Top Banner
1 Physical-Layer Security for MISO Visible Light Communication Channels Ayman Mostafa, Student Member, IEEE, and Lutz Lampe, Senior Member, IEEE Abstract—This paper considers improving the confidentiality of visible light communication (VLC) links within the framework of physical-layer security. We study a VLC scenario with one transmitter, one legitimate receiver, and one eavesdropper. The transmitter has multiple light sources, while the legitimate and unauthorized receivers have a single photodetector, each. We characterize secrecy rates achievable via transmit beamforming over the multiple-input, single-output (MISO) VLC wiretap channel. For VLC systems, intensity modulation (IM) via light- emitting diodes (LEDs) is the most practical transmission scheme. Because of the limited dynamic range of typical LEDs, the modulating signal must satisfy certain amplitude constraints. Hence, we begin with deriving lower and upper bounds on the secrecy capacity of the scalar Gaussian wiretap channel subject to amplitude constraints. Then, we utilize beamforming to obtain a closed-form secrecy rate expression for the MISO wiretap channel. Finally, we propose a robust beamforming scheme to consider the scenario wherein information about the eavesdropper’s channel is imperfect due to location uncertainty. A typical application of the proposed scheme is to secure the communication link when the eavesdropper is expected to exist within a specified area. The performance is measured in terms of the worst-case secrecy rate guaranteed under all admissible realizations of the eavesdropper’s channel. Index Terms—Visible light communication, intensity modula- tion, amplitude constraint, physical-layer security, secrecy capac- ity bounds, MISO wiretap VLC channel, robust beamforming, worst-case secrecy rate. I. I NTRODUCTION V ISIBLE light communication (VLC) is an enabling technology that exploits the lighting infrastructure for short-range wireless communication links. The IEEE 802.15.7 standard, released in 2011 [1], was a major step towards the commercialization and widespread deployment of VLC net- works. VLC links benefit from the license-free light spectrum, immunity to radio frequency (RF) interference, and the use of inexpensive light-emitting diodes (LEDs) and photodiodes (PDs) for up- and down-conversion, respectively. In addition, VLC systems can be piggybacked on the existing lighting infrastructure where legacy incandescent light bulbs and flu- orescent lamps are being replaced by LED-based luminaires with increased lifetime, reduced energy consumption, higher luminous efficacy, and pleasant user experience [2]. Moreover, Manuscript received May 28, 2014; revised November 10, 2014 and March 19, 2015; accepted April 10, 2015. This work was supported by the Natural Sciences and Engineering Research Council of Canada (NSERC). The material in this paper was presented in part at the 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, June 2014. A. Mostafa and L. Lampe are with the Department of Electrical and Computer Engineering, The University of British Colombia, Vancouver, BC, V6T 1Z4, Canada (e-mail: {amostafa,lampe}@ece.ubc.ca). due to line-of-sight (LoS) propagation and confinement of light waves by opaque surfaces, VLC links cause limited or no inter- network interference. Such advantages qualify VLC links for realizing small-size cells, often referred to as “atto-cells”, in fifth generation (5G) networks with coverage ranges on the order of a few meters. With the unprecedented increase in traffic volumes over wireless networks, data privacy and confidentiality are becom- ing a major concern for users as well as network administra- tors. Typical security mechanisms are implemented at upper layers of the network stack via access control, password pro- tection, and end-to-end encryption. Such schemes are deemed to be secure as long as the storage capacity and computational power of potential eavesdroppers remain within certain limits. During the past few years, however, physical-layer security has emerged as a promising research area to complement conven- tional encryption techniques and provide a first line of defense against eavesdropping attacks. Physical-layer security refers to the techniques which exploit the channel characteristics in order to hide information from unauthorized receivers, without reliance on upper-layer encryption [3]–[9]. The fundamental idea behind physical-layer security is to sacrifice a fraction of the communication rate, that otherwise would be used for data transmission, in order to confuse potential eavesdroppers and diminish their capability to infer information, via carefully- designed signaling and/or coding schemes. The framework of information-theoretic security was pio- neered by Shannon [10] who proposed a cipher system to achieve perfect secrecy over noiseless channels intercepted by unauthorized users. Almost two decades later, Wyner [11] considered secure transmission over noisy channels via the wiretap channel model. In addition, he proposed a fundamental information-theoretic security measure, termed as the secrecy capacity. Wyner proved that the secrecy capacity is non- zero as long as the eavesdropper’s channel is degraded with respect to (w.r.t.) the receiver’s channel, regardless of the decoding technology or computational power available to the eavesdropper. Motivated by Wyner’s work, information theoreticians con- sidered characterizing the secrecy performance of a variety of channel models. In [12], the secrecy capacity of the scalar, i.e., single-input, single-output (SISO), Gaussian wiretap channel was obtained as the difference between the channel capacities of the source-destination and source-eavesdropper links. A single-letter characterization of the secrecy capacity of the non-degraded wiretap channel was obtained by Csisz´ ar and orner in [13]. However, their expression involves stochastic mapping and maximization over an auxiliary random variable This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/10.1109/MCOM.2015.71582855 Copyright (c) 2015 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].
13

Physical-Layer Security for MISO Visible Light ...lampe/Preprints/2015-VLC-Physical-Layer... · 1 Physical-Layer Security for MISO Visible Light Communication Channels Ayman Mostafa,

Mar 26, 2018

Download

Documents

duongtuyen
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Physical-Layer Security for MISO Visible Light ...lampe/Preprints/2015-VLC-Physical-Layer... · 1 Physical-Layer Security for MISO Visible Light Communication Channels Ayman Mostafa,

1

Physical-Layer Security for MISO Visible LightCommunication Channels

Ayman Mostafa, Student Member, IEEE, and Lutz Lampe, Senior Member, IEEE

Abstract—This paper considers improving the confidentialityof visible light communication (VLC) links within the frameworkof physical-layer security. We study a VLC scenario with onetransmitter, one legitimate receiver, and one eavesdropper. Thetransmitter has multiple light sources, while the legitimate andunauthorized receivers have a single photodetector, each. Wecharacterize secrecy rates achievable via transmit beamformingover the multiple-input, single-output (MISO) VLC wiretapchannel. For VLC systems, intensity modulation (IM) via light-emitting diodes (LEDs) is the most practical transmission scheme.Because of the limited dynamic range of typical LEDs, themodulating signal must satisfy certain amplitude constraints.Hence, we begin with deriving lower and upper bounds onthe secrecy capacity of the scalar Gaussian wiretap channelsubject to amplitude constraints. Then, we utilize beamformingto obtain a closed-form secrecy rate expression for the MISOwiretap channel. Finally, we propose a robust beamformingscheme to consider the scenario wherein information about theeavesdropper’s channel is imperfect due to location uncertainty.A typical application of the proposed scheme is to secure thecommunication link when the eavesdropper is expected to existwithin a specified area. The performance is measured in termsof the worst-case secrecy rate guaranteed under all admissiblerealizations of the eavesdropper’s channel.

Index Terms—Visible light communication, intensity modula-tion, amplitude constraint, physical-layer security, secrecy capac-ity bounds, MISO wiretap VLC channel, robust beamforming,worst-case secrecy rate.

I. INTRODUCTION

V ISIBLE light communication (VLC) is an enablingtechnology that exploits the lighting infrastructure for

short-range wireless communication links. The IEEE 802.15.7standard, released in 2011 [1], was a major step towards thecommercialization and widespread deployment of VLC net-works. VLC links benefit from the license-free light spectrum,immunity to radio frequency (RF) interference, and the useof inexpensive light-emitting diodes (LEDs) and photodiodes(PDs) for up- and down-conversion, respectively. In addition,VLC systems can be piggybacked on the existing lightinginfrastructure where legacy incandescent light bulbs and flu-orescent lamps are being replaced by LED-based luminaireswith increased lifetime, reduced energy consumption, higherluminous efficacy, and pleasant user experience [2]. Moreover,

Manuscript received May 28, 2014; revised November 10, 2014 andMarch 19, 2015; accepted April 10, 2015. This work was supported by theNatural Sciences and Engineering Research Council of Canada (NSERC). Thematerial in this paper was presented in part at the 2014 IEEE InternationalConference on Communications (ICC), Sydney, NSW, Australia, June 2014.

A. Mostafa and L. Lampe are with the Department of Electrical andComputer Engineering, The University of British Colombia, Vancouver, BC,V6T 1Z4, Canada (e-mail: {amostafa,lampe}@ece.ubc.ca).

due to line-of-sight (LoS) propagation and confinement of lightwaves by opaque surfaces, VLC links cause limited or no inter-network interference. Such advantages qualify VLC links forrealizing small-size cells, often referred to as “atto-cells”, infifth generation (5G) networks with coverage ranges on theorder of a few meters.

With the unprecedented increase in traffic volumes overwireless networks, data privacy and confidentiality are becom-ing a major concern for users as well as network administra-tors. Typical security mechanisms are implemented at upperlayers of the network stack via access control, password pro-tection, and end-to-end encryption. Such schemes are deemedto be secure as long as the storage capacity and computationalpower of potential eavesdroppers remain within certain limits.During the past few years, however, physical-layer security hasemerged as a promising research area to complement conven-tional encryption techniques and provide a first line of defenseagainst eavesdropping attacks. Physical-layer security refersto the techniques which exploit the channel characteristics inorder to hide information from unauthorized receivers, withoutreliance on upper-layer encryption [3]–[9]. The fundamentalidea behind physical-layer security is to sacrifice a fraction ofthe communication rate, that otherwise would be used for datatransmission, in order to confuse potential eavesdroppers anddiminish their capability to infer information, via carefully-designed signaling and/or coding schemes.

The framework of information-theoretic security was pio-neered by Shannon [10] who proposed a cipher system toachieve perfect secrecy over noiseless channels interceptedby unauthorized users. Almost two decades later, Wyner [11]considered secure transmission over noisy channels via thewiretap channel model. In addition, he proposed a fundamentalinformation-theoretic security measure, termed as the secrecycapacity. Wyner proved that the secrecy capacity is non-zero as long as the eavesdropper’s channel is degraded withrespect to (w.r.t.) the receiver’s channel, regardless of thedecoding technology or computational power available to theeavesdropper.

Motivated by Wyner’s work, information theoreticians con-sidered characterizing the secrecy performance of a variety ofchannel models. In [12], the secrecy capacity of the scalar, i.e.,single-input, single-output (SISO), Gaussian wiretap channelwas obtained as the difference between the channel capacitiesof the source-destination and source-eavesdropper links. Asingle-letter characterization of the secrecy capacity of thenon-degraded wiretap channel was obtained by Csiszar andKorner in [13]. However, their expression involves stochasticmapping and maximization over an auxiliary random variable

This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/10.1109/MCOM.2015.71582855

Copyright (c) 2015 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].

Page 2: Physical-Layer Security for MISO Visible Light ...lampe/Preprints/2015-VLC-Physical-Layer... · 1 Physical-Layer Security for MISO Visible Light Communication Channels Ayman Mostafa,

2

whose optimum choice is not straightforward. Therefore, itdoes not provide much help in obtaining analytical expres-sions for the secrecy capacity of multiple-antenna systems.The secrecy capacity of the multiple-input, multiple-output(MIMO) Gaussian wiretap channel was considered in [14]–[18]. For the special case of multiple-input, single-output(MISO) channels, it was shown in [19] that beamformingis a secrecy capacity-achieving strategy, and zero-forcing isoptimum at asymptotically high signal-to-noise ratio (SNR).

Despite LoS propagation and better signal confinement,compared to RF channels, the VLC channel, without opticalfibers or any sort of wave-guiding, is still of broadcast nature.That makes VLC links inherently susceptible to eavesdroppingby unintended or unauthorized users having access to thephysical area illuminated by the data transmitters. Typicalscenarios include public areas such as classrooms, meetingrooms, libraries, shopping malls, and aircrafts, to name a few.

Unlike RF channels, conventionally modelled as a Gaussianchannel with average power constraint, the most practical com-munication scheme for VLC systems is intensity modulation(IM) along with direct detection (DD) [20], [21]. TypicalLEDs exhibit nonlinear current-light characteristics which canbe partially compensated via pre-distorters, right before theLED, to mitigate harmonic distortion [22]. However, thedynamic range of the LED is inherently limited. Therefore, themodulating signal must satisfy certain amplitude constraints toavoid clipping distortion. Hence, IM/DD channels are typicallymodelled with amplitude constraints imposed on the channelinput, rather than conventional average power constraints [23],[24].

Compared to the massive body of literature on the averagepower-constrained Gaussian wiretap channels, literature onthe information-theoretic secrecy performance of amplitude-constrained wiretap channels is rather scarce. In his seminalpaper [25, Section 26], Shannon referred to the difficulty ofobtaining an analytical expression for the capacity of peak-limited channels. Instead, he derived a loose lower bound andan asymptotic upper bound which is valid for high peak SNR.Out of his Ph.D. work [26], [27], Smith came up with therather surprising result that the capacity-achieving distributionfor the amplitude-constrained Gaussian channel is discretewith a finite number of mass points. In [28], Arimoto proposedan iterative numerical algorithm to compute the capacity ofarbitrary discrete memoryless channels. Closed-form lowerand upper bounds on the capacity of amplitude-constrainedGaussian channels were derived in [24]. In [29], Ozel et al. fol-lowed the approach devised in [27] and proved that the secrecycapacity-achieving distribution for the amplitude-constrainedGaussian wiretap channel is discrete with finite support. To thebest of our knowledge, no work in the literature, other than[29], has considered the secrecy performance of amplitude-constrained Gaussian wiretap channels.

In this paper, we consider enhancing the confidentiality ofVLC links via physical-layer security techniques. In particular,we are interested in characterizing the secrecy rates achievablein a typical VLC scenario consisting of one transmitter, onelegitimate receiver, and one eavesdropper, as illustrated inFig. 1. We begin with deriving lower and upper bounds on

hB

hE

Eve

Alice

Bob

Fig. 1. A VLC network consisting of one sender (Alice), who utilizes thelight sources for data transmission, one legitimate receiver (Bob), and oneeavesdropper (Eve).

the secrecy capacity of the amplitude-constrained Gaussianwiretap channel. Then, we leverage beamforming to derivea closed-form lower bound on the secrecy capacity of theMISO channel. We also characterize secrecy rates achievablevia zero-forcing beamformers. Finally, we consider a VLCscenario wherein the eavesdropper is expected to exist withina specified physical area. Thus, the eavesdropper’s channelinformation is not perfectly known to the transmitter. Thedesign problem is to devise a robust beamforming schemewhich improves the worst-case secrecy rate guaranteed underall admissible channel realizations of the eavesdropper’s link.Instead of solving a difficult max-min worst-case maximiza-tion problem, we propose a suboptimal, but essentially simple,beamforming scheme based on first-order Taylor’s approxima-tion of the LEDs emission pattern. Numerical results show thesuperior performance of the robust scheme in terms of worst-case secrecy rates.

The remainder of the paper is organized as follows. Westate the adopted notation in Section II-A, describe the VLCchannel model in Section II-B, recall the relevant definitionsof beamforming and zero-forcing in Section II-C, and discussthe system model in Section II-D. Lower and upper boundson the secrecy capacity of the amplitude-constrained Gaussianwiretap channel are provided in Section III-A, while wederive a secrecy rate expression for the MISO case in SectionIII-B. In Section IV, we formulate the worst-case secrecy ratemaximization problem and devise the robust beamformingscheme. Numerical results obtained by simulating a typicalVLC scenario are presented in Section V. Finally, we provideconcluding remarks in Section VI.

II. PRELIMINARIES

A. Notation

The following notation is adopted throughout the paper. Werefer to the transmitter, legitimate receiver, and eavesdropperas “Alice”, “Bob”, and “Eve”, respectively. The set of n-dimensional, real-valued numbers is denoted by Rn, and theset of n-dimensional, non-negative, real-valued numbers isdenoted by Rn+. Bold characters denote column vectors, andvector transposition is denoted by the superscript {·}T. Theall-ones column vector is denoted by 1, and its dimensionwill be clear from the context. The curled inequality symbol

Copyright (c) 2015 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].

This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/10.1109/MCOM.2015.71582855

Page 3: Physical-Layer Security for MISO Visible Light ...lampe/Preprints/2015-VLC-Physical-Layer... · 1 Physical-Layer Security for MISO Visible Light Communication Channels Ayman Mostafa,

3

Dimming

control

Bias-T

Visible light

Encoder DecoderData

input

Data

output

x(t) y(t)

IDC

PTX(t)

Fig. 2. A simplified block diagram of a PAM VLC system.

� between two vectors denotes componentwise inequality, and|·| denotes componentwise absolute value. Expected value isdenoted by E{·}, variance by var{·}, differential entropyby h(·), relative entropy by D(·‖·), and mutual informationby I(·; ·). We use log(·), without a base, to denote naturallogarithms, and information rates are specified in (nats/channeluse), unless otherwise indicated. We use SNR to denote thepeak, rather than average, signal-to-noise ratio. A lower-casecharacter x denotes one realization of the random variable X .Subscripts {·}B and {·}E denote Bob’s and Eve’s relevance,respectively.

B. The VLC Channel Model

We consider a DC-biased pulse-amplitude modulation(PAM) VLC scheme whose simplified block diagram is il-lustrated in Fig. 2. The transmit element is an illuminationLED driven by a fixed bias current IDC ∈ R+. The DC biassets the average radiated optical power and, consequently,adjusts the illumination level. The data signal x(t) ∈ R,t = 1, 2, 3, · · · , is a zero-mean current signal superimposedon IDC, via, e.g., a bias-T circuit, to imperceptibly modulatethe instantaneous optical power PTX(t) emitted from the LED.Since E{X(t)} = 0, the data signal does not contribute tothe average optical power and, therefore, it does not affectthe illumination level. In order to maintain linear current-light conversion and avoid clipping distortion, the total currentIDC +x(t) must be constrained within some range IDC±αIDC,where α ∈ [0, 1] is termed as the modulation index. Thus, x(t)must satisfy the amplitude constraint |x(t)| ≤ A ∀t, whereA = αIDC.

Then, using an appropriate pre-distorter [22], the electro-optical conversion can be modeled as PTX(t) = η (IDC + x(t))where η (W/A) is the current-to-light conversion efficiencyof the LED. The optical power collected by the receiver isgiven by PRX(t) = GPTX(t) where G < 1 is the path gain.A PD of responsivity R (A/W) converts the incident opticalpower into a proportional current RPRX(t). Then, the DC biasis removed, and the signal is amplified via a transimpedanceamplifier of gain T (V/A) to produce a voltage signal y(t) ∈R, which is a scaled, but noisy, version of the transmittedsignal x(t). Dominant noise sources are the thermal noise inthe receiver electronic circuits, i.e., pre-amplifier noise, andshot noise due to ambient illumination from sunlight and/orother light sources. Both noise processes are well-modelled assignal-independent, zero-mean, additive, white Gaussian noise(AWGN) [23], [30].

Therefore, the VLC channel in Fig. 2 can be modelled as

y(t) = hx(t) + w(t), (1)

w2

w1

x1(t)

IDC

IDC

IDC

y(t)

s(t)

wN

x2(t)

xN(t)

Fig. 3. Transmit beamforming over a MISO PAM VLC channel.

where h = ηGRT , h ∈ R+, is the channel gain and W (t) ∼N(0, σ2

)is the noise process.

Notice that the channel model in (1) considers only LoSpropagation and ignores reflections from surrounding surfaces.Such a model is valid for most indoor scenarios wherein lightfixtures are attached to the ceiling and facing down, makingreflections significantly weaker than LoS components [31],[32].

Assuming an LED with a generalized Lambertian emissionpattern, the path gain G is given by [33]

G =

{1

2π (m+ 1) cosm(φ)ARXd2 cosψ |ψ| ≤ ψFoV

0 |ψ| > ψFoV

, (2)

where m = − log 2log cosφ 1

2

is the order of Lambertian emission with

half irradiance at semi-angle φ 12

(measured from the opticalaxis of the LED), φ is the angle of irradiance, ARX is thereceiver collection area, d is the LoS distance between theLED and PD, ψ is the angle of incidence (measured from theaxis normal to the receiver surface), and ψFoV is the receiverfield-of-view (FoV) semi-angle. The receiver collection areais given by [32]

ARX =n2

sin2(ψFoV)APD, (3)

where n is the refractive index of the optical concentrator andAPD is the PD area.

C. Beamforming and Zero-Forcing

Definition 1 (Transmit Beamforming): Consider a transmit-ter with N transmit elements. Then, for a transmitted signalvector x(t) ∈ RN , we refer to the transmission scheme asbeamforming if x(t) can be factorized as x(t) = ws(t), wherew ∈ RN is a fixed vector, termed as the beamformer, whiles(t) ∈ R is the transmitted data symbol, i.e., S is a randomvariable.

Definition 2 (Zero-Forcing Beamformer): For a transmitbeamforming scheme x(t) = ws(t) and a single-elementreceiver with channel gain vector h ∈ RN , we refer to was a zero-forcing beamformer, w.r.t. the specified receiver, ifw satisfies hTw = 0, i.e., if w is in the null space of hT.

Fig. 3 depicts a simplified block diagram of a MISO VLCsystem utilizing transmit beamforming. Notice that, although

Copyright (c) 2015 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].

This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication.

The final version of record is available at http://dx.doi.org/10.1109/MCOM.2015.71582855

Page 4: Physical-Layer Security for MISO Visible Light ...lampe/Preprints/2015-VLC-Physical-Layer... · 1 Physical-Layer Security for MISO Visible Light Communication Channels Ayman Mostafa,

4

the VLC channel described in Section II-B utilizes IM, Def-initions 1 and 2 are still applicable since the DC bias atthe transmitter ensures the non-negativity of the total currentdriving the LEDs. Notice also that, for a zero-mean signals(t), beamforming does not affect the illumination level. It isalso crucial to notice that a zero-forcing beamformer ensuresonly that the data signal at the receiver is suppressed tozero. However, the DC component and, consequently, theillumination level at the receiver (or anywhere else) remainunchanged.

D. System Model

We consider the VLC scenario illustrated in Fig. 1. Theroom is illuminated by NA down-facing light fixtures attachedto the ceiling, and also utilized by Alice for data transmission.Each fixture consists of multiple LEDs modulated by thesame current signal, e.g., the LEDs are connected in series.In addition, the LEDs in a single fixture are sufficiently-closesuch that their channel gains, to a single receiver, are identical.Bob and Eve have a single PD, each, and their terminals arepositioned up-facing.

Utilizing the VLC channel model in (1), the signals receivedby Bob and Eve, respectively, are given by

y(t) = hTBx(t) + wB(t) (4a)

z(t) = hTE x(t) + wE(t), (4b)

where x(t) ∈ RNA is the transmitted signal vector, hB andhE ∈ RNA

+ are fixed channel gain vectors, and wB(t) andwE(t) are independent and identically-distributed Gaussiannoises whose samples are N

(0, σ2

)random variables. The

transmitted signal x(t) is subject to the amplitude constraint

|x(t)| � A1 ∀t. (5)

The fundamental problem addressed in this paper is: Aliceshall transmit confidential messages to Bob, and keep theinformation entirely hidden from Eve, without using secret-key encryption. To formulate the problem properly, we recallrelevant definitions from information theory [4], [34].

A(2nR, n

)code for a real-valued Gaussian MISO channel

subject to an amplitude constraint |x| � A1 consists of anindex set M =

{1, 2, · · · , 2nR

}, a stochastic encoder E :

M→ Xn which maps each index m ∈ M into a codewordx(t)|nt=1, x(t) ∈ RNA , according to transition probabilitiespχn|M, and a deterministic decoder D : Yn → M whichmaps the received sequence y(t)|nt=1, y(t) ∈ R, to an estimatem = D (y(t)|nt=1), m ∈ M. Each codeword x(t)|nt=1 mustsatisfy the amplitude constraint |x(t)| � A1 ∀t. The rateof information transmission is R (bits/channel use). An errorevent occurs when m 6= m, and the communication reliabilityis measured in terms of the average error probability Pne .

By considering the wiretap channel in (4), I(M ;Y n) mea-sures the amount of information attainable by Bob withinn channel uses, while I(M ;Zn) measures the amount ofinformation leaked to Eve. A communication rate Rs is said

to be achievable and fully secure, i.e., Rs is an achievablesecrecy rate, if there exists a

(2nRs , n

)code such that

limn→∞

Pne = 0 (6a)

limn→∞

I (M ;Zn) = 0, (6b)

where (6a) is the reliability constraint, i.e., reliable connectionbetween Alice and Bob, while (6b) is the strong secrecy con-straint. The secrecy capacity is the supremum of all achievablesecrecy rates [4].

Given the wiretap channel in (4), we are interested incharacterizing communication rates between Alice and Bob,subject to the amplitude constraint in (5) and reliability andsecrecy constraints in (6).

III. ACHIEVABLE SECRECY RATES

We first derive lower and upper bounds on the secrecycapacity of the scalar Gaussian wiretap channel subject to anamplitude constraint. Then, we utilize the lower bound alongwith beamforming to characterize achievable secrecy rates forthe MISO case.

A. Bounds on the Secrecy Capacity for the SISO Channel

If only a single light fixture is utilized for data transmission,or all the fixtures are modulated by identical current signals,e.g., due to hardware or wiring limitations, the wiretap channelmodel in (4) simplifies to

y(t) = hBx(t) + wB(t) (7a)z(t) = hEx(t) + wE(t). (7b)

If hB ≤ hE, then Alice-Bob channel is stochastically degradedw.r.t. Alice-Eve channel and the secrecy capacity is essentiallyzero. Alternatively, if hB > hE, then the secrecy capacity isgiven by [4]

CSISOs = max

pX(I(X;Y )− I(X;Z)) (8a)

s.t. |x| ≤ A. (8b)

Because of the amplitude constraint, obtaining a closed-formsolution for (8) is a formidable task, if not unfeasible. How-ever, it was shown in [29] that the maximization problem in(8) is convex. Furthermore, it was shown that the optimumdistribution p∗X , which maximizes I(X;Y ) − I(X;Z), isdiscrete with a finite number of mass points. Therefore, (8) canbe efficiently solved using numerical methods. Nevertheless,closed-form expressions are often of great interest for systemdesign purposes. In the following, we provide closed-formlower and upper bounds on the secrecy capacity of (8).

Copyright (c) 2015 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].

This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/10.1109/MCOM.2015.71582855

Page 5: Physical-Layer Security for MISO Visible Light ...lampe/Preprints/2015-VLC-Physical-Layer... · 1 Physical-Layer Security for MISO Visible Light Communication Channels Ayman Mostafa,

5

−20 −10 0 10 20 30 40 50 60 70 80−0.5

0

0.5

1

1.5

2

2.5

3

3.5

20 log10 (hBA/σ) (dB)

Secrecy

capacity

bounds(nats/chan

nel

use)

Lower bound (9)Lower bound (10)Upper bound (11) h2

E = 10−3h2B

h2E = 10−2h2

B

h2E = 10−1h2

B

Fig. 4. Secrecy capacity bounds of Theorem 1.

Theorem 1: The secrecy capacity of the Gaussian wiretapchannel in (7), subject to the amplitude constraint |x(t)| ≤A ∀t, is lower-bounded by each of the following two bounds

CSISOs ≥ 1

2log

(1 +

2h2BA

2

πeσ2

)−(

1− 2Q(δ + hEA

σ

))log

2(hEA+ δ)√2πσ2

(1− 2Q

(δσ

))−Q

σ

)− δ√

2πσ2e−

δ2

2σ2 +1

2(9)

CSISOs ≥ 1

2log

6h2BA

2 + 3πeσ2

πeh2EA

2 + 3πeσ2, (10)

and is upper-bounded by

CSISOs ≤ 1

2log

h2BA

2 + σ2

h2EA

2 + σ2, (11)

where δ in (9) is a free parameter such that δ > 0, and Q(·)is the Q-function.

Proof: See Appendices A and B.Notice that the lower bound in (9) exploits the lower and

upper bounds on the capacity of the IM channel studiedin [24]. Notice also that the upper bound in (11) is thesecrecy capacity of the Gaussian wiretap channel subject to theaverage power constraint E{X2} ≤ A2. Therefore, (11) can beconcluded by relaxing the amplitude constraint |x| ≤ A intothe average power constraint E{X2} ≤ A2. Nevertheless, weprovide a rigorous proof for (11) in Appendix B and introducea general approach for upper-bounding the secrecy capacity ofdegraded wiretap channels.

Fig. 4 presents the bounds of Theorem 1. Threegroups of bounds are shown using 20 log10 (hB/hE) =10, 20, and 30 dB. Lower bound (9) is calculated usingδ = σ log (1 + 2hEA/σ) as proposed in [24]. As can be seen,both (9) and (10) along with (11) tightly bound the secrecy ca-pacity at asymptotically low and high SNRB. Notice that (10)incurs a fixed gap of log

√πe/6 = 0.1765 nats/channel use

at asymptotically high SNRB. Nevertheless, since typical VLClinks operate at SNR values well below 40 dB (see, e.g., Fig.7), (10) is appropriate for VLC scenarios. Furthermore, (10)is more analytically-tractable and, therefore, it will be used toobtain secrecy rate expressions for the MISO channel.

B. Achievable Secrecy Rates for the MISO CaseA single-letter characterization of the secrecy capacity of

the non-degraded wiretap channel was given by Csiszar andKorner as [13]

CMISOs = max

pUX

(I(U;Y )− I(U;Z)) , (12)

where U is an auxiliary random vector that satisfies theMarkov relation U → X → (Y, Z). Unlike the scalar case,the optimization problem in (12) is, in general, non-convex.Furthermore, the optimum selection of U is not clear. Forthe Gaussian MISO channel with average power constraint, itwas shown in [19] that the secrecy capacity is achieved viabeamforming, i.e., the choice U = X = wS is optimum,where w is the beamformer and S is a random variable.

An achievable secrecy rate for the MISO channel withamplitude constraint can be obtained by lower-bounding thesecrecy capacity in (12) as follows.

CMISOs

(a)≥ max

pX(I (X;Y )− I (X;Z))

(b)≥ max

w,pS(I (wS;Y )− I (wS;Z))

(c)≥ max

w

1

2log

6A2wThBhTBw + 3πeσ2

πeA2wThEhTE w + 3πeσ2

, (13)

where (a) follows from setting X = U, (b) from choosingX = wS such that |w| � 1 and |s| ≤ A, i.e., restricting thetransmission scheme to beamforming, and (c) from choosing auniform distribution pS over the interval [−A,A] and utilizingthe lower bound in (10).

Although suboptimal, beamforming is preferable as it is alinear operation with low implementation complexity. Further-more, it reduces the vector channel into a scalar version whichenables the use of well-developed scalar channel codes. Thelower bound in (13) provides a design equation for the MISOcase where the problem is reduced to finding an appropriatebeamformer w.

1) Optimum Beamforming: The optimum beamformer w∗

which maximizes the secrecy rate in (13) is given by

w∗ = arg maxw

1

2log

6A2wThBhTBw + 3πeσ2

πeA2wThEhTE w + 3πeσ2

(14a)

s.t. |w| � 1. (14b)

Since hBhTB and hEh

TE are positive semi-definite matrices (as

both are singular), the problem in (14) is a maximization of theratio of two convex quadratic functions with box constraints.Such a problem is non-convex, and obtaining a local maximumhas been shown to be NP-hard [35]. Nevertheless, several ap-proaches have been proposed, e.g., in [36], [37], to obtain sub-optimal solutions. A typical algorithm begins with convertingthe problem into a parametric, non-convex, quadratic problem,as proposed in [38]. Then, a local maximum is found viaactive-set or interior methods.

Copyright (c) 2015 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].

This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/10.1109/MCOM.2015.71582855

Page 6: Physical-Layer Security for MISO Visible Light ...lampe/Preprints/2015-VLC-Physical-Layer... · 1 Physical-Layer Security for MISO Visible Light Communication Channels Ayman Mostafa,

6

Di

Z

χi

ϒi

2ϵ Δχ

Δϒ

x

yz

di

ith Light

fixture

Fig. 5. Geometry for the robust beamforming problem. The highlighted areaidentifies possible locations for Eve.

2) Zero-Forcing Beamforming: The secrecy rate in (13) canbe further lower-bounded by restricting w to be within Eve’snull space. Thus, the optimum zero-forcing beamformer wZFis obtained by

wZF = arg maxw

hTBw (15a)

s.t.

{|w| � 1

hTE w = 0

. (15b)

Replacing w in (13) with wZF results in the secrecy rate

RZFs =

1

2log

(1 +

2A2wTZFhBh

TBwZF

πeσ2

). (16)

Unlike the optimum beamforming case in (14), the maximiza-tion problem in (15) is linear and, therefore, it can be solvedwith lower computational complexity. Furthermore, the zero-forcing beamformer is sufficient to achieve the secrecy rate in(16) without resorting to stochastic encoding.

IV. ROBUST BEAMFORMING

For the wiretap channel, it is reasonable to assume thatBob’s channel is accurately known to Alice, via, e.g., feedbackfrom Bob. On the other hand, Eve is typically a malicioususer, and will not feed back her channel information to Alice.Nevertheless, in a typical VLC scenario, with the path gainas given in (2), Alice can map Eve’s uncertain locationinformation into an estimate of her channel gain. Thus, aninteresting design problem is to secure the connection betweenAlice and Bob when Eve is expected to exist within a specifiedarea, without knowing her exact location. A relevant practicalscenario would be, e.g., a governmental office with certainareas accessible to the public, and among them are potentialeavesdroppers.

Fig. 5 illustrates the scenario with uncertainty about Eve’slocation. For simplicity, we consider only two-dimensionallocation uncertainty, and assume that Eve’s height is fixed andis accurately known to Alice. Extension to three-dimensionaluncertainty should be straightforward. Without loss of gen-erality, we assume that Eve’s location is bounded by asquare of area 2ε × 2ε, i.e., Eve is located somewhere at

(χE + ∆χ,ΥE + ∆Υ), where χE and ΥE are measured w.r.t.some reference point at Eve’s height, e.g., the room center,while |∆χ| and |∆Υ| are bounded as |∆χ| ≤ ε and |∆Υ| ≤ ε.From this location information, Alice can estimate Eve’schannel with some bounded error.

If Alice adopts a beamforming strategy and perfectly knowsBob’s channel, then the achievable secrecy rate is given by (13)as a function of Eve’s exact location, i.e., Rs (w,∆χ,∆Υ). Fora fixed beamformer w, there exists a worst-case Eve’s location(χE + ∆∗χ(w),ΥE + ∆∗Υ(w)

),∣∣∆∗χ(w)

∣∣ ≤ ε, |∆∗Υ(w)| ≤ ε,which minimizes the achievable secrecy rate. Such secrecyrate is termed as the worst-case secrecy rate Rwc

s (w), and isa function of w. By definition, achieving Rwc

s (w) is guaran-teed regardless of Eve’s exact location (χE + ∆χ,ΥE + ∆Υ).Then, the design problem is to find the beamformer wRB whichmaximizes the worst-case secrecy rate over all admissiblebeamformers |w| � 1. Such a transmission strategy will betermed as robust beamforming.

To simplify the problem formulation, we rewrite Eve’schannel gain as a function of her location. Assume that theith light fixture is located at (χA,i,ΥA,i, Z), where χA,i andΥA,i are measured w.r.t. the reference point, while Z is thevertical distance between the light fixtures and Eve. Then, fori ∈ {1, 2, · · · , NA}, the channel gain hE,i, when |ψi| ≤ ψFoV,i.e., when the ith light fixture is within Eve’s FoV, can bewritten as

hE,i =η

2π(m+ 1)

(Z

di

)mARX

d2i

(Z

di

)RT

= Kd−(m+3)i

= K(

(χi + ∆χ)2

+ (Υi + ∆Υ)2

+ Z2)−m+3

2

, (17)

where χi = χE − χA,i, Υi = ΥE − ΥA,i, and K = η2π (m +

1)Zm+1ARXRT is a constant.Thus, the worst-case secrecy rate maximization problem can

be formulated as

Rwcs∗ = max

wmin

∆χ,∆Υ

1

2log

6A2wThBhTBw + 3πeσ2

πeA2wThEhTE w + 3πeσ2

(18a)

s.t.

|w| � 1

|∆χ| ≤ ε|∆Υ| ≤ ε

, (18b)

where, for i ∈ {1, 2, · · · , NA},

hE,i = K(

(χi + ∆χ)2

+ (Υi + ∆Υ)2

+ Z2)−m+3

2

. (18c)

The max-min problem in (18) involves two optimizationproblems. The inner problem is to find the worst-case locationfor Eve

(∆∗χ(w),∆∗Υ(w)

)which minimizes Rs for a fixed w.

The outer problem is similar to (14) and involves finding theoptimal beamformer w∗ (∆χ,∆Υ) that maximizes Rs for agiven location (∆χ,∆Υ). Solving (18) is difficult mainly dueto the mutual dependence between the optimization parametersin the inner and outer problems. In the following, we simplify(18) by considering the first-order Taylor series approximationof the channel gain in (17) at (∆χ,∆Υ) = (0, 0).

Copyright (c) 2015 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].

This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/10.1109/MCOM.2015.71582855

Page 7: Physical-Layer Security for MISO Visible Light ...lampe/Preprints/2015-VLC-Physical-Layer... · 1 Physical-Layer Security for MISO Visible Light Communication Channels Ayman Mostafa,

7

Define Di =√

(χ2i + Υ2

i + Z2), then, for i ∈{1, 2, · · · , NA}, Taylor’s expansion of hE,i at (∆χ,∆Υ) =(0, 0) is given by

hE,i(∆χ,∆Υ)

= K(D−(m+3)i

− (m+ 3)χiD−(m+5)i ∆χ

− (m+ 3)ΥiD−(m+5)i ∆Υ

+m+ 3

2

((m+ 5)χ2

iD−(m+7)i −D−(m+5)

i

)∆2χ

+m+ 3

2

((m+ 5)Υ2

iD−(m+7)i −D−(m+5)

i

)∆2

Υ

+(m+ 3)(m+ 5)χiΥiD−(m+7)i ∆χ∆Υ + · · ·

).

(19)

For sufficiently small ε, hE,i can be approximated by the firstthree terms in (19) as

hE,i(∆χ,∆Υ) = K(D−(m+3)i − (m+ 3)χiD

−(m+5)i ∆χ

−(m+ 3)ΥiD−(m+5)i ∆Υ

)= K (αi + βi∆χ + Γi∆Υ) , (20)

where αi = D−(m+3)i , βi = −(m+ 3)χiD

−(m+5)i , and Γi =

−(m+ 3)ΥiD−(m+5)i .

We define the matrix HE ∈ RNA×3 as

HE =

α1 β1 Γ1

α2 β2 Γ2

......

...αNA βNA ΓNA

. (21)

Then, for sufficiently small ε, hE(∆χ,∆Υ) can be approxi-mated by

hE = KHE

1∆χ

∆Υ

. (22)

The columns of HE span a three-dimensional vector space HE.If Alice has more than three transmit elements, i.e., NA ≥ 4,we propose restricting the transmit beamformer w into the nullspace of HE. Such a beamformer would significantly degradethe received signal at Eve provided that her actual location isfairly close to (χE,ΥE).

The approximation in (22), along with restricting w withinthe null space of HE, lead to a considerable simplification of(18) and allow decoupling the optimization variables in orderto solve two disjoint maximization problems. In particular, therobust beamforming problem can be reformulated as

wRB = arg maxw

hTBw (23a)

s.t.

{|w| � 1

HTE w = 0

, (23b)

(∆wcχ ,∆

wcΥ ) = arg max

∆χ,∆Υ

∣∣wTRBhE

∣∣ (24a)

s.t.

{|∆χ| ≤ ε|∆Υ| ≤ ε

, (24b)

and the resulting worst-case secrecy rate is obtained by

Rwcs =

1

2log

6A2wTRBhBh

TBwRB + 3πeσ2

πeA2wTRBh

wcE (hwc

E )TwRB + 3πeσ2

, (25)

where hwcE ≡ hE

(∆wcχ ,∆

wcΥ

).

Notice that the maximization in (23), which is the designequation for the robust beamformer, is a linear problem. On theother hand, the maximization in (24), with hE as given in (17),is a non-convex problem, and is used to find Eve’s locationcorresponding to the worst-case secrecy rate. Nevertheless,(24) can be simplified by approximating hE using the second-order terms of Taylor’s expansion provided in (19), i.e.,

˜hE = K

a1 b1 c1a2 b2 c2...

......

aNA bNA cNA

∆2

χ

∆2Υ

∆χ∆Υ

, (26)

where, for i ∈ {1, 2, · · · , NA},

ai =m+ 3

2

((m+ 5)χ2

iD−(m+7)i −D−(m+5)

i

),

bi =m+ 3

2

((m+ 5)Υ2

iD−(m+7)i −D−(m+5)

i

),

ci = (m+ 3)(m+ 5)χiΥiD−(m+7)i .

Such an approximation results in a quadratic maximizationproblem, which is still non-convex, but is easier to solve.

V. NUMERICAL RESULTS

To validate the proposed schemes, we have numericallysimulated a typical indoor VLC scenario. The problem ge-ometry is illustrated in Fig. 6, and simulation parametersare provided in Table I. The room dimensions (5 × 5 × 3m3) and the number of light fixtures and their locations arequite similar to those in Room 5505, Fred Kaiser Building,Department of Electrical and Computer Engineering, TheUniversity of British Columbia, Vancouver Campus. Thereexist 16 down-facing light fixtures attached to the ceiling. Eachfixture consists of four LEDs, and each LED radiates one Wattoptical power. The half-illuminance semi-angle is 60◦, whichis a typical value for commercially-available high-brightnessLEDs. Notice that LEDs with wide half-illuminance angles,e.g., 60◦, are preferred for general-purpose lighting to provideuniform illumination. The LEDs modulation index is set to10%. Bob and Eve are located at height 0.85 m above thefloor level, e.g., on desks, and their receivers have a 60◦ FoV(semi-angle). We use a Cartesian coordinate system (x, y) atthe receivers height to identify their locations. The origin (0, 0)corresponds to the room center, and all distances are measuredin meters. Noise power is calculated using [32, eq. (6) andTable I] with a 70 MHz receiver bandwidth, and the resultis averaged over the entire room area. The average electricalnoise power is −98.82 dBm.

Fig. 7 shows the spatial distribution of the SNR at thereceivers height without beamforming, i.e., w = 1. As canbe seen, the SNR reaches its maximum value, 39.40 dB, atthe room center, and decays to 24.97 dB at the corners.

Copyright (c) 2015 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].

This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/10.1109/MCOM.2015.71582855

Page 8: Physical-Layer Security for MISO Visible Light ...lampe/Preprints/2015-VLC-Physical-Layer... · 1 Physical-Layer Security for MISO Visible Light Communication Channels Ayman Mostafa,

8

1 m

1 m

5 m

5 m

9

5

1 2 3 4

876

10 11 12

16151413

x

y

Fig. 6. Geometry of a VLC scenario with 16 light fixtures.

TABLE ISIMULATION PARAMETERS.

Problem geometryRoom dimensions (W × L×H) 5× 5× 3 m3

Light fixtures (Alice) height 3 mReceivers (Bob and Eve) height 0.85 mNumber of light fixtures NA 16Number of LEDs per fixture 4

Transmitter characteristicsAverage optical power per LED 1 WModulation index α 10%LED half luminous intensity semi-angle φ 1

260◦

Receiver characteristicsReceiver FoV ψFoV 60◦

Lens refractive index n 1.5PD responsivity R 0.54 (A/W)PD geometrical area APD 1 cm2

Average electrical noise power σ2 −98.82 dBm

Fig. 8 shows the achievable communication rate RB, be-tween Alice and Bob, as a function of Bob’s location, withoutsecrecy constraints. This rate is obtained using (16) aftersetting wZF = 1.

Fig. 9 shows the secrecy rates achievable via the opti-mal beamformer (14a) and zero-forcing beamformer (15a) asfunctions of A. Bob and Eve are located at (−0.9,−2.0)and (1.6,−0.7), respectively. Their channel gain vectors areprovided in Table II with fixture indices corresponding tothose illustrated in Fig. 6. As can be seen, the improvementin secrecy rate via optimal beamforming, compared to zero-

TABLE IICHANNEL GAIN VECTORS

Fixture index at (−0.9,−2.0) at (1.6,−0.7)

×10−4 ×10−4

1 0.3482 0.04312 0.3765 0.10193 0.2042 0.22764 0.0843 0.34305 0.1823 0.04686 0.1928 0.11587 0.1222 0.27658 0.0597 0.43679 0.0756 0.038810 0.0783 0.086911 0.0579 0.180312 0.0345 0.258613 0.0321 014 0.0329 0.049515 0 0.083716 0 0.1063

−2−1

01

2

−2

−1

0

1

2

25

30

35

40

x (m)y (m)

20log10

(

∑N

A

i=1hiA

)

(dB)

26

28

30

32

34

36

38

Fig. 7. Spatial distribution of the SNR at the receivers level (0.85 m abovethe floor level) without beamforming.

−2−1

01

2

−2

−1

0

1

2

2

2.5

3

3.5

4

x (m)y (m)

Inform

ationrate

(nats/chan

nel

use)

2.2

2.4

2.6

2.8

3

3.2

3.4

3.6

3.8

Fig. 8. Achievable communication rate, between Alice and Bob, as a functionof Bob’s location, without secrecy constraints.

forcing, is negligible and does not outweigh the simplicity ofthe zero-forcing scheme.

In Fig. 10, Bob’s location is fixed at (−0.9,−2.0) and thesecrecy rate in (16) is shown as a function of Eve’s locationwithin the entire room area. As expected, the secrecy ratesignificantly decreases when Eve is close to Bob. Once Eve isrelatively far, e.g., more than about 2.5 m, the secrecy rate isalmost independent of Eve’s exact location. It is also interest-ing to characterize the loss in transmission rate caused by thesecrecy constraint, i.e., RB − Rs, by comparing the secrecyrates in Fig. 10 with RB(−0.9,−2.0) = 3.2256 nats/channeluse from Fig. 8.

In Fig. 11, Eve’s location is fixed at (1.6,−0.7) and thesecrecy rate (16) is shown as a function of Bob’s location.Even when Bob is relatively far from Eve, the secrecy ratestill depends on Bob’s location due to the dependence of RZF

s

Copyright (c) 2015 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].

This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/10.1109/MCOM.2015.71582855

Page 9: Physical-Layer Security for MISO Visible Light ...lampe/Preprints/2015-VLC-Physical-Layer... · 1 Physical-Layer Security for MISO Visible Light Communication Channels Ayman Mostafa,

9

−80 −70 −60 −50 −40 −30 −200

0.5

1

1.5

2

2.5

3

3.5

20 log10 A (dBm)

Secrecy

rate

(nats/chan

nel

use)

Optimal beamformingZero-forcing beamforming

−49 −48.5 −48 −47.5 −47 −46.5 −46 −45.5 −45

0.25

0.3

0.35

0.4

Fig. 9. Secrecy rates achievable via optimal beamforming (13) and zero-forcing beamforming (16) versus the amplitude constraint A in dBm. Boband Eve are located at (−0.9,−2.0) and (1.6,−0.7), respectively, and theirchannel gains are provided in Table II. Noise power is −98.82 dBm.

−2−1

01

2

−2

−1

0

1

2

0

0.5

1

1.5

2

2.5

3

3.5

x (m)y (m)

Secrecy

rate

(nats/chan

nel

use)

0.5

1

1.5

2

2.5

3

Fig. 10. Secrecy rate achievable via zero-forcing beamforming (16) as afunction of Eve’s location. Bob is located at (−0.9,−2.0).

on hB.Fig. 12 highlights the error in estimating the channel

gain caused by truncating Taylor’s expansion after the first-order terms. The spatial distribution of the channel gainfrom Fixture 8 is shown within the square area bounded by(1.6±0.25,−0.7±0.25). As expected, Taylor’s approximationexhibits maximum error at the corners. The maximum relativeerror is 5.45% at (1.85,−0.45).

Fig. 13 considers the robust beamforming problem andshows the improvement in the worst-case secrecy rate attainedby applying the robust beamformer in (23a). Bob is locatedat (−0.9,−2.0), and his channel gain is perfectly knownto Alice. Eve is located somewhere within the square area(1.6± ε,−0.7± ε). For relatively small ε, i.e., when Alice isquite certain about Eve’s location, the non-robust beamformerexhibits a slightly-better performance. The reason is that two

−2−1

01

2

−2

−1

0

1

2

0

1

2

3

4

x (m)y (m)

Secrecy

rate

(nats/chan

nel

use)

0

0.5

1

1.5

2

2.5

3

3.5

Fig. 11. Secrecy rate achievable via zero-forcing beamforming (16) as afunction of Bob’s location. Eve is located at (1.6,−0.7).

1.41.5

1.61.7

1.8

−0.9

−0.8

−0.7

−0.6

−0.5

3.8

4

4.2

4.4

4.6

4.8

x 10−5

x (m)y (m)

Channel

gain

3.9

4

4.1

4.2

4.3

4.4

4.5

4.6

x 10−5

Fig. 12. Spatial distribution of the channel gain from Fixture 8 (see Fig.6 for fixture indices) within a square of area (0.5 × 0.5 m2) centered at(1.6,−0.7).

degrees of freedom are unnecessarily exploited with the robustbeamformer to null out the signal at the directions of thesecond and third columns of HE in (21). As ε increases, therobust beamformer is clearly superior, and it slows down thedecay in Rwc

s with increasing ε.Finally, we validate the robust beamforming scheme over

the entire room area, as shown in Fig. 14. We divide the roominto 25 squares. Each square has an area of 1 m2, and outlinespossible locations for Eve. Bob is located at (−0.9,−2.0), andhis channel gain is perfectly known to Alice. Alice also knowswhich square bounds Eve’s location, without knowing herexact location. From such information, Alice applies the robustbeamformer in (23a). The resulting secrecy rate is shown asa function of Eve’s location within each square. Worst-casesecrecy rates Rwc

s are also shown. Notice that Rwcs is zero

when Bob and Eve are located within the same square, and itincreases as Eve moves far away from Bob.

Copyright (c) 2015 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].

This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/10.1109/MCOM.2015.71582855

Page 10: Physical-Layer Security for MISO Visible Light ...lampe/Preprints/2015-VLC-Physical-Layer... · 1 Physical-Layer Security for MISO Visible Light Communication Channels Ayman Mostafa,

10

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

0.5

1

1.5

2

2.5

3

3.5

ǫ (m)

Secrecy

rate

(nats/channel

use)

RobustNon-robust

Fig. 13. Worst-case secrecy rate (25) versus ε, half the side length of thesquare outlining possible locations of Eve. Bob is located at (−0.9,−2.0)and Eve’s location is bounded by (1.6± ε,−0.7± ε).

−2.5 −2 −1.5 −1 −0.5 0 0.5 1 1.5 2 2.5−2.5

−2

−1.5

−1

−0.5

0

0.5

1

1.5

2

2.5

1.97

2.01

1.98

2.21

2.16

1.75

1.69

1.23

1.57

2.23

0.316

0.43

1.12

2.05

2.03

x (m)

0

0.134

0.963

1.79

2.14

0.357

0.963

1.55

2.14

2.03

y(m

)

Secrecy

rate

(nats/channel

use)

0

0.5

1

1.5

2

2.5

3

Fig. 14. Secrecy rate as a function of Eve’s location when the robustbeamformer (23a) is applied. Eve’s location information is quantized into25 squares, each of area 1 m2, and the quantized location information isavailable to Alice. Bob is located at (−0.9,−2.0). Worst-case secrecy rates(nats/channel use) are also shown inside each square.

VI. CONCLUSIONS

In this work, we proposed the use of physical-layer securitytechniques to enhance the confidentiality of VLC links. So far,there have been very few deployments of physical-layer secu-rity systems. One major shortcoming of such security schemesis performance sensitivity to channel information assumptions,especially for the eavesdropper’s link. We believe, however,that VLC networks have a potential for the deployment ofphysical-layer security prototypes since realistic assumptionsabout the eavesdropper’s channel can be made.

Unlike RF channels, the VLC channel is well-modelledwith amplitude constraints imposed on the channel input,making it difficult to obtain analytical expressions for thesecrecy capacity, even for the simple SISO case. Therefore, wederived closed-form lower and upper bounds on the secrecy

capacity of the amplitude-constrained wiretap channel. Then,we utilized beamforming to obtain achievable secrecy ratesfor the MISO channel. We have shown that zero-forcing is anappropriate strategy for secure transmission over MISO VLCchannels. Although suboptimal, zero-forcing is preferable asit is an achievability strategy that eliminates the need touse secrecy codes which involve stochastic encoding. Wehave also proposed a practical robust beamforming schemewhich considerably improves worst-case secrecy rates wheninformation about the eavesdropper’s channel is imperfect dueto location uncertainty. The robust scheme directly addressesthe aforementioned problem of performance sensitivity tochannel assumptions.

APPENDIX ADERIVATION OF THE LOWER BOUNDS ON SECRECY

CAPACITY

A. Lower Bound (9) of Theorem 1

The secrecy capacity in (8) can be lower-bounded by thedifference between the channel capacities of Alice-Bob andAlice-Eve links as follows.

CSISOs = max

pX(I(X;Y )− I(X;Z))

(a)

≥ maxpX

I(X;Y )−maxpX

I(X;Z)

= CB − CE, (27)

where (a) follows from the inequality

maxu

(f1(u)− f2(u)) ≥ maxu

f1(u)−maxu

f2(u)

for arbitrary functions f1 and f2. Then, CB and CE, respec-tively, can be lower- and upper-bounded by [24, Theorem 5]

CB ≥1

2log

(1 +

2h2BA

2

πeσ2

), (28a)

CE ≤(

1− 2Q(δ + hEA

σ

))log

2(hEA+ δ)√2πσ2

(1− 2Q

(δσ

))+Q

σ

)+

δ√2πσ2

e−δ2

2σ2 − 1

2, (28b)

where δ > 0 is a free parameter. Finally, plugging (28) into(27) results in the lower bound in (9).

Copyright (c) 2015 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].

This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/10.1109/MCOM.2015.71582855

Page 11: Physical-Layer Security for MISO Visible Light ...lampe/Preprints/2015-VLC-Physical-Layer... · 1 Physical-Layer Security for MISO Visible Light Communication Channels Ayman Mostafa,

11

B. Lower Bound (10) of Theorem 1

Another lower bound on the secrecy capacity of (8) can beobtained as follows.

CSISOs = max

pX(I(X;Y )− I(X;Z))

= maxpX

(h(Y )− h(Y |X)− h(Z) + h(Z|X))

= maxpX

(h(Y )− h(Z))

= maxpX

(h(hBX +WB)− h(Z))

(a)≥ max

pX

(1

2log(e2h(hBX) + e2h(WB)

)−1

2log 2πe× var {Z}

)(b)≥ 1

2log(4h2

BA2 + 2πeσ2

)− 1

2log 2πe

(4h2

EA2

12+ σ2

)=

1

2log

6h2BA

2 + 3πeσ2

πeh2EA

2 + 3πeσ2, (29)

where (a) follows from lower-bounding h(hBX +WB) usingthe entropy-power inequality [34, Theorem 17.7.3], and upper-bounding h(Z) by the differential entropy of a Gaussianrandom variable with variance var{Z}, and (b) from droppingthe maximization, choosing a uniform distribution pX over theinterval [−A,A], and substituting h(hBX) = log (2hBA) andvar{Z} = var{hEX}+ var{WE} = (2hEA)

2/12 + σ2.

APPENDIX BDERIVATION OF THE UPPER BOUND ON SECRECY

CAPACITY

We follow the approach proposed in [39], [40] to derive anupper bound on the secrecy capacity of the degraded wiretapchannel using a dual expression for the secrecy capacity.

A. Duality-Based Upper Bound on Conditional Mutual Infor-mation

Theorem 2: The conditional mutual information I(X;Y |Z)is upper-bounded by

I(X;Y |Z) ≤ EpXZ{D(pY |XZ(y|X,Z)‖qY |Z(y|Z)

)}, (30)

where pY |XZ is uniquely determined by the conditional distri-butions of the degraded wiretap channel, i.e., pY |X and pZ|Y ,while qY |Z is an arbitrary conditional distribution of Y givenZ.

Proof: We begin with

I(X;Y |Z)

=

∫X

∫Y

∫Z

pXY Z(x, y, z) logpY |XZ(y|x, z)pY |Z(y|z)

dx dy dz (31)

and

EpXZ{D(pY |Z(y|Z)‖qY |Z(y|Z)

)}=

∫X

∫Y

∫Z

pXY Z(x, y, z) logpY |Z(y|z)qY |Z(y|z)

dx dy dz, (32)

where X , Y , and Z are the support sets of X , Y , and Z,respectively. Adding (31) to (32), we obtain

I(X;Y |Z) + EpXZ{D(pY |Z(y|Z)‖qY |Z(y|Z)

)}=

∫X

∫Y

∫Z

pXY Z(x, y, z) logpY |XZ(y|x, z)qY |Z(y|z)

dx dy dz

= EpXZ

∫Y

pY |XZ(y|X,Z) logpY |XZ(y|X,Z)

qY |Z(y|Z)dy

= EpXZ

{D(pY |XZ(y|X,Z)‖qY |Z(y|Z)

)}. (33)

Then, the inequality in (30) follows by noting that the integralin (32) is always non-negative. �

Equality holds in (30) when D(pY |Z‖qY |Z

)= 0, i.e., when

qY |Z = pY |Z ∀Z ∈ Z. Therefore, (30) can be written as

I(X;Y |Z) = minqY |Z

EpX pZ|X

{D(pY |XZ(y|X,Z)‖qY |Z(y|Z)

)}.

(34)Notice that the input distribution pX in (34) is arbitrary,and there exists a unique distribution p∗X that maximizesI(X;Y |Z), subject to the channel input constraints, resultingin the secrecy capacity Cs, i.e.,

Cs = minqY |Z

maxpX

EpX pZ|X

{D(pY |XZ(y|X,Z)‖qY |Z(y|Z)

)}.

(35)Then, by dropping the minimization and choosing an arbitraryconditional distribution qY |Z , we obtain the following upperbound on the secrecy capacity.

Lemma 1: An upper bound on the secrecy capacity of thedegraded wiretap channel is given by

Cs ≤ Ep∗X pZ|X

{D(pY |XZ(y|X,Z)‖qY |Z(y|Z)

)}(36)

for an arbitrary conditional distribution qY |Z .

B. Upper Bound (11) of Theorem 1Substituting for D(·‖·) in (36), we obtain

Cs ≤ Ep∗XpZ|X

∫Y

pY |XZ(y|X,Z) logpY |XZ(y|X,Z)

qY |Z(y|Z)dy

= Ep∗X

∫Y

∫Z

pY Z|X(y, z|X) log pY |XZ(y|X, z) dy dz

︸ ︷︷ ︸I1

−Ep∗X

∫Y

∫Z

pY Z|X(y, z|X) log qY |Z(y|z) dy dz

︸ ︷︷ ︸I2

.

(37)

We define γ2B = σ2/h2

B and γ2E = σ2/h2

E. Thus,

I1 = Ep∗X pY Z|X

{log pY |XZ(Y |X,Z)

}= −h(Y |X,Z)

= − (h(Y |X) + h(Z|X,Y )− h(Z|X))

= −1

2log

(2πe

γ2B(γ2

E − γ2B)

γ2E

). (38)

Copyright (c) 2015 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].

This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/10.1109/MCOM.2015.71582855

Page 12: Physical-Layer Security for MISO Visible Light ...lampe/Preprints/2015-VLC-Physical-Layer... · 1 Physical-Layer Security for MISO Visible Light Communication Channels Ayman Mostafa,

12

To calculate I2, we choose qY |Z as

qY |Z(y|z) =1√

2πs2e−

(y−µz)2

2s2 , (39)

where µ and s2 are constants to be determined in (42).For a degraded Gaussian wiretap channel, we have

pY Z|X(y, z|x) = pY |X(y|x) pZ|XY (z|x, y)

= pY |X(y|x) pZ|Y (z|y)

=1√

2πγ2B

e− (y−x)2

2γ2B

1√2π(γ2

E − γ2B)e− (z−y)2

2(γ2E−γ

2B ) .

(40)

Therefore,

I2 = −Ep∗X

1√2πγ2

B

∞∫−∞

e− (y−X)2

2γ2B

∞∫−∞

1√2π (γ2

E − γ2B)×

e− (z−y)2

2(γ2E−γ

2B )

(−1

2log 2πs2 − (y − µz)2

2s2

)dy dz

=

1

2log 2πs2 + Ep∗X

1√2πγ2

B

∞∫−∞

e− (y−X)2

2γ2B ×

1

2s2

(µ2(γ2

E − γ2B

)+ (µ− 1)

2y2)dy

=

1

2log 2πs2

+ Ep∗X

{1

2s2

(µ2(γ2

E − γ2B

)+ (µ− 1)

2 (X2 + γ2

B

))}≤ 1

2log 2πs2 +

1

2s2

(µ2(γ2

E − γ2B

)+ (µ− 1)2

(A2 + γ2

B

))(41)

where the last inequality follows from Ep∗X{X2} ≤ A2. To

minimize the expression in (41), we choose

µ =A2 + γ2

B

A2 + γ2E, (42a)

s2 =(A2 + γ2

B)(γ2E − γ2

B)

A2 + γ2E

. (42b)

Plugging (42) into (41) and adding the result to (38), we obtain

Cs ≤1

2log

(A2 + γ2B)γ2

E

(A2 + γ2E)γ2

B

=1

2log

h2BA

2 + σ2

h2EA

2 + σ2. (43)

Notice that the upper bound in (43) can be obtained byrelaxing the amplitude constraint into the average powerconstraint E{X2} ≤ A2 and calculating the secrecy capacityof the resulting channel. Nevertheless, the proposed frameworkis useful for deriving upper bounds on the secrecy capacity ofarbitrary degraded channels since Lemma 1 holds for arbitrarydistributions pY |X and pZ|Y , i.e., the main and degradedchannels need not be Gaussian.

ACKNOWLEDGMENT

The authors would like to thank Prof. Steve Hranilovic atMcMaster University for insightful comments and suggestions.

REFERENCES

[1] “IEEE Standard for Local and Metropolitan Area Networks–Part 15.7:Short-Range Wireless Optical Communication Using Visible Light,”IEEE Std 802.15.7-2011, pp. 1–309, 2011.

[2] R. Lenk and C. Lenk, Practical Lighting Design With LEDs. Wiley,2011.

[3] Y. Liang, H. V. Poor, and S. Shamai (Shitz), Information Theoretic Secu-rity, ser. Foundations and Trends R© in Communications and InformationTheory. Now Publishers, 2009, vol. 5, no. 4-5.

[4] M. Bloch and J. Barros, Physical-Layer Security: From InformationTheory to Security Engineering. Cambridge University Press, October2011.

[5] R. Liu and W. Trappe, Eds., Securing Wireless Communications at thePhysical Layer. Springer, 2010.

[6] H. Wen, Physical Layer Approaches for Securing Wireless Communi-cation Systems, ser. SpringerBriefs in Computer Science. Springer,2013.

[7] X. Zhou, L. Song, and Y. Zhang, Eds., Physical Layer Security inWireless Communications. CRC Press, 2013.

[8] Y.-W. P. Hong, P.-C. Lan, and C.-C. J. Kuo, Signal Processing Ap-proaches to Secure Physical Layer Communications in Multi-AntennaWireless Systems, ser. SpringerBriefs in Electrical and Computer Engi-neering. Springer, 2014.

[9] A. Mukherjee, S. Fakoorian, J. Huang, and A. Swindlehurst, “Principlesof physical layer security in multiuser wireless networks: A survey,”IEEE Communications Surveys & Tutorials, vol. 16, no. 3, pp. 1550–1573, Third quarter 2014.

[10] C. E. Shannon, “Communication theory of secrecy systems,” Bell SystemTechnical Journal, vol. 28, pp. 656–715, 1949.

[11] A. D. Wyner, “The wire-tap channel,” Bell System Technical Journal,vol. 54, pp. 1355–1387, 1975.

[12] S. Leung-Yan-Cheong and M. Hellman, “The Gaussian wire-tap chan-nel,” IEEE Transactions on Information Theory, vol. 24, no. 4, pp. 451–456, 1978.

[13] I. Csiszar and J. Korner, “Broadcast channels with confidential mes-sages,” IEEE Transactions on Information Theory, vol. 24, no. 3, pp.339–348, 1978.

[14] S. Shafiee, N. Liu, and S. Ulukus, “Towards the secrecy capacityof the Gaussian MIMO wire-tap channel: The 2-2-1 channel,” IEEETransactions on Information Theory, vol. 55, no. 9, pp. 4033–4039,Sept 2009.

[15] R. Liu and H. Poor, “Secrecy capacity region of a multiple-antennaGaussian broadcast channel with confidential messages,” IEEE Trans-actions on Information Theory, vol. 55, no. 3, pp. 1235–1249, March2009.

[16] T. Liu and S. Shamai, “A note on the secrecy capacity of the multiple-antenna wiretap channel,” IEEE Transactions on Information Theory,vol. 55, no. 6, pp. 2547–2553, June 2009.

[17] A. Khisti and G. W. Wornell, “Secure transmission with multipleantennas—part II: The MIMOME wiretap channel,” IEEE Transactionson Information Theory, vol. 56, no. 11, pp. 5515–5532, 2010.

[18] F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretapchannel,” IEEE Transactions on Information Theory, vol. 57, no. 8, pp.4961–4972, Aug 2011.

[19] A. Khisti and G. W. Wornell, “Secure transmission with multipleantennas I: The MISOME wiretap channel,” IEEE Transactions onInformation Theory, vol. 56, no. 7, pp. 3088–3104, 2010.

[20] K. Tae-Gyu, “Visible-light communications,” in Advanced Optical Wire-less Communication Systems, S. Arnon, J. R. Barry, G. K. Karagiannidis,R. Schober, and M. Uysal, Eds. Cambridge University Press, 2012,pp. 351–368.

[21] Z. Ghassemlooy, W. Popoola, and S. Rajbhandari, “Visible light com-munications,” in Optical Wireless Communications: System and ChannelModelling with MATLAB R©. CRC Press, 2013, pp. 443–496.

[22] H. Elgala, R. Mesleh, and H. Haas, “Predistortion in optical wirelesstransmission using OFDM,” in Ninth International Conference on Hy-brid Intelligent Systems, vol. 2, Aug 2009, pp. 184–189.

[23] S. Hranilovic and F. Kschischang, “Optical intensity-modulated directdetection channels: signal space and lattice codes,” IEEE Transactionson Information Theory, vol. 49, no. 6, pp. 1385–1399, June 2003.

Copyright (c) 2015 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].

This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/10.1109/MCOM.2015.71582855

Page 13: Physical-Layer Security for MISO Visible Light ...lampe/Preprints/2015-VLC-Physical-Layer... · 1 Physical-Layer Security for MISO Visible Light Communication Channels Ayman Mostafa,

13

[24] A. Lapidoth, S. Moser, and M. Wigger, “On the capacity of free-spaceoptical intensity channels,” IEEE Transactions on Information Theory,vol. 55, no. 10, pp. 4449–4461, Oct 2009.

[25] C. E. Shannon, “A mathematical theory of communication,” Bell SystemTechnical Journal, vol. 27, pp. 379–423, July/October 1948.

[26] J. G. Smith, On the Information Capacity of Peak and Average PowerConstrained Gaussian Channels. Ph.D. dissertation, Department ofElectrical Engineering, University of California, Berkeley, California,1969.

[27] ——, “The information capacity of amplitude- and variance-constrainedscalar Gaussian channels,” Journal of Information and Control, vol. 18,pp. 203–219, 1971.

[28] S. Arimoto, “An algorithm for computing the capacity of arbitrary dis-crete memoryless channels,” IEEE Transactions on Information Theory,vol. 18, no. 1, pp. 14–20, Jan 1972.

[29] O. Ozel, E. Ekrem, and S. Ulukus, “Gaussian wiretap channel withan amplitude constraint,” in 2012 IEEE Information Theory Workshop(ITW), Sept 2012, pp. 139–143.

[30] T. Komine and M. Nakagawa, “Fundamental analysis for visible-lightcommunication system using LED lights,” IEEE Transactions on Con-sumer Electronics, vol. 50, no. 1, pp. 100–107, 2004.

[31] J. Grubor, S. Randel, K.-D. Langer, and J. Walewski, “Broadbandinformation broadcasting using LED-based interior lighting,” Journalof Lightwave Technology, vol. 26, no. 24, pp. 3883–3892, Dec 2008.

[32] L. Zeng et al., “High data rate multiple input multiple output (MIMO)optical wireless communications using white LED lighting,” IEEEJournal on Selected Areas in Communications, vol. 27, no. 9, pp. 1654–1662, 2009.

[33] J. Kahn and J. Barry, “Wireless infrared communications,” Proceedingsof the IEEE, vol. 85, no. 2, pp. 265–298, Feb 1997.

[34] T. M. Cover and J. A. Thomas, Elements of Information Theory. Wiley,2006.

[35] E. Wong, Active-Set Methods for Quadratic Programming. Ph.D.dissertation, University of California, San Diego, 2011.

[36] J.-Y. Gotoh and H. Konno, “Maximization of the ratio of two convexquadratic functions over a polytope,” Computational Optimization andApplications, 20, pp. 43–60, 2001.

[37] H. P. Benson, “Fractional programming with convex quadratic forms andfunctions,” European Journal of Operational Research, 173 - Elsevier,pp. 351–369, 2005.

[38] W. Dinkelbach, “On nonlinear fractional programming,” ManagementScience, vol. 13, no. 7, pp. 492–498, 1967.

[39] A. Lapidoth and S. Moser, “Capacity bounds via duality with ap-plications to multiple-antenna systems on flat-fading channels,” IEEETransactions on Information Theory, vol. 49, no. 10, pp. 2426–2467,Oct 2003.

[40] S. M. Moser, Duality-Based Bounds on Channel Capacity. Ph.D.dissertation, Swiss Federal Institute of Technology, Zurich, 2004.

Ayman Mostafa (S’08) received the B.Sc. degreewith honours in electrical engineering from Alexan-dria University, Egypt in 2006, and the M.A.Sc.degree in electrical engineering from McMasterUniversity, Hamilton, ON, Canada in 2012. Heis currently working towards the Ph.D. degree inelectrical engineering at The University of BritishColumbia, Vancouver, BC, Canada. His current re-search interests are in the areas of optical wirelesscommunications, secure communications, and signalprocessing techniques for physical-layer security.

Lutz Lampe (M’02-SM’08) received the Dipl.-Ing.and Dr.-Ing. degrees in electrical engineering fromthe University of Erlangen, Erlangen, Germany, in1998 and 2002, respectively. Since 2003, he has beenwith the Department of Electrical and ComputerEngineering, University of British Columbia, Van-couver, BC, Canada, where he is a Full Professor.His research interests are broadly in theory andapplication of wireless, optical wireless and powerline communications. Dr. Lampe was the General(Co-)Chair for 2005 ISPLC and 2009 IEEE ICUWB

and General (Co-)Chair for the 2013 IEEE SmartGridComm. He is currentlyan Associate Editor of the IEEE WIRELESS COMMUNICATIONS LET-TERS and the IEEE COMMUNICATIONS SURVEYS AND TUTORIALSand has served as an Associate Editor and a Guest Editor of several IEEETRANSACTIONS and journals. He was a (co-)recipient of a number of BestPaper Awards, including awards at the 2006 IEEE International Conferenceon Ultra-Wideband (ICUWB), 2010 IEEE International CommunicationsConference (ICC), and 2011 IEEE International Conference on Power LineCommunications (ISPLC).

Copyright (c) 2015 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].

This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/10.1109/MCOM.2015.71582855