2018
DOI: 10.1109/access.2018.2799658
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Analysis of Generalized Space-Shift Keying Aided Visible Light Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

3
16
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 27 publications
(19 citation statements)
references
References 26 publications
3
16
0
Order By: Relevance
“…As expected, when E moves close to D, the achievable secrecy rate is significantly reduced. However, the achievable secrecy rate of the GSSK-VLC system increases rapidly, as E moves away from D. Additionally, when E is located at the symmetric regions of the projection of the transmitters, the achievable secrecy rate increases, which confirms the analytical results of [44]. In Fig.…”
Section: A Secrecy Performance Of the Proposed Gssk-vlc Systemssupporting
confidence: 78%
See 2 more Smart Citations
“…As expected, when E moves close to D, the achievable secrecy rate is significantly reduced. However, the achievable secrecy rate of the GSSK-VLC system increases rapidly, as E moves away from D. Additionally, when E is located at the symmetric regions of the projection of the transmitters, the achievable secrecy rate increases, which confirms the analytical results of [44]. In Fig.…”
Section: A Secrecy Performance Of the Proposed Gssk-vlc Systemssupporting
confidence: 78%
“…5 that in most of the area considered, the SSK-VLC system achieves a relatively stable secrecy rate. However, as shown in [44], the achievable secrecy rate of the SSK-VLC system is zero in most of the scenarios considered, if no secrecy enhancement is utilized. The main reason behind this is that even for high SNRs, the detection performance of E can still be degraded by optical jamming, without affecting the reception performance of D, since the jamming signals are designed to lie in the null space of h D .…”
Section: A Secrecy Performance Of the Proposed Gssk-vlc Systemsmentioning
confidence: 97%
See 1 more Smart Citation
“…Light energy harvesting and random positions were assumed for the one and only legitimate user and for an illegitimate user in the context of a hybrid VLC-RF system. Additionally, the secrecy performance of MISO generalized spaceshift keying (GSSK) aided VLC systems has been analyzed in [26] under certain constraints.…”
Section: Accepted Manuscriptmentioning
confidence: 99%
“…The authors showed that without extra secrecy enhancement strategy, illegal user can easily intercept the confidential signals at high SNR region, even if its channel condition is worse than the legal user. However, there is no particular practical strategy presented for enhancing the secrecy performance except for a suggested look-up table to select the optimal LEDs in [26].…”
Section: Accepted Manuscriptmentioning
confidence: 99%