Abstract
This study examines the physical-layer security of an indoor visible light communication (VLC) system using spatial modulation (SM), which consists of several transmitters, an authorized receiver, and a passive adversary. The SM technique is applied at the transmitters so that only one transmitter is operational at any given time. A uniform selection (US) strategy is employed to choose the active transmitter. The two scenarios under examination encompass the conditions of non-negativity and average optical intensity, as well as the conditions of non-negativity, average optical intensity, and peak optical intensity. The secrecy rate is then obtained for these two scenarios while accounting for both signal-independent noise and signal-dependent noise. Additionally, the high signal-to-noise ratio (SNR) asymptotic behavior of the derived secrecy rate constraints is investigated. A channel-adaptive selection (CAS) strategy and a greedy selection (GS) scheme are utilized to select the active transmitter, aiming to enhance the secrecy performance. The current numerical findings affirm a pronounced convergence between the lower and upper bounds characterizing the secrecy rate. Notably, marginal asymptotic differentials in performance emerge at elevated SNRs. Furthermore, the GS system outperforms the CAS scheme and the US method, in that order. Additionally, the impact of friendly optical jamming on the secrecy rate is investigated. The results show that optical jamming significantly enhances the secrecy rate, particularly at higher power levels.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.