Secure transmission OFDMA VLC in presence of external jammer: Perfect and imperfect CSI

IF 2 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC
Mohammad Hosein Sabbaghi, Fakhroddin Nazari, Farid Samsami Khodadad, Moslem Forouzesh
{"title":"Secure transmission OFDMA VLC in presence of external jammer: Perfect and imperfect CSI","authors":"Mohammad Hosein Sabbaghi,&nbsp;Fakhroddin Nazari,&nbsp;Farid Samsami Khodadad,&nbsp;Moslem Forouzesh","doi":"10.1016/j.phycom.2025.102670","DOIUrl":null,"url":null,"abstract":"<div><div>Secure transmission in visible light communication (VLC) is very important. Hence, in this paper, we investigate physical layer security (PLS) in downlink of orthogonal frequency-division multiple access (OFDMA), in the presence of multiple eavesdroppers (Eve), multi users, and an external jammer. It is necessary to mention that in the future networks the users need to service continually. Hence, the Time Division Multiple Access (TDMA) method is not compatible for this application, to tackle this issue, we use OFDMA technique. Moreover, due to its orthogonal subcarriers, OFDMA minimizes inter-user interference. This leads to a lower bit error rate compared to non-orthogonal multiple access in most scenarios. Specially, this metric is very vital in the medical application, hence, we investigate OFDMA in this work. Our intention is to improve sum secrecy rate (SSR); hence, we propose an optimization problem to assign the subcarrier and power to users, subject to power limitation and OFDMA requirements. Moreover, since Eve is passive, the Channel State Information (CSI) of Eves may be not available, hence, we investigate two scenarios, perfect and imperfect CSI. Sine the proposed optimization problem is non-convex and complicated, we utilize the well-known iterative algorithm called the Alternative Search Method (ASM). This algorithm breaks down the optimization problem into two subproblems: power allocation and subcarrier allocation. Since the power allocation optimization problem is non-convex, we employ difference of two concave functions (DC) approximation and epigraph method, to approximate it to convex one. Since subcarrier allocation optimization problem consists of binary variables, we employ the Mesh Adaptive Direct Search algorithm (MADS) to solve it. The simulation results show that in the proposed system model, it is not necessary to employ a photodiode with high physical area the reason is that secrecy rate is saturated in high value of physical area photodiode.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"71 ","pages":"Article 102670"},"PeriodicalIF":2.0000,"publicationDate":"2025-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Physical Communication","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1874490725000734","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Secure transmission in visible light communication (VLC) is very important. Hence, in this paper, we investigate physical layer security (PLS) in downlink of orthogonal frequency-division multiple access (OFDMA), in the presence of multiple eavesdroppers (Eve), multi users, and an external jammer. It is necessary to mention that in the future networks the users need to service continually. Hence, the Time Division Multiple Access (TDMA) method is not compatible for this application, to tackle this issue, we use OFDMA technique. Moreover, due to its orthogonal subcarriers, OFDMA minimizes inter-user interference. This leads to a lower bit error rate compared to non-orthogonal multiple access in most scenarios. Specially, this metric is very vital in the medical application, hence, we investigate OFDMA in this work. Our intention is to improve sum secrecy rate (SSR); hence, we propose an optimization problem to assign the subcarrier and power to users, subject to power limitation and OFDMA requirements. Moreover, since Eve is passive, the Channel State Information (CSI) of Eves may be not available, hence, we investigate two scenarios, perfect and imperfect CSI. Sine the proposed optimization problem is non-convex and complicated, we utilize the well-known iterative algorithm called the Alternative Search Method (ASM). This algorithm breaks down the optimization problem into two subproblems: power allocation and subcarrier allocation. Since the power allocation optimization problem is non-convex, we employ difference of two concave functions (DC) approximation and epigraph method, to approximate it to convex one. Since subcarrier allocation optimization problem consists of binary variables, we employ the Mesh Adaptive Direct Search algorithm (MADS) to solve it. The simulation results show that in the proposed system model, it is not necessary to employ a photodiode with high physical area the reason is that secrecy rate is saturated in high value of physical area photodiode.
求助全文
约1分钟内获得全文 求助全文
来源期刊
Physical Communication
Physical Communication ENGINEERING, ELECTRICAL & ELECTRONICTELECO-TELECOMMUNICATIONS
CiteScore
5.00
自引率
9.10%
发文量
212
审稿时长
55 days
期刊介绍: PHYCOM: Physical Communication is an international and archival journal providing complete coverage of all topics of interest to those involved in all aspects of physical layer communications. Theoretical research contributions presenting new techniques, concepts or analyses, applied contributions reporting on experiences and experiments, and tutorials are published. Topics of interest include but are not limited to: Physical layer issues of Wireless Local Area Networks, WiMAX, Wireless Mesh Networks, Sensor and Ad Hoc Networks, PCS Systems; Radio access protocols and algorithms for the physical layer; Spread Spectrum Communications; Channel Modeling; Detection and Estimation; Modulation and Coding; Multiplexing and Carrier Techniques; Broadband Wireless Communications; Wireless Personal Communications; Multi-user Detection; Signal Separation and Interference rejection: Multimedia Communications over Wireless; DSP Applications to Wireless Systems; Experimental and Prototype Results; Multiple Access Techniques; Space-time Processing; Synchronization Techniques; Error Control Techniques; Cryptography; Software Radios; Tracking; Resource Allocation and Inference Management; Multi-rate and Multi-carrier Communications; Cross layer Design and Optimization; Propagation and Channel Characterization; OFDM Systems; MIMO Systems; Ultra-Wideband Communications; Cognitive Radio System Architectures; Platforms and Hardware Implementations for the Support of Cognitive, Radio Systems; Cognitive Radio Resource Management and Dynamic Spectrum Sharing.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信