Next Article in Journal
Digital Engineering in Photonics: Optimizing Laser Processing
Previous Article in Journal
3D Multi-Phase Sub-Pixel PSF Estimation Based on Space Debris Detection System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secrecy Rate Bounds in Spatial Modulation-Based Visible Light Communications under Signal-Dependent Noise Conditions

by
Yahya M. Al-Moliki
1,*,
Ali H. Alqahtani
1,
Mohammed T. Alresheedi
2 and
Yahya Al-Harthi
2
1
Department of Applied Electrical Engineering, Al-Muzahimya Campus, College of Applied Engineering, King Saud University, P.O. Box 2454, Riyadh 11421, Saudi Arabia
2
Department of Electrical Engineering, College of Engineering, King Saud University, P.O. Box 800, Riyadh 11421, Saudi Arabia
*
Author to whom correspondence should be addressed.
Photonics 2024, 11(10), 934; https://doi.org/10.3390/photonics11100934
Submission received: 12 August 2024 / Revised: 23 September 2024 / Accepted: 30 September 2024 / Published: 3 October 2024
(This article belongs to the Section Optical Communication and Network)

Abstract

:
This study examines the physical-layer security of an indoor visible light communication (VLC) system using spatial modulation (SM), which consists of several transmitters, an authorized receiver, and a passive adversary. The SM technique is applied at the transmitters so that only one transmitter is operational at any given time. A uniform selection (US) strategy is employed to choose the active transmitter. The two scenarios under examination encompass the conditions of non-negativity and average optical intensity, as well as the conditions of non-negativity, average optical intensity, and peak optical intensity. The secrecy rate is then obtained for these two scenarios while accounting for both signal-independent noise and signal-dependent noise. Additionally, the high signal-to-noise ratio (SNR) asymptotic behavior of the derived secrecy rate constraints is investigated. A channel-adaptive selection (CAS) strategy and a greedy selection (GS) scheme are utilized to select the active transmitter, aiming to enhance the secrecy performance. The current numerical findings affirm a pronounced convergence between the lower and upper bounds characterizing the secrecy rate. Notably, marginal asymptotic differentials in performance emerge at elevated SNRs. Furthermore, the GS system outperforms the CAS scheme and the US method, in that order. Additionally, the impact of friendly optical jamming on the secrecy rate is investigated. The results show that optical jamming significantly enhances the secrecy rate, particularly at higher power levels.

1. Introduction

Multi-input multi-output (MIMO) is one of the most promising strategies for wireless communication networks, including vehicular ad hoc networks and fifth-/sixth-generation (5G/6G) networks [1]. However, MIMO schemes typically involve high hardware complexity due to the need for multiple radio frequency (RF) chains. To address this limitation, a low-complexity alternative called spatial modulation (SM), which uses a single RF chain, was developed [2,3]. In SM, only one antenna is activated in each time slot, while the others remain inactive. The index of the active antenna is encoded into a portion of the input bits at the transmitter. As a result, the signal’s dimensionality increases, enhancing the transmission rate. Both the transmitted signal and the active antenna index are recovered at the receiver. Readers can refer to [4] for more detailed information on SM.
SM has gained increasing attention for its ability to balance spectral efficiency and energy efficiency, while maintaining a simple design through the use of a single RF chain. A comprehensive survey of recent developments in SM, including its applications across various domains such as time, frequency, and code, as well as its integration with emerging wireless technologies, is provided in [5]. Furthermore, the potential of SM in 6G networks is highlighted in [6], where the concept of index modulation multiple access is explored to enhance system performance and enable massive connectivity, further extending the applicability of SM in future communication systems.
Conventional wireless communication systems, such as RF-based systems, operate in a spectrum that is highly susceptible to interference, fading, and congestion due to the shared nature of radio frequency bands. In contrast, Visible Light Communication (VLC) operates in a much larger, unregulated spectrum (400–800 THz), offering several advantages over traditional RF channels. VLC signals, transmitted through optical light, provide higher directivity and have a limited propagation range, reducing interference risk and enhancing spatial security. Moreover, VLC is highly resistant to electromagnetic interference, which is common in RF systems. However, due to its broadcast nature and line-of-sight requirements, VLC channels are also vulnerable to eavesdropping attacks. This makes physical-layer security techniques especially critical for VLC systems. These differences between VLC and conventional wireless channels necessitate specialized approaches to ensure data confidentiality, as explored in this study.
Significant reports on SM have demonstrated its advantages over MIMO. Recently, increasing attention has been directed toward research on SM in VLC systems [2,7]. VLC is a promising wireless technology that complements traditional RF systems due to its use of the open and unregulated light spectrum (400–800 THz). Optical signals offer higher directivity and greater resistance to obstacles compared to RF, enhancing security. However, VLC communications are vulnerable to eavesdropping due to the broadcast nature of the optical link. The topic of security in VLC has been studied in [8,9], where physical-layer security methods were identified as innovative and effective strategies for improving data confidentiality [10].
In [11,12,13,14], the authors analyzed physical-layer security in single-input-single-output (SISO) VLC systems, deriving tight upper and lower bounds on secrecy capacity under average and peak optical intensity constraints. In [15,16,17,18,19], various aspects of physical-layer security in multi-user VLC systems were addressed, including secrecy sum rates, performance in 3D networks, secrecy outage probabilities, and novel spatial constellation designs aimed at enhancing security and reducing eavesdropping. In [20,21,22,23,24,25], the focus shifted to multiple-input-single-output (MISO) VLC systems, where the authors explored secure beamforming under various channel state information (CSI) conditions, addressing amplitude constraints, non-line-of-sight effects, and inter-symbol interference to optimize secrecy rates. Lastly, in [26,27,28,29,30,31], techniques like jamming and AN-aided precoding were employed to maximize secrecy rates, while in [32,33], both secure beamforming and artificial noise (AN) jamming were combined for further secrecy rate enhancement.
Secret-key secrecy methods [34,35,36,37,38] have been developed to derive secret keys from physical-layer signals, such as orthogonal frequency division multiplexing signals, to enhance the security of VLC systems. The studies referenced in [11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38] analyzed secrecy performance under the assumption of signal-independent interfering noise, which is an unrealistic assumption for VLC systems. In contrast, [39] and [40] investigated the secrecy performance of SISO VLC systems with the more realistic assumption that the interfering noise depends on the signal.
While numerous studies have investigated methods to enhance the confidentiality of VLC in SISO- and MISO/MIMO-based spatial multiplexing systems [11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40], there is a limited body of literature specifically addressing the secrecy rate in VLC-based SM systems [41,42,43,44,45].
For the studies related to VLC-based SM systems [41,42,43,44,45], upper and lower bounds on VLC secrecy rates were derived under the assumption of signal-independent noise, which is impractical for VLC systems. In contrast, this study investigates the secrecy rate within a three-indoor SM-based VLC scheme, accounting for signal-dependent noise. We also propose random noise variances for both the intended user and the adversary. The key contributions of this work are as follows:
  • We assess the secrecy rate for SM-based VLC under non-negativity and average optical intensity constraints. We derive a lower bound using the uniform selection (US) mechanism and an upper bound using the dual expression of the secrecy rate, with closed-form expressions for both bounds. Numerical results confirm the reliability of these bounds.
  • We analyze SM-based VLC with constraints on non-negativity, average optical intensity, and peak optical intensity. Closed-form expressions for the secrecy rate bounds, including the peak optical intensity constraint, are derived. Numerical results demonstrate that the bounds are tightly constrained.
  • We evaluate the asymptotic performance of the secrecy rate at high optical intensity. The difference between the lower and upper bounds is minimal at high signal-to-noise ratios (SNR).
  • To enhance secrecy performance, we employ the channel-adaptive selection (CAS) method and the greedy selection (GS) method for active transmitter selection. The GS method outperforms both the CAS and US methods, as demonstrated by numerical results.
  • We investigate the impact of friendly optical jamming on the secrecy rate. The results show that optical jamming significantly improves the secrecy rate, particularly at higher power levels.
The remainder of this work is structured as follows: Section 2 introduces the system model. Section 3 and Section 4 analyze two scenarios, presenting the secrecy rate bounds and asymptotic performance for SM-based VLC. Section 5 discusses two transmitter selection strategies to enhance secrecy performance. Section 6 proposes an optical jamming technique for further improving secrecy. Section 7 examines a scenario with multiple receivers. Section 8 presents the numerical results. Section 9 provides the discussion, and Section 10 concludes the work.

2. System Model

Figure 1 depicts an indoor VLC system with M emitters, representing Alice (the transmitter), an authorized receiver (Bob), and an adversary (Eve). Each emitter, positioned on the roof, uses a light emitting diode (LED) to transmit optical signals. SM is employed by Alice, meaning that only one LED is activated at a time while the others remain inactive. Figure 2 illustrates the SM schematic in VLC. Both Bob and Eve are situated on the ground, each equipped with a photodiode (PD) for converting optical signals to electrical signals. When an active LED transmits data to Bob, Eve may also intercept the message.
The primary sources of noise at the receivers of Alice and Bob include both signal-independent and signal-dependent noise [11]. At any given time, the m -th LED is activated. Consequently, the signals received by Bob and Eve are described as follows:
{ Y B = h B , m X + h B , m X Z B , 1 + Z B , 0 Y E = h E , m X + h E , m X Z E , 1 + Z E , 0 ,   m = 1 , 2 ,   ,   M ,
where Z B , 0 ~ N ( 0 , σ B 2 ) and Z E , 0 ~ N ( 0 , σ E 2 ) denote the signal-independent noise at Bob and Eve, with σ B 2 and σ E 2 representing the noise variances. Similarly, Z B , 1 ~ N ( 0 , ς B 2 σ B 2 ) and Z E , 1 ~ N ( 0 , ς E 2 σ E 2 ) denote the signal-dependent noise at Bob and Eve, where ς B 2 and ς E 2 (with ς B 2 ,   ς E 2 > 0 ) are the ratios of signal-dependent noise variance to signal-independent noise variance. h B , m and h E , m are the instantaneous channel gains from the m -th LED to the receivers at Bob and Eve, respectively, as specified in Equation (6) of [35].
SM activates only one LED at a time, using the US mechanism, where each LED has an equal probability of being selected. Consequently, the probability p ( h k = h k , m ) is written as
p ( h k = h k , m ) = 1 M ,   k = B   or   E
We consider the following signal constraints for indoor VLC [11]:
  • Nonnegativity: The input signal X in (1) is a nonnegative random variable representing the optical signal’s intensity. Consequently, we have
    X 0 .
  • Peak optical intensity constraint: The input signal is typically subject to a peak optical intensity constraint, imposed by practical and safety limitations.
    X A ,
  • Average optical intensity constraint: Since VLC requires constant illumination, the average optical intensity must remain stable over time but can be adjusted to meet user needs. Thus, the average optical intensity constraint is described as
    E x ( X ) = ξ P ,
    where ξ ( 0 , 1 ] and P denote the dimming target and the nominal optical intensity of the LED, respectively.

3. Secrecy Rate for SM-Based VLC with Constraints (3) and (5)

This section analyzes the secrecy rate bounds for SM-based VLC under constraints (3) and (5). Additionally, it provides the secrecy rate asymptotic at large SNR. According to information theory [21], no secrecy rate is achievable if the main channel is worse than the adversary’s channel. Conversely, a positive secrecy rate R s for SM-based VLC with constraints (3) and (5) can be computed by solving the following problem:
R s = max f X ( x ) [ I ( X , h B ; Y B ) I ( X , h E ; Y E ) ] s . t .   0 f X ( x ) d x = 1 , E ( X ) = 0 x f X ( x ) d x = ξ P ,
where f X ( x ) represents the probability density function (PDF) of X , and I ( ; ) denotes the mutual information. Note that solving the optimization problem (6) is highly challenging. We will, however, closely examine constrained secrecy rate bounds in the following section.

3.1. Lower Bound of Secrecy Rate

An arbitrary input PDF f X ( x ) that satisfies constraints (3) and (5) can be used to derive a lower bound on the secrecy rate in optimization problem (6) as follows:
R s = max f X ( x ) 1 M m = 1 M [ I ( X , h B , m ; Y B ) m = 1 M I ( X , h E , m ; Y E ) ] = max f X ( x ) 1 M m = 1 M [ ( Y B ) ( Y E ) + ( Y E | h E , m , X ) ( Y B | h B , m , X ) ] ,
where ( · ) represents the entropy. In accordance with (1), the PDF of f Y k | h k , m ( y k | h k , m , x ) ,   k = B   or   E , can be obtained as
f Y k | h k , m ( y k | h k , m , x ) = e [ ( y k h k , m x ) 2 2 ( 1 + h k , m X ς k 2 ) σ k 2 ] 2 π ( 1 + h k , m X ς k 2 ) σ k 2 .
Thus, ( Y k | h k , m , X ) is computed as
( Y k | h k , m , X ) = 1 2 ln ( 2 π e σ k 2 ) + 1 2 E x [ ln ( 1 + h k , m X ς k 2 ) ] .
Moreover, ( Y E ) is constrained by the upper limit determined by the differential entropy of a Gaussian random variable with variance of var ( Y E ) [46], as follows:
( Y E ) 1 2 ln [ 2 π e var ( Y E ) ] .
As stated in proposition 11 of [47], The output entropy exceeding the input entropy implies that can be lower-bounded by
( Y B ) ( X ) + f l o w ( h B , m , ξ , P ) ,
where f l o w ( h B , m , ξ , P ) is computed as follows:
f l o w ( h B , m , ξ , P ) = 1 2 ln ( h B , m 2 + 2 h B , m ς B 2 σ B 2 ξ P ) h B , m ξ P + ς B 2 σ B 2 ς B 2 σ B 2 + h B , m ξ P ( h B , m ξ P + 2 ς B 2 σ B 2 ) ς B 2 σ B 2 .
We can rewrite the lower bound by substituting (9)–(11) into (7) as
R s 1 M m = 1 M ( f l o w ( h B , m , ξ , P ) + 1 2 E x [ ln ( 1 + h E , m X ς E 2 1 + h B , m X ς B 2 ) ] ) + ( X ) 1 2 ln [ 2 π e var ( Y E ) ] + 1 2 ln ( σ E 2 σ B 2 ) .
As shown in (13), we obtain a lower bound on the secrecy rate by choosing a PDF that satisfies the constraints of problem (6). To achieve a tight lower bound, we select an appropriate input PDF. Using the variational method, we derive this lower bound on the secrecy rate.
Theorem 1. 
The lower bound for the secrecy rate in SM-based VLC with constraints (3) and (5) is given by
R s 1 M m = 1 M ( 1 2 ln [ e ξ 2 P 2 σ E 2 2 π σ B 2 ( h E , m 2 ξ 2 P 2 + h E , m ξ P ς E 2 σ E 2 + σ E 2 ) ] + f l o w ( h B , m , ξ , P ) + 1 2 [ e 1 h B , m ς B 2 ξ P E i ( 1 h B , m ς B 2 ξ P ) e 1 h E , m ς E 2 ξ P E i ( 1 h E , m ς E 2 ξ P ) ] ) .
When M = 1 (SISO system), the secrecy rate bound in (19) coincides with (14) in [40].
Proof. 
See Appendix A. □
Corollary 1. 
In the scenario of assuming signal-independent noise (i.e.,  ς E 2 ,   ς B 2 0 ) , the secrecy rate lower bound given in (14) simplifies to (15), which coincides with (7) in [44].
R s 1 2 M m = 1 M ln [ e ξ 2 P 2 σ E 2 2 π σ B 2 ( h E , m 2 ξ 2 P 2 + σ E 2 ) ] ,

3.2. Upper Bound of Secrecy Rate

In this section, we use the dual expression of the secrecy rate [44] to analyze the upper bound. To simplify the derivation, we rewrite (1) as
{ Y ` B , m = X + h B , m X Z ` B , 1 , m + Z ` B , 0 , m Y ` E , m = X + h E , m X Z ` E , 1 , m + Z ` E , 0 , m ,
where Y ` B , m = Y B / h B , m , Y ` E , m = Y E / h E , m , Z ` B , 1 , m = Z B , 1 / h B , m , Z ` E , 1 , m = Z E , 1 / h E , m , Z ` B , 0 , m = Z B , 0 / h B , m , and Z ` E , 0 , m = Z E , 0 / h E , m .
The following inequality is valid for any random conditional PDF g Y ` B , m | Y ` E , m ( y ` B , m | Y ` E , m ) :
I ( X ; Y ` B , m | Y ` E , m ) E X Y ` E , m { u } ,
where u indicates to a relative entropy, stated as
u = D ( f Y ` B , m | X Y ` E , m ( y ` B , m | X , Y ` E , m ) | | g Y ` B , m | Y ` E , m ( y ` B , m | Y ` E , m ) ) .
To obtain an upper bound,
I ( X ; Y ` B , m | Y ` E , m ) = min g Y ` B , m | Y ` E , m ( y ` B , m | Y ` E , m ) E X Y ` E , m { u } .
Following (6), R s can be re-written as
R s = max f X ( x ) 1 M m = 1 M I ( X ; Y ` B , m | Y ` E , m ) .
An optimal solution for 1 M m = 1 M I ( X ; Y ` B , m | Y ` E , m ) can be achieved by using a specific input PDF f X ( x ) while satisfying constraints (3) and (5). The secrecy rate R s in (20) is re-expressed as
R s = 1 M m = 1 M { min g Y ` B , m | Y ` E , m ( y ` B , m | Y ` E , m ) E X Y ` E , m { u } } ,
where X and f X   ( x ) denote the optimal input and its associated PDF. To establish a tight upper bound on the secrecy rate, we need to select a tractable and appropriate g Y ` B , m | Y ` E , m ( y ` B , m | Y ` E , m ) . Consequently, the following problem arises:
Theorem 2. 
In the context of SM-based VLC having constraints (3) and (5), the secrecy rate is upper-bounded by
R s { 1 M m = 1 M ln ( 4 e h E , m ς E 2 σ E 2 π 2 M + 2 e ξ P h B , m h E , m ς E 2 σ E 2 π M ς B 2 σ B 2 ) , i f   1 2 π h E , m h B , m ( h B , m ς B 2 σ B 2 2 π M + h B , m 2 ξ P M ) 1 2 M m = 1 M ln ( 4 e h B , m ς E 2 σ E 2 π 2 h E , m ς B 2 σ B 2 ) ,   o t h e r w i s e  
where M = h E , m 2 ς B 2 σ B 2 / h B , m + h E , m ς E 2 σ E 2 .
When M = 1 (SISO system), the secrecy rate bound in (22) coincides with (21) in [40].
Proof. 
See Appendix B. □
Corollary 2. 
Assuming signal-dependent noise is disregarded in Theorem 2, secrecy rate upper bound (22) simplifies to (23), which coincides with (15) in [44].
lim ς B 0 ς E 0 R s { 1 M m = 1 M ln [ 4 e ( σ B 2 π + h B , m ξ P 2 ) 2 π e σ B 2 ( 1 + σ B 2 h E , m 2 σ E 2 h B , m 2 ) ] , i f   1 2 π h E , m σ B 2 h E , m 2 + σ E 2 h B , m 2 ( σ B 2 π + h B , m ξ P 2 ) 1 M m = 1 M ln ( 2 e h B , m σ E π h E , m σ B ) ,   o t h e r w i s e    

3.3. Asymptotic Behavior Analysis

Indoor VLC typically operates with a high SNR, often exceeding 30 dB. Therefore, we focus on analyzing secrecy in high SNR conditions.
Corollary 3. 
Exploring the upper and lower bounds of secrecy rates under constraints (3) and (5) as P approaches infinity as
lim P R s 1 2 ln ( e 2 π ) + 1 2 M m = 1 M ln ( h B , m ς E 2 σ E 2 h E , m ς B 2 σ B 2 ) l i m P R s 1 2 ln ( 4 e π 2 ) + 1 2 M m = 1 M ln ( h B , m ς E 2 σ E 2 h E , m ς B 2 σ B 2 ) .
Proof. 
See Appendix C. □
Remark 1. 
Lower and higher asymptotic secrecy rate bounds differ by   1 2 ln ( 4 e π 2 ) 1 2 ln ( e 2 π ) 0.4674  nat/transmission. Asymptotically, the performance gap is insignificant.

4. Secrecy Rate for SM-Based VLC with Constraints (3)–(5)

By introducing an additional peak optical intensity constraint on the channel input, we derive more accurate and asymptotic secrecy rate bounds for the SM-based VLC system. The computation of the secrecy rate involves addressing the following optimization problem while considering constraints (3)–(5):
R s = max f X ( x ) [ I ( X , h B ; Y B ) I ( X , h E ; Y E ) ] : s . t .   0 A f X ( x ) d x = 1 E ( X ) = 0 A x f X ( x ) d x = ξ P ,
Similar to (6), deriving the exact secrecy rate formulation for problem (25) is challenging. In the next two sections, we will derive both upper and lower bounds on the secrecy rate.

4.1. Lower Bound of Secrecy Rate

A lower bound on the secrecy rate for problem (25) can be obtained by selecting an arbitrary input PDF that satisfies criteria (3)–(5), as follows:
R s 1 M m = 1 M [ I ( X , h B , m ; Y B ) m = 1 M I ( X , h E , m ; Y E ) ] = 1 M m = 1 M [ ( Y B ) ( Y B | h B , m , X ) ( Y E ) + ( Y E | h E , m , X ) ] ,
In this instance, the lower bound on the secrecy rate (13) is applicable. Define the ratio of the average optical intensity to the peak optical intensity as α = ξ P / A . The following theorem establishes a lower bound for this ratio.
Theorem 3. 
Our lower bound on the secrecy rate for SM-based VLC, subject to constraints (3)–(5) is as follows:
R s { R s 1 ,   i f   α = 0.5 R s 2 ,   i f   α 0.5 ,
where R s 1 and R s 2 are expressed as
R s 1 = 1 M m = 1 M ( f l o w ( h B , m , ξ , P ) + 1 2 ln [ 6 A 2 σ E 2 π e σ B 2 ( h E , m 2 A 2 + 6 A h E , m ς E 2 σ E 2 + 12 σ E 2 ) ] + 1 2 ln ( 1 + h E , m A ς E 2 1 + h B , m A ς B 2 ) ln ( 1 + h B , m A ς B 2 ) 2 A h B , m ς B 2 + ln ( 1 + h E , m A ς E 2 ) 2 A h E , m ς E 2 ) ,
R s 2 = 1 M m = 1 M ( f l o w ( h B , m , ξ , P ) + 1 2 ( e c A 1 ) { ln ( 1 + h E , m A ς E 2 1 + h B , m A ς B 2 ) e c A e c h E , m ς E 2 [ E i ( c h E , m ς E 2 ( 1 + h E , m A ς E 2 ) ) E i ( c h E , m ς E 2 ) ] + e c h B , m ς B 2 [ E i ( c h B , m ς B 2 ( 1 + h B , m A ς B 2 ) ) E i ( c h B , m ς B 2 ) ] } 1 2 ln [ 2 π e ( h E , m 2 ( A ( c A 2 ) c ( 1 e c A ) + 2 c 2 ξ 2 P 2 ) + h E , m ξ P ς E 2 σ E 2 + σ E 2 ) ] ) c ξ P + 1 2 ln ( σ E 2 σ B 2 ( e c A 1 ) 2 c 2 )
where c in (29) can be computed from the following equation:
α = 1 1 e c A 1 c A
When M = 1 (SISO system), the secrecy rate bounds in (28) and (29) coincide with (27) and (28) in [40].
Proof. 
See Appendix D. □
Corollary 4. 
When signal-dependent noise is ignored, the secrecy rate lower bound (27) becomes
lim ς B 0 ς E 0 R s { 1 2 M m = 1 M ln [ 3 h B , m 2 σ E 2 A 2 2 π e σ B 2 ( ξ 2 P 2 h E , m 2 + 3 σ E 2 ) ]   i f   α = 0.5 1 2 M m = 1 M ln [ h B , m 2 σ E 2 e 2 c ξ P ( e c A 1 c ) 2 2 π e σ B 2 ( h E , m 2 A ( c A 2 ) c ( 1 e c A ) + 2 h E , m 2 c 2 h E , m 2 ξ 2 P 2 + σ E 2 ) ] ,   I f   α 0.5

4.2. Upper Bound of Secrecy Rate

The dual expression in (20) for the secrecy rate remains valid even with the additional peak optical intensity constraint. The following theorem is derived from (21) and Theorem 2.
Theorem 4. 
We obtain an upper bound for the secrecy rate in SM-based VLC, considering constraints (3)–(5) as follows:
R s 1 2 M m = 1 M ln [ h E , m ς E 2 σ E 2 ( h B , m A + ς B 2 σ B 2 ) ς B 2 σ B 2 ( h E , m 2 A + h E , m 2 h B , m ς B 2 σ B 2 + M ) ] ,
where M = h E , m 2 ς B 2 σ B 2 / h B , m + h E , m ς E 2 σ E 2 .
When M = 1 (SISO system), the secrecy rate bounds in (32) coincide with (31) in [40].
Proof. 
See Appendix E. □
Corollary 5. 
In Theorem 4, ignoring signal-dependent noise reduces the secrecy rate upper bound to
lim ς B 0 ς E 0 R s 1 2 M m = 1 M ln [ ( h B , m 2 A ξ P + σ B 2 ) σ E 2 ( h E , m 2 A ξ P + 2 h E , m 2 h B , m 2 σ B 2 + σ E 2 ) σ B 2 ] .
Remark 2. 
When signal-dependent noise is not taken into account, the upper bound on the secrecy rate for SM-based VLC in (33) coincides with (22) in [44]. This shows that the results in [44] are merely a specific instance of this paper’s Theorem 4.

4.3. Asymptotic Behavior Analysis

As the peak optical intensity of LED A approaches infinity, the asymptotic secrecy rate bounds can be obtained, as stated in Theorems 3 and 4.
Corollary 6. 
We obtain asymptotic lower and upper bounds on secrecy rate for SM-based VLC satisfying constraints (3)–(5) as
{ lim A R s { 1 2 M m = 1 M ln ( 6 h B , m ς E 2 σ E 2 π e h E , m ς B 2 σ B 2 ) ,     i f   α = 0.5 1 2 M m = 1 M ln [ h B , m h E , m ς E 2 σ E 2 ( e c A 1 ) 2 2 π e c 2 ς B 2 σ B 2 e 2 e ξ P [ h E , m 2 ( A ( c A 2 ) c ( 1 e c A ) + 2 c 2 ξ 2 P 2 ) + h E , m ξ P ς E 2 σ E 2 + σ E 2 ] ] lim A R s 1 2 M m = 1 M ln ( h B , m ς E 2 σ E 2 h E , m ς B 2 σ B 2 ) . ,   i f   α 0.5
Proof. 
See Appendix F. □
Remark 3. 
In Corollary 6, when   α = 0.5 , the difference between the asymptotic upper bound and the asymptotic lower bound is 1 2 ln ( π e 6 ) 0.1765 Nat/transmission. This means that the asymptotic performance difference is insignificant.
When α 0.5 , obtaining an exact asymptotic lower bound on the secrecy rate is challenging. Thus, the evaluation of the performance gap between the upper and lower bounds relies on numerical results presented in Section 8.

5. Secrecy Methods for Enhancing Performance

In Section 2, the US method is used to choose the operating transmitter, assuming each LED has an equal probability of being selected. However, this method is not always optimal. New transmitter selection strategies are introduced here to enhance the secrecy rate.

5.1. Channel-Adaptive Selection Technique

In this technique, the possibility of picking every LED varies depending on both Bob and Eve’s CSI. The rate of secrecy goes up as the difference between h B , m / σ B and h E , m / σ E grows larger. To increase the rate of secrecy, the LED with a large h B , m / σ B h E , m / σ E should be chosen with a high probability. Therefore, in (2), the probability of choosing the m-th LED is changed as [44]
p ( h k = h k , m ) = h B , m σ B h E , m σ E j = 1 M ( h B , m σ B h E , m σ E ) ,   k = B   or   E
Algorithm 1 [44] details the practical selection process of each LED in the CAS system. Assuming there are N time intervals, the computational complication of Algorithm 1 is O ( M N ) , making the CAS technique computationally efficient. Additionally, since 0 q i 1 for all i { 1 , ,   M } and r [ 0 , 1 ] , Steps 6 10 are used to select a specific LED. LEDs can be selected independently at various time points, ensuring that Algorithm 1 is convergent. Theorems 1 and 2 can be reformulated as Theorem 5 using the CAS technique.
Algorithm 1 The CAS technique
1:Input:  σ B ,   σ E , and M.
2:Output: The k-th index of LED.
3:Get Alice’s, Bob’s, and Eve’s locations.
4:Calculate the probability of every LED being selected utilizing (35).
5: Calculate   the   accumulated   probability   of   q i = m = 1 i p ( h k = h k , m ) ,   i = 1 , , M .
6:Produce a randomly generated r in the interval [ 0 ,   1 ] .
7:if  r < q 1 then
8:The 1st index is chosen.
9: else   if   q k 1 < r < q k then
10:The k-th index is chosen.
11:end if
12: Iterate   the   above   steps   2 10 for choosing a different index for the subsequent particular time.
Theorem 5. 
Utilizing the CAS technique in (35), we can find the lower and upper bounds of the secrecy rate for the SM-based VLC subject to constraints (3) and (5) as follows:
R s m = 1 M { h B , m σ B h E , m σ E j = 1 M ( h B , m σ B h E , m σ E ) { 1 2 ln [ e ξ 2 P 2 σ E 2 2 π σ B 2 ( h E , m 2 ξ 2 P 2 + h E , m ξ P ς E 2 σ E 2 + σ E 2 ) ] + f l o w ( h B , m , ξ , P ) + 1 2 [ e 1 h B , m ς B 2 ξ P E i ( 1 h B , m ς B 2 ξ P ) e 1 h E , m ς E 2 ξ P E i ( 1 h E , m ς E 2 ξ P ) ] } } .
R s { m = 1 M { h B , m σ B h E , m σ E j = 1 M ( h B , m σ B h E , m σ E ) [ ln ( 4 e h E , m ς E 2 σ E 2 π 2 M + 2 e ξ P h B , m h E , m ς E 2 σ E 2 π M ς B 2 σ B 2 ) ] } if   1 2 π h E , m h B , m ( h B , m ς B 2 σ B 2 2 π M + h B , m 2 ξ P M ) 1 2 m = 1 M { h B , m σ B h E , m σ E j = 1 M ( h B , m σ B h E , m σ E ) ln ( 4 e h B , m ς E 2 σ E 2 π 2 h E , m ς B 2 σ B 2 ) } ,   otherwise .
Theorems 3 and 4 can be updated using the CAS approach as detailed in (35).
Theorem 6. 
Applying the CAS technique outlined in (35), we can use (27) to calculate the lower bound of the secrecy rate for SM-based VLC with constraints (3)–(5), where   R s 1   and   R s 2   are expressed in (38), and the upper bound of the secrecy rate is given in (39).
R s 1 = m = 1 M { h B , m σ B h E , m σ E j = 1 M ( h B , m σ B h E , m σ E ) ( f l o w ( h B , m , ξ , P ) + 1 2 ln [ 6 A 2 σ E 2 π e σ B 2 ( h E , m 2 A 2 + 6 A h E , m ς E 2 σ E 2 + 12 σ E 2 ) ] + 1 2 ln ( 1 + h E , m A ς E 2 1 + h B , m A ς B 2 ) ln ( 1 + h B , m A ς B 2 ) 2 A h B , m ς B 2 + ln ( 1 + h E , m A ς E 2 ) 2 A h E , m ς E 2 ) } ,
R s 2 = m = 1 M { h B , m σ B h E , m σ E j = 1 M ( h B , m σ B h E , m σ E ) ( f l o w ( h B , m , ξ , P ) + 1 2 ( e c A 1 ) { ln ( 1 + h E , m A ς E 2 1 + h B , m A ς B 2 ) e c A e c h E , m ς E 2 [ E i ( c h E , m ς E 2 ( 1 + h E , m A ς E 2 ) ) E i ( c h E , m ς E 2 ) ] + e c h B , m ς B 2 [ E i ( c h B , m ς B 2 ( 1 + h B , m A ς B 2 ) ) E i ( c h B , m ς B 2 ) ] } 1 2 ln [ 2 π e ( h E , m 2 ( A ( c A 2 ) c ( 1 e c A ) + 2 c 2 ξ 2 P 2 ) + h E , m ξ P ς E 2 σ E 2 + σ E 2 ) ] ) c ξ P + 1 2 ln ( σ E 2 σ B 2 ( e c A 1 ) 2 c 2 ) }
R s 1 2 m = 1 M { h B , m σ B h E , m σ E j = 1 M ( h B , m σ B h E , m σ E ) · ln [ h E , m ς E 2 σ E 2 ( h B , m A + ς B 2 σ B 2 ) ς B 2 σ B 2 ( h E , m 2 A + h E , m 2 h B , m ς B 2 σ B 2 + M ) ] } ,

5.2. Greedy Selection Technique

This subsection introduces the GS method. At each time instant, the LED with the highest value of h B , m / σ B h E , m / σ E is selected. The probability of choosing the m -th LED is then [44]
p ( h k = h k , m ) = { 1 ,     if   m = arg max k = 1 , ,   M ( h B , m σ B h E , m σ E ) 0 ,                                                                                     otherwise ,
Algorithm 2 [44] outlines the process for selecting each LED using this technique. With a computational complexity of O ( M N ) , similar to Algorithm 1, the GS method is also efficient. Additionally, since the value h B , k / σ B h E , k / σ E varies with k , the index m can be determined for each time instant using m = arg max k = 1 , ,   M ( h B , m σ B h E , m σ E ) . The LED selections at different time instants are independent. Therefore, Algorithm 2 is convergent as well. Theorems 1 and 2 can be updated to Theorem 7 using the GS approach.
Algorithm 2 The GS technique
1:Input:  σ B ,   σ E , and M.
2:Output: The m-th index of LED.
3:Get Alice’s, Bob’s, and Eve’s locations.
4: Calculate   h B , k / σ B h E , k / σ E   for   k = 1 , ,   M .
5:if  m = arg max k = 1 , ,   M ( h B , m σ B h E , m σ E )   then
6:The m-th index is chosen.
7:end if
8: Iterate the above steps 2–6 for choosing a different index for the subsequent particular time.
Theorem 7. 
For the SM-based VLC with constraints (3) and (5), the lower and upper secrecy rate bounds are given as
R s max m { 1 2 ln [ e ξ 2 P 2 σ E 2 2 π σ B 2 ( h E , m 2 ξ 2 P 2 + h E , m ξ P ς E 2 σ E 2 + σ E 2 ) ] + f l o w ( h B , m , ξ , P ) + 1 2 [ e 1 h B , m ς B 2 ξ P E i ( 1 h B , m ς B 2 ξ P ) e 1 h E , m ς E 2 ξ P E i ( 1 h E , m ς E 2 ξ P ) ] } .
R s { max m { ln ( 4 e h E , m ς E 2 σ E 2 π 2 M + 2 e ξ P h B , m h E , m ς E 2 σ E 2 π M ς B 2 σ B 2 ) } m , if   1 2 π h E , m h B , m ( h B , m ς B 2 σ B 2 2 π M + h B , m 2 ξ P M ) max m { 1 2 ln ( 4 e h B , m ς E 2 σ E 2 π 2 h E , m ς B 2 σ B 2 ) } ,   otherwise ,
GS technique updates Theorems 3 and 4 to Theorem 8.
Theorem 8. 
The lower and upper bounds for the secrecy rate in the SM-based VLC, subject to constraints (3)–(5) are provided by
R s 1 = max m { f l o w ( h B , m , ξ , P ) + 1 2 ln [ 6 A 2 σ E 2 π e σ B 2 ( h E , m 2 A 2 + 6 A h E , m ς E 2 σ E 2 + 12 σ E 2 ) ] + 1 2 ln ( 1 + h E , m A ς E 2 1 + h B , m A ς B 2 ) ln ( 1 + h B , m A ς B 2 ) 2 A h B , m ς B 2 + ln ( 1 + h E , m A ς E 2 ) 2 A h E , m ς E 2 } ,
R s 2 = max m { ( f l o w ( h B , m , ξ , P ) + 1 2 ( e c A 1 ) { ln ( 1 + h E , m A ς E 2 1 + h B , m A ς B 2 ) e c A e c h E , m ς E 2 [ E i ( c h E , m ς E 2 ( 1 + h E , m A ς E 2 ) ) E i ( c h E , m ς E 2 ) ] + e c h B , m ς B 2 [ E i ( c h B , m ς B 2 ( 1 + h B , m A ς B 2 ) ) E i ( c h B , m ς B 2 ) ] } 1 2 ln [ 2 π e ( h E , m 2 ( A ( c A 2 ) c ( 1 e c A ) + 2 c 2 ξ 2 P 2 ) + h E , m ξ P ς E 2 σ E 2 + σ E 2 ) ] ) c ξ P + 1 2 ln ( σ E 2 σ B 2 ( e c A 1 ) 2 c 2 ) } .
R s max m { 1 2 ln [ h E , m ς E 2 σ E 2 ( h B , m A + ς B 2 σ B 2 ) ς B 2 σ B 2 ( h E , m 2 A + h E , m 2 h B , m ς B 2 σ B 2 + M ) ] } ,

6. Secrecy-Rate Enhancement-Based Optical Jamming

The friendly jamming technique can enhance the secrecy rate of SM-based VLC systems. In standard SM, one LED out of M is active for communication while the remaining M 1 LEDs are idle. By utilizing friendly jamming, these inactive LEDs can be used to emit optical jamming signals to increase noise for eavesdroppers. Assuming Alice lacks the CSI of a passive eavesdropper, she can transmit an optical jamming signal in the null-space of the main channel, alongside the information signal. When Alice uses the m-th LED for transmission, the other M 1 LEDs can simultaneously send jamming signals without interfering with Bob’s reception. Bob receives the intended information as usual, while Eve faces interference from Alice’s jamming. However, enhancing secrecy performance necessitates deploying additional LEDs and allocating extra power for jamming, all while maintaining equal power levels. By employing singular value decomposition [38], the VLC gain of the main channel h B can be expressed as
h B T = [ λ , 0 T ] [ v s , V n ] T ,
where λ and v s represent the singular value and the right singular vector of the VLC channel gain h B , respectively. Based on (45), a null space V n = [ v s , v s ,   ·   ·   ·   ,   v M 1 ] R M × ( M 1 ) is identified, given that h B has rank ( h B ) = 1 . Consequently, the optical jamming generated by Alice is formulated as
w = V n u ,
where u is a time-varying jamming vector with elements following a real truncated Gaussian distribution [47] within the range [ A 2 M 1 ,   A 2 M 1 ] . Thus, the peak amplitude constraint for the ( M 1 ) jamming codewords is [ A 2 , + A 2 ], and for the private signal, it is A 1 . The total peak amplitude constraint for the LEDs is therefore A = A 1 + A 2 .
The total noise at Bob and Eve includes both signal-independent and signal-dependent components [11]. When the m-th LED is selected for transmission, the signals received by Bob and Eve are given as
{ Y B = h B , m X + h B , m X Z B , 1 + Z B , 0 Y E = h E , m X + h E , m X Z E , 1 + h E T w + Z E , 0 ,
where Z B , 1 ~ N ( 0 , ς B 2 σ B 2 ) and Z E , 1 ~ N ( 0 , ς E 2 ( σ E 2 + σ W 2 ) ) and σ W 2 is the noise power at Eve due to optical jamming. h E T is the VLC gain of the wiretap channel, and ( h B , m , h E , m ) are the instant channel gain between the selected m-th LED and the PD of Bob and Eve respectively.
Bob’s reception is unaffected by the optical jamming produced by w, aside from a portion of power being allocated to it. However, Eve’s reception may be significantly disrupted, enhancing Bob’s secrecy performance, as shown in the simulations.
Let Z ˇ E , 0 represent the noise experienced by Eve. According to (42), we have
Z ˇ E , 0 = h E T w + Z E , 0 = h E T V n u + Z E , 0 = i = 1 M 1 u i h E T v i + Z E , 0 ,
This represents the sum of M 1 independently distributed variables with varying variances. Finding a closed-form PDF for Z ˇ E , 0 , derived from the convolution of double-sided truncated Gaussian variables, is challenging. Therefore, we use the Lyapunov central limit theorem, which states that the sum of T independent variables approximates a Gaussian distribution as T increases. With more than ten LEDs typically used in practice, the theorem’s approximation of independent truncated Gaussian variables as Gaussian is suitable for our VLC systems. Thus, Z ˇ E , 0 is approximately Gaussian.
The Gaussian approximation simplifies the assertion that Z ˇ E , 0 has a mean of zero and a variance of
Ω E 2 = E { ( h E T i = 1 M 1 u i v i ) ( h E T j = 1 M 1 u j v j ) T } + σ E 2 = σ J 2 M 1 h E T ( i = 1 M 1 v i v i T ) h E + σ E 2 = σ J 2 M 1 h E T V n V n T h E + σ E 2 , = σ W 2 + σ E 2 ,
where σ J 2 is the power of the optical jamming. This equality is obtained based on the statistical independence of { u i } i = 1 M 1 and Z E , 0 . When optical jamming is applied, Equations (14)–(44) can be applied with σ E 2 replaced by ( σ W 2 + σ E 2 ) .

7. Scenarios with Multiple Receivers

In this section, we analyze scenarios involving multiple legitimate receivers and illegitimate receivers (adversary). For generality, we assume the presence of U legitimate receivers and V adversaries. The signals received by each legitimate receiver and adversary are expressed as follows:
{ Y B , u = h B , u , m X + h B , u , m X Z B , u , 1 + Z B , u , 0 ,       u { 1 , 2 , U } Y E , v = h E , v , m X + h E , v , m X Z E , v , 1 + Z E , v , 0 ,         v { 1 , 2 , V }
where Z B , u , 0 ~ N ( 0 , σ E , u 2 )   and   Z E , v , 0 ~ N ( 0 , σ E , v 2 ) represent the signal-independent noise at the u-th legitimate receiver and v-th adversary, respectively. Similarly, Z B , u , 1 ~ N ( 0 , ς B , u 2 σ B , u 2 ) ,   Z E , v , 1 ~ N ( 0 , ς E , v 2 σ E , v 2 ) denote the signal-dependent noise at the u-th legitimate receiver and v-th adversary, respectively.
We assume that the adversaries do not collude, meaning each processes their received signals independently. The adversary with the highest mutual information is considered the worst-case adversary. The secrecy rate R s for the u -th legitimate receiver, as defined in (6) and (25), becomes
R s , u = max f X ( x ) [ I ( X , h B , u ; Y B , u ) I ( X , h E ; Y E ) ] , where I ( X , h E ; Y E ) = max v = { 1 , 2 , V } I ( X , h E , v ; Y E , v ) .
Thus, the secrecy capacity is formulated according to problems (6) and (25). This confirms that the secrecy capacity bounds obtained in Section 3, Section 4 and Section 5 remain valid in scenarios with multiple receivers, assuming non-colluding adversaries.

8. Numerical Results

In this section, we conduct numerical analyses of the indoor SM-based VLC system’s secrecy rate. Assuming a three-node indoor VLC system with a   5   m × 4   m × 3   m room. M = 4 LEDs (Alice) are mounted on the 3 m ceiling, whereas Bob and Eve are at 0.8 m. Table 1 displays Alice and Bob’s coordinates. Bob and Eve’s noise variances are selected to be σ B 2 = σ E 2 = 1 and ς B 2 = ς E 2 = 1.5 .

8.1. SM-Based VLC with Constraints (3) and (5)

The secrecy rate bounds vs.   P with varied h B / h E when ξ = 0.3 are shown in Figure 3 for various noise conditions. Every secrecy rate bound in this figure grows as h B / h E and P increase. However, when P grows, they tend to take on more stable values. Furthermore, with signal-dependent (SD) noise, the secrecy rate bounds are lower than with signal-independent (SID) noise. This demonstrates that the presence of signal-dependent noise reduces VLC’s secrecy rate. In order to quantify the gaps between the upper (14) and lower (22) bounds of secrecy rate with signal-dependent noise in the region of high optical intensity, Table 2 is presented. All performance gaps are approximately 0.467 Nat/transmission, as may be noticed. This finding is the same as that stated in Remark 1.
Figure 4 illustrates the link between the secrecy rate bounds and ξ for varying P , with h B / h E = 1000 under various noise conditions. For small values of ξ , increasing ξ results in a swift escalation in the secrecy rate bounds. Nevertheless, as ξ increases, the secrecy rate bounds tend to stabilize. In addition, when P increases, so does the performance of the secrecy rate. This suggests that an indoor VLC system with a greater nominal optical intensity outperforms. Additionally, Figure 4 illustrates that the secrecy rate bounds with signal-dependent noise are lower than with signal-independent noise. This also demonstrates that the presence of signal-dependent noise reduces VLC’s secrecy rate.

8.2. SM-Based VLC with Constraints (3)–(5)

Figure 5 illustrates the secrecy rate bounds vs. P with varying h B / h E when A = P . Particularly, Figure 5 displays the results when ξ = 0.5 . Much like Figure 3, the secrecy rate bounds exhibit initial growth before eventually stabilizing as P rises. In addition, the secrecy rates improve when h B / h E increases. The performance disparities between the lower bound (27) and the upper bound (32) are insignificant. In order to quantify these differences at high SNR with ξ = 0.5 , refer to Table 3. Consistent with the conclusion in Remark 3, there is a performance gap of roughly 0.1765 Nat/transmission between the asymptotic lower bound and the asymptotic upper bound of secrecy rates. Figure 5 shows that signal-dependent noise has lower secrecy rate bounds than signal-independent noise. Signal-dependent noise affects VLC’s secrecy rate.

8.3. SM-Based VLC with the US, CAS, and GS Techniques

Given Alice’s position, the locations of Bob and Eve impact the effectiveness of transmitter selection techniques. To compare the performance of the US, CAS, and GS methods, the mean secrecy rate is analyzed. Bob’s position varies across the receiver plane, while Eve’s position is fixed with h B / h E   = 1000 . Using the constraints (3) and (5), Figure 6 illustrates the mean secrecy rate bounds versus P for the three transmitter selection strategies with ξ = 0.3 and h B / h E   = 1000 . The GS scheme achieves the highest secrecy rate, followed by the CAS system and the US scheme, which achieves the lowest secrecy rate. This indicates that selecting a transmitter uniformly may not be the most effective strategy in a practical SM system. The GS and CAS schemes offer significant improvements in secrecy performance compared to the US approach.
Using the constraints (3)–(5), Figure 7 illustrates the mean secrecy rate bounds versus P for the three transmitter selection strategies with ξ = 0.5 , α = 0.5 , A = P , and h B / h E   = 1000 . As with Figure 6, the GS strategy provides the highest rate of secrecy, while the US scheme yields the lowest.

8.4. SM-Based VLC with Optical Jamming

Figure 8 illustrates the effect of optical jamming on the enhancement of the secrecy rate in both signal-dependent noise and signal-independent noise scenarios at hB/hE = 100, ξ = 0.5 , and A = P . As depicted, in both signal-dependent noise and signal-independent noise scenarios without the application of optical jamming, an increase in P leads to a steady improvement in secrecy rates. However, when optical jamming is introduced, the secrecy rate shows a slower increase within a limited range of P , similar to the scenario without jamming. Notably, once P 45 dB, the introduction of AN causes the secrecy rate to rise more rapidly. This demonstrates that the use of friendly optical jamming significantly enhances the secrecy rate, especially in scenarios with high optical power, such as P 45 dB. At P = 80 dB, there is an approximate increase of 3.9 nat/transmission compared to the scenario without optical jamming in both signal-dependent noise and signal-independent noise scenarios. Furthermore, as indicated in earlier results, secrecy is more effectively enhanced using signal-independent noise compared to signal-dependent noise. Specifically, at P = 80 dB, the inclusion of signal-independent noise results in an approximate increase of 3.5 nat/transmission compared to signal-dependent noise, underscoring the detrimental impact of signal-dependent noise on the achievable secrecy rate in VLC systems.

9. Discussion

This study presents an in-depth analysis of the secrecy rate in SM-based VLC systems, focusing on the effects of signal-dependent noise and proposing new methods to enhance physical-layer security. The results demonstrate that signal-dependent noise plays a significant role in limiting the secrecy performance of VLC systems. By deriving both lower and upper bounds for the secrecy rate under non-negativity, average, and peak optical intensity constraints, we found that signal-dependent noise substantially reduces the achievable secrecy rate compared to systems with signal-independent noise. At high optical intensity levels, the bounds converge, with the performance gap remaining minimal (approximately 0.1765 nat/transmission). Numerical findings also show that employing GS technique for transmitter selection results in better secrecy performance than the CAS and US methods. Furthermore, optical jamming proves highly effective in enhancing secrecy, particularly at higher power levels.
In comparing this study with previous works, several key differences emerge. While numerous studies have investigated secrecy in VLC systems, the majority, including works referenced [11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38], primarily assumed signal-independent noise, which is an unrealistic assumption for practical VLC scenarios. In contrast, the work in [39] and [40] addressed secrecy performance in VLC systems under signal-dependent noise, providing a more realistic analysis but applied in SISO systems. Moreover, while studies in [41,42,43,44,45] explored the confidentiality of VLC in SM systems, they primarily considered signal-independent noise, which is less practical for VLC systems.
The contribution of this study lies in its focus on SM-based VLC systems, which are less frequently analyzed in the context of signal-dependent noise. The incorporation of transmitter selection techniques (US, CAS, and GS) and optical jamming represents a significant advancement. Unlike earlier research that largely overlooked these aspects, our approach integrates adaptive selection techniques and optical jamming to enhance secrecy performance, particularly in high optical power scenarios. This study also extends the analysis to a three-indoor SM-based VLC scheme, accounting for signal-dependent noise and suggesting random noise variances at both the intended user and the adversary.
Table 4 provides a clear comparison of this study with recent works, highlighting the unique contributions of our approach. The distinction lies in addressing signal-dependent noise and leveraging advanced selection techniques and optical jamming, which were not extensively explored in prior research on SM-based VLC systems.
The theoretical implications of this study are significant, as it advances the understanding of physical-layer security in VLC systems. The derived closed-form expressions for secrecy rate bounds provide a solid theoretical foundation for further exploration of SM-based VLC under signal-dependent noise. Moreover, this study extends current transmitter selection strategies by demonstrating the superior performance of the GS method, particularly in challenging noise environments. The use of optical jamming adds an innovative dimension to VLC security, offering a practical solution for enhancing secrecy, especially at high optical power levels. These contributions refine and extend existing theories on physical-layer security in VLC, providing new tools for addressing confidentiality in future wireless systems.

10. Conclusions

This study investigates the secrecy of indoor VLC systems utilizing the SM technique. The system comprises M transmitters, a receiver, and an adversary. In SM, only one transmitter is active at a time, and the US method is used to choose the active transmitter. We derive both lower and upper bounds on the secrecy rate under constraints of non-negativity and average optical intensity. Additional bounds are obtained by examining peak optical intensity. We also derive secrecy rate bounds for scenarios with only signal-independent noise by letting the signal-dependent noise variance approach zero.
When SNR is high, the performance gap between the lower and upper asymptotic bounds is minimal (approximately 0.1765 nat/transmission). Numerical findings reveal that signal-dependent noise significantly impacts the secrecy rate, which affects overall secrecy performance. Interestingly, the secrecy rate does not increase with P or A at high SNR levels; instead, it remains approximately constant. The CAS and GS schemes are employed to further enhance secrecy performance.
Furthermore, the impact of friendly optical jamming on the secrecy rate is examined. Results indicate that optical jamming significantly improves the secrecy rate at higher power levels. Specifically, at P = 80   dB , optical jamming enhances the secrecy rate by approximately 3.9 nat/transmission compared to scenarios without jamming.
In future work, we plan to delve into the analysis of the secrecy rate within VLC systems, utilizing advanced SM techniques such as generalized spatial modulation (GSM) and quadrature spatial modulation (QSM). These methodologies will be scrutinized in terms of their efficacy in enhancing the secrecy rate, juxtaposed against the conventional SM approach.

Author Contributions

Y.M.A.-M.: conceived the idea, generated the simulation results, and revised the manuscript. A.H.A.: discussed the results and revised the manuscript. M.T.A.: discussed the results and revised the manuscript. Y.A.-H.: discussed the results and revised the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the King Saud University, Riyadh, Saudi Arabia, through Researchers Supporting Project number RSPD2024R1104.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

All the data related to these findings are included in the manuscript.

Conflicts of Interest

The authors declare that they do not have any conflicts of interest regarding the publication of this article.

Appendix A

Proof of lower bound (14) in Theorem 1:
Maximizing source entropy while adhering to constraints (3) and (5) gives a secrecy rate lower bound in (13), i.e.,
max f X ( x ) ( X ) = 0 f X ( x ) ln [ f X ( x ) ] d x s . t .   0 f X ( x ) d x = 1 E ( X ) = 0 x f X ( x ) d x = ξ P .
When we apply the variational method to the input X , we obtain an optimized PDF as follows:
f X ( x ) = 1 ξ P e 1 ξ P x , x 0 .
From (A2), we can obtain
{ H ( X ) = ln ( e ξ P ) E x ( X ) = ξ P var ( X ) = ξ 2 P 2 E X , Z E , 1 ( X Z E , 1 ) = E X ( X ) E Z E , 1 ( Z E , 1 ) = 0 var ( Y E ) = h E , m 2 ξ 2 P 2 + h E , m ξ P ς E 2 σ E 2 + σ E 2
Furthermore, E x [ ln ( 1 + h E , m X ς E 2 1 + h B , m X ς B 2 ) ] can be computed as [40]
E x [ ln ( 1 + h E , m X ς E 2 1 + h B , m X ς B 2 ) ] = [ e 1 h B , m ς B 2 ξ P E i ( 1 h B , m ς B 2 ξ P ) e 1 h E , m ς E 2 ξ P E i ( 1 h E , m ς E 2 ξ P ) ] .
Theorem 1 is obtained by substituting (A3) and (A4) into (13).

Appendix B

Proof of Upper bound (22) in Theorem 2:
Based on (21), the secrecy rate is upper-bounded as
R s 1 M m = 1 M ( E X Y ` E , m { u 1 } I 1 E X Y ` E , m { u 2 } I 1 ) ,
where u 1 and u 2 are defined as follows:
u 1 = f Y ` B , m | X Y ` E , m ( y ` B , m | X , Y ` E , m ) ln [ f Y ` B , m | X Y ` E , m ( y ` B , m | X , Y ` E , m ) ] d y ` B , m , u 2 = f Y ` B , m | X Y ` E , m ( y ` B , m | X , Y ` E , m ) ln g Y ` B , m | Y ` E , m ( y ` B , m | Y ` E , m ) d y ` B , m .
I 1 in (A5) is expressed as
I 1 = [ ( Y ` B , m | X ) + ( Y ` E , m | X , Y ` B , m ) ( Y ` E , m | X ) ] ,
where ( Y ` k , m | X )   ( k = B   for   Bob   and   k = E   for   Eve ) is obtained by
( Y ` k , m | X ) = E X { 1 2 ln [ 2 π e ( 1 + h k , m X ς k 2 ) σ E 2 ] } .
The conditional PDF f Y ` E , m | X Y ` B , m ( y ` E , m | X , Y ` B , m ) is expressed as [40]
f Y ` E , m | X Y ` B , m ( y ` E , m | X , Y ` B , m ) = 1 2 π ( M X + N ) e ( y ` E , m h E , m h B , m Y ` B , m ) 2 ( M X + N ) ,
where M = h E , m 2 ς B 2 σ B 2 / h B , m + h E , m ς E 2 σ E 2 and N = h E , m 2 σ B 2 / h B , m 2 + σ E 2 . According to the conditional PDF (A9), ( Y ` E , m | X , Y ` B , m ) can be obtained as
( Y ` E , m | X , Y ` B , m ) = E X { 1 2 ln [ 2 π e ( M X + N ) ] } .
Using (A8) and (A10), I 1 in (A7) is obtained as
I 1 = 1 2 ln ( 2 π e σ B 2 σ E 2 ) 1 2 E X { 1 2 ln ( M N + N ) + ln ( 1 + h B , m X ς B 2 1 + h E , m X ς E 2 ) } ,
For I 2 in (A5) to be computed, the conditional PDF g Y ` B , m | Y ` E , m ( y ` B , m | Y ` E , m ) is selected as
g Y ` B , m | Y ` E , m ( y ` B , m | Y ` E , m ) = 1 2 s 2 e | y ` B , m μ y ` E , m | s 2 ,
where s and μ are free parameters. Using (A12), I 2 is computed:
I 2 = E X Y B , m { ln ( 2 s 2 ) + 1 s 2 R 1 } , R 1 = e ( y ` E , m h E , m h B , m Y ` B , m ) 2 2 ( M X + N ) 2 π ( M X + N ) | Y ` B , m μ y ` E , m | d y ` E , m .
Letting t = y ` E , m h E , m Y ` B , m / h B , m and utilizing the fact that | a b | | a | + | b | , R 1 in (A13) can be written as
R 1 2 | μ | M X + N 2 π + | 1 μ h E , m h B , m | | Y ` B , m | .
Using (A14), I 2 is written as
I 2 = E X { ln ( 2 s 2 ) + 1 s 2 [ 2 | μ | M X + N 2 π + | 1 μ h E , m h B , m | R 2 ] } , R 2 = e ( y ` B , m h B , m X ) 2 2 ( 1 + h B , m X ς B 2 ) σ B 2 2 π ( 1 + h B , m X ς B 2 ) σ B 2 | y ` B , m | d y ` B , m .
From the fact | a + b | | a | + | b | , R 2 is upper-bounded by
R 2 2 ( 1 + h B , m X ς B 2 ) σ B 2 2 π + h B , m X .
To obtain a tight upper bound, we initially take the partial derivative of (A15) with respect to s 2 , resulting in I 2 . The minimum point is
s 2 = 2 | μ | M X + N 2 π + | 1 μ h E , m h B , m | R 2 .
Thus, I 2 is upper-bounded by
I 2 E X { ln [ 4 e ( | μ | M X + N 2 π + | 1 μ h E , m h B , m | ( ( 1 + h B , m X ς B 2 ) σ B 2 2 π + h B , m X 2 ) ) ] } ,
Substituting (A11) and (A18), R s in (A5) can be computed in (A19). Utilizing the inequality h B , m X 2 M X + N h B , m X 2 M X = h B , m X 2 M and the inequality of Jensen for convex functions ln ( · ) and · , (A19) can be re-expressed in (A20).
R s 1 M m = 1 M { 1 2 ln ( 2 π e σ B 2 σ E 2 ) 1 2 E X [ ln ( 1 + h B , m X ς B 2 1 + h E , m X ς E 2 ) ] + E X [ ln ( 4 e ( | μ | 2 π + | 1 μ h E , m h B , m | ( ( 1 + h B , m X ς B 2 ) σ B 2 2 π ( M X + N ) + h B , m X 2 M X + N ) ) ) ] } .
R s 1 M m = 1 M { 1 2 ln ( 2 π e σ B 2 σ E 2 ) 1 2 E X [ ln ( 1 + h B , m X ς B 2 1 + h E , m X ς E 2 ) ] + E X [ ln ( 4 e ( | μ | 2 π + | 1 μ h E , m h B , m | ( E X [ ( 1 + h B , m X ς B 2 ) σ B 2 2 π ( M X + N ) ] + h B , m ξ P 2 M ) ) ) ] } ,
To satisfy illumination requirements, VLC systems operate with high optical intensity, and we are particularly focused on performance under such conditions. The optical input distribution tends to infinity as P approaches infinity [47]. Consequently, when P reaches infinity, we obtain
{ E X [ ln ( 1 + h B , m X ς B 2 1 + h E , m X ς E 2 ) ] = 1 + h B , m P ς B 2 1 + h E , m P ς E 2 E X [ ( 1 + h B , m X ς B 2 ) σ B 2 2 π ( M X + N ) ] = ( 1 + h B , m P ς B 2 ) σ B 2 2 π ( M P + N ) .
Furthermore, utilizing L’Hospital rule for (A21), we obtain
{ lim P 1 + h B , m P ς B 2 1 + h E , m P ς E 2 = h B , m ς B 2 h E , m ς E 2 lim P ( 1 + h B , m P ς B 2 ) σ B 2 2 π ( M P + N ) = h B , m ς B 2 σ B 2 2 π M .
Using (A21) and (A22), we rewrite (A20) as
R s 1 M m = 1 M { 1 2 ln ( 2 π e h B , m ς B 2 σ B 2 h E , m ς E 2 σ E 2 ) + [ ln ( 4 e ( | μ | 2 π + | 1 μ h E , m h B , m | ( h B , m ς B 2 σ B 2 2 π M + h B , m ξ P 2 M ) ) R 3 ) ] }
R 3 = μ [ 1 2 π h B , m h E , m ( h B , m ς B 2 σ B 2 2 π M + h B , m ξ P 2 M ) ] + h B , m ς B 2 σ B 2 2 π M + h B , m ξ P 2 M .
R 3 in (A23) is a function of μ . We need to find a smaller value of R 3 to obtain a tight upper constraint on secrecy capacity. Here, we will look at three scenarios: when μ 0 , R 3 h B , m ς B 2 σ B 2 2 π M + h B , m ξ P 2 M , when μ h B , m h E , m , R 3 h B , m h E , m 2 π , and when 0 μ h B , m h E , m , R 3 is obtained in (A24). If 1 2 π h B , m h E , m ( h B , m ς B 2 σ B 2 2 π M + h B , m ξ P 2 M ) , R 3 h B , m ς B 2 σ B 2 2 π M + h B , m ξ P 2 M ; otherwise R 3 h B , m h E , m 2 π .
Substituting R 3 into (A23), we obtain Theorem 2.

Appendix C

Proof of Asymptotic Behavior (24):
According to Theorem 1, f l o w ( h B , m , ξ , P ) is a monotonically declining positive function concerning h B , m , ξ , and P [47]. When P approaches infinity, we can clearly obtain [40]
{ lim P f l o w ( h B , m , ξ , P ) = ln ( h B , m ) lim P [ e 1 h B , m ς B 2 ξ P E i ( 1 h B , m ς B 2 ξ P ) e 1 h E , m ς E 2 ξ P E i ( 1 h E , m ς E 2 ξ P ) ] = h E , m ς E 2 h B , m ς B 2                                                                                                                   .
We obtain an asymptotic lower bound by putting (A25) into Theorem 1 as
lim P R s 1 2 ln ( e 2 π ) + 1 2 M m = 1 M ln ( h B , m ς E 2 σ E 2 h E , m ς B 2 σ B 2 ) .
With respect to the asymptotic upper bound, when P approaches infinity, we do not encounter the condition of 1 2 π h E , m h B , m ( h B , m ς B 2 σ B 2 2 π M + h B , m 2 ξ P M ) . The asymptote upper bound can be obtained as
lim P R s 1 2 ln ( 4 e π 2 ) + 1 2 M m = 1 M ln ( h B , m ς E 2 σ E 2 h E , m ς B 2 σ B 2 ) .

Appendix D

Proof of Lower bound (27) in Theorem 3:
Corresponding to (A.1), the functional optimization problem is
max f X ( x ) ( X ) = 0 A f X ( x ) ln [ f X ( x ) ] d x s . t .   0 A f X ( x ) d x = 1 E ( X ) = 0 A x f X ( x ) d x = ξ P .
By employing the variational method, we can determine the input PDF as [11]
f X ( x ) = e c x + b 1 ,
where c and b are free parameters. When c = 0 , replacing the constraints in (A28) with the expression from (A29) yields [11]
f X ( x ) = 1 A ,   x [ 0 , A ]
In this case, E X ( X ) = A 2 = ξ P . When α = 0.5 , we can obtain ( X ) = ln ( A ) and var ( Y ` E , m ) = h E , m 2 A 2 12 + A 2 h E , m ς E 2 σ E 2 + σ E 2 . Furthermore, E x [ ln ( 1 + h E , m X ς E 2 1 + h B , m X ς B 2 ) ] in (13) can be obtained as [40]
E x [ ln ( 1 + h E , m X ς E 2 1 + h B , m X ς B 2 ) ] = ln ( 1 + h E , m A ς E 2 1 + h B , m A ς B 2 ) ln ( 1 + h B , m A ς B 2 ) A h B , m ς B 2 + ln ( 1 + h E , m A ς E 2 ) A h E , m ς E 2 .
Then, we substitute ( X ) , var ( Y E , m ) , and (A31) into (13), the lower bound is obtained for α = 0.5 .
When c 0 , we have α 0.5 , Replacing the constraints in (A28) with the expression from (A29) yields [11]
f X ( x ) = c e c x e c A 1 ,   x [ 0 , A ]
where c is the solution to (30). Therefore, we obtain ( X ) = ln ( e c A 1 c ) c ξ P . Then, we obtain (A33) and (A34) as
var ( Y E , m ) = h E , m 2 [ A ( c A 2 ) c ( 1 e c A ) + 2 c 2 ξ 2 P 2 ] + h E , m ξ P ς E 2 σ E 2 + σ E 2 .
E x [ ln ( 1 + h E , m X ς E 2 1 + h B , m X ς B 2 ) ] = 1 e c A 1 { ln ( 1 + h E , m A ς E 2 1 + h B , m A ς B 2 ) e c A e c h E , m ς E 2 [ E i ( c ( 1 + h E , m A ς E 2 ) h E , m ς E 2 ) E i ( c h E , m ς E 2 ) ] + e c h B , m ς B 2 i ( c ( 1 + h B , m A ς B 2 ) h B , m ς B 2 ) E i ( c h B , m ς B 2 ) } .
Substituting ( X ) , (A33) and (A34) into (13), the lower bound is obtained for α 0.5 .

Appendix E

Proof of Upper bound (32) in Theorem 4:
In this case, (A5) and (A6) hold; therefore I 1 can be represented as (A11). For I 2 , we choose g Y ` B , m | Y ` E , m in (A6) as [40]
g Y ` B , m | Y ` E , m = 1 2 π s 2 e ( y ` B , m μ y ` B , m ) 2 2 s 2 ,
where μ and s represent two free parameters. Subsequently, I 2 is written as
I 2 = E X Y ` B , m { 1 2 ln ( 2 π s 2 ) + 1 2 s 2 e ( y ` E , m h E , m h B , m Y ` B , m ) 2 2 ( M X + N ) 2 π ( M X + N ) ( Y ` B , m μ y ` E , m ) 2 d y ` E , m R 4 } ,
where R 4 can be written as
R 4 = ( 1 μ h E , m h B , m ) 2 Y ` B , m 2 + μ 2 ( M X + N ) .
Then, we substitute R 4 in (A36); I 2 is written in (A38). The inequality holds because X A .
I 2 E X { 1 2 ln ( 2 π s 2 ) + 1 2 s 2 [ ( 1 μ h E , m h B , m ) 2 ( h B , m 2 A X + h B , m X ς B 2 σ B 2 + σ B 2 ) + μ 2 ( M X + N ) ] R 5 }
Using the first partial derivative of R 5 in (A38) with s 2 and setting it to zero, we can find the minimum point as
s 2 = ( 1 μ h E , m h B , m ) 2 ( h B , m 2 A X + h B , m X ς B 2 σ B 2 + σ B 2 ) + μ 2 ( M X + N ) .
By substituting (A39) into (A38), R 5 can be obtained as
R 5 = 1 2 ln { 2 π e [ ( 1 μ h E , m h B , m ) 2 ( h B , m 2 A X + h B , m X ς B 2 σ B 2 + σ B 2 ) + μ 2 ( M X + N ) ] } .
Putting (A11), (A38) and (A40) into (A5) and utilizing Jensen’s inequality for ln ( · ) gives us the upper bound as
R s 1 2 M m = 1 M { ln ( 2 π e σ B 2 σ E 2 ) 1 2 ln [ E X ( 1 + h B , m X ς B 2 1 + h E , m X ς E 2 ) ] + 1 2 ln [ 2 π e ( 1 μ h E , m h B , m ) 2 E X ( h B , m 2 A X + h B , m X ς B 2 σ B 2 + σ B 2 M X + N ) + μ 2 ] } .
We are primarily concerned with the performance at high optical intensities. As A approaches infinity, the input PDF secrecy rate will also reach infinite [47]. Consequently, when A approaches infinity, we obtain
{ E X [ ln ( 1 + h B , m X ς B 2 1 + h E , m X ς E 2 ) ] = 1 + h B , m A ς B 2 1 + h E , m A ς E 2 E X [ h B , m 2 A X + h B , m X ς B 2 σ B 2 + σ B 2 M X + N ] = h B , m 2 A 2 + h B , m A ς B 2 σ B 2 + σ B 2 M X + N .
Utilizing L’Hospital’s rule, we obtain
{ lim A 1 + h B , m A ς B 2 1 + h E , m A ς E 2 = h B , m ς B 2 h E , m ς E 2 lim A h B , m 2 A 2 + h B , m A ς B 2 σ B 2 + σ B 2 M X + N = h B , m 2 A + h B , m ς B 2 σ B 2 M
In accordance with (A41)–(A43), the upper bound can be asymptotically obtained as
R s 1 2 M m = 1 M { ln ( 2 π e h B , m ς B 2 σ B 2 h E , m ς E 2 σ E 2 ) + 1 2 ln [ 2 π e ( ( 1 μ h E , m h B , m ) 2 h B , m 2 A + h B , m ς B 2 σ B 2 M + μ 2 ) R 6 ] } ,
Using the first partial derivative of R 6 regarding μ and setting it to 0, (A45) is obtained. Putting (A45) into (A44), we obtain (32).
μ = h E , m h B , m h B , m 2 A + h B , m ς B 2 σ B 2 M 1 + ( h E , m h B , m ) 2 h B , m 2 A + h B , m ς B 2 σ B 2 M .

Appendix F

Proof of Upper bound (34) in Corollary 6:
The ratio of the average to the maximum optical intensity, α ( 0 , 1 ] , is a constant that is always positive, and α A   =   ξ P . When A approaches closer and closer to infinity, so does P . When α = 0.5 , we have [40]
lim A f l o w ( h B , m , ξ , P ) = lim P f l o w ( h B , m , ξ , P ) = ln ( h B , m ) .
Utilizing L’Hospital’s rule, we obtain
{ lim A 1 2 ln ( 1 + h E , m A ς E 2 1 + h B , m A ς B 2 ) A = 1 2 ln ( h E , m ς E 2 h B , m ς B 2 ) lim A ln ( 1 + h B , m A ς B 2 ) 2 A h B , m ς B 2 = 0 lim A ln ( 1 + h E , m A ς E 2 ) 2 A h E , m ς E 2 = 0 lim A 1 2 ln ( 6 A 2 σ B 2 π e σ B 2 ( h E , m 2 A 2 h E , m ς E 2 σ E 2 + 12 σ E 2 ) ) = 1 2 ln ( 6 σ E 2 π e σ B 2 h E , m 2 ) . .
Based on (A46) and (A47), the asymptotic lower bound is computed when α = 0.5   as
lim A R s 1 2 M m = 1 M ln ( 6 h B , m ς E 2 σ E 2 π e h E , m ς B 2 σ B 2 ) .
When α 0.5 , (A46) can also be obtained. Based on (A34)–(A43), we have
lim A 1 2 ( e c A 1 ) { ln ( 1 + h E , m A ς E 2 1 + h B , m A ς B 2 ) e c A e c h E , m ς E 2 [ E i ( c ( 1 + h E , m A ς E 2 ) h E , m ς E 2 ) E i ( c h E , m ς E 2 ) ] + e c h B , m ς B 2 i ( c ( 1 + h B , m A ς B 2 ) h B , m ς B 2 ) E i ( c h B , m ς B 2 ) } = 1 2 ln ( h E , m ς E 2 h B , m ς B 2 ) .
Thus, we attain the asymptotic lower bound when α 0.5 as
lim A R s 1 2 M m = 1 M ln [ h B , m h E , m ς E 2 σ E 2 ( e c A 1 ) 2 2 π e c 2 ς B 2 σ B 2 e 2 e ξ P [ h E , m 2 ( A ( c A 2 ) c ( 1 e c A ) + 2 c 2 ξ 2 P 2 ) + h E , m ξ P ς E 2 σ E 2 + σ E 2 ] ] .
We obtain the asymptotic upper bound as
lim A R s 1 2 M m = 1 M ln ( h B , m ς E 2 σ E 2 h E , m ς B 2 σ B 2 ) .
Based on (A48), (A50) and (A51), Corollary 6 is verified.

References

  1. Matthaiou, M.; Yurduseven, O.; Ngo, H.Q.; Morales-Jimenez, D.; Cotton, S.L.; Fusco, V.F. The Road to 6G: Ten Physical Layer Challenges for Communications Engineers. IEEE Commun. Mag. 2021, 59, 64–69. [Google Scholar] [CrossRef]
  2. Ishikawa, N.; Sugiura, S.; Hanzo, L. 50 Years of Permutation, Spatial and Index Modulation: From Classic RF to Visible Light Communications and Data Storage. IEEE Commun. Surv. Tutor. 2018, 20, 1905–1938. [Google Scholar] [CrossRef]
  3. Di Renzo, M.; Haas, H.; Ghrayeb, A.; Sugiura, S.; Hanzo, L. Spatial Modulation for Generalized MIMO: Challenges, Opportunities, and Implementation. Proc. IEEE 2014, 102, 56–103. [Google Scholar] [CrossRef]
  4. Yang, P.; Di Renzo, M.; Xiao, Y.; Li, S.; Hanzo, L. Design Guidelines for Spatial Modulation. IEEE Commun. Surv. Tutor. 2014, 17, 6–25. [Google Scholar] [CrossRef]
  5. Wen, M.; Zheng, B.; Kim, K.J.; Di Renzo, M.; Tsiftsis, T.A.; Chen, K.-C.; Al-Dhahir, N. A Survey on Spatial Modulation in Emerging Wireless Systems: Research Progresses and Applications. IEEE J. Sel. Areas Commun. 2019, 37, 1949–1972. [Google Scholar] [CrossRef]
  6. Li, J.; Dang, S.; Wen, M.; Li, Q.; Chen, Y.; Huang, Y.; Shang, W. Index Modulation Multiple Access for 6G Communications: Principles, Applications, and Challenges. IEEE Netw. 2023, 37, 52–60. [Google Scholar] [CrossRef]
  7. Al-Moliki, Y.M.; Alresheedi, M.T.; Abas, A.F.; Mahdi, M.A.; Khoon, N.E. OFDM-Based Time-Domain Optical MIMO with General-Numbered LED Configurations. Opt. Quantum Electron. 2023, 55, 1093. [Google Scholar] [CrossRef]
  8. Rohner, S.; Raza, D.; Puccinelli, D.; Voigt, T. Security in Visible Light Communication: Novel Challenges and Opportunities. Sens. Transducers 2015, 192, 9–15. [Google Scholar]
  9. Blinowski, G. Security Issues in Visible Light Communication Systems. In Proceedings of the 13th IFAC and IEEE Conference on Programming Devices and Embedded Systems, Cracow, Poland, 13–15 May 2015; Elsevier Science Direct: Amsterdam, The Netherlands, 2015; Volume 48, pp. 234–239. [Google Scholar]
  10. Hamamreh, J.M.; Furqan, H.M.; Arslan, H. Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey. IEEE Commun. Surveys Tutor. 2019, 21, 1773–1828. [Google Scholar] [CrossRef]
  11. Wang, J.; Liu, C.; Wang, J.; Wu, Y.; Lin, M.; Cheng, J. Physical-Layer Security for Indoor Visible Light Communications: Secrecy Capacity Analysis. IEEE Trans. Commun. 2018, 66, 6423–6436. [Google Scholar] [CrossRef]
  12. Che, Z.; Fang, J.; Jiang, Z.L.; Li, J.; Zhao, S.; Zhong, Y.; Chen, Z. A Physical-Layer Secure Coding Scheme for Indoor Visible Light Communication Based on Polar Codes. IEEE Photon. J. 2018, 10, 7907313. [Google Scholar] [CrossRef]
  13. Chen, J.; Shu, T. Statistical Modeling and Analysis on the Confidentiality of Indoor VLC Systems. IEEE Trans. Wirel. Commun. 2020, 19, 4744–4757. [Google Scholar] [CrossRef]
  14. Kumar, P.; Garg, A.; Gupta, A. PLS Analysis in an Indoor Heterogeneous VLC/RF Network Based on Known and Unknown CSI. IEEE Syst. J. 2021, 15, 68–76. [Google Scholar] [CrossRef]
  15. Pham, T.V.; Pham, A.T. On the Secrecy Sum-Rate of MU-VLC Broadcast Systems with Confidential Messages. In Proceedings of the 10th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), Prague, Czech Republic, 20–22 July 2016; IEEE: New York, NY, USA, 2016; pp. 1–6. [Google Scholar]
  16. Yin, L.; Haas, H. Physical-Layer Security in Multiuser Visible Light Communication Networks. IEEE J. Sel. Areas Commun. 2018, 36, 162–174. [Google Scholar] [CrossRef]
  17. Zhao, X.; Chen, H.; Sun, J. On Physical-Layer Security in Multiuser Visible Light Communication Systems with Non-Orthogonal Multiple Access. IEEE Access 2018, 6, 34004–34017. [Google Scholar] [CrossRef]
  18. Su, N.; Panayirci, E.; Koca, M.; Yesilkaya, A.; Poor, H.V.; Haas, H. Physical Layer Security for Multi-User MIMO Visible Light Communication Systems with Generalized Space Shift Keying. IEEE Trans. Commun. 2021, 69, 2585–2598. [Google Scholar] [CrossRef]
  19. Pan, G.; Ye, J.; Ding, Z. On Secure VLC Systems With Spatially Random Terminals. IEEE Commun. Lett. 2017, 21, 492–495. [Google Scholar] [CrossRef]
  20. Ma, S.; Dong, Z.-L.; Li, H.; Lu, Z.; Li, S. Optimal and Robust Secure Beamformer for Indoor MISO Visible Light Communication. J. Light. Technol. 2016, 34, 4988–4998. [Google Scholar] [CrossRef]
  21. Mostafa, A.; Lampe, L. Optimal and Robust Beamforming for Secure Transmission in MISO Visible-Light Communication Links. IEEE Trans. Signal Process. 2016, 64, 6501–6516. [Google Scholar] [CrossRef]
  22. Arfaoui, M.A.; Rezki, Z.; Ghrayeb, A.; Alouini, M.S. On the Input Distribution and Optimal Beamforming for the MISO VLC Wiretap Channel. In Proceedings of the IEEE Global Conference on Signal and Information Processing (GlobalSIP), Washington, DC, USA, 7–9 December 2016; IEEE: New York, NY, USA, 2016; pp. 970–974. [Google Scholar]
  23. Arfaoui, M.A.; Rezki, Z.; Ghrayeb, A.; Alouini, M.S. On the Secrecy Capacity of MISO Visible Light Communication Channels. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; IEEE: New York, NY, USA; pp. 1–7. [Google Scholar]
  24. Mostafa, A.; Lampe, L. Physical-Layer Security for MISO Visible Light Communication Channels. IEEE J. Sel. Areas Commun. 2015, 33, 1806–1818. [Google Scholar] [CrossRef]
  25. Wang, J.-Y.; Yu, Y.-C.; Lu, D.-S.; Su, D.-P. Secure Beamforming for MISO Visible Light Communications with ISI and NLoS Components. IEEE Wirel. Commun. Lett. 2024, 13, 908–912. [Google Scholar] [CrossRef]
  26. Mostafa, A.; Lampe, L. Securing Visible Light Communications via Friendly Jamming. In Proceedings of the IEEE Globecom Workshops (GC Wkshps), Austin, TX, USA, 8–12 December 2014; IEEE: New York, NY, USA; pp. 524–529. [Google Scholar]
  27. Zaid, H.; Rezki, Z.; Chaaban, A.; Alouini, M.S. Improved Achievable Secrecy Rate of Visible Light Communication with Cooperative Jamming. In Proceedings of the IEEE Global Conference on Signal and Information Processing (GlobalSIP), Orlando, FL, USA, 4–16 December 2015; IEEE: New York, NY, USA; pp. 1165–1169. [Google Scholar]
  28. Pham, T.V.; Hayashi, T.; Pham, A.T. Artificial-Noise-Aided Precoding Design for Multi-User Visible Light Communication Channels. IEEE Access 2019, 7, 3767–3777. [Google Scholar] [CrossRef]
  29. Pham, T.V.; Pham, A.T. Energy Efficient Artificial Noise-Aided Precoding Designs for Secured Visible Light Communication Systems. IEEE Trans. Wirel. Commun. 2021, 20, 653–666. [Google Scholar] [CrossRef]
  30. Wang, J.-Y.; Hong, L.-H.; Liu, N.; Yang, H.-N.; Feng, P.; Ren, J. Secrecy Analysis and Optimization for IRMA- and Jammer-Aided Visible Light Communications. IEEE Wirel. Commun. Lett. 2024, 13, 1908–1912. [Google Scholar] [CrossRef]
  31. Pham, T.V.; Pham, A.T.; Ishihara, S. Design of Energy-Efficient Artificial Noise for Physical Layer Security in Visible Light Communications. IEEE Trans. Green Commun. Netw. 2024, 8, 741–755. [Google Scholar] [CrossRef]
  32. Shen, H.; Deng, Y.; Xu, W.; Zhao, C. Secrecy-Oriented Transmitter Optimization for Visible Light Communication Systems. IEEE Photon. J. 2016, 8, 7905914. [Google Scholar] [CrossRef]
  33. Cho, S.; Chen, G.; Coon, J.P. Enhancement of Physical Layer Security with Simultaneous Beamforming and Jamming for Visible Light Communication Systems. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2633–2648. [Google Scholar] [CrossRef]
  34. Mukherjee, P. Secret-Key Agreement for Security in Multi-Emitter Visible Light Communication Systems. IEEE Commun. Lett. 2016, 20, 1361–1364. [Google Scholar] [CrossRef]
  35. Al-Moliki, Y.M.; Alresheedi, M.T.; Al-Harthi, Y. Improving Availability and Confidentiality via Hyperchaotic Baseband Frequency Hopping Based on Optical OFDM in VLC Networks. IEEE Access 2020, 8, 125013–125028. [Google Scholar] [CrossRef]
  36. Al-Moliki, Y.M.; Alresheedi, M.T.; Al-Harthi, Y. Design of Physical Layer Key Generation Encryption Method Using ACO-OFDM in VLC Networks. IEICE Trans. Commun. 2020, E103.B, 969–978. [Google Scholar] [CrossRef]
  37. Al-Moliki, Y.M.; Alresheedi, M.T.; Al-Harthi, Y.; Alqahtani, A.H. Robust Lightweight Channel-Independent OFDM-Based Encryption Method for VLC-IoT Networks. IEEE Internet Things J. 2022, 9, 4661–4676. [Google Scholar] [CrossRef]
  38. Alresheedi, M.T.; Al-Moliki, Y.M.; Al-Harthi, Y.; Alqahtani, A.H. Dynamic Hyperchaotic Key Generation Using Optical Orthogonal Frequency Division Multiplexing-Based Visible Light Communication Networks. IEEJ Trans. Elec. Electron. Eng. 2022, 17, 695–704. [Google Scholar] [CrossRef]
  39. Soltani, M.; Rezki, Z. Optical Wiretap Channel with Input-Dependent Gaussian Noise under Peak-and Average-Intensity Constraints. IEEE Trans. Inf. Theory 2018, 64, 6878–6893. [Google Scholar] [CrossRef]
  40. Wang, J.-Y.; Yu, P.F.; Fu, X.T.; Wang, J.B.; Lin, M.; Cheng, J.; Alouini, M.S. Secrecy-Capacity Bounds for Visible Light Communications with Signal-Dependent Noise. IEEE Trans. Wirel. Commun. 2023, 22, 7227–7242. [Google Scholar] [CrossRef]
  41. Li, H.; Wang, F.; Zhang, J.; Liu, C. Secrecy Performance Analysis of MISO Visible Light Communication Systems with Spatial Modulation. Digit. Signal Process. 2018, 81, 116–128. [Google Scholar] [CrossRef]
  42. Wang, F.; Li, R.; Zhang, J.; Shi, S.; Liu, C. Enhancing the Secrecy Performance of the Spatial Modulation Aided VLC Systems with Optical Jamming. Signal Process. 2019, 157, 288–302. [Google Scholar] [CrossRef]
  43. Ge, H.; Dai, J.; Huang, B.; Wang, J. Secrecy Rate Analysis for Visible Light Communications Using Spatial Modulation. In Proceedings of the IEEE 21st International Conference on High Performance Computing and Communications (HPCC), Zhangjiajie, China, 10–12 August 2019; IEEE: New York, NY, USA, 2019; pp. 1241–1248. [Google Scholar]
  44. Wang, J.-Y.; Ge, H.; Lin, M.; Wang, J.-B.; Dai, J.; Alouini, M.-S. On the Secrecy Rate of Spatial Modulation-Based Indoor Visible Light Communications. IEEE J. Sel. Areas Commun. 2019, 37, 2087–2101. [Google Scholar] [CrossRef]
  45. Al-Moliki, Y.M.; Alresheedi, M.T.; Al-Harthi, Y.; Alqahtani, A.H. Channel-Independent Quantum Mapping-Substitution OFDM-Based Spatial Modulation for Physical-Layer Encryption in VLC Networks. Veh. Commun. 2024, 45, 100706. [Google Scholar] [CrossRef]
  46. Cover, T.; Thomas, J. Elements of Information Theory, 2nd ed.; Wiley: Hoboken, NJ, USA, 2006. [Google Scholar]
  47. Moser, S.M. Capacity Results of an Optical Intensity Channel with Input-Dependent Gaussian Noise. IEEE Trans. Inf. Theory 2012, 58, 207–223. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Photonics 11 00934 g001
Figure 2. The SM schematic in VLC.
Figure 2. The SM schematic in VLC.
Photonics 11 00934 g002
Figure 3. Secrecy rate bounds vs. P for varying h B / h E and ξ = 0.3 .
Figure 3. Secrecy rate bounds vs. P for varying h B / h E and ξ = 0.3 .
Photonics 11 00934 g003
Figure 4. Secrecy rate bounds vs. ξ for varying P and h B / h E = 1000 .
Figure 4. Secrecy rate bounds vs. ξ for varying P and h B / h E = 1000 .
Photonics 11 00934 g004
Figure 5. Secrecy rate bounds vs. A for varying h B / h E when ξ = 0.5 , α = 0.5 , and A = P .
Figure 5. Secrecy rate bounds vs. A for varying h B / h E when ξ = 0.5 , α = 0.5 , and A = P .
Photonics 11 00934 g005
Figure 6. Secrecy rate bounds vs. P with h B / h E = 1000 and ξ = 0.3 .
Figure 6. Secrecy rate bounds vs. P with h B / h E = 1000 and ξ = 0.3 .
Photonics 11 00934 g006
Figure 7. Secrecy rate bounds vs. A with h B / h E = 1000 when ξ = 0.5 , α = 0.5 , and A = P .
Figure 7. Secrecy rate bounds vs. A with h B / h E = 1000 when ξ = 0.5 , α = 0.5 , and A = P .
Photonics 11 00934 g007
Figure 8. Secrecy rate bounds with/without optical jamming vs. A , h B / h E = 100 , ξ = 0.5 ,     A = P .
Figure 8. Secrecy rate bounds with/without optical jamming vs. A , h B / h E = 100 , ξ = 0.5 ,     A = P .
Photonics 11 00934 g008
Table 1. Location of Alice and Bob.
Table 1. Location of Alice and Bob.
AliceBob
Locations ( 1.8 , 1.8 , 3 ) ,   ( 2.2 , 1.8 , 3 ) ,
( 1.8 , 2.2 , 3 ) ,   ( 2.2 , 2.2 , 3 )
( 1.95 , 1.95 , 0.75 )
Table 2. Performance gaps between (14) and (22) at high SNR.
Table 2. Performance gaps between (14) and (22) at high SNR.
P (dB) h B / h E = 10 h B / h E = 1000
650.4680.467
700.4670.467
750.4670.4672
Table 3. Performance gaps between (27) and (32) at high SNR.
Table 3. Performance gaps between (27) and (32) at high SNR.
P (dB) h B / h E = 10 h B / h E = 1000
650.17650.1765
700.17650.1765
750.17650.1765
Table 4. Comparison of the recent works.
Table 4. Comparison of the recent works.
ReferencesNoise AssumptionSecrecy Rate BoundsSelection TechniquesOptical JammingMain Contribution
[11,12,13,14]Signal-independentDerived for SISO VLCNoneNot consideredTight upper and lower bounds for secrecy capacity in SISO systems
[15,16,17,18,19]Signal-independentSecrecy sum rates, 3D networksNot specifiedNot consideredPhysical-layer security in multi-user VLC networks
[20,21,22,23,24,25]Signal-independentSecrecy rate under secure beamformingNot specifiedNot consideredSecure beamforming in MISO VLC under CSI constraints
[26,27,28,29,30,31]Signal-independentSecrecy rate maximization using jammingNot specifiedJamming usedJamming and AN-aided precoding to improve secrecy
[32,33]Signal-independentSecrecy rate under secure beamforming and jammingNot specifiedJamming usedSecure beamforming in MISO VLC under CSI constraints
[34,35,36,37,38]Signal-independentSecret-key derivationNot specifiedNot consideredKey generation from physical-layer signals
[39,40]Signal-dependentSecrecy performance in SISO VLCNot specifiedJamming usedInvestigate the secrecy rate for SISO VLC under signal-dependent noise
[41]Signal-independentSecrecy rate bounds in SM VLCNot specifiedNot consideredInvestigate the secrecy rate for SM-based VLC systems
[42]Signal-independentSecrecy rate bounds in SM VLCNot specifiedJamming usedOptical jamming scheme for enhancing secrecy in SM-VLC systems
[43,44]Signal-independentSecrecy rate bounds in SM VLCUS, CAS, GSNot consideredImprove secrecy rate for SM-VLC using transmitter selection
This workSignal-dependentSecrecy rate bounds in SM VLCUS, CAS, GSJamming usedImprove secrecy rate for SM-VLC using transmitter selection and optical jamming under signal-dependent noise
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Al-Moliki, Y.M.; Alqahtani, A.H.; Alresheedi, M.T.; Al-Harthi, Y. Secrecy Rate Bounds in Spatial Modulation-Based Visible Light Communications under Signal-Dependent Noise Conditions. Photonics 2024, 11, 934. https://doi.org/10.3390/photonics11100934

AMA Style

Al-Moliki YM, Alqahtani AH, Alresheedi MT, Al-Harthi Y. Secrecy Rate Bounds in Spatial Modulation-Based Visible Light Communications under Signal-Dependent Noise Conditions. Photonics. 2024; 11(10):934. https://doi.org/10.3390/photonics11100934

Chicago/Turabian Style

Al-Moliki, Yahya M., Ali H. Alqahtani, Mohammed T. Alresheedi, and Yahya Al-Harthi. 2024. "Secrecy Rate Bounds in Spatial Modulation-Based Visible Light Communications under Signal-Dependent Noise Conditions" Photonics 11, no. 10: 934. https://doi.org/10.3390/photonics11100934

APA Style

Al-Moliki, Y. M., Alqahtani, A. H., Alresheedi, M. T., & Al-Harthi, Y. (2024). Secrecy Rate Bounds in Spatial Modulation-Based Visible Light Communications under Signal-Dependent Noise Conditions. Photonics, 11(10), 934. https://doi.org/10.3390/photonics11100934

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop