2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP) 2015
DOI: 10.1109/globalsip.2015.7418381
|View full text |Cite
|
Sign up to set email alerts
|

Improved achievable secrecy rate of visible light communication with cooperative jamming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
43
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 49 publications
(43 citation statements)
references
References 11 publications
0
43
0
Order By: Relevance
“…Artificial noise based beamforming was adopted in [71]- [75]. Specifically, in [71], [72], the proposed schemes consist of transmitting the information bearing signal from one AP and jamming signals from the remaining APs. Moreover, the information bearing and jamming signals were assumed to follow uniform distributions in [71] and truncated Gaussian distributions in [72].…”
Section: A Single Aumentioning
confidence: 99%
“…Artificial noise based beamforming was adopted in [71]- [75]. Specifically, in [71], [72], the proposed schemes consist of transmitting the information bearing signal from one AP and jamming signals from the remaining APs. Moreover, the information bearing and jamming signals were assumed to follow uniform distributions in [71] and truncated Gaussian distributions in [72].…”
Section: A Single Aumentioning
confidence: 99%
“…[19] developed the upper and lower bounds for the multiple-input multiple-output (MIMO) channel capacity under the idealized simplifying assumption of having perfect channel state information (CSI) at the transmitter. As one of the key techniques of achieving secrecy, the multi-LED based wiretap channel enjoyed particular attention [5], [20]- [23], where the associated high degree of freedom may be exploited by beamforming schemes [5], [22], [23] and artificial noise injection [20], [21], [24]. Specifically, the authors of [5] derived the lower and upper bounds on the capacity of the SISO Gaussian wiretap channel under continuous input distribution and amplitude constraints.…”
Section: Introductionmentioning
confidence: 99%
“…Then, robust secrecy-enhancing beamformers were designed for the secrecy rate maximization of a MISO VLC system, when either the CSI or the CSI-statistics of the eavesdropper was assumed to be perfectly known or imperfectly known [22], [23]. Alternatively, when considering MISO VLC systems, and when the eavesdropper's instantaneous CSI was not available at the transmitter, a friendly jammer was relied upon for transmitting jamming signals by a beamformer to maximize the secrecy rate [20], [21]. Furthermore, to enhance the communication secrecy, a scheme that jointly relies on both transmit beamforming and friendly jamming was proposed for a MISO VLC system operating in the face of multiple eavesdroppers [25].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, Mostafa et al analyzed the achievable secrecy rate for single-input single-output (SISO) and multiple-input single-output (MISO) scenarios and proposed a variety of beamforming schemes such as zero-forcing (null-steering), artificial noise generation, friendly jamming, and robust beamforming [11]- [13]. Additionally, Zaid and Arfaoui proposed the truncated normal input distribution and the truncated generalized normal input distribution, respectively, to increase the secrecy rate under constraints on the input signal amplitude [14], [15]. It is important to note, however, that these contributions assumed a small number of EDs are present in the system and either the channel state information (CSI) or the locations of the EDs Inspired by the aforementioned contributions exploiting stochastic geometry in RF communications, our previous work [16] firstly developed an analogous approach to modeling ED locations in VLC systems.…”
Section: Introductionmentioning
confidence: 99%