Secrecy Capacity Analysis for Indoor Visible Light Communications with Input-Dependent Gaussian Noise

  • Bo Huang
  • Jianxin DaiEmail author
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 301)


This paper mainly focus on the performance of secrecy capacity in the physical layer security (PLS) for the eavesdropping channel in visible light communication (VLC) system. In this system, due to the effects of thermal and shoot noises, the main interference of the channel is not only from additive white Gaussian noise (AWGN), but also dependent on the input signal. Considering a practical scenery, based on the input-dependent Gaussian noise, the closed-form expression of the upper and lower bounds of secrecy capacity are derived under the constraints of non-negative and average optical intensity. Specifically, since the entropy of the output signal is always greater than the input signal, on this basis, the derivation of lower bound is using the variational method to obtain a better input distribution. The upper bound is derived by the dual expression of channel capacity. We verified the performance of secrecy capacity through numerical results. The results show that the upper and lower bounds are relatively tight when optical intensity is high, which proves validity of the expression. In the low signal-to-noise ratio (SNR) scheme, the result of bounds with more input-dependent noise is better than less noise. And in the high SNR scheme, the result of bounds with less input-dependent noise outperforms that noise is more.


Input-dependent Gaussian noise Secrecy capacity Visible light communication 


  1. 1.
    Andrews, J.G., Buzzi, S., Choi, W., Hanly, S.V.: What will 5G be. IEEE J. Sel. Areas Commun. 32(3), 1065–1082 (2014)CrossRefGoogle Scholar
  2. 2.
    Komine, T., Nakagawa, M.: Fundamental analysis for visible-light communication system using LED lights. IEEE Trans. Consum. Electron. 50(1), 100–107 (2004)CrossRefGoogle Scholar
  3. 3.
    Karunatilaka, D., Zafar, F., Kalavally, V., Parthiban, R.: LED based indoor visible light communications: state of the art. IEEE Commun. Surv. Tut. 17(3), 1649–1678 (2015)CrossRefGoogle Scholar
  4. 4.
    Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Wyner, D.: The wire-tap channel. Bell Syst. Tech. J. 54, 1355–1387 (1975)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Lapidoth, A., Moser, S.M.: Capacity bounds via duality with applications to multiple-antenna systems on flat fading channels. IEEE Trans. Inf. Theory 49(10), 2426–2467 (2003)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Lapidoth, A., Moser, S.M., Wigger, M.A.: On the capacity of free-space optical intensity channels. IEEE Trans. Inf. Theory 55(10), 4449–4461 (2009)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Mostafa, A., Lampe, L.: Physical-layer security for MISO visible light communication channels. IEEE J. Sel. Areas Commun. 33(9), 1806–1818 (2015)CrossRefGoogle Scholar
  9. 9.
    Wang, J.-Y., Dai, J., Guan, R., Jia, L., Wang, Y., Chen, M.: On the channel capacity and receiver deployment optimization for multi-input multi-output visible light communications. Opt. Exp. 24(12), 13060–13074 (2016)CrossRefGoogle Scholar
  10. 10.
    Wang, J.-Y., Liu, C., Wang, J., Wu, Y., Lin, M., Cheng, J.: Physical layer security for indoor visible light communications: secrecy capacity analysis. IEEE Trans. Commun. 66(12), 6423–6436 (2018)CrossRefGoogle Scholar
  11. 11.
    Moser, S.M.: Capacity results of an optical intensity channel with input dependent Gaussian noise. IEEE Trans. Inf. Theory 58(1), 207–223 (2012)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Cover, T., Thomas, J.: Elements of Information Theory, 2nd edn. Wiley, Hoboken (2006)zbMATHGoogle Scholar
  13. 13.
    Csiszar, I., Korner, J.: Information Theory: Coding Theorems for Discrete Memoryless Systems. Academic, New York (1981)zbMATHGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.College of Telecommunications and Information EngineeringNanjing University of Posts and TelecommunicationsNanjingChina
  2. 2.School of ScienceNanjing University of Posts and TelecommunicationsNanjingChina
  3. 3.National Mobile Communications Research LaboratorySoutheast UniversityNanjingChina

Personalised recommendations