Skip to main content
Philosophical transactions. Series A, Mathematical, physical, and engineering sciences logoLink to Philosophical transactions. Series A, Mathematical, physical, and engineering sciences
. 2020 Mar 2;378(2169):20190193. doi: 10.1098/rsta.2019.0193

Physical layer security in light-fidelity systems

Zhenyu Zhang 1,, Anas Chaaban 1, Lutz Lampe 2
PMCID: PMC7062006  PMID: 32114918

Abstract

Light-fidelity (LiFi) is a light-based wireless communication technology which can complement radio-frequency (RF) communication technologies for indoor applications. Although LiFi signals are spatially more contained than RF signals, the broadcasting nature of LiFi also makes it susceptible to eavesdropping. Therefore, it is important to secure the transmitted data against potential eavesdroppers. In this paper, an overview of the recent developments pertaining to LiFi physical layer security (PLS) is provided, and the main differences between LiFi PLS and RF PLS are explained. LiFi achievable secrecy rates and upper bounds are then investigated under practical channel models and transmission schemes. Beamforming and jamming, which received significant research attention recently as a means to achieve PLS in LiFi, are also investigated under indoor illumination constraints. Finally, future research directions of interest in LiFi PLS are identified and discussed.

This article is part of the theme issue ‘Optical wireless communication’.

Keywords: intensity modulation, wiretap channel, secrecy rate

1. Introduction

With the high and continuously increasing demand for data communications, the limited radio-frequency (RF) spectrum becomes a bottleneck which slows down communication speeds. The light spectrum, which consists of around 670 THz of unlicensed bandwidth, is a promising resource for aleviating this problem. In this context, light-fidelity (LiFi) [13] is a communication system that uses visible light communication (VLC) to provide indoor wireless communication. It is a promising technology to complement its RF-based counterpart, WiFi. Owing to its importance, several LiFi companies have recently emerged, including PureLiFi in England and Oledcom in France. Additionally, several existing companies have entered the LiFi market such as Apple, Light, Casio, Intel, LVX systems, Philips, Samsung and ZTE.

Similar to RF, a LiFi system sends signals in a broadcast fashion over a given location (its coverage), which makes the link vulnerable to attacks. In general, there are two forms of attacks in wireless communications that are studied in the literature [4]: passive attacks which do not disturb the system; and active attacks which do. Eavesdropping is a form of passive attack which can take place in an indoor LiFi system. Since LiFi may transmit private and personal information, securing LiFi systems against eavesdropping is essential. One direct approach is to adopt off-the-shelf security techniques developed for WiFi, such as the MAC-layer security mechanisms, which are based on cryptography, as defined in the IEEE 802.15.7 standard. Cryptography-based security techniques are efficient under the assumptions that the secret key is unknown to unintended receivers and the computational power of the unintended receivers is restricted. As described in [5,6], the shortage of these techniques includes inefficient key distribution, key exposure potential and decryption potential. Thus, cryptography-based methods are only conditionally secure. By contrast, physical layer security (PLS) provides theoretically provable security, and is a promising solution for securing LiFi systems [6].

PLS originated from information-theoretic studies on the wiretap channel [6,7], which makes use of physical properties of the transmission process to enhance security. As suggested by the name, PLS is a security technique for the physical layer and is independent of other layers of the OSI network model, and thus can provide either independent protection or cooperative protection with other layers [8]. In addition to being provably secure, advantages of PLS include [5] being key-free; assuming no limitations on the eavesdropper’s computational capabilities and knowledge of network parameters; and having a precisely quantified achieved security.

When studying PLS in LiFi, the studies on the Gaussian wiretap channel for RF systems can serve as a starting point, but do not apply directly. This is due to the constraints that the transmitted optical signals must satisfy, such as a peak constraints and/or an average constraint, in addition to a non-negativity constraint [9]. As LiFi is proposed as an add-on functional module to the indoor illumination system, the LiFi system should not disturb the indoor illumination level. Therefore, LiFi PLS should be designed for different illumination levels, such as dimming [10], where a strict average constraint should be imposed on the transmit signals of the LiFi system. Thus, PLS in LiFi must be investigated while paying careful attention to the optical signal constraints.

Various methods to realize secure transmissions have been studied in the literature. For instance, a security zone scheme was proposed in [11] to prevent eavesdropping within a certain region around the legitimate receiver. A MIMO-based VLC security zone was proposed based on light-emission pattern shaping in [12]. The effect of different light-fixture deployments on LiFi PLS was investigated in [13], where four types of deployments were tested, and an angle diversity receiver is shown to improve secrecy throughput significantly. Most of the related work only consider line-of-sight links, the secrecy performance under reflections and non-line-of-sight links was investigated in [14]. PLS for multi-user VLC networks was studied in [15]. A relay-aided secrecy communication is studied in [16], where different relaying schemes such as cooperative jamming, decode-and-forward, amplify-and-forward were compared. The works in [1726] study the secrecy capacity and derive achievable secrecy rates for the LiFi wiretap channel, which is the focus of this paper.

In this paper, we focus on the recent theoretical studies of LiFi PLS, where we review bounds on the LiFi wiretap channel secrecy capacity, including single-input single-output (SISO) and multiple-input single-output (MISO) cases. For the LiFi SISO wiretap channel, we review and extend existing secrecy capacity bounds, while considering both peak and average constraints on the transmit signal. We comment on the applicability of existing results to a LiFi system which must satisfy a specific lighting requirement (average constraint with equality), which is important for light dimming. For the LiFi MISO wiretap channel, we review achievable secrecy rates using beamforming and friendly jamming under a peak constraint on the transmit signal. We then extend these results to LiFi MISO systems with both peak and average constraints on the transmit signal. We describe an enhanced beamforming scheme which makes better use of the emitting range of an LED, and we derive its achievable secrecy rate. Finally, we identify some gaps and future directions in LiFi PLS research.

Next, in §2, we review the theoretical background of the wiretap channel in general, and the LiFi wiretap channel in particular, and we review some LiFi P2P channel capacity bounds that are needed in the following sections. In §§3 and 4, we discuss secrecy capacity bounds for the LiFi SISO and MISO wiretap channels, respectively. We conclude the paper in §5 with some future research directions.

2. Preliminaries

In this section, we review PLS starting from Wyner’s discrete memoryless wiretap channel, and then introduce the LiFi wiretap channel. We also introduce some LiFi P2P capacity bounds, which are needed for bounding the secrecy capacity of the LiFi wiretap channel throughout the paper.

(a). A general review of physical layer security for the wiretap channel

(i). The wiretap channel and secrecy capacity

A discrete memoryless wiretap channel is depicted in figure 1. It consists of a transmitter (Alice), an intended receiver (Bob) and an eavesdropper (Eve). Alice wishes to transmit a message to Bob through a noisy channel while keeping it secret from Eve. This transmission can be described as follows [27]. Alice’s message is denoted by M, which is a random variable uniformly distributed on M={1,2,,2nR} for some nN+ and RR. To realize this, Alice encodes the message M into a codeword Xn={X[i]}i=1n where X[i]X, for some alphabet X. Then Alice sends this codeword symbol by symbol over n transmissions.1

Figure 1.

Figure 1.

The SISO wiretap channel model.

The signals received by Bob and Eve are denoted by Y1Y1 and Y2Y2, respectively. These are related to the transmitted signal X according to a conditional joint distribution p(y1, y2|x).

Bob collects Y1 over n uses of the channel, i.e. Y1n={Y1[i]}i=1n, and then tries to decode M. If we denote the decoding result as M^M{e}, where e is an error message, then the probability of error can be written as Pe,n=P{M^M}.

Similarly, Eve collects Y2 over n uses of the channel, i.e. Y2n={Y2[i]}i=1n, and tries to infer as much information about M as possible. Clearly, Alice would like to reduce Eve’s abilities to infer information about M. The amount of information leaked to Alice can be expressed as I(M;Y2n), where I( · ; · ) is the mutual information.

To communicate in a secret way, this transmission scheme should be designed so that

limnPe,n=0andlimn1nI(M;Y2n)=0. 2.1

The maximum rate R at which Alice can communicate with Bob while concealing the message from Eve (according to (2.1)) is called the secrecy capacity. The secrecy capacity of the wiretap channel is shown to be

Cs=maxp(u,x)I(U;Y1)I(U;Y2), 2.2

where UU is an auxiliary random and |U||X| [27,28]. The purpose of p(u, x) is to transform the end-to-end channel from p(y1, y2|x) to p~(y1,y2|u), which can be more favourable from a secrecy rate perspective. In particular, the achievable secrecy rate I(U;Y1) − I(U;Y2) for some p(x, u) can be larger than the achievable secrecy rate I(X;Y1) − I(X;Y2) achieved when X = U.

The secrecy capacity achieving coding scheme [27] is a multi-coding and two-step randomized encoding scheme (figure 2). In this coding scheme, Alice first generates a subcodebook of codewords un(ℓ) for each message mM, with Lm{(m1)2n(R~R)+1,,m2n(R~R)} for some R~R. The reason for generating many codewords for each m is to increase the randomness of the transmission of m so as to confuse Eve. The symbols of un(ℓ) are independent and identically distributed according to p(u). Consequently, each message m is represented by many codewords un(ℓ). To send m, Alice randomly chooses a un(ℓ) with Lm, and then generates the transmit signal xn whose symbols are independent and identically distributed according to p(x|u).

Figure 2.

Figure 2.

The secrecy capacity achieving scheme encodes the message m into many codewords un(ℓ). Alice selects a random codeword un(ℓ) corresponding to the message m to be sent, and then sends a random signal xn distributed according to p(x|u). Bob is able to decode the correct message by decoding the correct un(ℓ) (marked with a square), while Eve will have ambiguity between many un(ℓ) corresponding to different messages m (white).

Note that the total number of generated codewords un(ℓ) is 2nR~. If R~<I(U;Y1), then by the channel coding theorem [27], Bob will be able to discern the sent codewords if n is large enough. It then decodes ℓ, from which it knows m.

The maximum number of codewords that Eve can discern is given by 2nI(U;Y2) asymptotically for large n, which can be proved using the channel coding theorem [27, ch. 3.1]. If we choose R~R>I(U;Y2), then Eve will have ambiguity between multiple codewords un(ℓ) corresponding to m = 1, multiple codewords un(ℓ) corresponding to m = 2, etc. Moreover, this ambiguity will show no preference to a specific m, since the number of ‘likely’ codewords un(ℓ) will be roughly the same for all m. This confuses Eve and establishes secrecy. When optimized with respect to p(u, x), this coding scheme achieves the secrecy capacity in (2.2). Note that this coding scheme is also known as ‘binning’ [29].

(ii). The degraded wiretap channel

The above description applies to a general discrete-memoryless wiretap channel. If the wiretap channel satisfies the condition p(y1, y2|x) = p(y1|x) p(y2|y1), i.e. X → Y1 → Y2 forms a Markov chain, then the wiretap channel is said to be physically degraded.2 In this case, Eve receives a degraded version of Bob’s received signal (as if Bob’s received signal is passed to Eve through another noisy channel p(y2|y1)). If there exists Y~2 so that Y~2|X has the same distribution as Y|X and XY1Y~2 forms a Markov chain, then the channel is said to be stochastically degraded [27].

Under both types of degradedness, the secrecy capacity simplifies to [27]

Cs=maxp(x)I(X;Y1)I(X;Y2). 2.3

In other words, in this case, it is optimal to choose X = U. Note that this expression also applies to the family of continuous-memoryless wiretap channels (cf. [29, ch. 5]).

As we shall see next, the SISO LiFi wiretap channel where Alice has a single transmitter and each of Bob and Eve have a single receiver is a degraded wiretap channel if h1 > h2. The LiFi wiretap channel is not degraded in general if Alice is equipped with multiple transmitters that can transmit non-identical signals. We call this a MISO wiretap channel. We introduce the LiFi wiretap channel next.

(b). Light-fidelity wiretap channel

In a LiFi system, the transmitter is a light source such as an LED (or a group thereof as in a light fixture), and the receiver is a photodetector (PD) consisting of a photodiode (or a group thereof). The light intensity of the LED is modulated by modulating the driving current, and the PD transforms light intensity to current.

Let us denote the driving current by X. Owing to the use of LEDs, the driving current can only be positive. Therefore, XR+. In addition to this constraint, the current X must satisfy some additional constraints due to safety and practical considerations. For instance, to avoid over-driving the LED, or operating it beyond its saturation current, we require a peak constraint to be satisfied, which is given by XA. Additionally, for eye safety X has to satisfy an average constraint E[X]E, which arises due to a (roughly) linear relation between current and light intensity in LiFi solid-state lighting devices [30]. Moreover, to meet a desired illumination requirement, we might also require E[X]=E. Some studies on LiFi ignore the average constraint and only focus on a peak constraint. In this paper, we will consider both average and peak constraints.

In general, if Alice is equipped with multiple transmitters (light-fixtures for example), then the transmit signal will be a vector XR+K where K is the number of transmitters. In this case, each component of X is constrained by a peak constraint A, and the average constraint can apply to the sum as k=1KE[Xk]E or individually as E[Xk]Ek for all k = 1, 2, …, K.

Upon transmitting X, Bob and Eve receive Y1 and Y2 (representing currents), which can be described by the following input–output relations:

Yr=hrTX+Zr,r=1,2, 2.4

where h1, h2R+K are the time-invariant channel coefficient vectors from Alice to Bob and Eve, respectively, and Zi-s are independent Gaussian noises which have zero mean and variance σ2. This noise combines thermal noise and noise from ambient light. Throughout the paper, we assume that the channels from the transmitters to the receivers are known globally.

Remark 2.1. —

Note the following main differences between the RF wiretap channel with a power constraint. First, the transmit signal and channel gains are real positive, whereas they are complex-valued in RF. Second, the transmit signal is subject to peak and average constraints, whereas in RF it is subject to power (second moment) and possibly peak constraints. These make up the main differences between the two cases.

(i). Light-fidelity single-input single-output secrecy capacity

If K = 1, then we have a LiFi SISO wiretap channel. If h1 > h2, this LiFi SISO wiretap channel is stochastically degraded. In particular, Y~2=(h2/h1)Y1+Z~ where Z~N(0,σ2(1h22h12)) has the same conditional distribution Y~2|X as Y2|X, and satisfies the Markov chain XY1Y~2. Consequently, in this case, the secrecy capacity is given by

Cs,iSISO=maxp(x)P(t)I(X;Y1)I(X;Y2), 2.5

where t = 1, 2, P(1) is the collection of distributions of X[0,A] (peak constraint), and P(2) is the collection of distributions of X[0,A] with E[X]E (peak and average constraint).

If h1 ≤ h2, then it can be shown that the secrecy capacity is zero.

Now the question is how to maximize (2.5). The optimal solution of this problem is not obvious, and requires numerical methods. Moreover, it was shown in [26] that the optimal p(x) in (2.5) (under both i = 1, 2) is discrete with a finite number of mass points. At low signal-to-noise ratio (SNR) ((A/σ)0), Soltani & Rezki [26] show that the secrecy capacity achieving distribution has two mass points. It is also shown that at high SNR ((A/σ)), a large number of mass points is needed. However, the optimal distribution p(x) remains unknown.

(ii). Light-fidelity multiple-input single-output secrecy capacity

If K > 1, then we have a LiFi MISO wiretap channel. The LiFi MISO wiretap channel is not degraded, unless h1 = ηh2 for some ηR (aligned),3 which is unlikely in practice. Thus, the secrecy capacity of the MISO wiretap channel is given by [22]

Cs,iMISO=maxp(u,x):p(xi)P(t)I(U;Y1)I(U;Y2), 2.6

i = 1, 2, where U is an auxiliary vector [19,22]. The optimal input distribution which maximizes (2.6) is unknown, and works in the literature on LiFi MISO wiretap channels generally focus on achievable rates based on beamforming and friendly jamming.

It is often convenient to express capacity in general, and secrecy capacity in our case in particular, using simple analytical expressions. Using a discrete p(x) in (2.5) or (2.6) prohibits this due to the integral form of the mutual information, which does not simplify easily in this case. To circumvent this issue, it is useful to develop bounds on the secrecy capacity and asymptotic capacity expressions at high and low SNR. To develop such bounds, we first introduce capacity lower and upper bounds for the SISO LiFi channel without an eavesdropper.

(c). LiFi P2P channel capacity bounds

Several works in the literature studied the LiFi P2P channel capacity [9,31,32] and developed upper and lower bounds. These bounds have been used intensively in the literature to study other types of LiFi channels’ [3335], including the LiFi wiretap channel [22,25].

Consider a LiFi P2P channel with input X satisfying X[0,A] and E[X]αA for some α ∈ [0, 1] (average-to-peak ratio), and output Y = X + Z, with Z Gaussian with zero mean and variance σ2. Denote the capacity of this channel by Cα(A,σ)=maxp(X)I(Y;X). We review bounds on Cα(A,σ) in the following lemmas. We start with α ≥ 1/2, in which case the average constraint is inactive, and the peak constraint dominates.

Lemma 2.2 ([9]). —

If 1/2 ≤ α < 1 (inactive average constraint) or α = 1 (peak constraint only), then the capacity of the LiFi P2P channel Cα(A,σ) is bounded as follows

Cα(A,σ)C_α[1](A,σ)12log(1+A22πeσ2), 2.7
Cα(A,σ)C¯α[1](A,σ)12log(1+A24σ2) 2.8
andCα(A,σ)C˙α[1](A,σ), 2.9

where

C˙α[1](A,σ)minδ>0(12Q(δ+A2σ))log(A+2δσ2π(12Q((δ/σ))))+log(e)(12+Q(δσ)+δ2πσe(δ2/2σ2)). 2.10

It can be seen that α does not affect the bounds in lemma 2.2. This is because if α ≥ 1/2, then E(A/2), and the capacity-achieving input distribution has mean A2 in this case [9]. If α < (1/2), then the average constraint is active, and capacity is bounded as given next.

Lemma 2.3 ([9]). —

If 0 < α < 1/2, then the capacity of the LiFi P2P channel Cα(A,σ) is bounded as follows

Cα(A,σ)C_α[2](A,σ)12log(1+A2e2αμα2πeσ2(1eμαμα)), 2.11
Cα(A,σ)C¯α[2](A,σ)12log(1+α(1α)A2σ2) 2.12
andCα(A,σ)C˙α[2](A,σ), 2.13

where μα is the unique positive solution of α=(1/μα)(eμα)/(1eμα), and

C˙α[2](A,σ)minμ,δ>0(1Q(δ+αAσ)Q(δ+(1α)Aσ))log(Aσe(μδ/A)eμ(1+(δ/A))2πμ(12Q((δ/σ))))+log(e)[12+Q(δσ)+δ2πσe(δ2/2σ2)+σAμ2π(e(δ2/2σ2)e((A+δ)2)/(2σ2))+μα(12Q(δ+A/2σ))]. 2.14

The upper bounds C˙α[i](A,σ), i = 1, 2, have been shown to be asymptotically tight at high SNR where they coincide with the lower bounds C_α[i](A,σ), i = 1, 2, respectively, while the bounds C¯α[i](A,σ), i = 1, 2, have been shown to be asymptotically tight at low SNR [9]. Needless to say, all the lower bounds above are achievable rates.

Now, we are ready to present LiFi SISO secrecy capacity bounds that have been derived in the recent literature, which rely on lemmas 2.3 and 2.2, in addition to a new bound which we develop to fill some gaps in the literature.

3. LiFi SISO secrecy capacity bounds

In this section, we present LiFi SISO secrecy capacity results from the literature, and develop some new bounds. Clearly, we focus on h1 > h2, since the secrecy capacity is zero otherwise. We will split the review into two parts depending on the constraint on X.

(a). Secrecy capacity bounds under a peak constraint

When only a peak constraint is imposed, the LiFi SISO wiretap channel capacity is given by

Cs,1SISO=maxp(x)P(1)I(X;Y1)I(X;Y2). 3.1

In what follows, we use (x)+ to denote max{0, x} and log +(x) to denote max{0, log (x)}. The following theorem presents a secrecy capacity lower bound which relies on lemma 2.2.

Theorem 3.1 (Lower bound [22]). —

Under a peak constraint, the LiFi SISO wiretap channel secrecy capacity is lower bounded by Cs,1SISOC_s,1SISO(1/2log(1+(h12A2)/(2πeσ2))C˙1[1](h2A,σ))+.

Proof. —

Since Cs,1SISO=maxp(x)P(1)I(X;Y1)I(X;Y2), we can write

Cs,1SISOmaxp(x)P(1)I(X;Y1)maxp(x)P(1)I(X;Y2)(C_1[1](h1A,σ)C˙1[1](h2A,σ))+. 3.2

where the last step follows using lemma 2.2. ▪

Another lower bound that is derived using a different method, and leads to a simple expression is given next.

Theorem 3.2 (Lower bound [22]). —

Under a peak constraint, the LiFi SISO wiretap channel secrecy capacity is lower bounded by Cs,1SISOC˙s,1SISO1/2log+((6h12A2+12πeσ2)/(πeh22A2+12πeσ2)).

Proof. —

We have Cs,1SISO=maxp(x)P(1)I(X;Y1)I(X;Y2) which we can write as Cs,1SISO=maxp(x)P(1)h(Y1)h(Y1|X)h(Y2)+h(Y2|X) where h( · ) and h( · | · ) are the differential and conditional differential entropy, respectively. We proceed as follows:

Cs,1SISO=maxp(x)P(1)h(Y1)h(Z1)h(Y2)+h(Z2)(a)maxp(x)P(1)(12log(22h(h1X)+22h(Z1))12log(2πeVAR{Y2}))+(b)(12log(h12A2+2πeσ2)12log(2πe(h22A212+σ2)))+=12log+(6h12A2+12πeσ2πeh22A2+12πeσ2), 3.3

where (a) follows by using h(Z1) = h(Z2), lower bounding h(Y1) using the entropy-power inequality (EPI), and upper bounding h(Y2) by the differential entropy of a Gaussian random variable with variance VAR{Y2}; and (b) follows by choosing X to be uniformly distributed on [0,A]. ▪

The advantage of this lower bound compared to the one in theorem 3.1 is that it has a closed-form expression. Next, we present a secrecy capacity upper bound.

Theorem 3.3 (Upper bound [22]). —

Under a peak constraint, the LiFi SISO wiretap channel secrecy capacity is upper bounded by Cs,1SISOC¯s,1SISO1/2log((h12A2+4σ2)/(h22A2+4σ2)).

This statement was proved in [22, Prop. 2.3] using a dual secrecy capacity expression (for degraded channels), which is an extension of the dual capacity expression in [36]. This statement can also be proved by converting the LiFi SISO wiretap channel into a Gaussian wiretap channel with a power constraint E[X2]A24. Namely, we can consider an equivalent degraded wiretap channel with Yi=hi(X(A/2))+Zi. Then, we note that X(A/2) is in [(A/2),(A/2)] and has maximum variance (A2/4). By dropping the peak constraints and allowing X to be in R instead, we obtain a Gaussian wiretap channel with a power constraint E[X2](A2/4), whose secrecy capacity is given as in theorem 3.3 [27]. This bound can be also obtained from [25].

(b). Secrecy capacity bounds under peak and average constraints

When both peak and average constraints are imposed, the secrecy capacity is given by

Cs,2SISO=maxp(x)P(2)I(X;Y1)I(X;Y2). 3.4

In this case, the secrecy capacity can be bounded using the LiFi P2P channel capacity bounds in lemmas 2.2 and 2.3 as shown next.

Theorem 3.4 (Lower bound [25]). —

Under both peak and average constraints, the LiFi SISO wiretap channel secrecy capacity is lower bounded by

Cs,2SISOC_s,2SISO(α)(C_α[i](h1A,σ)min{C¯α[i](h2A,σ),C˙α[i](h2A,σ)})+, 3.5

where i = 1 if α12 and i = 2 if α < 1/2.

The proof of this theorem is similar to the proof of C_s,1SISO in theorem 3.1, but uses both lemmas 2.2 and 2.3.

Similar to theorem 3.2, we can develop a lower bound under both peak and average constraints. Instead of the uniform distribution used in theorem 3.2, we use a truncated-exponential distribution similar to [9]. The following theorem describes this new lower bound.

Theorem 3.5 (Lower bound). —

Under both peak and average constraints with α < 1/2, the LiFi SISO wiretap channel secrecy capacity is lower bounded by

Cs,2SISOC˙s,2SISO(α)12log+(ρh12A2+2πeσ22πeϕh22A2+2πeσ2), 3.6

where ρ=e2(1(μα)/(eμα1))((1eμα)/(μα))2, ϕ=(1/μα2)+(1/4)((1/eμα1)+(1/2)) and μα is defined in lemma 2.3.

Proof. —

The proof is similar to that of theorem 3.2 until (b), where instead of a uniform distribution, we choose X according to a truncated-exponential distribution which maximizes the differential entropy h(X), where X[0,A] and E[X]=E=αA [9, (42)], given by

p(x)=1Aμ1eμe(μx/A). 3.7

Thus, we have

Cs,2SISO(12log(22h(h1X)+22h(Z1))12log(2πeVAR[Y2]))+, 3.8

where X follows the distribution p(x) above, and VAR{Y2}=h22VAR{X}+σ2. Then we have VAR[X]E[X2](E[X])2=ϕh22A2, and h(h1X)=h(X)+log(h1)=log((1h1A)(eμ)/(1eμ))+log(e)(1(μα)/(eμα1)). Then 2h(h1X)=ρh12A2. Substituting in (3.8) concludes the proof. ▪

Next, we present a secrecy capacity upper bound derived using the EPI and the bounds in lemmas 2.2 and 2.3.

Theorem 3.6 (Upper bound [25]). —

Under both peak and average constraints, the LiFi SISO wiretap channel secrecy capacity is upper bounded by

Cs,2SISOC¯s,2SISO(α)12log(h1222C¯α[i](h1A,σ)h22h12+h2222C¯α[i](h1A,σ)) 3.9

and

Cs,2SISOC˙s,2SISO(α)12log(h1222C˙α[i](h1A,σ)h12h22+h2222C˙α[i](h1A,σ)), 3.10

where i = 1 if α ≥ 1/2 and i = 2 if α < 1/2.

Proof. —

Since I(X;Y1) − I(X;Y2) = I(X;h1 X + Z1) − I(X;h2 X + Z2), we can write

I(X;Y1)I(X;Y2)=I(X;h1X+Z1)h(h2X+Z2)+h(Z2)=(a)I(X;h1X+Z1)h(h1X+Z1+Z)log(h2h11)+h(Z2)(b)I(X;h1X+Z1)12log(22h(h1X+Z1)+22h(Z))log(h2h11)+h(Z2)=(c)12log(h1222I(X;h1X+Z1)+2h(Z2)h2222I(X;h1X+Z1)+2h(Z1)+h2222h(Z)), 3.11

where (a) follows by using h(X) = h(aX) − log (a) for a > 0 and writing (h1/h2)Z2 = Z1 + Z′ with Z′ being Gaussian with zero mean and variance ((h12/h22)1)σ2 (note that h2 > h1 > 0 for a degraded LiFi wiretap channel), (b) follows by using the EPI, and (c) follows since I(X;h1X + Z1) = h(h1X + Z1) − h(Z1).

Note that the last line in (3.11) is monotonically increasing in I(X;h1X + Z1). Moreover, I(X;h1X+Z1)C¯α[i](h1A,σ) and I(X;h1X+Z1)C˙α[i](h1A,σ) by lemmas 2.2 and 2.3. Furthermore, 22h(Z1)=22h(Z2)=2πeσ2 and 22h(Z)=2πe((h12/h22)1)σ2. Substituting these identities and inequalities in the last line in (3.11) concludes the proof. ▪

(c). Extension to systems with specific lighting requirements

The above discussion considered peak, or both peak and average constraints, where the average constraint is an inequality constraint given by E[X]E. As discussed earlier, in LiFi, we are also interested in a practical average constraint which is an equality constraint E[X]=E, which reflects a specific lighting requirement. So it is also relevant to develop secrecy capacity bounds under this equality constraint.

Towards this end, we discuss below how the above bounds can be extended to LiFi systems with E[X]=E. Some results above apply immediately to this case which are discussed in the following remarks. The only missing piece is when α > 1/2, which is discussed afterwards.

Remark 3.7. —

Given α ≤ 1/2, the secrecy capacity lower bounds in theorems 3.4 and 3.5 (peak and average constraint E[X]E) are also secrecy capacity lower bounds for a LiFi SISO wiretap channel with a peak constraint and an average constraint E[X]=E. The reason is that the schemes achieving the secrecy rates in these theorems satisfy the constraint E[X]E with equality.

Remark 3.8. —

The secrecy capacity upper bounds in theorem 3.6 (peak and average constraint E[X]E) are also secrecy capacity upper bounds for a LiFi SISO wiretap channel with a peak constraint and an average constraint E[X]=E. The reason is that the constraint E[X]E is a relaxed version of E[X]=E, and hence the former has larger secrecy capacity than the latter. We improve this upper bound further next.

Based on these remarks, for a LiFi SISO system with a constraint E[X]=E, it remains to develop secrecy capacity lower bounds for the case α > 1/2, and to improve the upper bound from remark 3.8. This task is simple after observing the following.

The secrecy capacity for a LiFi SISO wiretap channel with α > 1/2 is the same as for a channel with outputs Y1=h1AY1=h1(AX)+Z1 and Y2=h2AY2=h2(AX)+Z2 by symmetry of the noises’ Gaussian distribution. But the signal AX has lies in [0,A] and satisfies E[AX]=AE=(1α)A if E[X]=E=αA. Moreover, if α > 1/2, then 1 − αα′ < 1/2. Hence, the developed lower bounds in theorems 3.4 and 3.5 and the upper bound in theorem 3.6 for the case α < 1/2 also apply to this new channel with α′ < 1/2. Thus, we can state the following.

Corollary 3.9. —

Under a peak constraint and an average constraints E[X]=E=αA with α > 1/2, the LiFi SISO wiretap channel secrecy capacity is upper bounded by C¯s,2SISO(α) and lower bounded by C_s,2SISO(α) and C˙s,2SISO(α), where

α={αα121αα>12. 3.12

Next, we present some numerical evaluations.

(d). Numerical results

First, we show a comparison of the secrecy capacity bounds for a LiFi SISO wiretap channel with a peak constraint only, under different ratios (h1/h2). Figure 3a compares lower bounds C_s,1SISO and C˙s,1SISO from theorems 3.1 and 3.2, respectively, with upper bound C¯s,1SISO from theorem 3.3, versus SNR defined as (A/σ). It can be seen that all bounds increase with (h1/h2), which supports the intuition that a larger disparity between Bob’s and Eve’s channels lead to higher secrecy capacity. The figure shows that C˙s,1SISO outperforms C_s,1SISO when SNR is not very large. On the other hand, as SNR increases, C_s,1SISO converges to C¯s,1SISO. In particular, the two converge to the high-SNR secrecy capacity characterized in [25] as Cs,1SISO1/2log((h12/h22)) as SNR → ∞.

Figure 3.

Figure 3.

Secrecy capacity bounds for the LiFi SISO wiretap channel. (a) Peak constraint only, (b) peak and average constraints: α = 0.3. (Online version in colour.)

Figure 3b compares lower bounds C_s,2SISO and C˙s,2SISO from theorems 3.4 and 3.5, respectively, with upper bound C¯s,2SISO from theorem 3.6, versus SNR defined as (A/σ). The impact of increasing (h1/h2) is similar to that in figure 3a and the newly derived lower bound, C˙s,2SISO, is tighter than C_s,2SISO when SNR is relatively low. It can also be seen that C_s,2SISO and C¯s,2SISO converge to the asymptotic high-SNR secrecy capacity (1/2)log((h12/h22)) [25], which is the same as for the case under a peak constraint, i.e. the high-SNR secrecy capacity is independent of α. This conclusion is examined next.

Figure 4 compares the bounds for a wiretap channel with both peak and average constraints, for different values of α, under fixed (h1/h2) = 10. It can be seen that for each α, the corresponding lower bound converges to the upper bound when SNR is high enough. It can also be seen that the lower bound increases with α, which depicts the impact of dimming in LiFi, since decrease α decreases the average light intensity.

Figure 4.

Figure 4.

Secrecy capacity bounds under both peak and average constraints with (h1/h2) = 10 and different values of α. (Online version in colour.)

4. Light-fidelity multiple-input single-output achievable secrecy rates

An indoor illumination system usually has multiple light fixtures to cover a large area. LiFi transmission through these multiple light fixtures can be modelled as a MISO channel. In this section, we review achievable secrecy rate results for the LiFi MISO wiretap channel. We split the discussion into two parts: (i) beamforming and (ii) friendly jamming; and we conclude with numerical evaluations.

(a). Light-fidelity multiple-input single-output secrecy by beamforming

In LiFi applications, one can use beamforming to improve transmission or secrecy, however, subject to the condition that this beamforming does not affect illumination—the primary function of light fixtures. The light intensity is controlled by means of the driving current, i.e. its DC component. As such, it is desirable to separate the DC component from the modulated signal in order to be able to control each of them separately, and ensure that communication does not affect illumination. As such, the transmit signal can be written as

X=wS+d1,

where w=[wk]k=1KRK is the beamforming vector, S is the codeword symbol to be transmitted, d is the DC offset, and 1 is the all-ones vector of length K. This construction has been studied in [21] with d=(A/2). Next, we generalize this to any d[0,A], and then we present some achievable secrecy rate results.

The illumination is set by choosing d[0,A]. To preserve this illumination level, we force S to have zero mean, and to vary between [d,Ad], and we constrain w to be in [(d)/(Ad),1]K. This guarantees that E[Xi]=d and Xi[0,A]. Note that d must satisfy dE if the system is constrained by an average constraint E[Xi]E, and d=E, if the system is constrained by an average constraint E[Xi]=E.

As a result, the input–output relationship becomes [21]

Yr=hrTX+Zr=(hrTw)S+dhrT1+Zr,r=1,2. 4.1

The DC component dhrT1 can be subtracted at the receiver. This converts the LiFi MISO wiretap channel into a SISO one, where bounds from §3 can be applied. However, the choice of w remains to be optimized.

In the following, we present an achievable secrecy rate derived in [21] based on (4.1), under the peak constraint Xi[0,A] and illumination constraint E[Xi]=(A/2). Then, we discuss the cases E[Xi](A/2), E[Xi]=E, and E[Xi]E.

Theorem 4.1 (Beamforming lower bound [21]). —

Under the constraints Xi[0,A] and E[Xi]=(A/2), the secrecy capacity of the LiFi MISO wiretap channel is lower bounded as Cs,1MISOC_s,1MISO, where this achievable lower bound is given by

C_s,1MISO=maxw[1,1]K12log+(6(h1Tw)2A2+12πeσ2πe(h2Tw)2A2+12πeσ2). 4.2

Proof. —

We start by setting U = X in (2.6) to obtain Cs,1MISOmaxp(x)I(X;Y1)I(X;Y2). Then we choose X = wS + d1, d=(A/2), and S to be uniformly distributed on [(A/2),(A/2)], to obtain Cs,1MISOmaxwI(wS;Y1)I(wS;Y2)=maxwI(S;Y1)I(S;Y2). Then we use the lower bound C˙s,1SISO in theorem 3.2 to bound I(S;Y1) − I(S;Y2) which yields Cs,1MISOC_s,1MISO as defined in (4.2). This completes the proof. ▪

The optimization problem in theorem 4.1 is non-convex. However, it can be transformed into a quasi-convex line search problem and solved using bisection as described in [21].

Note that C_s,1MISO can be achieved if a peak constraint Xi[0,A] is imposed without an average constraint, or with an average constraint E{Xi}=(A/2) since this is automatically satisfied by choosing S to follow a zero-mean uniform distribution. If an inequality average constraint is imposed such that E{Xi}E(A/2), or an equality average constraint E{Xi}=E(A/2), the same scheme of theorem 4.1 can also be applied, as shown in the following corollary.

Corollary 4.2. —

Under the constraints Xi[0,A] and either E[Xi]E or E[Xi]=E, where EA2, the secrecy capacity of the LiFi MISO wiretap channel is lower bounded as Cs,2MISOC_s,2MISO, where

C_s,2MISO=maxw[1,1]K12log+(6(h1Tw)2E2+3πeσ2πe(h2Tw)2E2+3πeσ2) 4.3

The proof is similar to theorem 4.1, with A replaced with 2E. This forces E[Xi] to be equal to E. Note that one may also replace A in the proof of theorem 4.1 by dE if the average constraint is E[Xi]E, and then maximize with respect to d. However, the maximum can be shown to be achieved when d=E.

The advantage of the scheme used in corollary 4.2 is that we can still choose w ∈ [ − 1, 1]K, which provides flexibility in beamforming. The disadvantage is that we limit the range of Xi to [0,2E], which is a subset of [0,A]. Another way to develop an achievable secrecy rate for the case E[Xi]E is by choosing S to be distributed according to a truncated-exponential distribution (similar to [9, (42)]) between [E,AE] with zero mean. However, since we construct the transmit signal as X=wS+E1, this imposes the restriction that w[αα1,1]K where α=(E/A), since otherwise, Xi may become negative. Despite this disadvantage, the advantage is that Xi can occupy the whole range [0,A] when wi (the corresponding component of w) is positive. It still occupies a portion of [0,A] when wi is negative. We present a new lower bound which applies this scheme next.

Theorem 4.3 (Beamforming lower bound). —

Under the constraints Xi[0,A] and either E[Xi]E or E[Xi]=E, where E=αA and α < (1/2), the secrecy capacity of the LiFi MISO wiretap channel is lower bounded as Cs,1MISOC˙s,2MISO, where

C˙s,2MISO(α)=maxw[(α/α1),1]K12log+(ρ(h1Tw)2A2+2πeσ22πeϕ(h2Tw)2A2+2πeσ2), 4.4

where ρ=e2(1(μα/eμα1))((1eμα)/(μα))2, ϕ=(1/μα2)+1/4((1/eμα1)+(1/2)) and μα is defined in lemma 2.3.

Proof. —

The proof is similar to the proof of theorem 4.1 except for the last inequality which is obtained by using the bounds in theorem 3.5. In this case, Alice uses a truncated-exponential distribution for S[E,AE] with zero mean (a shifted version of [9, (42)]), and sends X=wS+E1 where w ∈ [(α)/(α − 1), 1]K. ▪

The optimization problem in theorem 4.3 can be solved using the same algorithm as in theorem 4.1 by replacing the constraint w ∈ [ − 1, 1]K in theorem 4.1 by two constraints, max kwk ≤ 1 and min kwk ≥ (α)/(α − 1).

Finally, the achievable secrecy rate using this scheme under α ≥ (1/2) can be obtained by replacing α and E by α′ = 1 − α and E=AE, respectively, in corollary 4.2 and theorem 4.3.

In addition to beamforming, another technique that can be used to enhance secrecy is jamming. This is discussed next.

(b). Light-fidelity multiple-input single-output secrecy by friendly jamming

Suppose the room is illuminated by K identical light fixtures. Let K = KJ + KA. Alice uses KA light fixtures to transmit a message. On the other hand, a friendly jammer uses the remaining KJ light fixtures to support Alice by sending noise. When Eve is closer to Alice than Bob, secure communication using the beamforming method described in the previous subsection becomes less promising. To worsen the channel quality from Alice to Eve and maintain a good channel quality from Alice to Bob, the jammer sends a jamming signal which is friendly to Bob but hostile to Eve.

While KA can be generally any number between 1 and K, in [18,20], KA is chosen to be 1. We stick to this case in the current description. In this case, the input–output relation under friendly jamming can be expressed as follows:

Yr=hrX+hJrTXJ+Zr,r=1,2, 4.5

Here, h1 and h2 are the channels from Alice to Bob and Eve, respectively, X is the information-bearing signal, hJ1 and hJ2 are the channels from the jammer to Bob and Eve, respectively, and XJ is a jamming noise signal.

The design of friendly jamming can be achieved as follows. First, the jamming signal is beamformed in a way that maximizes the jamming effect at Eve, so that XJ = wJSJ, where wJ=[wJ,k]k=1KJ is the jammer’s beamforming vector, and SJ is the jamming noise signal. Second, the jamming signal is made friendly to Bob by choosing wJ in a way that decreases the impact of SJ at Bob, i.e., ideally hJ1TwJ=0.

In [18], an achievable secrecy rate was also developed for this jamming scheme, where X and SJ were chosen to be uniformly distributed. An improved secrecy rate was derived in [20], by using truncated-Gaussian distributions instead. Define ϕ(x)=(1/2π)e(x2/2) as the standard Gaussian distribution, and Φ(x) to be the corresponding cumulative distribution. We define a truncated-Gaussian distribution pA,σt(x) as follows:

pA,σt(x)={(1/σt)ϕ((x/σt))Φ(β)Φ(β),x[A2,A2],0,|x|>A2 4.6

where β=(A)/(2σt). Also, define ζ = Φ(β) − Φ( − β). Using this distribution, we can derive the following lower bound on secrecy capacity of the LiFi MISO wiretap channel.

Theorem 4.4 (Jamming lower bound [20]). —

Under the constraints Xi[0,A] and E[Xi]=(A/2), the secrecy capacity of the LiFi MISO wiretap channel is lower bounded by Cs,1MISOC˙s,1MISO where

C˙s,1MISO12log(1+σt2h12e2ησ2)h(V0)+12log(2πeσt2)+maxhJ1Tw=0w[1,1]K1log(|hJ2TwJ|)+η, 4.7

where V0=h2Xt+hJ2TwJSt, Xt and St follow a truncated-Gaussian distribution fσt(x), and η = log (ζ) + ( − βϕ( − β) − βϕ(β))/(2ζ).

The optimal wJ for maximizing C˙s,1MISO can be found by solving the following optimization problem [20]:

wJ=argmaxwJ[1,1]K1hJ2TwJs.t.hJ1TwJ=0,} 4.8

which is a zero-forcing beamforming problem and can be solved using a linear programming algorithm. To maximize the achievable secrecy rate further, one can optimize the selection of one transmitter and K − 1 jammers from among the K light fixtures.

Extension to the inequality or equality average constraint, i.e. E[Xi]E or E[Xi]=E, where E(A/2) is not considered in this paper, but is a relevant research direction. Now, we present some numerical evaluations which evaluate the presented bounds.

(c). Numerical results

In the following numerical evaluations, we consider a room of size 6 × 6 × 3 m3 which is illuminated by four lighting fixtures located at the corners of a 3 × 3 m square centred at the ceiling of the room, as shown in figure 5a. Each of the fixtures consists of an array of LEDs, and assume identical PDs for Bob and Eve. The channel gains between the light fixtures and PDs, i.e. h1, h2, hJ1, hJ2, can be estimated using the following model [21, (6a)][37]:

h=(m+1)gA2πd2(cosϕ)2cosψI(ψ<Ψc), 4.9

where m = ( − ln2)/(ln(cosΦh)) is the Lambertian emission order, Φh is the half-intensity semi-angle of the light fixture, d is the distance of the light propagation, g is the PD receiving gain and A is its area, ϕ and ψ are the emitting and receiving angle of the transmitter and PD, respectively, Ψc is the field of view (FOV) of the PD, and I() is a logic function which returns 1 if its argument is true, and zero otherwise. In the simulations, we assume that gA = 10, Φh = 60°, Ψc = 70°, and we also assume that the PD is always placed upright, so that ϕ = ψ.

Figure 5.

Figure 5.

Room layout used in the simulations and secrecy capacity bounds. (a) The room layout, where the dots represent the light fixture, the dashed circles identify the half-intensity regions, (b) secrecy rate as a function of SNR. (Online version in colour.)

We note that when evaluating the friendly jamming scheme, the selection of the light fixtures into a transmitter and K − 1 jammers is optimized to increase the secrecy rate.

In figure 5b, we compare the achieved secrecy rate by beamforming C_s,1MISO in (4.2) and by friendly jamming C˙s,1MISO in (4.7), under different SNRs, where we fix Eve’s location at coordinates p0 = (0, 0, 0.8), and fix Bob’s location at coordinates p1 = (1.5, 1.5, 0.8) or p2 = (0, 1.5, 0.8). We use σt = 9 in (4.2) [20]. It can be seen that when Bob is at p1, the beamforming scheme always outperforms the friendly jamming scheme. However, when Bob is at p2, friendly jamming can achieve higher secrecy rates when SNR is lower than 20 dB. This suggests that a scheme which combines beamforming and friendly jamming can achieve a better performance. Developing such a scheme is a relevant research direction.

In figure 6, we fix SNR = 20 dB and compare the achieved secrecy rate by the beamforming and the friendly jamming schemes, where Eve’s location is fixed at p0 and Bob can move around the room. It can be seen the beamforming and the friendly jamming schemes are suitable for different regions. For example, when Bob is very close to one of the light fixtures, the beamforming scheme will be a better choice. However, when Bob is between two nearby light fixtures, the friendly jamming scheme can achieve much higher secrecy rate. In conclusion, the friendly jamming scheme can complement the beamforming, since it can achieve superior performance in some ranges of SNR, α, and relative locations of Bob and Eve.

Figure 6.

Figure 6.

Secrecy rate as a function of Bob’s location when Eve is fixed at position p0 (room centre). (a) Beamforming, (b) friendly jamming. (Online version in colour.)

In figure 7, we compare C_s,2MISO(α) and C˙s,2MISO(α) for SNR between 0 and 40 dB, where the locations of Bob and Eve are fixed at p1 and p0, respectively. We choose α to be 0.1 or 0.3. It can be seen that, for α = 0.1, although  s,2(α) uses a larger signal range, it is a little better than Cs,2(α) only when SNR ≤ 30 dB, and becomes much worse than Cs,2(α) when SNR = 40 dB, but for α = 0.3,  s,2(α) outperforms Cs,2(α) for all the tested SNR region.

Figure 7.

Figure 7.

Secrecy rate constraint E[Xi]=αA as a function of SNR, where Bob and Eve are located at p1 and p0, respectively. (Online version in colour.)

In figure 8, we compare the beamforming lower bounds C_s,2MISO(α) in corollary 4.2 and C˙s,2MISO(α) in theorem 4.3, under an average constraint E[Xi]=αA with α = 0.3. In this evaluation, Eve’s location is fixed at p0 but Bob can move around the room. It can be seen that because of a larger signal range (range of S), C˙s,2MISO(α) outperforms C_s,2MISO(α) in general.

Figure 8.

Figure 8.

Secrecy rate under constraint E[Xi]=0.3A as a function of Bob’s location, where Eve is fixed at p0 and SNR = 20 dB. (a) C_s,2MISO(α), (b) C˙s,2MISO(α). (Online version in colour.)

5. Conclusion and future research directions

In this paper, we reviewed theoretical results on LiFi PLS focusing on the LiFi SISO and MISO wiretap channel models and their secrecy capacity bounds. We considered systems with a peak constraint only and also systems with both peak and average constraints. As LiFi should not disturb illumination levels, an equality average constraint has been discussed, and new bounds or extensions of existing bounds are developed for this case. We studied beamforming and jamming schemes, and evaluated their performance numerically. We have also derived new achievable secrecy rates under beamforming, which improve upon existing results. Existing results and new results presented in this paper can be further improved and extended along the following lines: Transmission under a specific illumination requirement for MISO and MIMO LiFi, signalling schemes and hybrid LiFi/WiFi systems. These three directions are discussed next.

Current studies on LiFi MIMO wiretap channels in the literature [23,24] adopt precoding to realize secrecy, but they only consider the peak constraint and average total power constraint, i.e. XkA and k=1KE[Xk]E. In a LiFi system, each light fixture should provide a constant average light intensity, and thus X has to be constrained by E[Xk]=Ek, k = 1, …, K. In the special case of LiFi MISO, the current studies adopt beamforming and friendly jamming. As we have seen above, if the equality average constraint is imposed, the transmitted signal may not be able to vary over the whole permissible range [0,A]—the linear range of the LED. For example, in theorem 4.3, if wk < 0, then Xk varies over a subset of [0,(αA)/(1α)] (α ∈ [0, 0.5]), which is itself a subset of the whole range [0,A]. As seen in figure 7, a larger emitting range can increase the secrecy performance. Therefore, it is important to rethink the current design to make full use of the emitting range of the LED. Moreover, in such a design, Ek does not have to be the same for all k. For instance, in some large indoor scenarios, not all lights have to be turned on or provide the same level of illumination. For example, light fixtures in a large library may only need to turn on when people walk in the nearby region, leading to non-equal values of Ek.

Another promising direction is designing signalling schemes for LiFi PLS. As shown in [26], the optimal input distribution for the LiFi SISO wiretap channel studied in this paper is discrete with a finite number of mass points. But the optimal distribution is unknown, and even if found numerically, it is not clear how to design the transmitted signal to match the theoretically optimal input distribution. On the other hand, existing modulation schemes produce a uniform distribution (realized by PPM and PAM) and truncated Gaussian distribution (realized by various types of unipolar OFDM-based schemes [38]). It is important to develop modulation schemes that produce a truncated-exponential distribution, which has superior performance compared with a uniform distribution as shown in figure 7. The work in [39] proposes a method for generating a non-uniform discrete distribution of the SISO LiFi channel without an eavesdropper, which might also be useful for the wiretap channel. This research direction is relevant and requires additional investigation.

It is also important to note that LiFi is vulnerable to physical blockage, and RF access points (such as WiFi) can be used to support LiFi connection in such cases. Hybrid VLC/RF communication has been demonstrated in the literature [40]. The current studies on the secrecy of hybrid VLC/RF systems mostly use zero-forcing beamforming and try to minimize the system power consumption [4143]. These works consider VLC and RF as independent components which perform secure communication independently without cooperation, and they do not consider a specific lighting requirement in the form of an average constraint E[Xk]=Ek. This calls upon designing and studying more cooperative PLS schemes for hybrid LiFi/RF or LiFi/WiFi systems.

Footnotes

1

The time index i will only be indicated when needed.

2

A channel satisfying the Markov chain X → Y2 → Y1 is also physically degraded, but has zero secrecy capacity, and hence is not of interest in this paper.

3

In this case, the channel is equivalent to a SISO channel with input X~=h2TX and outputs Y1=ηX~+Z1 and Y2=X~+Z2, which is degraded.

Data accessibility

This article does not contain any additional data.

Authors' contributions

This is mostly a review article. All three authors participated equally in the design of the manuscript scope and structure. Z.Z. carried out all the numerical evaluations and the drafting of the manuscript. A.C. and L.L. performed revisions and provided comments.

Competing interests

We declare we have no competing interest.

Funding

This work has been supported by the Natural Sciences and Engineering Research Council of Canada (NSERC).

Reference

  • 1.Tsonev D, Videv S, Haas H. 2014. Light fidelity (Li-Fi): towards all-optical networking. In Broadband Access Commun. Technol., VIII (vol. 9007), p. 900702. Bellingham, WA: International Society for Optics and Photonics. [DOI] [PubMed]
  • 2.Haas H, Yin L, Wang Y, Chen C. 2015. What is lifi? J. lightw. Technol. 34, 1533–1544. ( 10.1109/JLT.2015.2510021) [DOI] [Google Scholar]
  • 3.Haas H. 2018. LiFi is a paradigm-shifting 5G technology. Rev. Phys. 3, 26–31. ( 10.1016/j.revip.2017.10.001) [DOI] [Google Scholar]
  • 4.Shiu YS, Chang SY, Wu HC, Huang SCH, Chen HH. 2011. Physical layer security in wireless networks: a tutorial. IEEE Wireless Commun. 18, 66–74. ( 10.1109/MWC.2011.5751298) [DOI] [Google Scholar]
  • 5.Mukherjee A, Fakoorian SAA, Huang J, Swindlehurst AL. 2014. Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surveys Tuts. 16, 1550–1573. ( 10.1109/SURV.2014.012314.00178) [DOI] [Google Scholar]
  • 6.Poor HV, Schaefer RF. 2017. Wireless physical layer security. Proc. Natl Acad. Sci. USA 114, 19–26. ( 10.1073/pnas.1618130114) [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 7.Wyner AD. 1975. The wiretap channel. Bell Syst. Tech. J. 54, 1355–1387. ( 10.1002/j.1538-7305.1975.tb02040.x) [DOI] [Google Scholar]
  • 8.Zeng K, Govindan K, Mohapatra P. 2010. Non-cryptographic authentication and identification in wireless networks. IEEE Wireless Commun. 17, 56–62. ( 10.1109/MWC.2010.5601959) [DOI] [Google Scholar]
  • 9.Lapidoth A, Moser SM, Wigger MA. 2009. On the capacity of free-space optical intensity channels. IEEE Trans. Inf. Theory 55, 4449–4461. ( 10.1109/TIT.2009.2027522) [DOI] [Google Scholar]
  • 10.Rajagopal S, Roberts RD, Lim SK. 2012. IEEE 802.15. 7 Visible light communication: modulation schemes and dimming support. IEEE Commun. Mag. 50, 72–82. ( 10.1109/MCOM.2012.6163585) [DOI] [Google Scholar]
  • 11.Le Minh H, Pham AT, Ghassemlooy Z, Burton A. 2014. Secured communications-zone multiple input multiple output visible light communications. In IEEE Globecom Workshops (GC Wkshps), pp. 505–511.
  • 12.Mostafa A, Lampe L. 2015. Pattern synthesis of massive LED arrays for secure visible light communication links. In IEEE Int. Conf. Commun. Workshop (ICCW), pp. 1350–1355.
  • 13.Chen Z, Haas H. 2017. Physical layer security for optical attocell networks. IEEE Int. Conf. Commun. (ICC), pp. 1–6.
  • 14.Cho S, Chen G, Chun H, Coon JP, O’Brien D. 2018. Impact of multipath reflections on secrecy in VLC systems with randomly located eavesdroppers. In IEEE Wireless Commun. Netw. Conf. (WCNC), pp. 1–6. Piscataway, NJ: IEEE.
  • 15.Yin L, Haas H. 2018. Physical-layer security in multiuser visible light communication networks. IEEE J. Sel. Areas Commun. 36, 162–174. ( 10.1109/JSAC.2017.2774429) [DOI] [Google Scholar]
  • 16.Arafa A, Panayirci E, Poor HV. 2019. Relay-aided secure broadcasting for visible light communications. IEEE Trans. Commun. 67, 4227–4239. [Google Scholar]
  • 17.Mostafa A, Lampe L. 2014. Physical-layer security for indoor visible light communications. In IEEE Int. Commun. Conf. (ICC), Sydney, Australia. Piscataway, NJ: IEEE.
  • 18.Mostafa A, Lampe L. 2014. Securing visible light communications via friendly jamming. In IEEE Globecom Workshops, pp. 524–529. Piscataway, NJ: IEEE.
  • 19.Mostafa A, Lampe L. 2015. Physical-layer security for MISO visible light communication channels. IEEE J. Sel. Areas Commun. 33, 1806–1818. ( 10.1109/JSAC.2015.2432513) [DOI] [Google Scholar]
  • 20.Zaid H, Rezki Z, Chaaban A, Alouini MS. 2015. Improved achievable secrecy rate of visible light communication with cooperative jamming. In IEEE Global Conf. Signal and Information Processing, pp. 1165–1169. Piscataway, NJ: IEEE.
  • 21.Mostafa A, Lampe L. 2016. Optimal and robust beamforming for secure transmission in MISO visible-light communication links. IEEE Trans. Signal Processing 64, 6501–6516. ( 10.1109/TSP.2016.2603964) [DOI] [Google Scholar]
  • 22.Mostafa A. 2017. Physical-layer security for visible-light communication systems. Doctoral dissertation, University of British Columbia.
  • 23.Arfaoui MA, Ghrayeb A, Assi C. 2017. Achievable secrecy sum-rate of the MISO VLC broadcast channel with confidential messages. In IEEE Global Commun. Conf., pp. 1–6. Piscataway, NJ: IEEE.
  • 24.Arfaoui MA, Ghrayeb A, Assi C. 2017. On the achievable secrecy rate of the MIMO VLC Gaussian wiretap channel. In IEEE Int. Symp. Personal, Indoor, and Mobile Radio Communications, pp. 1–5. Piscataway, NJ: IEEE.
  • 25.Hassan O. 2018. On the secrecy capacity of wiretap visible light communication channels. Bachelor, Princeton, NJ: Princeton University.
  • 26.Soltani M, Rezki Z. 2018. Optical wiretap channel with input-dependent Gaussian noise under peak-and average-intensity constraints. IEEE Trans. Inf. Theory 64, 6878–6893. ( 10.1109/TIT.2018.2851225) [DOI] [Google Scholar]
  • 27.El Gamal A, Kim YH. 2011. Network information theory. Cambridge, UK: Cambridge University Press. [Google Scholar]
  • 28.Csiszár I, Korner J. 1978. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 24, 339–348. ( 10.1109/TIT.1978.1055892) [DOI] [Google Scholar]
  • 29.Bloch M, Barros J. 2011. Physical-layer security: from information theory to security engineering. Cambridge, UK: Cambridge University Press. [Google Scholar]
  • 30.Dimitrov S, Haas H. 2012. Information rate of OFDM-based optical wireless communication systems with nonlinear distortion. J. Lightw. Technol. 31, 918–929. ( 10.1109/JLT.2012.2236642) [DOI] [Google Scholar]
  • 31.Farid AA, Hranilovic S. 2010. Capacity bounds for wireless optical intensity channels with Gaussian noise. IEEE Trans. Inf. Theory 56, 6066–6077. ( 10.1109/TIT.2010.2080470) [DOI] [Google Scholar]
  • 32.Chaaban A, Morvan JM, Alouini MS. 2016. Free-space optical communications: Capacity bounds, approximations, and a new sphere-packing perspective. IEEE Trans. Commun. 64, 1176–1191. ( 10.1109/TCOMM.2016.2524569) [DOI] [Google Scholar]
  • 33.Chaaban A, Rezki Z, Alouini MS. 2016. On the capacity of the intensity-modulation direct-detection optical broadcast channel. IEEE Trans. Wireless Commun. 15, 3114–3130. ( 10.1109/TWC.2016.2517152) [DOI] [Google Scholar]
  • 34.Chaaban A, Al-Ebraheemy OMS, Al-Naffouri TY, Alouini MS. 2017. Capacity bounds for the Gaussian IM-DD optical multiple-access channel. IEEE Trans. Wireless Commun. 16, 3328–3340. ( 10.1109/TWC.2017.2681071) [DOI] [Google Scholar]
  • 35.Zhang Z, Chaaban A. 2019. On the capacity of the two-user IM/DD interference channel. In Canadian Workshop on Info. Theory. Piscataway, NJ: IEEE.
  • 36.Moser SM. 2005. Duality-based bounds on channel capacity, 1 Zurich, Switzerland: ETH Zurich. [Google Scholar]
  • 37.Ghassemlooy Z, Popoola W, Rajbhandari S. 2019. Optical wireless communications: system and channel modelling with Matlab. Boca Raton, FL: CRC Press. [Google Scholar]
  • 38.Barros DJ, Wilson SK, Kahn JM. 2011. Comparison of orthogonal frequency-division multiplexing and pulse-amplitude modulation in indoor optical wireless links. IEEE Trans. Commun. 60, 153–163. ( 10.1109/TCOMM.2011.112311.100538) [DOI] [Google Scholar]
  • 39.Farid AA 2, Hranilovic S. 2009. Channel capacity and non-uniform signalling for free-space optical intensity channels. IEEE J. Sel. Areas Commun. 27, 1553–1563. ( 10.1109/JSAC.2009.091205) [DOI] [Google Scholar]
  • 40.Rahaim MB, Vegni AM, Little TD. 2011. A hybrid radio frequency and broadcast visible light communication system. In IEEE Globecom Workshops, pp. 792–796.
  • 41.Marzban MF, Kashef M, Abdallah M, Khairy M. 2017. Beamforming and power allocation for physical-layer security in hybrid RF/VLC wireless networks. In Int. Wireless Commun. and Mobile Computing Conf., pp. 258–263.
  • 42.Pan G, Ye J, Ding Z. 2017. Secure hybrid VLC-RF systems with light energy harvesting. IEEE Trans. Commun. 65, 4348–4359. [Google Scholar]
  • 43.Al-Khori J, Nauryzbayev G, Abdallah MM, Hamdi M. 2019. Secrecy performance of decode-and-forward based hybrid RF/VLC relaying systems. IEEE Access 7, 10 844–10 856. ( 10.1109/ACCESS.2019.2891678) [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

This article does not contain any additional data.


Articles from Philosophical transactions. Series A, Mathematical, physical, and engineering sciences are provided here courtesy of The Royal Society

RESOURCES