Papers
Topics
Authors
Recent
Search
2000 character limit reached

Q-learning-based Joint Design of Adaptive Modulation and Precoding for Physical Layer Security in Visible Light Communications

Published 21 Feb 2024 in cs.IT, cs.SY, eess.SY, and math.IT | (2402.13549v1)

Abstract: There has been an increasing interest in physical layer security (PLS), which, compared with conventional cryptography, offers a unique approach to guaranteeing information confidentiality against eavesdroppers. In this paper, we study a joint design of adaptive $M$-ary pulse amplitude modulation (PAM) and precoding, which aims to optimize wiretap visible-light channels' secrecy capacity and bit error rate (BER) performances. The proposed design is motivated by higher-order modulation, which results in better secrecy capacity at the expense of a higher BER. On the other hand, a proper precoding design, which can manipulate the received signal quality at the legitimate user and the eavesdropper, can also enhance secrecy performance and influence the BER. A reward function that considers the secrecy capacity and the BERs of the legitimate user's (Bob) and the eavesdropper's (Eve) channels is introduced and maximized. Due to the non-linearity and complexity of the reward function, it is challenging to solve the optical design using classical optimization techniques. Therefore, reinforcement learning-based designs using Q-learning and Deep Q-learning are proposed to maximize the reward function. Simulation results verify that compared with the baseline designs, the proposed joint designs achieve better reward values while maintaining the BER of Bob's channel (Eve's channel) well below (above) the pre-FEC (forward error correction) BER threshold.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (12)
  1. M. A. Arfaoui, M. D. Soltani, I. Tavakkolnia, A. Ghrayeb, M. Safari, C. M. Assi, and H. Haas, “Physical layer security for visible light communication systems: A survey,” IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1887–1908, 2020.
  2. A. D. Wyner, “The wire-tap channel,” Bell system technical journal, vol. 54, no. 8, pp. 1355–1387, 1975.
  3. I. Csiszár and J. Korner, “Broadcast channels with confidential messages,” IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339–348, 1978.
  4. D. Castelvecchi, “The race to save the internet from quantum hackers,” Nature, vol. 602, pp. 198–201, 2022.
  5. A. Mostafa and L. Lampe, “Physical-layer security for MISO visible light communication channels,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 9, pp. 1806–1818, 2015.
  6. S. Ma, Z.-L. Dong, H. Li, Z. Lu, and S. Li, “Optimal and robust secure beamformer for indoor MISO visible light communication,” Journal of Lightwave Technology, vol. 34, no. 21, pp. 4988–4998, 2016.
  7. T. V. Pham and A. T. Pham, “Secrecy sum-rate of multi-user MISO visible light communication systems with confidential messages,” Optik, vol. 151, pp. 65–76, 2017.
  8. M. A. Arfaoui, A. Ghrayeb, and C. M. Assi, “Secrecy performance of multi-user MISO VLC broadcast channels with confidential messages,” IEEE Transactions on Wireless Communications, vol. 17, no. 11, pp. 7789–7800, 2018.
  9. T. Komine and M. Nakagawa, “Fundamental analysis for visible-light communication system using LED lights,” IEEE Trans. Consum. Electron., vol. 50, no. 1, pp. 100–107, 2004.
  10. K. Cho and D. Yoon, “On the general ber expression of one- and two-dimensional amplitude modulations,” IEEE Transactions on Communications, vol. 50, no. 7, pp. 1074–1080, 2002.
  11. L. Xiao et al., “Deep reinforcement learning-enabled secure visible light communication against eavesdropping,” IEEE Trans Commun., vol. 67, no. 10, pp. 6994–7005, 2019.
  12. V. Mnih et al., “Human-level control through deep reinforcement learning,” Nature, vol. 518, pp. 529–533, Feb. 2015.
Citations (2)

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 2 tweets with 1 like about this paper.