1 / 10

Security capabilities for Light Communications

Security capabilities for Light Communications. Date: 2017-11-01. Author:. Abstract. This presentation discussed the security benefits of LC. Where can eavesdroppers be?. Wi-Fi: the location of the eavesdropper can be arbitrary

felica
Download Presentation

Security capabilities for Light Communications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security capabilities for Light Communications Date: 2017-11-01 Author: Eric Yin (University of Edinburgh)

  2. Abstract This presentation discussed the security benefits of LC. Eric Yin (University of Edinburgh)

  3. Where can eavesdroppers be? • Wi-Fi: the location of the eavesdropper can be arbitrary • LC: eavesdroppers have to be within the coverage are of the AP (more difficult!) Li-Fi eavesdropper Wi-Fi eavesdropper legitimate user Eric Yin (University of Edinburgh)

  4. Jamming an entire LC Network? • Jamming a LC AP typically requires the eavesdropper to use a directional beam. • Due to the dense deployment of APs in a LC network, users are likely to roam between different AP frequently. • It is very difficult for an eavesdropper to point to the ‘right’ AP. Eric Yin (University of Edinburgh)

  5. source What is the Secrecy Capacity/Rate? link 1 link 2 legitimate user eavesdropper S. Leung-Yan-Cheong and M. Hellman, “The Gaussian Wire-Tap Channel,” in IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978. Eric Yin (University of Edinburgh)

  6. source LC PHY-Security: Advantages of light NLOS LOS legitimate user eavesdropper Eric Yin (University of Edinburgh)

  7. source LC PHY-Security: Advantages of light legitimate user eavesdropper Eric Yin (University of Edinburgh)

  8. source LC PHY-Security: Multiple lights can provide cooperation and improve security • Existing power lines offer the possibility for LED cooperation (e.g., MISO, MIMO) • Secrecy performance can be further enhanced through precoding techniques. legitimate user eavesdropper A. Mostafa and L. Lampe, “Physical-layer security for MISO visible light communication channels,” IEEE J. Sel. Areas Commun., vol. 33, no. 9, pp. 1806-1818, Sept. 2015. Eric Yin (University of Edinburgh)

  9. source LC PHY-Security legitimate user eavesdropper Simulation parameters: transmit power 1 W; Lambertian order 1; L = 2.15 m; PD area 1 cm^2; PD responsivity 0.4 A/W. Eric Yin (University of Edinburgh)

  10. Angle Diversity Transmitter • Optical beamforming • Narrower beam -> more secure, also higher rate because of less interference Z. Chen and H. Haas, “Physical-layer security for optical attocell networks,” in Proc. IEEE ICC, Paris, 2017, pp. 1-6. Eric Yin (University of Edinburgh)

More Related