Mohammad Hosein Sabbaghi, Fakhroddin Nazari, Farid Samsami Khodadad, Moslem Forouzesh
{"title":"Secure transmission OFDMA VLC in presence of external jammer: Perfect and imperfect CSI","authors":"Mohammad Hosein Sabbaghi, Fakhroddin Nazari, Farid Samsami Khodadad, Moslem Forouzesh","doi":"10.1016/j.phycom.2025.102670","DOIUrl":null,"url":null,"abstract":"<div><div>Secure transmission in visible light communication (VLC) is very important. Hence, in this paper, we investigate physical layer security (PLS) in downlink of orthogonal frequency-division multiple access (OFDMA), in the presence of multiple eavesdroppers (Eve), multi users, and an external jammer. It is necessary to mention that in the future networks the users need to service continually. Hence, the Time Division Multiple Access (TDMA) method is not compatible for this application, to tackle this issue, we use OFDMA technique. Moreover, due to its orthogonal subcarriers, OFDMA minimizes inter-user interference. This leads to a lower bit error rate compared to non-orthogonal multiple access in most scenarios. Specially, this metric is very vital in the medical application, hence, we investigate OFDMA in this work. Our intention is to improve sum secrecy rate (SSR); hence, we propose an optimization problem to assign the subcarrier and power to users, subject to power limitation and OFDMA requirements. Moreover, since Eve is passive, the Channel State Information (CSI) of Eves may be not available, hence, we investigate two scenarios, perfect and imperfect CSI. Sine the proposed optimization problem is non-convex and complicated, we utilize the well-known iterative algorithm called the Alternative Search Method (ASM). This algorithm breaks down the optimization problem into two subproblems: power allocation and subcarrier allocation. Since the power allocation optimization problem is non-convex, we employ difference of two concave functions (DC) approximation and epigraph method, to approximate it to convex one. Since subcarrier allocation optimization problem consists of binary variables, we employ the Mesh Adaptive Direct Search algorithm (MADS) to solve it. The simulation results show that in the proposed system model, it is not necessary to employ a photodiode with high physical area the reason is that secrecy rate is saturated in high value of physical area photodiode.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"71 ","pages":"Article 102670"},"PeriodicalIF":2.0000,"publicationDate":"2025-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Physical Communication","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1874490725000734","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
Secure transmission in visible light communication (VLC) is very important. Hence, in this paper, we investigate physical layer security (PLS) in downlink of orthogonal frequency-division multiple access (OFDMA), in the presence of multiple eavesdroppers (Eve), multi users, and an external jammer. It is necessary to mention that in the future networks the users need to service continually. Hence, the Time Division Multiple Access (TDMA) method is not compatible for this application, to tackle this issue, we use OFDMA technique. Moreover, due to its orthogonal subcarriers, OFDMA minimizes inter-user interference. This leads to a lower bit error rate compared to non-orthogonal multiple access in most scenarios. Specially, this metric is very vital in the medical application, hence, we investigate OFDMA in this work. Our intention is to improve sum secrecy rate (SSR); hence, we propose an optimization problem to assign the subcarrier and power to users, subject to power limitation and OFDMA requirements. Moreover, since Eve is passive, the Channel State Information (CSI) of Eves may be not available, hence, we investigate two scenarios, perfect and imperfect CSI. Sine the proposed optimization problem is non-convex and complicated, we utilize the well-known iterative algorithm called the Alternative Search Method (ASM). This algorithm breaks down the optimization problem into two subproblems: power allocation and subcarrier allocation. Since the power allocation optimization problem is non-convex, we employ difference of two concave functions (DC) approximation and epigraph method, to approximate it to convex one. Since subcarrier allocation optimization problem consists of binary variables, we employ the Mesh Adaptive Direct Search algorithm (MADS) to solve it. The simulation results show that in the proposed system model, it is not necessary to employ a photodiode with high physical area the reason is that secrecy rate is saturated in high value of physical area photodiode.
期刊介绍:
PHYCOM: Physical Communication is an international and archival journal providing complete coverage of all topics of interest to those involved in all aspects of physical layer communications. Theoretical research contributions presenting new techniques, concepts or analyses, applied contributions reporting on experiences and experiments, and tutorials are published.
Topics of interest include but are not limited to:
Physical layer issues of Wireless Local Area Networks, WiMAX, Wireless Mesh Networks, Sensor and Ad Hoc Networks, PCS Systems; Radio access protocols and algorithms for the physical layer; Spread Spectrum Communications; Channel Modeling; Detection and Estimation; Modulation and Coding; Multiplexing and Carrier Techniques; Broadband Wireless Communications; Wireless Personal Communications; Multi-user Detection; Signal Separation and Interference rejection: Multimedia Communications over Wireless; DSP Applications to Wireless Systems; Experimental and Prototype Results; Multiple Access Techniques; Space-time Processing; Synchronization Techniques; Error Control Techniques; Cryptography; Software Radios; Tracking; Resource Allocation and Inference Management; Multi-rate and Multi-carrier Communications; Cross layer Design and Optimization; Propagation and Channel Characterization; OFDM Systems; MIMO Systems; Ultra-Wideband Communications; Cognitive Radio System Architectures; Platforms and Hardware Implementations for the Support of Cognitive, Radio Systems; Cognitive Radio Resource Management and Dynamic Spectrum Sharing.