2017
DOI: 10.1109/jlt.2017.2761301
|View full text |Cite
|
Sign up to set email alerts
|

Secure MIMO Visible Light Communication System Based on User's Location and Encryption

Abstract: Visible light communication systems are rapidly growing research areas with wide applications ranging from illumination and data communication. To achieve high data rates in such systems, a number of techniques have been employed such as equalization of transmission signals, deployment of complex data modulation and the use of multiple input multiple output (MIMO) systems. However, security in wireless telecommunication systems is a common concern. This paper proposes a secure MIMO-VLC system that relies on th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(19 citation statements)
references
References 28 publications
(39 reference statements)
0
19
0
Order By: Relevance
“…In this case, the transmission may be based on IEEE 802. 15 relayed VLC-based network is the Li-Fi, in which the original message is transmitted to the VLC AP via RF, fiber optics or any other data communication technology.…”
Section: Relayed Vs Non-relayed Vlc-based Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…In this case, the transmission may be based on IEEE 802. 15 relayed VLC-based network is the Li-Fi, in which the original message is transmitted to the VLC AP via RF, fiber optics or any other data communication technology.…”
Section: Relayed Vs Non-relayed Vlc-based Networkmentioning
confidence: 99%
“…2f for a single user. Typically, such networks use the color-shift-keying scheme [14] or may exploit the multiple-input multiple-output technique [15] to transmit data. In both cases, considering a single user, the data rate is improved when compared with single channel systems.…”
Section: Multi-channel Vlc-based Networkmentioning
confidence: 99%
“…Explicitly, a pair of secure communication protocols, termed as a non-jamming protocol and a cooperative jamming protocol, were proposed and tractable solutions were obtained based on the alternating optimization approach. A novel secure MIMO-VLC system has been designed using the modified Rivest-Shamir-Adleman (RSA) technique of [23] to encrypt the transmitted data in the MAC layer based on the location of the user supported by MIMO-VLC systems [23].…”
Section: Accepted Manuscriptmentioning
confidence: 99%
“…Additionally, Zou et.al. in [26] have analyzed the secrecy rate of MISO optical wireless scattering communication systems, under certain constraints. Explicitly, a pair of secure communication protocols, termed as a nonjamming protocol and a cooperative jamming protocol, were proposed and tractable solutions were obtained based on the alternating optimization approach.…”
Section: Introductionmentioning
confidence: 99%
“…Explicitly, a pair of secure communication protocols, termed as a nonjamming protocol and a cooperative jamming protocol, were proposed and tractable solutions were obtained based on the alternating optimization approach. A novel secure MIMO-VLC system has been designed using the modified Rivest-ShamirAdleman (RSA) technique of [26] to encrypt the transmitted data in the MAC layer based on the location of the user supported by MIMO-VLC systems [26]. In [27], the closedform analytical expressions of both secrecy outage probability and of the average secrecy capacity of a downlink VLC system have been derived by ignoring any amplitude constraints and by assuming Gaussian input distribution, while considering random positions for both the one and only legitimate user as well as for the multiple illegitimate users.…”
Section: Introductionmentioning
confidence: 99%