Advanced Search
Volume 44 Issue 8
Aug.  2022
Turn off MathJax
Article Contents
WANG Jinyuan, YU Pengfei, SHI Jiawei, LIN Min, WANG Junbo. Research on Fundamental Performance Limit of Covert Visible Light Communications[J]. Journal of Electronics & Information Technology, 2022, 44(8): 2619-2628. doi: 10.11999/JEIT220026
Citation: WANG Jinyuan, YU Pengfei, SHI Jiawei, LIN Min, WANG Junbo. Research on Fundamental Performance Limit of Covert Visible Light Communications[J]. Journal of Electronics & Information Technology, 2022, 44(8): 2619-2628. doi: 10.11999/JEIT220026

Research on Fundamental Performance Limit of Covert Visible Light Communications

doi: 10.11999/JEIT220026
Funds:  The Key International Cooperation Research Project (61720106003), The Open Research Foundation of Key Laboratory of Broadband Wireless Communication and Sensor Network Technology (JZNY202115)
  • Received Date: 2022-01-06
  • Rev Recd Date: 2022-03-10
  • Available Online: 2022-04-18
  • Publish Date: 2022-08-17
  • Facing the development needs of the sixth-generation mobile communication, Visible Light Communication (VLC) is a promising indoor coverage candidate. Due to the open and broadcast features, the information security of VLC can not be ignored. As a novel information security technology, covert wireless communication has been widely investigated in recent years. However, there are significant differences between VLC and radio frequency wireless communication. The results of covert wireless communication can not be directly applied to covert VLC. In view of this, the basic theory of covert VLC is studied in this paper. First, under the constraints of covertness, nonnegativity and average optical power, a functional optimization problem is established. The optimal input distribution is obtained as an exponential distribution, which provides a reference for the signal design of covert VLC. Using the covertness constraint, the condition which should be satisfied by the transmitter’s average optical power is obtained, it provides a basis for the transmitter to set the transmit power. Then, when the transmitter has or has not the knowledge of the warden’s information, the maximum amounts of information that can be covertly transmitted by covert VLC are derived, which reveals the fundamental performance limit of covert VLC. Finally, numerical results verify the theoretical analysis.
  • loading
  • [1]
    LIANGYingbin, POOR H V, and SHAMAI S. Physical layer security in broadcast networks[J]. Security & Communication Networks, 2009, 2(3): 227–238. doi: 10.1002/sec.110
    [2]
    WANG Jinyuan, LIU Cheng, WANG Junbo, et al. Physical-layer security for indoor visible light communications: Secrecy capacity analysis[J]. IEEE Transactions on Communications, 2018, 66(12): 6423–6436. doi: 10.1109/TCOMM.2018.2859943
    [3]
    BASH B A, GOECKEL D, and TOWSLEY D. Limits of reliable communication with low probability of detection on AWGN channels[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1921–1930. doi: 10.1109/JSAC.2013.130923
    [4]
    CHE P H, BAKSHI M, CHAN C, et al. Reliable, deniable and hidable communication[C]. 2014 Information Theory and Applications Workshop (ITA), San Diego, USA, 2014: 1–10.
    [5]
    WANG Ligong, WORNELL G W, and ZHENG Lizhong. Fundamental limits of communication with low probability of detection[J]. IEEE Transactions on Information Theory, 2016, 62(6): 3493–3503. doi: 10.1109/TIT.2016.2548471
    [6]
    YAN Shihao, CONG Yirui, HANLY S V, et al. Gaussian signalling for covert communications[J]. IEEE Transactions on Wireless Communications, 2019, 18(7): 3542–3553. doi: 10.1109/TWC.2019.2915305
    [7]
    GOECKEL D, BASH B, GUHA S, et al. Covert communications when the warden does not know the background noise power[J]. IEEE Communications Letters, 2016, 20(2): 236–239. doi: 10.1109/LCOMM.2015.2507594
    [8]
    HE Biao, YAN Shihao, ZHOU Xiangyun, et al. On covert communication with noise uncertainty[J]. IEEE Communications Letters, 2017, 21(4): 941–944. doi: 10.1109/LCOMM.2016.2647716
    [9]
    ZHENG Mengfan, HAMILTON A, and LING Cong. Covert communications with a full-duplex receiver in non-coherent Rayleigh fading[J]. IEEE Transactions on Communications, 2021, 69(3): 1882–1895. doi: 10.1109/TCOMM.2020.3041353
    [10]
    WANG Jianquan, TANG Wanbin, ZHU Qiangqiang, et al. Covert communication with the help of relay and channel uncertainty[J]. IEEE Wireless Communications Letters, 2019, 8(1): 317–320. doi: 10.1109/LWC.2018.2872058
    [11]
    BASH B A, GOECKEL D, and TOWSLEY D. Covert communication gains from adversary’s ignorance of transmission time[J]. IEEE Transactions on Wireless Communications, 2016, 15(12): 8394–8405. doi: 10.1109/TWC.2016.2614502
    [12]
    SOBERS T V, BASH B A, GUHA S, et al. Covert communication in the presence of an uninformed jammer[J]. IEEE Transactions on Wireless Communications, 2017, 16(9): 6193–6206. doi: 10.1109/TWC.2017.2720736
    [13]
    KOMINE T and NAKAGAWA M. Fundamental analysis for visible-light communication system using LED lights[J]. IEEE Transactions on Consumer Electronics, 2004, 50(1): 100–107. doi: 10.1109/TCE.2004.1277847
    [14]
    LAPIDOTH A, MOSER S M, and WIGGER M A. On the capacity of free-space optical intensity channels[J]. IEEE Transactions on Information Theory, 2009, 55(10): 4449–4461. doi: 10.1109/TIT.2009.2027522
    [15]
    LEHMANN E L and ROMANO J P. Testing Statistical Hypotheses[M]. 3rd ed. New York: Springer, 2005.
    [16]
    COVER T M and THOMAS J A. Elements of Information Theory[M]. 2nd ed. Hoboken, New Jersey: John Wiley & Sons, 2006.
    [17]
    LEE K, PARK H, and BARRY J R. Indoor channel characteristics for visible light communications[J]. IEEE Communications Letters, 2011, 15(2): 217–219. doi: 10.1109/LCOMM.2011.010411.101945
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(7)  / Tables(1)

    Article Metrics

    Article views (738) PDF downloads(102) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return