ORIGINAL RESEARCH article

Front. Phys., 30 July 2021

Sec. Optics and Photonics

Volume 9 - 2021 | https://doi.org/10.3389/fphy.2021.683479

Secrecy Performance Analysis of Hybrid RF/VLC Dual-Hop Relaying Systems

  • 1. Shandong Key Laboratory of Optical Communication Science and Technology, School of Physics Science and Information Technology, Liaocheng University, Liaocheng, China

  • 2. Key Laboratory of Broadband Wireless Communication and Sensor Network Technology, Nanjing University of Posts and Telecommunications, Nanjing, China

  • 3. Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China

Abstract

In this article, the secrecy performance of a hybrid radio frequency (RF)/visible light communication (VLC) system is studied. In this hybrid system, the source node (i.e., Alice) transmits information to the relay node via the outdoor RF link. Nakagami-m fading and path loss are considered for the RF link. The relay node includes an outdoor component and an indoor component, which are connected by using a wired medium. The outdoor component receives and recovers information by using the decode-and-forward (DF) relaying scheme and then transmits it to the indoor component. The indoor component then converts the received electrical signal into an optical signal by using a light-emitting diode. A legitimate receiver (i.e., Bob) deployed on the floor receives the optical signal. An eavesdropper (i.e., Eve) deployed in the RF or VLC link wiretaps the confidential information. In this study, we use the secrecy outage probability (SOP) and the probability of strictly positive secrecy capacity (SPSC) to evaluate the system performance. We then obtain the closed-form expression for a lower bound on the SOP and an exact closed-form expression for the probability of SPSC when the RF and VLC links are wiretapped, respectively. Numerical results are presented to validate the accuracy of our derivations. We further discuss the effects of the noise standard deviation, the equivalent threshold of the signal-to-noise ratio, and the floor radius on the system secrecy performance when the VLC link is eavesdropped upon. For the case when the RF link is eavesdropped upon, the impacts of the distance between Alice and the relay, the path loss exponent, the fading factor, and the distance between Alice and Eve on secrecy performance are also provided.

1 Introduction

In the past ten years, the research on conventional radio frequency (RF) wireless communication has intensified [1]. With the rapid development of solid-state lighting, the visible light communication (VLC) technology has emerged as a promising technology in recent years [2]. VLC has a wider modulation bandwidth, less susceptibility to electromagnetic interference, and a larger capacity than RF communications. In VLC, both illumination and communication are simultaneously implemented [3]. The performance of VLC, however, heavily depends on the line-of-sight (LoS) connection, and it also has a limited coverage area. Therefore, the performance of VLC suffers severe degradation in the absence of the LoS link. Moreover, the light emitted by a light-emitting diode (LED) in VLC is easily blocked by obstacles [4]. In contrast, RF communication has higher transmission reliability even in the absence of the LoS link [510]. To address the issues mentioned above, hybrid VLC/RF technology is proposed to tackle the aforementioned problems. The VLC technology can overcome the shortcomings of RF spectrum shortage and large power consumption, while the RF technology compensates for the dependence of VLC on LoS to improve the communication coverage and also reduces the power consumption. Besides, VLC and RF signals do not interfere with each other [7].

There are several studies on hybrid wireless systems combining RF and VLC technologies. In reference [3], a random geometric framework for the coexistence of VLC and RF networks was proposed, and its coverage and achievable rate analysis for typical users were studied. In reference [5], the power and bandwidth allocation problem for the energy efficiency maximization of the VLC/RF hybrid system was solved, and the impact of the system parameters on the energy efficiency of the mixed system was investigated. The research in reference [7] showed that compared with the network that only uses RF or VLC, a hybrid RF/VLC network can reduce the probability of interruption by reducing the area power consumption. An effective beamforming design was also discussed in reference [8].

Since the physical layer security (PLS) utilizes the randomness of the wireless channel and noise, it is often considered to be a viable solution to ensure secure communication and prevent eavesdropping and jamming attacks [11]. In reference [9], PLS characteristics of the hybrid RF/VLC system were studied, the problem of minimizing the power consumption was also studied, and a zero-forcing beamforming strategy and a minimum power allocation algorithm were proposed. The PLS of indoor heterogeneous VLC/RF networks based on known and unknown channel state information (CSI) was further analyzed in reference [12]. In reference [13], the PLS transmission for VLC with simultaneous lightwave information and power transfer was investigated.

Besides, dual-hop relay technology has been considered to be another efficient technology that can be used to increase the capacity and expand the coverage of low-power wireless networks [14]. In such systems, the signal propagates from the source node to the destination node through a relay node, so that the connection can be realized in the case of high path loss and deep attenuation in the traditional direct transmission between the source node and the destination node. In references [4, 10], the dual-hop hybrid systems with energy harvesting relays were investigated. Specifically, the authors of reference [4] optimized the VLC/RF hybrid system from the perspective of maximizing the data rate, while the authors of reference [10] investigated the data packet transmission performance of the VLC/RF hybrid system. Furthermore, in reference [14], the performance of hybrid free-space optical (FSO) communication and RF dual-hop systems based on amplify-and-forward relaying and CSI-assisted relaying were analyzed, and the closed-form expressions for the outage probability and the average bit error rate were derived in the high signal-to-noise ratio (SNR) regime. In reference [15], the expressions of the outage probability, bit error rate, and average capacity of the hybrid RF/FSO system were derived for the first time. For amplify-and-forward relay, the outage probability and bit error probability of the hybrid RF/FSO system were also obtained in reference [16]. There are many studies on the PLS of the dual-hop system. It is noteworthy that the authors of references [1720] considered the mixed RF/FSO transmission systems. The lower bound of the secrecy outage probability (SOP) and the closed-form expression of the probability of strictly positive secrecy capacity (SPSC) when an eavesdropper is eavesdropping on the FSO link were derived in reference [17]. Furthermore, for a mixed RF/FSO downlink simultaneous wireless information and power transfer system, reference [18] derived the exact and asymptotic expressions of the SOP. The closed-form expressions for the lower bound of the SOP and the exact average secrecy capacity of mixed RF/FSO systems were also derived in reference [19], where an eavesdropper node eavesdrops on the FSO hop. In reference [20], the secrecy outage performance of a mixed RF/FSO system with imperfect CSI was analyzed. To the best of the authors’ knowledge, in the aforementioned works, Shannon’s capacity is often employed to evaluate the performance of the VLC link [11, 12]. However, in the actual VLC environment, the visible-light signal is an optical intensity signal, which means that the signal amplitude of the VLC system is non-negative. Furthermore, in the VLC system, it is necessary to consider illumination while transmitting data; therefore, the average optical intensity should be a fixed value according to the users’ dimming requirement [21]. Therefore, Shannon’s capacity is not suitable for VLC. Based on the considerations above, it is necessary to analyze the secrecy performance of the hybrid RF/VLC dual-hop relaying systems.

In this study, we analyze the PLS performance of a hybrid RF/VLC system. The main contributions are summarized as follows:

  • • Based on the system model, when the VLC link is eavesdropped upon, the probability density functions (PDFs) of the channel gain for the RF and VLC channels are derived, respectively. Using those PDFs, we then derive the closed-form expressions for the lower bound of the SOP and the probability of SPSC. It is also shown that the performance gap between theoretical results and simulation results is small, which verifies the accuracy of the derived expression. Moreover, the SOP increases with the noise standard deviation of Bob and decreases with the noise standard deviation of Eve. The SNR threshold degrades the system secrecy performance. The performance of the probability of SPSC mainly depends on the VLC, which deteriorates with Bob’s noise standard deviation and improves with Eve’s noise standard deviation or the radius of the floor.

  • • For the case when the RF link is eavesdropped upon, the PDFs and cumulative distribution functions (CDFs) of the instantaneous SNR at the relay node and the Eve node have been derived. Based on these statistic distributions, we also derive the closed-form expressions for the lower bound of the SOP and the probability of SPSC. The results further show that the performance gap between theoretical results and simulation results is also small, which verifies the accuracy of the derived expressions. In this case, the performance of the probability of SPSC mainly depends on the RF link, and all theoretical results of the probability of SPSC match the simulation results very well. Numerical results further confirm that the system secrecy performance is degraded with the distance between the Alice and relay nodes and the channel fading factor and improved by increasing the path loss exponent.

This article is arranged as follows. In Section 2, the system model of the hybrid VLC/RF system is presented. In Section 3, we derive the lower bound of the SOP and the exact expression of the probability of SPSC when the VLC link is eavesdropped upon. The secrecy performance analysis when the RF link is eavesdropped upon is presented in Section 4. Section 5 presents some numerical results. Finally, the conclusion of this article is given in Section 6.

2 System Model

As shown in Figure 1, we consider a dual-hop hybrid RF/VLC network, which includes an outdoor RF link and an indoor VLC link. The hybrid network is composed of a source node (Alice), a relay node, an eavesdropper (Eve), and a legitimate receiver (Bob). The relay node includes an outdoor component and an indoor component, which are connected by using a wired medium. In this study, we assume that the outdoor component receives and recovers information by using the DF relaying scheme and then transmits it to the indoor component. The indoor component converts the received electrical signal to an optical signal by using an LED. There is no direct communication between Alice and Bob; information must be transmitted through the relay node. The communication arranges two transmission time slots. In the first time slot, Alice transmits confidential information x to the outdoor component of the relay over the RF channel. In the second time slot, the indoor component of the relay forwards the optical signal X to Bob through the indoor VLC channel. Both Bob and Eve deploy photodiodes to receive information and perform photoelectric conversion. When Alice transmits to Bob, Eve attempts to intercept the secret information.

FIGURE 1

2.1 RF Link

In the first time slot, the received signal at the relay can be written as follows:where represents the transmission power at Alice, represents the channel gain of the RF link, x is the transmitted confidential information, and is additive white Gaussian noise (AWGN) with zero mean and variance .

The instantaneous SNR at the relay is given by the following:

In the RF link, in Eq. 2 can be expressed as follows:where and denote the fast fading and path loss, respectively. It should be noted that the two terms are independent of each other. The envelope of is assumed to experience a Nakagami-m fading, and thus the squared envelope follows a gamma distribution. Therefore, the PDF of can be written as follows [22]:where represents the fading factor, and represents the gamma function.

Furthermore, in Eq. 3 can be modeled as follows [22]:where λ denotes the path loss exponent, denotes the reference distance, and is the distance between Alice and the relay.

Therefore, the PDF of can be written as follows:

By using (8.351.1) in reference [23], the cumulative distribution function (CDF) of can be written as follows:where is the lower incomplete gamma function defined by (8.350.1) in reference [23].

2.2 VLC Link

In the second time slot, we consider an indoor VLC link. To facilitate the analysis, it is assumed that the receiving area is a disk with a radius D. As shown in Figure 1, the LED is projected at the center of the disk. Besides, we assume that both Bob and Eve are uniformly distributed within the area . According to the settings above, the PDF of Bob’s (or Eve’s) position is given by the following:where U represents the position of Bob and W represents the position of Eve.

In the second time slot, the received signals at Bob and Eve can be expressed as follows:where X represents the input optical intensity, is the AWGN at Bob (or Eve), and is the variance of the corresponding noise.

Because the information is modulated as the instantaneous optical intensity, X must meet the non-negative constraint as follows [21]:

Although the optical intensity can be adjusted according to the dimming requirements, the average optical intensity cannot change with time. Therefore, the dimmable average optical intensity constraint is given by the following [21]:where ξ indicates the dimming target, and P indicates the nominal optical intensity of the LED. Because the user can adjust the optical intensity at will, the dimming target must satisfy the following [21]:

Without loss of generality, we assume that both Bob and Eve can be illuminated by the LED, and thus, the illumination angle cannot exceed the field of view of the PD , that is, . In indoor VLC, the channel gain can be written as follows [24]:where and represent the distance and the irradiance angle between the LED and Bob (or Eve), A is the physical area of the PD, m denotes the order of the Lambertian emission, g is the PD’s concentrator gain, and represents the optical filter gain. Also, assuming that the normal vector between the transceiver plane and the ceiling is vertical, we can obtain , where l represents the vertical distance between the LED and the receiving plane. Therefore, the channel gain in Eq. 14 can be further written as follows:where is the distance between the projection point O and the receiver.

According to Eqs. 8 and 9, the CDF of can be expressed as follows:

Furthermore, the PDF of can be obtained as follows:where is the derivative of with respect to .

The PDF of the channel gain is then written as follows:where is a symbol for the absolute value.

Substituting Eq. 15 and Eq. 17 into Eq. 18, we can obtain the PDF of as follows:where , , and are given by the following:

3 Secrecy Performance Analysis When VLC Link Is Eavesdropped Upon

3.1 SOP Analysis

In this subsection, we analyze the SOP of the hybrid RF/VLC system. Because there are no eavesdroppers in the RF link, the instantaneous SC of the first hop is its instantaneous channel capacity, that is,

In the VLC link, we need to consider the average and non-negative constraints simultaneously. Therefore, Shannon’s capacity is not applicable to the VLC link [25]. For VLC with constraints as in Eqs 11, 12, a lower bound on the instantaneous SC is given by the following [26]:

Furthermore, according to Eq. 19, and , the PDFs of and are given by the following [13]:where , , , and .

As is known, the hybrid system is equivalent to a series network, so the capacity of the system is determined by the worse channel [27]. Therefore, the instantaneous SC of the entire hybrid system is the minimum of and , which can be expressed as follows1:

The SOP is an important performance metric to evaluate the PLS of a wireless communication system. It is defined as the probability that the instantaneous SC is lower than the target capacity . Therefore, SOP can be expressed as follows:

Substituting Eq. 26 into Eq. 27, the SOP is rewritten as follows:where is given by the following:

and is given by the following:where denotes the threshold of the targeted SC and denotes the equivalent threshold of the SNR [13]. It should be noted that it is challenging to obtain a closed-form expression of Eq. 30. In indoor VLC, it is reasonable to assume that and . When , we have . Therefore, an upper bound of Eq. 30 is given by the following:

From Eqs 28, 29, and 31, the SOP is lower-bounded by the following:

In Eq. 25, and are independent of each other. Moreover, the value of depends on the value of . Figure 2 shows four cases of the integral region of . Based on the four cases, is derived as follows:where and are given by the following:

FIGURE 2

andwhere .

The lower bound of the SOP can be further derived as follows:

Substituting Eq. 34 and Eq. 35 into Eq. 36, the expression for the lower bound of the SOP can be obtained as Eq. 37, as shown below:

Remark 1.According toEq. 33, with the increase in, the channel gaindecreases, and the integral range ofis enlarged. In this circumstance, the value of SOP inEq. 37increases with. Similarly, we can conclude that the SOP degrades with the increase in.

Remark 2.With the increase in, the value of the lower bound of the SOP inEq. 37is enlarged. Moreover, when, the lower bound of the SOP becomes one; hence, the information cannot be transmitted securely.

3.2 Probability of SPSC Analysis

In secure communications, the probability of SPSC is a fundamental benchmark that is employed to emphasize the existence of SC [17]. In this subsection, we derive the probability of SPSC of the hybrid RF/VLC system. The probability of SPSC is defined as follows:

According to Eq. 23, is expressed as follows:

and is expressed as follows:

Remark 3.Sinceis always equal to one, the performance of the probability of SPSC mainly depends on the VLC link.

It should be noted that the value of Eq. 40 also depends on the integral region. Figure 3 shows four cases of the integral region in Eq. 40. Based on the four cases, the probability of SPSC in Eq. 40 can be written as follows:Since and are independent of each other, and are given by the following:andFinally, the closed-from expression of the probability of SPSC can be expressed as follows:

FIGURE 3

Remark 4.Opposite to Remark 1, with the increase in, the channel gainis decreased, and the integral range ofis enlarged. In this circumstance, the value of the probability of SPSC can decrease with the increase in. Besides, we can conclude that the probability of the SPSC can increase with the increase in.

Remark 5.As the radius D increases, the probability of Eve being placed far away from Bob increases and the probability of Eve eavesdropping on confidential information decreases. Therefore, the channel gainis decreased, and the integral range ofis enlarged. According to Remark 3, the performance of the probability of SPSC mainly depends on the VLC link. Therefore, the performance of the system will be improved.

4 Secrecy Performance Analysis When RF Link Is Eavesdropped Upon

In Section 3, the SOP and the probability of the SPSC have been analyzed when the VLC link is eavesdropped upon. However, in practice, the RF link is more vulnerable to unauthorized users, so it is necessary to analyze the secrecy performance of the hybrid RF/VLC system when the RF link is eavesdropped upon. The system model is shown in Figure 4.

FIGURE 4

4.1 SOP Analysis

In this subsection, we analyze the SOP of a hybrid RF/VLC system when the RF link is eavesdropped upon. The instantaneous SC of the first hop is given by the following:where , represents the instantaneous SNR at Eve and it can be expressed as follows:

Similarly, the represents the channel gain between Alice and Eve, where can be written as follows:where the PDF of is as follows:where represents the fading factor between Alice and Eve. Furthermore, in Eq. 47 can be modeled as follows [22]:where is the distance between Alice and Eve. Therefore, the PDF and the CDF of () are as follows:

Because there are no eavesdroppers in the VLC link, the instantaneous SC of the first hop is its instantaneous channel capacity, that is, a lower bound on the instantaneous SC of the second hop is written by using the following [21]:

Similarly, the instantaneous SC of the entire hybrid system is the minimum of and , which is expressed as follows:

We have known that SOP can be given by . Furthermore, the SOP can be rewritten as follows:where

and

Substituting Eqs 54 and 55 into Eq. 53, we have the following:

It is mathematically difficult to obtain the exact close-form expression for SOP as shown in Eq. 56. Therefore, we alternatively evaluate the lower bound of SOP. We assume that and , and when , we have . Therefore, we can derive the lower bound of SOP as follows:where, is the Gauss hypergeometric function.

Remark 6.With the increase in, the Alice–relay link path loss is reduced, which results in the decreasing of the instantaneous SNR, and the value of theis reduced due to the channel advantages of the Alice–relay link over the Alice–Eve. Therefore, the value of the lower bound of the SOP also increased.

Remark 7.According toEqs 2, 46, and 54, it is seen that by increasing λ, the value of theis also increased, and then the lower bound of the SOP is decreased.

Remark 8.By increasing, the value of theis decreased and the value of theis also decreased. According toEq. 53, we can conclude that the value of the SOP is increased.

4.2 Probability of SPSC Analysis

Similarly, the probability of SPSC of the hybrid RF/VLC system when an eavesdropper eavesdrops on the RF link can be written as follows:

According to Eq. 45, is expressed as follows:

and is expressed as follows:

Based on Eqs 60 and 61, the closed-from expression of the probability of SPSC in Eq. 59 can be written as follows:

Remark 9.Similar to Remark 6, the probability of the SPSC decreases by increasing. However, with the increase in, the value of theis also increased. Therefore, the probability of the SPSC is increased by increasing.

Remark 10.Since the value of theis always equal to one, the probability of SPSC mainly depends on the RF link.

5 Numerical Results

In this section, we present the numerical results of hybrid RF/VLC systems. Here, the theoretical results of the derived lower bound of the SOP and the probability of SPSC are verified by using Monte-Carlo simulation, which is performed by generating random samples. Unless otherwise specified, the main simulation parameters of the hybrid system are listed in Table 1. It should be noted that all numerical results are obtained by using MATLAB.

TABLE 1

ParametersSymbolsValues
RFReference distance1 km
Noise variance1
Transmission power at Alice60 dB
VLCPhysical filter gain of the PDA
Optical filter gain of the PD1
Concentrator gain of the PDg3
Vertical distance between the LED and the floorl4 m
Order of Lambertian emissionm2

Main simulation parameters.

5.1 Results When VLC Link Is Eavesdropped Upon

Figure 5 shows the SOP versus Bob’s noise standard deviation with different Eve’s noise standard deviations when P = 60 dB, ξ = 0.2, and = 3. It is seen that the SOP performance deteriorates with the increase in , and this is because the larger the value of , the smaller the channel gain . A larger also leads to better secrecy performance, while a smaller degrades the secrecy performance. Besides, with the increase in , the value of SOP is reduced; therefore, by increasing , is reduced, and a smaller leads to higher secrecy as in Remark 1.

FIGURE 5

Figure 6 shows the SOP versus Bob’s noise standard deviation with different when P = 60 dB, ξ = 0.2, and = 3. As it is seen, the SOP increases with the increase in , which is consistent with that in Figure 5. Moreover, it can be observed that the value of SOP becomes larger with the increase in , which means that the system secrecy performance is degraded, which coincides with Remark 2.

FIGURE 6

From Figure 5 and Figure 6, it can be clearly observed that simulation results are in close agreement with the theoretical results, which validates our theoretical analysis of SOP as correct.

Figure 7 shows the probability of SPSC versus Bob’s noise standard deviation with different Eve’s noise standard deviations when P = 60 dB and ξ = 0.2. It can be seen that the performance of the probability of SPSC deteriorates with the increase in , and this is because a larger value of results in a smaller channel gain . A larger leads to better secrecy performance, whereas a smaller value leads to worse secrecy performance. Moreover, it can be observed from the plot that the probability of SPSC is increased by increasing from = 2 to = 4. This means that by increasing , is reduced, and a smaller leads to better secrecy performance. This is consistent with Remark 4.

FIGURE 7

Figure 8 shows the probability of SPSC versus Bob’s noise standard deviation with different floor radii D when P = 60 dB and ξ = 0.2. It can be seen from Figure 8 that when , the probability of SPSC decreases with the increase in D. This is because when , a larger () leads to a smaller , and thus, secrecy performance mainly depends on Bob’s and Eve’s SNRs. When , it is seen that by increasing D from 4 to 12 m, the value of the probability of SPSC is increased. This is also consistent with Remark 5. Expanding the floor radius, D, also decreases the probability of Eve eavesdropping on information, which improves the performance of the hybrid system.

FIGURE 8

Moreover, it can be found from Figure 7 and Figure 8 that all theoretical results match simulation results very well, which indicates the correctness of the theoretical analysis.

5.2 Results When RF Link Is Eavesdropped Upon

Figure 9 shows SOP versus the distance between nodes Alice and relay with different path loss exponents λ when P = 60 dB, = 2, = 2, = 2, and = 2 (eavesdropping on the RF link). It can be seen that the SOP performance is deteriorated by increasing , which is intuitive because a larger value of results in a smaller channel gain, , which then results in a worse secrecy performance. This conclusion is consistent with Remark 6. Moreover, with the increase in path loss exponent λ, the value of SOP becomes smaller, which means that the system secure transmission performance is improved. This verifies the conclusion in Remark 7.

FIGURE 9

Figure 10 shows the SOP versus the distance between nodes Alice and relay with different Alice–Eve channel fading factors when P = 60 dB, λ = 3, = 2, = 2, and = 2 (eavesdropping on the RF link). As it is seen, by increasing , the SOP performance is degraded with the increase in . This is also consistent with that in Figure 9. Besides, by increasing , the value of SOP also becomes large. This is because the larger the value of , the smaller the Alice–Eve channel fading which, in turn, deteriorates the secrecy performance. This verifies the conclusion in Remark 8.

FIGURE 10

From Figure 9 and Figure 10, it should be emphasized that the performance gap between theoretical results and simulation results is small, which verifies the accuracy of the derived expression, which indicates that the scaling for the lower bound of SOP is reasonable.

Figure 11 shows the probability of SPSC versus the distance between nodes Alice and relay with different distances between node Alice and Eve when P = 60 dB, λ = 3, = 2, = 2, and = 2 (eavesdropping on the RF link). It is seen that the SPSC performance is decreased by increasing . This also indicates that the system secrecy performance is reduced when the relay node receives less confidential information. This conclusion is consistent with that in Figure 9. By increasing , Eve eavesdrops on less information. Therefore, the larger the value of , the better the performance. This is also consistent with Remark 9.

FIGURE 11

Figure 12 shows the probability of SPSC versus the distance between nodes Alice and relay with different Alice–Eve channel fading factors when P = 60 dB, λ = 3, = 2, = 2, and = 2 (eavesdropping on the RF link). Similar to Figure 11, the probability of the SPSC performance degrades with the increase in . Moreover, for smaller than 1.6 (km), the probability of the SPSC increases with the increase in the Alice–Eve channel fading factor . However, if is larger than 1.6 (km), the probability of the SPSC increases with the decrease in the Alice–Eve channel fading factor . This is because for small , the relay node has a stronger ability to receive confidential information than Eve. For a larger , Eve eavesdrops on more confidential information.

FIGURE 12

From Figure 11 and Figure 12, all theoretical results of the probability of the SPSC match the simulation results very well, which verifies the accuracy of the derived theoretical expression of the probability of the SPSC. Therefore, the derived expression can be used directly to evaluate the system performance with time-intensive simulations.

5.3 Comparisons for Systems With and Without Eavesdroppers

Figure 13 depicts OP performance for systems with and without an RF eavesdropper when ξ = 0.2 and = 3. It is seen that the OP performance decreases with the increase in P, and this is because the larger the value of P, the larger the capacity of the second hop becomes. Besides, with the increase in larger , the OP performance is deteriorated, which is consistent with Remark 1. Furthermore, for fixed P and , the system with an RF eavesdropper achieves worse OP performance than the system without an eavesdropper. It is because the existence of the eavesdropper increases the security risk of the system.

FIGURE 13

Figure 14 illustrates the OP performance for systems with and without a VLC eavesdropper when ξ = 0.2 and = 3. As it is seen, the value of OP decreases with the increase in P, which is consistent with that in Figure 13. Moreover, it can be observed that for fixed and P, the value of OP becomes larger when the VLC link is eavesdropped upon.

FIGURE 14

6 Conclusion

In this article, we have studied the performance of a hybrid RF/VLC DF-based relaying network, in which two scenarios are taken into account: in one scenario, the VLC link is wiretapped, and in the other scenario, the RF link is wiretapped. The major conclusions of the study are given as follows:

  • 1. We assume that the RF link experiences Nakagami-m fading and has path loss, and the non-negative and average optical intensity constraint in the VLC link is considered. The closed-form expressions of the lower bound of SOP and the probability of SPSC are derived, respectively. Numerical results show that theoretical results match simulation results well.

  • 2. When the VLC link is eavesdropped upon, Bob’s (or Eve’s) noise standard deviation (or ), the equivalent threshold of the SNR , and the floor radius D have strong impacts on the performance of SOP or the probability of SPSC. The increase in the and degrades the system secrecy performance, while the increase in and D will improve the secrecy performance.

  • 3. If the RF link is eavesdropped upon, we can conclude that with the increase in , the system secrecy performance is degraded, whereas the increase in λ and improves the secrecy performance.

  • 4. The derived theoretical expressions in this study will enable communication system designers to quickly and accurately evaluate PLS performance of the hybrid RF/VLC system without time-intensive and laborious Monte-Carlo simulations.

In this study, the secrecy performance of the hybrid RF/indoor VLC system is analyzed. In future work, we will establish the channel model for outdoor VLC and continue to study the secrecy performance of the hybrid RF/outdoor VLC system. Moreover, we will also explore some secrecy performance improvement schemes of the hybrid system.

Statements

Data availability statement

The original contributions presented in the study are included in the article/Supplementary Material; further inquiries can be directed to the corresponding authors.

Author contributions

JW and QW designed the research. JW, QW, and JL contributed with data acquisition, analysis, and discussion of results. BZ contributed to the data analysis. JL wrote the manuscript with input from all other authors.

Funding

This work is supported by the National Nature Science Foundation of China (61701254 and 11604133), the Science and Technology Plan of Youth Innovation Team for Universities of Shandong Province (2019KJJ019), the Introduction and Cultivation Plan of Youth Innovation Talents for Universities of Shandong Province, the Fund of the Shandong Key Laboratory of Optical Communication Science and Technology in Liaocheng University (SDOC201901), and the Open Project of Shanghai Key Laboratory of Trustworthy Computing.

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

Footnotes

1.^Note that the instantaneous SC in reference [18] is defined as the difference of channel capacities between the Alice–relay–Bob channel and the Alice–relay–Eve channel. Different from reference [18], the instantaneous SC in our study is defined as the minimum SC of the two hops, which is similar to that in reference [17].

2.^The orange rectangle in Figure 2 is determined by JB and JE, and the red straight line represents . The integral region is the yellow enclosed area enclosed by the red straight line and the orange rectangle in Figure 2. The four cases in Figure 2 depend on the slope γth of the line and the ratio of JB and JE. According to mathematical knowledge, the value of is actually equal to the double integral on the integral region, and the calculation of the double integral is realized by the repeated integral.

3.^Similarly to Figure 2, the orange rectangle in Figure 3 is also determined by JB and JE, and the red straight line represents JB = JE. The integral region is also the yellow enclosed area enclosed by the red straight line and the orange rectangle in Figure 3. The four cases in Figure 3 depend on the slope 1 of the line and the ratio of JB and JE. According to mathematical knowledge, the value of Pr {JB > JE} is actually equal to the double integral on the integral region, and the calculation of the double integral is realized by the repeated integral.

References

  • 1.

    YangZChenMWongKKPoorHVCuiS. Federated Learning for 6G: Applications, Challenges, and Opportunities. arXiv preprint arXiv:2101.01338 (2021).

  • 2.

    WangJ-YYangZWangYChenM. On the Performance of Spatial Modulation Based Optical Wireless Communications. IEEE Photon Technol Lett (2016) 28:1. 10.1109/LPT.2016.2585502

  • 3.

    TabassumHHossainE. Coverage and Rate Analysis for Co-existing RF/VLC Downlink Cellular Networks. IEEE Trans Wireless Commun (2018) 17:2588601. 10.1109/TWC.2018.2799204

  • 4.

    RakiaTYangH-CGebaliFAlouiniM-S. Optimal Design of Dual-Hop VLC/RF Communication System with Energy Harvesting. IEEE Commun Lett (2016) 20:197982. 10.1109/LCOMM.2016.2595561

  • 5.

    KashefMIsmailMAbdallahMQaraqeKASerpedinE. Energy Efficient Resource Allocation for Mixed RF/VLC Heterogeneous Wireless Networks. IEEE J Select Areas Commun (2016) 34:88393. 10.1109/JSAC.2016.2544618

  • 6.

    HammoudaMAkinSVegniAMHaasHPeissigJ. Link Selection in Hybrid RF/VLC Systems under Statistical Queueing Constraints. IEEE Trans Wireless Commun (2018) 17:273854. 10.1109/TWC.2018.2802937

  • 7.

    KongJIsmailMSerpedinEQaraqeKA. Energy Efficient Optimization of Base Station Intensities for Hybrid RF/VLC Networks. IEEE Trans Wireless Commun (2019) 18:417183. 10.1109/TWC.2019.2922611

  • 8.

    HsiaoY-CWuY-CLinC. Energy-efficient Beamforming Design for MU-MISO Mixed RF/VLC Heterogeneous Wireless Networks. IEEE Trans Signal Process (2019) 67:377084. 10.1109/TSP.2019.2920612

  • 9.

    MarzbanMFKashefMAbdallahMKhairyM. Beamforming and Power Allocation for Physical-Layer Security in Hybrid RF/VLC Wireless Networks. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC). Piscataway, New Jersey: IEEE (2017). p. 25863.

  • 10.

    RakiaTYangHCGebaliFAlouiniMS. Dual-hop VLC/RF Transmission System with Energy Harvesting Relay under Delay Constraint. In: 2016 IEEE Globecom Workshops (GC Wkshps). Piscataway, New Jersey: IEEE (2016). p. 16.

  • 11.

    Al-KhoriJNauryzbayevGAbdallahMMHamdiM. Secrecy Performance of Decode-And-Forward Based Hybrid RF/VLC Relaying Systems. IEEE Access (2019) 7:1084456. 10.1109/ACCESS.2019.2891678

  • 12.

    KumarAGargPGuptaA. PLS Analysis in an Indoor Heterogeneous VLC/RF Network Based on Known and Unknown CSI. IEEE Syst J (2021) 15:6876. 10.1109/JSYST.2020.2964033

  • 13.

    WangJ-YQiuYLinS-HWangJ-BWangQZhangB. Performance Analysis and Improvement for Secure VLC with SLIPT and Random Terminals. IEEE Access (2020) 8:7364558. 10.1109/ACCESS.2020.2988470

  • 14.

    ZediniESouryHAlouiniM-S. On the Performance Analysis of Dual-Hop Mixed FSO/RF Systems. IEEE Trans Wireless Commun (2016) 15:367989. 10.1109/TWC.2016.2524685

  • 15.

    YangLHasnaMOGaoX. Performance of Mixed RF/FSO with Variable Gain over Generalized Atmospheric Turbulence Channels. IEEE J Select Areas Commun (2015) 33:191324. 10.1109/JSAC.2015.2432471

  • 16.

    Soleimani-NasabEUysalM. Generalized Performance Analysis of Mixed RF/FSO Cooperative Systems. IEEE Trans Wireless Commun (2016) 15:71427. 10.1109/TWC.2015.2477400

  • 17.

    PanXRanHPanGXieYZhangJ. On Secrecy Analysis of DF Based Dual Hop Mixed RF-FSO Systems. IEEE Access (2019) 7:6672530. 10.1109/ACCESS.2019.2914227

  • 18.

    LeiHDaiZParkK-HLeiWPanGAlouiniM-S. Secrecy Outage Analysis of Mixed RF-FSO Downlink SWIPT Systems. IEEE Trans Commun (2018) 66:638495. 10.1109/TCOMM.2018.2865944

  • 19.

    LeiHDaiZAnsariISParkK-HPanGAlouiniM-S. On Secrecy Performance of Mixed RF-FSO Systems. IEEE Photon J. (2017) 9:114. 10.1109/JPHOT.2017.2723422

  • 20.

    LeiHLuoHParkK-HRenZPanGAlouiniM-S. Secrecy Outage Analysis of Mixed RF-FSO Systems with Channel Imperfection. IEEE Photon J. (2018) 10:113. 10.1109/JPHOT.2018.2835562

  • 21.

    WangJ-BHuQ-SWangJChenMWangJ-Y. Tight Bounds on Channel Capacity for Dimmable Visible Light Communications. J Lightwave Technol (2013) 31:37719. 10.1109/JLT.2013.2286088

  • 22.

    SimonMKAlouiniMS. Digital Communication over Fading Channels. 2nd ed., Vol. 95. Hoboken, New Jersey: John Wiley & Sons (2005).

  • 23.

    JeffreyAZwillingerD. Table of Integrals, Series, and Products. Amsterdam, Netherlands: Elsevier (2007).

  • 24.

    KomineTNakagawaM. Fundamental Analysis for Visible-Light Communication System Using LED Lights. IEEE Trans Consumer Electron (2004) 50:1007. 10.1109/TCE.2004.1277847

  • 25.

    YinLHaasH. Physical-layer Security in Multiuser Visible Light Communication Networks. IEEE J Select Areas Commun (2018) 36:16274. 10.1109/JSAC.2017.2774429

  • 26.

    WangJ-YLiuCWangJ-BWuYLinMChengJ. Physical-layer Security for Indoor Visible Light Communications: Secrecy Capacity Analysis. IEEE Trans Commun (2018) 66:642336. 10.1109/TCOMM.2018.2859943

  • 27.

    AiYMathurACheffenaMBhatnagarMRLeiH. Physical Layer Security of Hybrid Satellite-FSO Cooperative Systems. IEEE Photon J (2019) 11:114. 10.1109/JPHOT.2019.2892618

Summary

Keywords

visible light communications, radio frequency communications, secrecy outage probability, probability of strictly positive secrecy capacity, hybrid RF/VLC systems

Citation

Liu J, Wang J, Zhang B and Wang Q (2021) Secrecy Performance Analysis of Hybrid RF/VLC Dual-Hop Relaying Systems. Front. Phys. 9:683479. doi: 10.3389/fphy.2021.683479

Received

21 March 2021

Accepted

28 June 2021

Published

30 July 2021

Volume

9 - 2021

Edited by

Haohai Yu, Shandong University, China

Reviewed by

Qiong Wu, Jiangnan University, China

Shuai Ma, China University of Mining and Technology, China

Zhaohui Yang, King’s College London, United Kingdom

Updates

Copyright

*Correspondence: Jinyuan Wang, ; Qinglin Wang,

This article was submitted to Optics and Photonics, a section of the journal Frontiers in Physics

Disclaimer

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

Outline

Figures

Cite article

Copy to clipboard


Export citation file


Share article

Article metrics