Q-learning-based Joint Design of Adaptive Modulation and Precoding for Physical Layer Security in Visible Light Communications
Abstract: There has been an increasing interest in physical layer security (PLS), which, compared with conventional cryptography, offers a unique approach to guaranteeing information confidentiality against eavesdroppers. In this paper, we study a joint design of adaptive $M$-ary pulse amplitude modulation (PAM) and precoding, which aims to optimize wiretap visible-light channels' secrecy capacity and bit error rate (BER) performances. The proposed design is motivated by higher-order modulation, which results in better secrecy capacity at the expense of a higher BER. On the other hand, a proper precoding design, which can manipulate the received signal quality at the legitimate user and the eavesdropper, can also enhance secrecy performance and influence the BER. A reward function that considers the secrecy capacity and the BERs of the legitimate user's (Bob) and the eavesdropper's (Eve) channels is introduced and maximized. Due to the non-linearity and complexity of the reward function, it is challenging to solve the optical design using classical optimization techniques. Therefore, reinforcement learning-based designs using Q-learning and Deep Q-learning are proposed to maximize the reward function. Simulation results verify that compared with the baseline designs, the proposed joint designs achieve better reward values while maintaining the BER of Bob's channel (Eve's channel) well below (above) the pre-FEC (forward error correction) BER threshold.
- M. A. Arfaoui, M. D. Soltani, I. Tavakkolnia, A. Ghrayeb, M. Safari, C. M. Assi, and H. Haas, “Physical layer security for visible light communication systems: A survey,” IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1887–1908, 2020.
- A. D. Wyner, “The wire-tap channel,” Bell system technical journal, vol. 54, no. 8, pp. 1355–1387, 1975.
- I. Csiszár and J. Korner, “Broadcast channels with confidential messages,” IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339–348, 1978.
- D. Castelvecchi, “The race to save the internet from quantum hackers,” Nature, vol. 602, pp. 198–201, 2022.
- A. Mostafa and L. Lampe, “Physical-layer security for MISO visible light communication channels,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 9, pp. 1806–1818, 2015.
- S. Ma, Z.-L. Dong, H. Li, Z. Lu, and S. Li, “Optimal and robust secure beamformer for indoor MISO visible light communication,” Journal of Lightwave Technology, vol. 34, no. 21, pp. 4988–4998, 2016.
- T. V. Pham and A. T. Pham, “Secrecy sum-rate of multi-user MISO visible light communication systems with confidential messages,” Optik, vol. 151, pp. 65–76, 2017.
- M. A. Arfaoui, A. Ghrayeb, and C. M. Assi, “Secrecy performance of multi-user MISO VLC broadcast channels with confidential messages,” IEEE Transactions on Wireless Communications, vol. 17, no. 11, pp. 7789–7800, 2018.
- T. Komine and M. Nakagawa, “Fundamental analysis for visible-light communication system using LED lights,” IEEE Trans. Consum. Electron., vol. 50, no. 1, pp. 100–107, 2004.
- K. Cho and D. Yoon, “On the general ber expression of one- and two-dimensional amplitude modulations,” IEEE Transactions on Communications, vol. 50, no. 7, pp. 1074–1080, 2002.
- L. Xiao et al., “Deep reinforcement learning-enabled secure visible light communication against eavesdropping,” IEEE Trans Commun., vol. 67, no. 10, pp. 6994–7005, 2019.
- V. Mnih et al., “Human-level control through deep reinforcement learning,” Nature, vol. 518, pp. 529–533, Feb. 2015.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.