based on an achievable rate of Bob’s channel. It is observed that the channel in (8) is subject to a Gaussian channel with amplitude-constrained input and interference. For such a channel, a lower bound on its channel capacity is given by [39, Eq. (4)],
(13) |
One can also derive an upper bound on the channel capacity based on [39, Eq. (7)]. However, the resulting design problem is not particularly different. For the sake of conciseness, we thus consider designs with respect to the lower bound capacity (or lower bound secrecy capacity as in the case of known Eves’ CSI).
In the considered system, energy is consumed for illumination, generation of the information-bearing signal and AN, and circuitry operations. In general, while the powers for illumination () and circuitry operations () can be assumed to be fixed (i.e., the dimming level is unchanged), the power level by the information-bearing signal () and AN () needs to be optimized with respect to the achievable secrecy rate. The total power can then be written as
(14) |
where is the LEDs’ forward voltage and with being the resistance of the AC circuit. Given the achievable rate in (13), the EE of the system with respect to Bob’s channel is expressed by
(15) |
II-C2 Known Eves’ CSI
In this scenario, due to the availability of Eves’ CSI, achievable secrecy rates can be derived to calculate the SEE. In particular, a lower bound on the secrecy capacity of the wiretap channel comprising Bob and the th Eve is written by
(16) |
where and is an upper bound on the capacity of the -th Eve’s channel, which can be derived from [39, Eq. (7)]. Using (13) gives the following expression for
(17) |
with and being channel coefficients between Alice, jammer and the -th Eve, respectively. Moreover, the constraint in (11) can rewritten in terms of as
(18) |
Using the same assumptions in the case of unknown Eves’ CSI, the total power consumption is given by
(19) |
Note that to ensure the confidentiality of the transmitted signal against all eavesdroppers, the information rate must be no higher than the lowest achievable secrecy rate among values of . Therefore, we are interested in an AN design that maximizes the SEE corresponding to the minimum achievable secrecy rate, which is defined by
(20) |
III Secrecy Energy Efficiency Maximization
The availability of Eves’s CSI at Alice and the jammers is critical to our design approaches. In the following, we, hence, separately consider two scenarios: unknown and known Eves’ CSI. The designs are again presented for the selective SISO transmission scheme, mentioning the MISO transmission scheme when needed.
III-A Unknown Eves’ CSI
In most practical cases, Eves are passive eavesdroppers who do not feed their CSI back to the transmitters, leading to the unavailability of Eves’ CSI on the transmitting side. Without the knowledge of Eves’ CSI, direct optimization of the SEE may not be possible. Instead, an indirect design approach is to maximize the EE of Bob’s channel. The obtained solution is then used to calculate the SEE. Due to the proportionality between the capacity of Bob’s channel and the secrecy capacity, this design approach possibly results in good SEE performance as well.
With constraints on the precoders and given in (4) and (5), a naive way to formulate an EE maximization problem for Bob’s channel is as follows
(21a) | ||||||
subject to | ||||||
(21b) | ||||||
(21c) |
Proposition 1.
The optimal AN solution to is .
Proof.
An intuitive proof is that using AN does not improve the achievable rate of Bob’s channel while increasing energy consumption. Thus, an AN-aided transmission reduces the EE, which shows that the no-AN transmission (i.e., ) is optimal. A rigorous proof is given in Appendix A. ∎
Proposition 1 shows that in order to achieve the maximal , jammers should be inactive. However, this may not lead to an improved SEE because without being interfered with by the AN, Eves can enjoy high-quality communication channels (thus, lowering the achievable secrecy rate). To enable the use of AN, one can set a constraint to ensure that a certain amount of power is allocated to generating the AN signal, for example, where is the minimal allocated power threshold. The choice of is critical as due to (21c), this power allocation renders the design problem infeasible if . Moreover, although increasing decreases Eves’ SINRs, it potentially degrades the quality of Bob’s channel as well and increases the total consumption power. Consequently, the overall SEE might be reduced. To prevent too much power from being allocated to the AN and guarantee that the quality of Bob’s channel is above a desirable limit, a constraint on Bob’s SINR is taken into consideration. Specifically, we study a modification for as given below
(22a) | ||||||
subject to | ||||||
(22b) | ||||||
(22c) | ||||||
Here, is the minimum SINR required for Bob’s channel.
One should emphasize that the introduction of constraints in (22b) and (22c) may render infeasible. Indeed, it can be easily verified that the problem is infeasible when . Therefore, we assume that and are explicitly chosen so that is feasible. It is seen that is a fractional non-convex optimization problem. Hence, we employ the Dinkelbach algorithm, which is efficient in solving fractional programming to tackle the problem. The principle of the Dinkelbach algorithm is to get rid of the fractional objective function by introducing an equivalent non-fractional parametric objective function, which can be handled more conveniently. In particular to our problem, let and be the value of the objective function. The algorithm then iteratively solves the following parametric problem
(23a) | ||||||
subject to | ||||||
In each iteration, say the th iteration, a new is updated, where and are the iteration’s optimal solutions to and , respectively. The algorithm terminates when converges to a predefined sufficiently low value. The algorithm is summarized as follows.
III-A1 General AN-aided SISO
In each iteration of Algorithm 1, it is required to solve , which is not a convex optimization problem due to the non-concavity of the objective function and non-convexity of (22b) and (22c). Notice that (22b) can be convexified via an observation that there exists an optimal solution satisfying that . Indeed, it is obvious that if there is any optimal solution to that , then is also feasible and offers the same objective value. Hence, is also optimal. As a result, (22b) is equivalently rewritten as
(24) |
which is convex. The non-concavity of the objective function is due to the fact that is not concave. To overcome this problem, one can make use of the following variable transformations
(25) | |||
(26) | |||
(27) | |||
(28) |
Accordingly, we reformulate as
(29a) | ||||||
subject to | ||||||
(29b) | ||||||
(29c) | ||||||
(29d) | ||||||
(29e) | ||||||
(29f) | ||||||
Note that without lost of optimality, the equalities in (25)-(28) are replaced by their corresponding inequalities in (29b)-(29e) of . Indeed, since the objective in (29a) is monotically increasing with , at the opitmal solution, must attain its maximum value, which implies that (29b) and (29c) hold at equality. The same argument can be used to validate (29d) and (29e). Now, all constraints except (29c), (29d), and (22c) are convex. Observe that one side in each of these inequality constraints is either constant or linear. This enables the use of Taylor expansion to approximately linearize the constraints. Then, the CCP is used to successively solve the problem. Specifically, at the th iteration of the CCP, the following first-order Taylor approximations are used
(30) |
(31) |
(32) |
where , , and are the solutions to , , and in the th iteration, respectively. Replacing (29c), (29d), and (22c) by their corresponding constraints using (30), (31), and (32) results in
(33a) | ||||||
subject to | ||||||
(33b) | ||||||
(33c) | ||||||
(33d) | ||||||
which is a convex optimization problem and thus can be solved efficiently using available software packages, e.g., CVX [40]. Then a sub-optimal solution to can be found via solving a sequence of until a convergence criterion is satisfied. Note that due to the tighter constraints used in (33b)-(33c), it is guaranteed that a solution to is feasible to . In summary, an CCP algorithm to solve is described in Algorithm 2.
III-A2 ZF AN-aided SISO
The presented general AN design requires two iterative procedures, which might incur a high computational complexity. In order to simplify the design, we present in this section a ZF design approach where the AN is constructed to lie on the null-space of . This ensures that the generated AN does cause any interference on Bob’s channel. This, however, also leads to a smaller search space of , possibly resulting in a reduced SEE performance. To this end, let be an orthogonal basic for the null-space of . The AN precoder is then given by , where is a scaling factor, which controls the AN power. Under this null-space strategy, the EE of Bob’s channel is simplified to
(34) |
and the design problem becomes
(35a) | ||||||
subject to | ||||||
(35b) | ||||||
(35c) | ||||||
(35d) | ||||||
(35e) |
Note that (35c) holds because . Firstly, we can see that is feasible if and only if the two conditions and are simultaneously satisfied. Assume that these conditions hold, because (34) is monotonically decreasing with , the optimal solution to is obviously . With this and by making change of variable , reduces to
(36a) | ||||||
subject to | ||||||
(36b) | ||||||
(36c) |
where .
Proposition 2.
Assume that is feasible, a global solution exists and is unique.
Proof.
The proof is given in Appendix B. ∎
The proof of Proposition 2 shows that there is no need to utilize the Dinkelbach algorithm and the CCP to solve . In the worst-case scenario, solving only requires a bisection procedure, which generally results in a considerably reduced computational complexity. Note that the same solving approach presented in the proof of the proposition may not be possible for the ZF AN-aided MISO scheme because of the vector form of the precoder . Instead, a combination of the Dinkelbach algorithm and the CCP is required to solve the design problem. Nonetheless, the complexity can still be reduced due to the smaller search space of when the ZF constraint is applied.
III-B Known Eves’ CSI
Recall that when Eves’ CSI is known at the transmitter, we consider a direct design to maximize the minimum SEE. Following the expression in (20), the AN design problem, in this case, is formulated as
(37a) | ||||||
subject to | ||||||
(37b) | ||||||
(37c) |
It is seen that is a nonconvex maximin optimization problem. A standard technique to handle the problem is to introduce a slack variable and then transform to
(38a) | ||||
subject to | ||||
(38b) | ||||
The use of the slack variable results in additional constraints , which are equivalently represented in (38b), which is non-convex and difficult to handle due to the product between optimizing variables on the right-hand side. It is, therefore, challenging to directly solve . However, one can transform into a feasibility problem by fixing the value of . Then, a solution to the original problem can be found using the bisection method. Specifically, given a fixed value of ,
(39a) | ||||
subject to | ||||
(39b) | ||||
Similar to (25)-(28), we make use of the following variable transformations
(40) | |||
(41) | |||
(42) | |||
(43) | |||
(44) |
(45) | |||
(46) | |||
(47) |
and then transform into the following
(48a) | ||||
subject to | ||||
(48b) | ||||
(48c) | ||||
(48d) | ||||
(48e) | ||||
(48f) | ||||
(48g) | ||||
(48h) | ||||
(48i) | ||||
(48j) | ||||
It is seen that constraint (48c), (48f), (48h), (48i), (37b), and (37c) are convex while the rest are not. Using the first-order Taylor expansion to approximately convexify those non-convex constraints results in
(49) |
(50) |
(51) |
(52) |
where , , , and are the solutions to , , , and at the -th iteration of the CCP procedure. Replacing the above approximating terms to (48d), (48e), (48g), and (48j), respectively, resulting in
(53a) | ||||
subject to | ||||
(53b) | ||||
(53c) | ||||
(53d) | ||||
(53e) | ||||
which is a convex feasibility problem, hence can be efficiently handled. The feasibility of can then be determined if there exists a solution to . Now, it is observed that the solution to is the maximum value of at which is feasible. Therefore, the bisection method, as described in the Algorithm 3 on top of the next page, can be utilized to solve .
IV Numerical Results and Discussions
In this section, simulation results are presented to demonstrate the SEE of the AN designs for the two transmission schemes. A typical room of the size of 5 m (Length) 5 m (Width) 3 m (Height) equipped with 4 LED luminaries as shown in Figs. 1(a) and 1(b) is considered. Bob’s and Eves’ receivers are placed 0.5 m above the floor. Locations of LED luminaires, Bob, and Eves are determined through a Cartesian coordinate system whose origin is the center of the floor. We also assume that and , resulting in . Without otherwise noted, dB, Watts, Volts, , and error tolerances are used [36]. Other system parameters are given in Table II. Furthermore, simulation results are averaged over 2000 randomly generated channel realizations for Bob and Eves. Without loss of generality, for the fixed AN-aided SISO scheme, luminaire 1 is chosen to be Alice, while luminaires 2, 3, and 4 act as jammers. Since the information-bearing and AN symbols are both assumed to be zero-mean, the average emitted optical power of each luminaire is dependent solely on and given as .
IV-A Unknown Eves’ CSI
Firstly, it is necessary to specify the minimum allocated AN power as described in (22c). According to the constraint in (21c), the maximum allowable AN power in the selective AN-aided SISO scheme is while it is in the case of the AN-aided MISO transmission. Thus, to avoid the infeasibility of (21c) in both AN transmission schemes, can be chosen to be , where is a constant that controls the maximum amount of the AN power given a fixed value of .
Room and LED configurations | ||
LED luminaire positions | luminaire 1 : (, , 3) | luminaire 2 : (, , 3) |
luminaire 3 : (, , 3) | luminaire 4 : (, , 3) | |
LED bandwidth, | 20 MHz | |
LED beam angle, | ||
(LED Lambertian order is 1) | ||
LED conversion factor, | 0.44 W/A | |
Receiver photodetectors | ||
Active area, | 1 | |
Responsivity, | 0.54 A/W | |
Field of view (FoV), | ||
Optical filter gain, | 1 | |
Refractive index of the concentrator, | 1.5 | |
Other parameters | ||
Ambient light photocurrent, | 10.93 ) | |
Preamplifier noise current density, | 5 |



Recall that depending on the choice of and , constraints (22b) and (22c) may not be simultaneously satisfied, which results in an infeasibility of (similar arguments for the fixed AN-aided SISO and AN-aided MISO schemes). Since dB is assumed, we show in Figs. 2(a), 2(b), and 2(c) the impact of on the feasibility of for different values of . When is less than 0.5, except for the fixed SISO scheme, all AN transmission schemes are always feasible. Their feasibility probabilities, however, start decreasing as exceeds 0.5, especially for the ZF AN designs (due to their reduced feasible regions imposed by the ZF constraint). Also, the low feasibility probability of the fixed SISO scheme is due to the fact that Bob can be out of the service zone as a fixed luminaire is chosen to transmit the information-bearing signal. To ensure sufficiently high feasibility probabilities of all transmission schemes, in the following, is chosen for simulations.
To qualitatively compare the SEE performance of the examined AN-aided transmission schemes, it suffices to consider the case that the number of Eves is 1. Figs. 3(a) and 3(b) depict the EE of Bob’s channel (i.e., the solution to ) and the resultant SEE with respect to the average luminaire optical power . It is clearly shown that when only Bob’s channel is considered, the MISO transmission performs better than the selective and fixed SISO. This verifies the benefit of spatial precoding in improving EE. Interestingly, the resultant SEE shows a contrary observation where the proposed selective SISO scheme significantly outperforms the MISO and the fixed SISO transmissions. For instance, the optimal SEE of the selective SISO is more than twice that of the MISO scheme and about 80% higher than that of the fixed SISO scheme.



This can be explained in Fig. 3(c), which plots the gap between the signal-to-interference-plus-noise ratios (SINR) of Bob’s and Eve’s channels. It is seen that the SINR gap in the case of the MISO scheme is smaller than that of the selective SISO, especially in the low optical power region. Recall that the AN design, in this case, tries to maximize the EE of Bob’s channel without consideration of Eve due to its unknown CSI (i.e., indirect AN design). Consequently, using more luminaires for transmitting the information-bearing signal enables Eve to receive more signal power, which results in a lower secrecy rate compared to that of the selective SISO scheme. As the transmit optical power increases, an increase in the SINR gap is observed. Nevertheless, this improvement (due to increased ) does not result in a better SEE because of the dominance of the power consumption. It is also evident that AN-aided transmission schemes offer better SEE performance than their no-AN (i.e., without AN) counterparts. Regarding the selective SISO transmissions, the ZF AN-aided design, despite its low complexity, archives a comparable SEE with that of the general design. Hence, it may be preferable for the system design when reducing the signal processing time is of importance.
We now discuss the complexity of the general AN designs for the selective SISO and MISO transmissions. As presented in Sec. III.A, the solving procedure involves two iterative algorithms (i.e., Dinkelback-type and CCP-type algorithms). Thus, Figs. 4(a) and 4(b) show the convergence error of the EE with respect to the number of iterations of the Dikelbach-type (Algorithm 1) and CCP-type (Algorithm 2) algorithms for the selective AN-aided SISO and the AN-aided MISO schemes, respectively.


For the former, there requires, on average, three iterations for both algorithms to achieve the convergence error of . For the latter to attain the same convergence error, at least six and four iterations are needed for the CCP-type and the Dinkelbach-type algorithms, respectively. The higher complexity of the AN-aided MISO is due to the larger sizes of its optimizing variables (i.e., vs. 1 for the precoder of the information symbol and vs. for the precoder of the AN). In practical scenarios, when more LED luminaries are deployed (i.e., increases), the complexity may increase substantially due to the bigger size of the optimization variables.
IV-B Known Eves’ CSI


In Fig. 6, comparisons between AN-aided and no-AN transmission schemes in terms of the SEE are illustrated when Eves’ CSI is known at the transmitters when the number of Eves is set to 1. In sharp contrast to the case of unknown Eves’ CSI, it is shown in this case that at their respective optimal SEE, the MISO scheme outperforms the selective and fixed SISO counterparts by 30% and 167%, respectively. In the case of the indirect design when Eve’s CSI is not available, due to the absence of Eve’s CSI in the AN design, only one luminaire (that provides the highest channel gain) should be used to transmit the information-bearing signal so that as little as possible the information is eavesdropped on by Eves. This strategy is, however, not optimal for the direct design when Eves’ CSI is considered. Since AN can be specifically constructed to attenuate Eves’ channels, more luminaires should be employed to transmit the information-bearing signal so that the SEE can be improved.
As we study VLC systems where multiple non-colluding Eves can coexist, Fig. 6 illustrates the SEE with respect to the number of Eves when 26 dBm. It is highlighted that while the SEE in the case of AN-aided transmission considerably deteriorates as the number of Eves increases, it stays unchanged when AN is not used. Specifically, when the number of Eves increases from 1 to 5, the SEE drops 22%, 28%, and 23% for the selective AN-aided SISO, AN-aided MISO, and fixed SISO transmission schemes, respectively. This SEE degradation is due to the proportionality between the number of Eves and the number of AN streams. Hence, when more Eves are present, more power should be allocated to the AN, leading to a reduction in the SEE. Furthermore, it is seen that as the number of Eves increases, the SEE of the AN-aided transmission asymptotes that of the no-AN scheme.
V Conclusion
In this paper, we have examined the selective AN-aided SISO and AN-aided MSIO transmission schemes and studied their SEE performances. Simulation results revealed that while the selective AN-aided SISO achieves better SEE than the AN-aided MISO scheme when Eves’ CSI is unavailable at the transmitting side, it is the opposite when Eves’ CSI is available. It was also observed that using AN is advantageous over the no-AN transmission regardless of the availability of Eves’ CSI. This work considered the case of a single legitimate user, which is a relatively special assumption. It should be noted that the proposed selective AN-aided SISO scheme was not designed for a more general scenario with multiple Bobs. Therefore, our future research attempts a modified transmission scheme to support such a setting.
Appendix A Proof of Proposition 1
We first prove that is strictly monotonically decreasing with . Indeed, the first derivative of with respect to is given by
(54) |
which is obviously negative. Thus, the optimal solution to maximize satisfies , which corresponds to laying on the null-space of . It is then easily verified that simultaneously maximizes and minimizes while satisfying the constraint in (21c). This proves that is optimal to .
Appendix B Proof of Proposition 2
For expressional simplicity, we denote and . The derivative of with respective to is then given by
(55) |
Let . We then have the derivative of with respective to is . Since , is strictly decreasing with . As it is deduced from (36b) and (36c) that , let us consider the following three scenarios.
-
•
If and , a critical point (also the optimal solution) to exists and is unique. Furthermore, can be found using the bisection method [41].
-
•
If then is strictly increasing with . Therefore, the optimal solution .
-
•
If then is strictly decreasing with . Hence, the optimal solution = .
The proof is completed.
References
- [1] H. Chun, A. Gomez, C. Quintana, W. Zhang, G. Faulkner, and D. O’Brien, “A wide-area coverage 35 gb/s visible light communications link for indoor wireless applications,” Sci. Rep., vol. 9, no. 2019, p. Article:4952, 2019.
- [2] L. E. M. Matheus, A. B. Vieira, L. F. M. Vieira, M. A. M. Vieira, and O. Gnawali, “Visible light communication: Concepts, applications and challenges,” IEEE Commun. Surv. Tutor., vol. 21, no. 4, pp. 3204–3237, 2019.
- [3] Z. Ahmed, R. Singh, W. Ali, G. Faulkner, D. O’Brien, and S. Collins, “A SiPM-based VLC receiver for gigabit communication using OOK modulation,” IEEE Photon. Technol. Lett., vol. 32, no. 6, pp. 317–320, 2020.
- [4] M. S. Amjad, C. Tebruegge, A. Memedi, S. Kruse, C. Kress, J. C. Scheytt, and F. Dressler, “Towards an IEEE 802.11 compliant system for outdoor vehicular visible light communications,” IEEE Trans. Veh. Technol., vol. 70, no. 6, pp. 5749–5761, 2021.
- [5] D. Castelvecchi, “The race to save the internet from quantum hackers,” Nature, vol. 602, pp. 198–201, 2022.
- [6] A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, 1975.
- [7] G. Blinowski, “Security of visible light communication systems-a survey,” Phys. Commun., vol. 34, pp. 246–260, 2019.
- [8] M. A. Arfaoui et al., “Physical layer security for visible light communication systems: A survey,” IEEE Commun. Surv. Tutor., vol. 22, pp. 1887–1908, thirdquarter 2020.
- [9] J.-Y. Wang, C. Liu, J.-B. Wang, Y. Wu, M. Lin, and J. Cheng, “Physical-layer security for indoor visible light communications: Secrecy capacity analysis,” IEEE Trans Commun., vol. 66, no. 12, pp. 6423–6436, 2018.
- [10] J.-Y. Wang, H. Ge, M. Lin, J.-B. Wang, J. Dai, and M.-S. Alouini, “On the secrecy rate of spatial modulation-based indoor visible light communications,” IEEE J. Sel. Areas Commun., vol. 37, no. 9, pp. 2087–2101, 2019.
- [11] J.-Y. Wang, X.-T. Fu, R.-R. Lu, J.-B. Wang, M. Lin, and J. Cheng, “Tight capacity bounds for indoor visible light communications with signal-dependent noise,” IEEE Trans. Wirel. Commun., vol. 20, no. 3, pp. 1700–1713, 2021.
- [12] A. Mostafa and L. Lampe, “Physical-layer security for MISO visible light communication channels,” IEEE J. Sel. Areas Commun., vol. 33, no. 9, pp. 1806–1818, 2015.
- [13] A. Mostafa and L. Lampe, “Optimal and robust beamforming for secure transmission in MISO visible-light communication links,” IEEE Trans. Signal Process., vol. 64, no. 24, pp. 6501–6516, 2016.
- [14] S. Ma, Z.-L. Dong, H. Li, Z. Lu, and S. Li, “Optimal and robust secure beamformer for indoor miso visible light communication,” J. Lightw. Technol., vol. 34, no. 21, pp. 4988–4998, 2016.
- [15] T. V. Pham and A. T. Pham, “Secrecy sum-rate of multi-user MISO visible light communication systems with confidential messages,” Optik, vol. 151, pp. 65–76, 2017.
- [16] M. A. Arfaoui, A. Ghrayeb, and C. M. Assi, “Secrecy performance of multi-user MISO VLC broadcast channels with confidential messages,” IEEE Trans. Wirel. Commun., vol. 17, no. 11, pp. 7789–7800, 2018.
- [17] S. Cho, G. Chen, and J. P. Coon, “Zero-forcing beamforming for active and passive eavesdropper mitigation in visible light communication systems,” IEEE Trans. Inf. Forensics Secur., vol. 16, pp. 1495–1505, 2021.
- [18] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wirel. Commun., vol. 7, no. 6, pp. 2180–2189, 2008.
- [19] Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A survey on wireless security: Technical challenges, recent advances, and future trends,” Proceedings of the IEEE, vol. 104, no. 9, pp. 1727–1765, 2016.
- [20] Y. Liu, H.-H. Chen, and L. Wang, “Physical layer security for next generation wireless networks: Theories, technologies, and challenges,” IEEE Commun. Surv. Tutor., vol. 19, no. 1, pp. 347–376, 2017.
- [21] A. Mostafa and L. Lampe, “Securing visible light communications via friendly jamming,” in 2014 IEEE Globecom Workshops (GC Wkshps), pp. 524–529, 2014.
- [22] H. Zaid, Z. Rezki, A. Chaaban, and M. S. Alouini, “Improved achievable secrecy rate of visible light communication with cooperative jamming,” in 2015 IEEE Glob. Conf. Signal Inf. Process. (GlobalSIP), pp. 1165–1169, 2015.
- [23] H. Shen, Y. Deng, W. Xu, and C. Zhao, “Secrecy-oriented transmitter optimization for visible light communication systems,” IEEE Photonics J., vol. 8, no. 5, pp. 1–14, 2016.
- [24] S. Cho, G. Chen, and J. P. Coon, “Enhancement of physical layer security with simultaneous beamforming and jamming for visible light communication systems,” IEEE Trans. Inf. Forensics Secur., vol. 14, no. 10, pp. 2633–2648, 2019.
- [25] T. V. Pham, T. Hayashi, and A. T. Pham, “Artificial-noise-aided precoding design for multi-user visible light communication channels,” IEEE Access, vol. 7, pp. 3767–3777, 2019.
- [26] T. V. Pham and A. T. Pham, “Energy efficient artificial noise-aided precoding designs for secured visible light communication systems,” IEEE Trans. Wirel. Commun., vol. 20, no. 1, pp. 653–666, 2020.
- [27] E. Bjornson and E. G. Larsson, “How energy-efficient can a wireless communication system become?,” in 2018 52nd Asilomar Conference on Signals, Systems, and Computers, pp. 1252–1256, 2018.
- [28] H.-O. Scheck, “ICT & wireless networks and their impact on global warming,” in 2010 European Wireless Conference (EW), pp. 911–915, 2010.
- [29] M. Kashef et al., “Energy efficient resource allocation for mixed rf/vlc heterogeneous wireless networks,” IEEE J. Sel. Areas Commun., vol. 34, no. 4, pp. 883–893, 2016.
- [30] A. Khreishah et al., “A hybrid RF-VLC system for energy efficient wireless access,” IEEE Trans. Green Commun. Netw., vol. 2, no. 4, pp. 932–944, 2018.
- [31] H. Zhang, N. Liu, K. Long, J. Cheng, V. C. M. Leung, and L. Hanzo, “Energy efficient subchannel and power allocation for software-defined heterogeneous VLC and RF networks,” IEEE J. Sel. Areas Commun., vol. 36, no. 3, pp. 658–670, 2018.
- [32] S. Ma, T. Zhang, S. Lu, H. Li, Z. Wu, and S. Li, “Energy efficiency of SISO and MISO in visible light communication systems,” J. Light. Technol., vol. 36, no. 12, pp. 2499–2509, 2018.
- [33] S. Aboagye, A. Ibrahim, T. M. N. Ngatched, A. R. Ndjiongue, and O. A. Dobre, “Design of energy efficient hybrid vlc/rf/plc communication system for indoor networks,” IEEE Wirel. Commun. Lett., vol. 9, no. 2, pp. 143–147, 2020.
- [34] L. An, H. Shen, J. Wang, Y. Zeng, and R. Ran, “Energy efficiency optimization for MIMO visible light communication systems,” IEEE Wirel. Commun. Lett., vol. 9, no. 4, pp. 452–456, 2020.
- [35] S. T. Duong, T. V. Pham, C. T. Nguyen, and A. T. Pham, “Energy-efficient precoding for multi-user visible light communication with confidential messages,” in 2021 IEEE 93rd Veh. Technol. Conf., 2021.
- [36] S. T. Duong, T. V. Pham, C. T. Nguyen, and A. T. Pham, “Energy-efficient precoding designs for multi-user visible light communication systems with confidential messages,” IEEE Trans. Green Commun. Netw., vol. 5, no. 4, pp. 1974–1987, 2021.
- [37] T. V. Pham and A. T. Pham, “Energy-efficient friendly jamming for physical layer security in visible light communication,” in 2021 IEEE Int. Conf. Commun. Workshops (ICC Workshops), pp. 1–6, 2021.
- [38] T. Komine and M. Nakagawa, “Fundamental analysis for visible-light communication system using LED lights,” IEEE Trans. Consum. Electron., vol. 50, no. 1, pp. 100–107, 2004.
- [39] T. V. Pham and A. T. Pham, “Coordination/cooperation strategies and optimal zero-forcing precoding design for multi-user multi-cell vlc networks,” IEEE Trans. Commun., vol. 67, no. 6, pp. 4240–4251, 2019.
- [40] M. Grant and S. Boyd, “CVX: Matlab software for disciplined convex programming, version 2.1.” http://cvxr.com/cvx, Mar. 2014.
- [41] T. Young and M. J. Mohlenkamp, Introduction to Numerical Methods and MATLAB Programming for Engineers. Dept. Math. Athens, OH, USA: Ohio Univ, 2015.