Visible to the public Secrecy Outage Probability Analysis for Visible Light Communications with SWIPT and Random Terminals

TitleSecrecy Outage Probability Analysis for Visible Light Communications with SWIPT and Random Terminals
Publication TypeConference Paper
Year of Publication2019
AuthorsQiu, Yu, Wang, Jin-Yuan, Lin, Sheng-Hong, Wang, Jun-Bo, Lin, Min
Conference Name2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)
Keywordsenergy receiver, free-space optical communication, indoor communication, indoor visible light communications, inductive power transmission, information receiver, light emitting diodes, lower bound, Metrics, optical receivers, passive information eavesdropper, physical-layer data, physical-layer data secure transmission, power system reliability, probability, Probability density function, pubcrawl, radiofrequency power transmission, random channel characteristics, random terminals, Resiliency, Scalability, secrecy outage probability analysis, secrecy performance, security, simultaneous wireless information and power transfer, SOP, SWIPT, System performance, telecommunication power management, telecommunication security, telecommunication terminals, transmitter, typical indoor VLC system, Visual Light Communications Security, wireless channels
AbstractThis paper investigates the physical-layer data secure transmission for indoor visible light communications (VLC) with simultaneous wireless information and power transfer (SWIPT) and random terminals. A typical indoor VLC system including one transmitter, one desired information receiver and one energy receiver is considered. The two receivers are randomly deployed on the floor, and the random channel characteristics is analyzed. Based on the possibility that the energy receiver is a passive information eavesdropper, the secrecy outage probability (SOP) is employed to evaluate the system performance. A closed-from expression for the lower bound of the SOP is obtained. For the derived lower bound of SOP, the theoretical results match the simulation results very well, which indicates that the derived lower bound can be used to evaluate the secrecy performance. Moreover, the gap between the results of the lower bound and the exact simulation results is also small, which verifies the correctness of the analysis method to obtain the lower bound.
DOI10.1109/WCSP.2019.8928105
Citation Keyqiu_secrecy_2019