Skip to main content

ORIGINAL RESEARCH article

Front. Phys., 30 July 2021
Sec. Optics and Photonics
Volume 9 - 2021 | https://doi.org/10.3389/fphy.2021.683479

Secrecy Performance Analysis of Hybrid RF/VLC Dual-Hop Relaying Systems

www.frontiersin.orgJiaoli Liu1 www.frontiersin.orgJinyuan Wang1,2,3* www.frontiersin.orgBingyuan Zhang1 www.frontiersin.orgQinglin Wang1*
  • 1Shandong Key Laboratory of Optical Communication Science and Technology, School of Physics Science and Information Technology, Liaocheng University, Liaocheng, China
  • 2Key Laboratory of Broadband Wireless Communication and Sensor Network Technology, Nanjing University of Posts and Telecommunications, Nanjing, China
  • 3Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China

In this article, the secrecy performance of a hybrid radio frequency (RF)/visible light communication (VLC) system is studied. In this hybrid system, the source node (i.e., Alice) transmits information to the relay node via the outdoor RF link. Nakagami-m fading and path loss are considered for the RF link. The relay node includes an outdoor component and an indoor component, which are connected by using a wired medium. The outdoor component receives and recovers information by using the decode-and-forward (DF) relaying scheme and then transmits it to the indoor component. The indoor component then converts the received electrical signal into an optical signal by using a light-emitting diode. A legitimate receiver (i.e., Bob) deployed on the floor receives the optical signal. An eavesdropper (i.e., Eve) deployed in the RF or VLC link wiretaps the confidential information. In this study, we use the secrecy outage probability (SOP) and the probability of strictly positive secrecy capacity (SPSC) to evaluate the system performance. We then obtain the closed-form expression for a lower bound on the SOP and an exact closed-form expression for the probability of SPSC when the RF and VLC links are wiretapped, respectively. Numerical results are presented to validate the accuracy of our derivations. We further discuss the effects of the noise standard deviation, the equivalent threshold of the signal-to-noise ratio, and the floor radius on the system secrecy performance when the VLC link is eavesdropped upon. For the case when the RF link is eavesdropped upon, the impacts of the distance between Alice and the relay, the path loss exponent, the fading factor, and the distance between Alice and Eve on secrecy performance are also provided.

1 Introduction

In the past ten years, the research on conventional radio frequency (RF) wireless communication has intensified [1]. With the rapid development of solid-state lighting, the visible light communication (VLC) technology has emerged as a promising technology in recent years [2]. VLC has a wider modulation bandwidth, less susceptibility to electromagnetic interference, and a larger capacity than RF communications. In VLC, both illumination and communication are simultaneously implemented [3]. The performance of VLC, however, heavily depends on the line-of-sight (LoS) connection, and it also has a limited coverage area. Therefore, the performance of VLC suffers severe degradation in the absence of the LoS link. Moreover, the light emitted by a light-emitting diode (LED) in VLC is easily blocked by obstacles [4]. In contrast, RF communication has higher transmission reliability even in the absence of the LoS link [510]. To address the issues mentioned above, hybrid VLC/RF technology is proposed to tackle the aforementioned problems. The VLC technology can overcome the shortcomings of RF spectrum shortage and large power consumption, while the RF technology compensates for the dependence of VLC on LoS to improve the communication coverage and also reduces the power consumption. Besides, VLC and RF signals do not interfere with each other [7].

There are several studies on hybrid wireless systems combining RF and VLC technologies. In reference [3], a random geometric framework for the coexistence of VLC and RF networks was proposed, and its coverage and achievable rate analysis for typical users were studied. In reference [5], the power and bandwidth allocation problem for the energy efficiency maximization of the VLC/RF hybrid system was solved, and the impact of the system parameters on the energy efficiency of the mixed system was investigated. The research in reference [7] showed that compared with the network that only uses RF or VLC, a hybrid RF/VLC network can reduce the probability of interruption by reducing the area power consumption. An effective beamforming design was also discussed in reference [8].

Since the physical layer security (PLS) utilizes the randomness of the wireless channel and noise, it is often considered to be a viable solution to ensure secure communication and prevent eavesdropping and jamming attacks [11]. In reference [9], PLS characteristics of the hybrid RF/VLC system were studied, the problem of minimizing the power consumption was also studied, and a zero-forcing beamforming strategy and a minimum power allocation algorithm were proposed. The PLS of indoor heterogeneous VLC/RF networks based on known and unknown channel state information (CSI) was further analyzed in reference [12]. In reference [13], the PLS transmission for VLC with simultaneous lightwave information and power transfer was investigated.

Besides, dual-hop relay technology has been considered to be another efficient technology that can be used to increase the capacity and expand the coverage of low-power wireless networks [14]. In such systems, the signal propagates from the source node to the destination node through a relay node, so that the connection can be realized in the case of high path loss and deep attenuation in the traditional direct transmission between the source node and the destination node. In references [4, 10], the dual-hop hybrid systems with energy harvesting relays were investigated. Specifically, the authors of reference [4] optimized the VLC/RF hybrid system from the perspective of maximizing the data rate, while the authors of reference [10] investigated the data packet transmission performance of the VLC/RF hybrid system. Furthermore, in reference [14], the performance of hybrid free-space optical (FSO) communication and RF dual-hop systems based on amplify-and-forward relaying and CSI-assisted relaying were analyzed, and the closed-form expressions for the outage probability and the average bit error rate were derived in the high signal-to-noise ratio (SNR) regime. In reference [15], the expressions of the outage probability, bit error rate, and average capacity of the hybrid RF/FSO system were derived for the first time. For amplify-and-forward relay, the outage probability and bit error probability of the hybrid RF/FSO system were also obtained in reference [16]. There are many studies on the PLS of the dual-hop system. It is noteworthy that the authors of references [1720] considered the mixed RF/FSO transmission systems. The lower bound of the secrecy outage probability (SOP) and the closed-form expression of the probability of strictly positive secrecy capacity (SPSC) when an eavesdropper is eavesdropping on the FSO link were derived in reference [17]. Furthermore, for a mixed RF/FSO downlink simultaneous wireless information and power transfer system, reference [18] derived the exact and asymptotic expressions of the SOP. The closed-form expressions for the lower bound of the SOP and the exact average secrecy capacity of mixed RF/FSO systems were also derived in reference [19], where an eavesdropper node eavesdrops on the FSO hop. In reference [20], the secrecy outage performance of a mixed RF/FSO system with imperfect CSI was analyzed. To the best of the authors’ knowledge, in the aforementioned works, Shannon’s capacity is often employed to evaluate the performance of the VLC link [11, 12]. However, in the actual VLC environment, the visible-light signal is an optical intensity signal, which means that the signal amplitude of the VLC system is non-negative. Furthermore, in the VLC system, it is necessary to consider illumination while transmitting data; therefore, the average optical intensity should be a fixed value according to the users’ dimming requirement [21]. Therefore, Shannon’s capacity is not suitable for VLC. Based on the considerations above, it is necessary to analyze the secrecy performance of the hybrid RF/VLC dual-hop relaying systems.

In this study, we analyze the PLS performance of a hybrid RF/VLC system. The main contributions are summarized as follows:

• Based on the system model, when the VLC link is eavesdropped upon, the probability density functions (PDFs) of the channel gain for the RF and VLC channels are derived, respectively. Using those PDFs, we then derive the closed-form expressions for the lower bound of the SOP and the probability of SPSC. It is also shown that the performance gap between theoretical results and simulation results is small, which verifies the accuracy of the derived expression. Moreover, the SOP increases with the noise standard deviation of Bob and decreases with the noise standard deviation of Eve. The SNR threshold degrades the system secrecy performance. The performance of the probability of SPSC mainly depends on the VLC, which deteriorates with Bob’s noise standard deviation and improves with Eve’s noise standard deviation or the radius of the floor.

• For the case when the RF link is eavesdropped upon, the PDFs and cumulative distribution functions (CDFs) of the instantaneous SNR at the relay node and the Eve node have been derived. Based on these statistic distributions, we also derive the closed-form expressions for the lower bound of the SOP and the probability of SPSC. The results further show that the performance gap between theoretical results and simulation results is also small, which verifies the accuracy of the derived expressions. In this case, the performance of the probability of SPSC mainly depends on the RF link, and all theoretical results of the probability of SPSC match the simulation results very well. Numerical results further confirm that the system secrecy performance is degraded with the distance between the Alice and relay nodes and the channel fading factor and improved by increasing the path loss exponent.

This article is arranged as follows. In Section 2, the system model of the hybrid VLC/RF system is presented. In Section 3, we derive the lower bound of the SOP and the exact expression of the probability of SPSC when the VLC link is eavesdropped upon. The secrecy performance analysis when the RF link is eavesdropped upon is presented in Section 4. Section 5 presents some numerical results. Finally, the conclusion of this article is given in Section 6.

2 System Model

As shown in Figure 1, we consider a dual-hop hybrid RF/VLC network, which includes an outdoor RF link and an indoor VLC link. The hybrid network is composed of a source node (Alice), a relay node, an eavesdropper (Eve), and a legitimate receiver (Bob). The relay node includes an outdoor component and an indoor component, which are connected by using a wired medium. In this study, we assume that the outdoor component receives and recovers information by using the DF relaying scheme and then transmits it to the indoor component. The indoor component converts the received electrical signal to an optical signal by using an LED. There is no direct communication between Alice and Bob; information must be transmitted through the relay node. The communication arranges two transmission time slots. In the first time slot, Alice transmits confidential information x to the outdoor component of the relay over the RF channel. In the second time slot, the indoor component of the relay forwards the optical signal X to Bob through the indoor VLC channel. Both Bob and Eve deploy photodiodes to receive information and perform photoelectric conversion. When Alice transmits to Bob, Eve attempts to intercept the secret information.

FIGURE 1
www.frontiersin.org

FIGURE 1. RF/VLC hybrid communication network.

2.1 RF Link

In the first time slot, the received signal at the relay can be written as follows:

y=PshSRx+nR,(1)

where Ps represents the transmission power at Alice, hSR represents the channel gain of the RF link, x is the transmitted confidential information, and nR is additive white Gaussian noise (AWGN) with zero mean and variance N0.

The instantaneous SNR γSR at the relay is given by the following:

γSR=Ps|hSR|2/N0.(2)

In the RF link, |hSR|2 in Eq. 2 can be expressed as follows:

|hSR|2=|gR|2GR,(3)

where gR and GR denote the fast fading and path loss, respectively. It should be noted that the two terms are independent of each other. The envelope of gR is assumed to experience a Nakagami-m fading, and thus the squared envelope |gR|2 follows a gamma distribution. Therefore, the PDF of |gR|2 can be written as follows [22]:

f|gR|2(x)=xmR1Γ(mR)mRmRexp(mRx),x0,(4)

where mR represents the fading factor, and Γ(mR)=0+xmR1exdx represents the gamma function.

Furthermore, GR in Eq. 3 can be modeled as follows [22]:

GR=(d0d1)λ,(5)

where λ denotes the path loss exponent, d0 denotes the reference distance, and d1 is the distance between Alice and the relay.

Therefore, the PDF of |hSR|2 can be written as follows:

f|hSR|2(y)=1GR(yGR)mR11Γ(mR)mRmR×exp(mRyGR),y0.(6)

By using (8.351.1) in reference [23], the cumulative distribution function (CDF) of |hSR|2 can be written as follows:

F|hSR|2(y)=1Γ(mR)γ(mR,mRyPR),y0,(7)

where γ(,) is the lower incomplete gamma function defined by (8.350.1) in reference [23].

2.2 VLC Link

In the second time slot, we consider an indoor VLC link. To facilitate the analysis, it is assumed that the receiving area P is a disk with a radius D. As shown in Figure 1, the LED is projected at the center of the disk. Besides, we assume that both Bob and Eve are uniformly distributed within the area P. According to the settings above, the PDF of Bob’s (or Eve’s) position is given by the following:

fU(u)=1πD2,uP,(8)
fW(w)=1πD2,wP,(9)

where U represents the position of Bob and W represents the position of Eve.

In the second time slot, the received signals at Bob and Eve can be expressed as follows:

Yk=HkX+Zk,k=BforBob,k = EforEve,(10)

where X represents the input optical intensity, ZkN(0,σk2) is the AWGN at Bob (or Eve), and σk2 is the variance of the corresponding noise.

Because the information is modulated as the instantaneous optical intensity, X must meet the non-negative constraint as follows [21]:

X0.(11)

Although the optical intensity can be adjusted according to the dimming requirements, the average optical intensity cannot change with time. Therefore, the dimmable average optical intensity constraint is given by the following [21]:

E(X)=ξP,(12)

where ξ indicates the dimming target, and P indicates the nominal optical intensity of the LED. Because the user can adjust the optical intensity at will, the dimming target must satisfy the following [21]:

0ξ1.(13)

Without loss of generality, we assume that both Bob and Eve can be illuminated by the LED, and thus, the illumination angle ψk cannot exceed the field of view of the PD Ψc, that is, 0<ψk<Ψc. In indoor VLC, the channel gain Hk can be written as follows [24]:

Hk=(m+1)A2πdk2TSgcosm(ϕk)cos(ψk),k=BorE,(14)

where dk and ϕk represent the distance and the irradiance angle between the LED and Bob (or Eve), A is the physical area of the PD, m denotes the order of the Lambertian emission, g is the PD’s concentrator gain, and TS represents the optical filter gain. Also, assuming that the normal vector between the transceiver plane and the ceiling is vertical, we can obtain cos(ϕk)=cos(ψk)=l/dk, where l represents the vertical distance between the LED and the receiving plane. Therefore, the channel gain in Eq. 14 can be further written as follows:

Hk=(m+1)ATSglm+12π(rk2+l2)m+32,(15)

where rk is the distance between the projection point O and the kth receiver.

According to Eqs. 8 and 9, the CDF of rk can be expressed as follows:

Frk(rk)=Pr{rrk}=Pr{ρrk,0θ2π}=02π0rk1πD2ρdρdθ=rk2D2,0<rkD.(16)

Furthermore, the PDF of rk can be obtained as follows:

frk(rk)=dFrk(rk)drk=2rkD2,0rkD,(17)

where dFrk(rk)drk is the derivative of Frk(rk) with respect to rk.

The PDF of the channel gain Hk is then written as follows:

fHk(h)=|ddhrk|frk(rk),(18)

where |.| is a symbol for the absolute value.

Substituting Eq. 15 and Eq. 17 into Eq. 18, we can obtain the PDF of Hk as follows:

fHk(h)=Ξh2m+31,vminhvmax,(19)

where Ξ, vmin, and vmax are given by the following:

Ξ=2(m+3)D2((m+1)ATSglm+12π)2m+3,(20)
vmin=(m+1)ATSglm+12π(D2+l2)m+32,(21)
vmax=(m+1)ATSglm+12πl(m+3).(22)

3 Secrecy Performance Analysis When VLC Link Is Eavesdropped Upon

3.1 SOP Analysis

In this subsection, we analyze the SOP of the hybrid RF/VLC system. Because there are no eavesdroppers in the RF link, the instantaneous SC of the first hop is its instantaneous channel capacity, that is,

Chop,1=12ln(1+γSR)=12ln(1+PsN0|hSR|2).(23)

In the VLC link, we need to consider the average and non-negative constraints simultaneously. Therefore, Shannon’s capacity is not applicable to the VLC link [25]. For VLC with constraints as in Eqs 11, 12, a lower bound on the instantaneous SC is given by the following [26]:

Chop,2=12ln(σE22πσB2eξ2P2HB2+2πσB2HE2ξ2P2+σB2)=12ln(1+JB1+JE).(24)

Furthermore, according to Eq. 19, JB=eξ2P2HB22πσB2 and JE=ξ2P2HE2σE2, the PDFs of JB and JE are given by the following [13]:

{fJB(j)=Ξ2(2πσB2eξ2P2)1m+3j1m+31,JB,minjJB,max,fJE(j)=Ξ2(σE2ξ2P2)1m+3j1m+31,JE,minjJE,max,(25)

where JB,min=eξ2P2vmin22πσB2, JB,max=eξ2P2vmax22πσB2, JE,min=ξ2P2vmin2σE2, and JE,max=ξ2P2vmax2σE2.

As is known, the hybrid system is equivalent to a series network, so the capacity of the system is determined by the worse channel [27]. Therefore, the instantaneous SC of the entire hybrid system is the minimum of Chop,1 and Chop,2, which can be expressed as follows1:

CI=min{Chop,1,Chop,2}.(26)

The SOP is an important performance metric to evaluate the PLS of a wireless communication system. It is defined as the probability that the instantaneous SC is lower than the target capacity Cth. Therefore, SOP can be expressed as follows:

PSOP=Pr{CI<Cth}.(27)

Substituting Eq. 26 into Eq. 27, the SOP is rewritten as follows:

PSOP=Pr{min(Chop,1,Chop,2)<Cth}=1Pr{min(Chop,1,Chop,2)Cth}=1Pr{Chop,1Cth}Pr{Chop,2Cth},(28)

where Pr{Chop,1Cth} is given by the following:

Pr{Chop,1Cth}=Pr{12ln(1+PsN0|hSR|2)Cth}=1Pr{12ln(1+PsN0|hSR|2)<12ln(γth)}=1Pr{|hSR|2<(γth1)N0Ps}=1F|hSR|2((γth1)N0Ps),(29)

and Pr{Chop,2Cth} is given by the following:

Pr{Chop,2Cth}=1Pr{Chop,2<Cth}=1Pr{12ln(1+JB1+JE)<12ln(γth)},(30)

where Cth=12ln(γth) denotes the threshold of the targeted SC and γth1 denotes the equivalent threshold of the SNR [13]. It should be noted that it is challenging to obtain a closed-form expression of Eq. 30. In indoor VLC, it is reasonable to assume that JB1 and JE1. When JB>JE, we have (1+JB)/(1+JE)<JB/JE. Therefore, an upper bound of Eq. 30 is given by the following:

Pr{Chop,2Cth}1Pr{JB<JEγth}.(31)

From Eqs 28, 29, and 31, the SOP is lower-bounded by the following:

PSOP=1(1F|hSR|2((γth1)N0Ps))×(1Pr{JB<JEγth})=ΔPSOPL.(32)

In Eq. 25, JB and JE are independent of each other. Moreover, the value of PSOPL depends on the value of γth. Figure 2 shows four cases of the integral region of Pr(JB<JEγth). Based on the four cases, Pr(JB<JEγth) is derived as follows:

Pr(JB<JEγth)={0,ifγthJB,minJE,maxD1,ifJB,minJE,max<γthJB,minJE,minD2,ifJB,maxJE,max<γth<JB,maxJE,min1,ifγthJB,maxJE,min,(33)

where D1 and D2 are given by the following:

D1=JB,minγthJE,maxfJE(z)JB,minγthzfJB(y)dydz=ε(m+3)2JB,min1m+3[(JB,minγth)1m+3JE,max1m+3]ε2(m+3)2γth1m+3[(JB,minγth)2m+3JE,max2m+3](34)

FIGURE 2
www.frontiersin.org

FIGURE 2. Four cases of the integral of Pr(JB<JEγth). (A) γthJB,minJE,max. (B) JB,minJE,max<γthJB,minJE,min. (C) JB,maxJE,max<γth<JB,maxJE,min. (D) γthJB,maxJE,min2.

and

D2= JE,minJB,maxγthfJE(z)JB,minγthzfJB(y)dydz+JB,maxγthJE,maxfJE(z)JB,minJB,maxfJB(y)dydz=ε(m+3)2JB,min1m+3[JE,min1m+3(JB,maxγth)1m+3]ε2(m+3)2γth1m+3[JE,min2m+3(JB,maxγth)2m+3]+ε(m+3)2(JB,min1m+3JB,max1m+3)×[(JB,maxγth)1m+3JE,max1m+3],(35)

where ε=Ξ24(2πσB2σE2eξ4P4)1m+3.

The lower bound of the SOP can be further derived as follows:

PSOPL={F|hSR|2((γth1)N0Ps),ifγthJB,minJE,max1(1F|hSR|2((γth1)N0Ps))(1D1),ifJB,minJE,max<γthJB,minJE,min1(1F|hSR|2((γth1)N0Ps))(1D2),ifJB,minJE,min<γth<JB,maxJE,min1,ifγthJB,maxJE,min,(36)

Substituting Eq. 34 and Eq. 35 into Eq. 36, the expression for the lower bound of the SOP can be obtained as Eq. 37, as shown below:

PSOPL={PRΓ(mR)γ(mR,mRPR((γth1)N0Ps)),ifγthJB,minJE,max1PRΓ(mR)γ(mR,mRPR((γth1)N0Ps))+PRΓ(mR)γ(mR,mRPR((γth1)N0Ps))×ε(m+3)2JB,min1m+3[(JB,minγth)1m+3JE,max1m+3]ε2(m+3)2γth1m+3[(JB,minγth)2m+3JE,max2m+3],ifJB,minJE,max<γthJB,minJE,min1PRΓ(mR)γ(mR,mRPR((γth1)N0Ps))+PRΓ(mR)γ(mR,mRPR((γth1)N0Ps))×ε(m+3)2JB,min1m+3[JE,min1m+3(JB,maxγth)1m+3]ε2(m+3)2γth1m+3[JE,min2m+3(JB,maxγth)2m+3]+ε(m+3)2(JB,min1m+3JB,max1m+3)×[(JB,maxγth)1m+3JE,max1m+3],ifJB,minJE,min<γth<JB,maxJE,min1,ifγthJB,maxJE,min(37)

Remark 1.According toEq. 33, with the increase inσB, the channel gainHBdecreases, and the integral range ofPr(JB<JEγth)is enlarged. In this circumstance, the value of SOP inEq. 37increases withσB. Similarly, we can conclude that the SOP degrades with the increase inσE.

Remark 2.With the increase inγth, the value of the lower bound of the SOP inEq. 37is enlarged. Moreover, whenγthJB,max/JE,min, the lower bound of the SOP becomes one; hence, the information cannot be transmitted securely.

3.2 Probability of SPSC Analysis

In secure communications, the probability of SPSC is a fundamental benchmark that is employed to emphasize the existence of SC [17]. In this subsection, we derive the probability of SPSC of the hybrid RF/VLC system. The probability of SPSC is defined as follows:

PSPSC=Pr{min(Chop,1,Chop,2)>0}=Pr{Chop,1>0}Pr{Chop,2>0}.(38)

According to Eq. 23, Pr{Chop,1>0} is expressed as follows:

Pr{Chop,1>0}=Pr{12ln(1+PsN0|hSR|2)>0}=Pr{PsN0|hSR|2>0}=1,(39)

and Pr{Chop,2>0} is expressed as follows:

Pr{Chop,2>0}=Pr{12ln(1+JB1+JE)>0}=Pr{JB>JE}.(40)

Remark 3.SincePr{Chop,1>0}is always equal to one, the performance of the probability of SPSC mainly depends on the VLC link.

It should be noted that the value of Eq. 40 also depends on the integral region. Figure 3 shows four cases of the integral region in Eq. 40. Based on the four cases, the probability of SPSC in Eq. 40 can be written as follows:

PSPSC={1,ifJB,minJE,max1C1,ifJB,minJE,max<1JB,minJE,minC2,ifJB,minJE,min<1<JB,maxJE,min0,ifJB,maxJE,min1.(41)

Since JB and JE are independent of each other, C1 and C2 are given by the following:

C1=1JB,minJE,maxfJE(z)JB,minzfJB(y)dydz=1+ε(m+3)2JB,min1m+3[JE,max1m+3JB,min1m+3]ε2(m+3)2[JE,max2m+3JB,min2m+3](42)

and

C2=JE,minJB,maxfJE(z)zJB,maxfJB(y)dydz=ε(m+3)2[JB,max2m+3JB,max1m+3JE,min1m+3]ε2(m+3)2[JB,max2m+3JE,min2m+3].(43)

Finally, the closed-from expression of the probability of SPSC can be expressed as follows:

PSPSC={1,ifJB,minJE,max11+ε(m+3)2JB,min1m+3[JE,max1m+3JB,min1m+3]ε2(m+3)2[JE,max2m+3JB,min2m+3],ifJB,minJE,max<1JB,minJE,minε(m+3)2[JB,max2m+3JB,max1m+3JE,min1m+3]ε2(m+3)2[JB,max2m+3JE,min2m+3],ifJB,minJE,min<1<JB,maxJE,min0,ifJB,maxJE,min1.(44)
FIGURE 3
www.frontiersin.org

FIGURE 3. Four cases of the integral of Pr{CRD>0}. (A) 1JB,minJE,max. (B) JB,minJE,max<1JB,minJE,min. (C)  JB,maxJE,max<1<JB,maxJE,min. (D)  1JB,maxJE,min3.

Remark 4.Opposite to Remark 1, with the increase inσB, the channel gainHBis decreased, and the integral range ofPr{Chop,2>0}is enlarged. In this circumstance, the value of the probability of SPSC can decrease with the increase inσB. Besides, we can conclude that the probability of the SPSC can increase with the increase inσE.

Remark 5.As the radius D increases, the probability of Eve being placed far away from Bob increases and the probability of Eve eavesdropping on confidential information decreases. Therefore, the channel gainHBis decreased, and the integral range ofPr{Chop,2>0}is enlarged. According to Remark 3, the performance of the probability of SPSC mainly depends on the VLC link. Therefore, the performance of the system will be improved.

4 Secrecy Performance Analysis When RF Link Is Eavesdropped Upon

In Section 3, the SOP and the probability of the SPSC have been analyzed when the VLC link is eavesdropped upon. However, in practice, the RF link is more vulnerable to unauthorized users, so it is necessary to analyze the secrecy performance of the hybrid RF/VLC system when the RF link is eavesdropped upon. The system model is shown in Figure 4.

FIGURE 4
www.frontiersin.org

FIGURE 4. RF/VLC hybrid communication network when the RF link is eavesdropped upon.

4.1 SOP Analysis

In this subsection, we analyze the SOP of a hybrid RF/VLC system when the RF link is eavesdropped upon. The instantaneous SC of the first hop is given by the following:

Chop,1={12(ln(1+γSR)ln(1+γSE))}+,(45)

where {x}+=max{x,0}, γSE represents the instantaneous SNR at Eve and it can be expressed as follows:

γSE=Ps|hSE|2/N0.(46)

Similarly, the hSE represents the channel gain between Alice and Eve, where |hSE|2 can be written as follows:

|hSE|2=|gR|2GE,(47)

where the PDF of |gR|2 is as follows:

f|gR|2(x)=xmE1Γ(mE)mEmEexp(mEx),x0,(48)

where mE represents the fading factor between Alice and Eve. Furthermore, GE in Eq. 47 can be modeled as follows [22]:

GE=(d0d1)λ,(49)

where d1 is the distance between Alice and Eve. Therefore, the PDF and the CDF of γSj (j{R,E}) are as follows:

{fγSj(z)=N0PsGj(N0PsGjz)mj11Γ(mj)mjmjexp(mjN0PsGjz),z0FγSj(z)=1Γ(mj)γ(mj,mjN0PsGjz),z0.(50)

Because there are no eavesdroppers in the VLC link, the instantaneous SC of the first hop is its instantaneous channel capacity, that is, a lower bound on the instantaneous SC of the second hop is written by using the following [21]:

Chop,1=12ln(1+e2π(HBξPσB)2)=12ln(1+JB).(51)

Similarly, the instantaneous SC of the entire hybrid system is the minimum of Chop,1 and Chop,2, which is expressed as follows:

CI=min{Chop,1,Chop,2}.(52)

We have known that SOP can be given by PSOP=Pr{CI<Cth}. Furthermore, the SOP can be rewritten as follows:

PSOP=Pr{min(Chop,1,Chop,2)<Cth}=1Pr{Chop,1Cth}Pr{Chop,2Cth},(53)

where

Pr{Chop,1Cth}=Pr{12ln(1+γSR1+γSE)12lnγth}=1Pr{γSR<γthγSE+γth1}(54)

and

Pr{Chop,2Cth}=Pr{12ln(1+JB)12lnγth}=1Pr{JB<γth1}.(55)

Substituting Eqs 54 and 55 into Eq. 53, we have the following:

PSOP={0FγSR(γSEγth+γth1)fγSE(γSE)dγSE,ifγth1<JB,min1(10FγSR(γSEγth+γth1)fγSE(γSE)dγSE)(1JB,minγth1fJB(y)dy),ifJB,minγth1<JB,max1(10FγSR(γSEγth+γth1)fγSE(γSE)dγSE)(1JB,minJB,maxfJB(y)dy),ifγth1JB,max.(56)

It is mathematically difficult to obtain the exact close-form expression for SOP as shown in Eq. 56. Therefore, we alternatively evaluate the lower bound of SOP. We assume that γSE1 and γSR1, and when γSR>γSE, we have (1+γSR)/(1+γSE)<γSR/γSE. Therefore, we can derive the lower bound of SOP as follows:

PSOPPSOPL=Δ{A,ifγth1<JB,minA+ε[JB,min1m+3(γth1)1m+3]×(1A),ifJB,minγth1<JB,maxA+ε[JB,min1m+3JB,max1m+3]×(1A),ifγth1JB,max,(57)

where

A=1Γ(mR)1Γ(mE)(mEGRγthmRGE)mEΓ(mR+mE)mR(1+mEGRγthmRGE)mR+mE×F(1,mR+mE;1+mR;1mEGRγthmRGE+1).(58)

ε=(m+3)Ξ2(2πσB2eξ2P2)1m+3, F(a,b;c;z) is the Gauss hypergeometric function.

Remark 6.With the increase ind1, the Alice–relay link path loss is reduced, which results in the decreasing of the instantaneous SNRγSR, and the value of thePr{Chop,1Cth}is reduced due to the channel advantages of the Alice–relay link over the Alice–Eve. Therefore, the value of the lower bound of the SOP also increased.

Remark 7.According toEqs 2, 46, and 54, it is seen that by increasing λ, the value of thePr{Chop,1Cth}is also increased, and then the lower bound of the SOP is decreased.

Remark 8.By increasingmE, the value of theChop,1is decreased and the value of thePr{Chop,1Cth}is also decreased. According toEq. 53, we can conclude that the value of the SOP is increased.

4.2 Probability of SPSC Analysis

Similarly, the probability of SPSC of the hybrid RF/VLC system when an eavesdropper eavesdrops on the RF link can be written as follows:

PSPSC=Pr{min(Chop,1,Chop,2)>0}=Pr{Chop,1>0}Pr{Chop,2>0}.(59)

According to Eq. 45, Pr{Chop,1>0} is expressed as follows:

Pr{Chop,1>0}=Pr{12ln(1+γSR1+γSE)>0}=Pr{γSR>γSE},(60)

and Pr{Chop,2>0} is expressed as follows:

Pr{Chop,2>0}=Pr{12(1+JB)>0}=Pr{JB>0}=1.(61)

Based on Eqs 60 and 61, the closed-from expression of the probability of SPSC in Eq. 59 can be written as follows:

PSPSC=1Γ(mR)1Γ(mE)(GRmEmRGE)mEΓ(mR+mE)mE(1+GRmEmRGE)mR+mEF(1,mR+mE;1+mE;GRmEmRGRGRmEmRGE+1).(62)

Remark 9.Similar to Remark 6, the probability of the SPSC decreases by increasingd1. However, with the increase ind1, the value of thePr{Chop,1>0}is also increased. Therefore, the probability of the SPSC is increased by increasingd1.

Remark 10.Since the value of thePr{Chop,2>0}is always equal to one, the probability of SPSC mainly depends on the RF link.

5 Numerical Results

In this section, we present the numerical results of hybrid RF/VLC systems. Here, the theoretical results of the derived lower bound of the SOP and the probability of SPSC are verified by using Monte-Carlo simulation, which is performed by generating 104 random samples. Unless otherwise specified, the main simulation parameters of the hybrid system are listed in Table 1. It should be noted that all numerical results are obtained by using MATLAB.

TABLE 1
www.frontiersin.org

TABLE 1. Main simulation parameters.

5.1 Results When VLC Link Is Eavesdropped Upon

Figure 5 shows the SOP versus Bob’s noise standard deviation σB with different Eve’s noise standard deviations σE when P = 60 dB, ξ = 0.2, and γth = 3. It is seen that the SOP performance deteriorates with the increase in σB, and this is because the larger the value of σB, the smaller the channel gain HB. A larger HB also leads to better secrecy performance, while a smaller HB degrades the secrecy performance. Besides, with the increase in σE, the value of SOP is reduced; therefore, by increasing σE, HE is reduced, and a smaller HE leads to higher secrecy as in Remark 1.

FIGURE 5
www.frontiersin.org

FIGURE 5. SOP versus σB with different σE when P = 60 dB, ξ = 0.2, and γth = 3.

Figure 6 shows the SOP versus Bob’s noise standard deviation σB with different γth when P = 60 dB, ξ = 0.2, and σE = 3. As it is seen, the SOP increases with the increase in σB, which is consistent with that in Figure 5. Moreover, it can be observed that the value of SOP becomes larger with the increase in γth, which means that the system secrecy performance is degraded, which coincides with Remark 2.

FIGURE 6
www.frontiersin.org

FIGURE 6. SOP versus σB with different γth when P = 60 dB, ξ = 0.2, and σE = 3.

From Figure 5 and Figure 6, it can be clearly observed that simulation results are in close agreement with the theoretical results, which validates our theoretical analysis of SOP as correct.

Figure 7 shows the probability of SPSC versus Bob’s noise standard deviation σB with different Eve’s noise standard deviations σE when P = 60 dB and ξ = 0.2. It can be seen that the performance of the probability of SPSC deteriorates with the increase in σB, and this is because a larger value of σB results in a smaller channel gain HB. A larger HB leads to better secrecy performance, whereas a smaller value leads to worse secrecy performance. Moreover, it can be observed from the plot that the probability of SPSC is increased by increasing σE from σE = 2 to σE = 4. This means that by increasing σE, HE is reduced, and a smaller HE leads to better secrecy performance. This is consistent with Remark 4.

FIGURE 7
www.frontiersin.org

FIGURE 7. PSPSC versus σB with different σE when P = 60 dB and ξ = 0.2.

Figure 8 shows the probability of SPSC versus Bob’s noise standard deviation σB with different floor radii D when P = 60 dB and ξ = 0.2. It can be seen from Figure 8 that when σB2, the probability of SPSC decreases with the increase in D. This is because when σB2, a larger σE (σE=3) leads to a smaller HE, and thus, secrecy performance mainly depends on Bob’s and Eve’s SNRs. When σB>2, it is seen that by increasing D from 4 to 12 m, the value of the probability of SPSC is increased. This is also consistent with Remark 5. Expanding the floor radius, D, also decreases the probability of Eve eavesdropping on information, which improves the performance of the hybrid system.

FIGURE 8
www.frontiersin.org

FIGURE 8. PSPSC versus σB with different D when P = 60 dB and ξ = 0.2.

Moreover, it can be found from Figure 7 and Figure 8 that all theoretical results match simulation results very well, which indicates the correctness of the theoretical analysis.

5.2 Results When RF Link Is Eavesdropped Upon

Figure 9 shows SOP versus the distance between nodes Alice and relay d1 with different path loss exponents λ when P = 60 dB, mE = 2, σB = 2, mB = 2, and d1 = 2 (eavesdropping on the RF link). It can be seen that the SOP performance is deteriorated by increasing d1, which is intuitive because a larger value of d1 results in a smaller channel gain, hSR, which then results in a worse secrecy performance. This conclusion is consistent with Remark 6. Moreover, with the increase in path loss exponent λ, the value of SOP becomes smaller, which means that the system secure transmission performance is improved. This verifies the conclusion in Remark 7.

FIGURE 9
www.frontiersin.org

FIGURE 9. SOP versus d1 with different λ when P = 60 dB, mE = 2, σB = 2, mB = 2, and d1 = 2 (eavesdropping on the RF link).

Figure 10 shows the SOP versus the distance between nodes Alice and relay d1 with different Alice–Eve channel fading factors mE when P = 60 dB, λ = 3, σB = 2, mB = 2, and d1 = 2 (eavesdropping on the RF link). As it is seen, by increasing d1, the SOP performance is degraded with the increase in d1. This is also consistent with that in Figure 9. Besides, by increasing mE, the value of SOP also becomes large. This is because the larger the value of mE, the smaller the Alice–Eve channel fading which, in turn, deteriorates the secrecy performance. This verifies the conclusion in Remark 8.

FIGURE 10
www.frontiersin.org

FIGURE 10. SOP versus d1 with different mE when P = 60 dB, λ = 3, σB = 2, mB = 2, and d1 = 2 (eavesdropping on the RF link).

From Figure 9 and Figure 10, it should be emphasized that the performance gap between theoretical results and simulation results is small, which verifies the accuracy of the derived expression, which indicates that the scaling for the lower bound of SOP is reasonable.

Figure 11 shows the probability of SPSC versus the distance between nodes Alice and relay d1 with different distances between node Alice and Eve d1 when P = 60 dB, λ = 3, σB = 2, mB = 2, and mE = 2 (eavesdropping on the RF link). It is seen that the SPSC performance is decreased by increasing d1. This also indicates that the system secrecy performance is reduced when the relay node receives less confidential information. This conclusion is consistent with that in Figure 9. By increasing d1, Eve eavesdrops on less information. Therefore, the larger the value of d1, the better the performance. This is also consistent with Remark 9.

FIGURE 11
www.frontiersin.org

FIGURE 11. PSPSC versus d1 with different d1 when P = 60 dB, λ = 3, σB = 2, mB = 2, and mE = 2 (eavesdropping on the RF link).

Figure 12 shows the probability of SPSC versus the distance between nodes Alice and relay d1 with different Alice–Eve channel fading factors mE when P = 60 dB, λ = 3, σB = 2, mB = 2, and d1 = 2 (eavesdropping on the RF link). Similar to Figure 11, the probability of the SPSC performance degrades with the increase in d1. Moreover, for mE smaller than 1.6 (km), the probability of the SPSC increases with the increase in the Alice–Eve channel fading factor mE. However, if d1 is larger than 1.6 (km), the probability of the SPSC increases with the decrease in the Alice–Eve channel fading factor mE. This is because for small d1, the relay node has a stronger ability to receive confidential information than Eve. For a larger d1, Eve eavesdrops on more confidential information.

FIGURE 12
www.frontiersin.org

FIGURE 12. PSPSC versus d1 with different d1 when P = 60 dB, λ = 3, σB = 2, mB = 2, and d1 = 2 (eavesdropping on the RF link).

From Figure 11 and Figure 12, all theoretical results of the probability of the SPSC match the simulation results very well, which verifies the accuracy of the derived theoretical expression of the probability of the SPSC. Therefore, the derived expression can be used directly to evaluate the system performance with time-intensive simulations.

5.3 Comparisons for Systems With and Without Eavesdroppers

Figure 13 depicts OP performance for systems with and without an RF eavesdropper when ξ = 0.2 and γth = 3. It is seen that the OP performance decreases with the increase in P, and this is because the larger the value of P, the larger the capacity of the second hop becomes. Besides, with the increase in larger σB, the OP performance is deteriorated, which is consistent with Remark 1. Furthermore, for fixed P and σB, the system with an RF eavesdropper achieves worse OP performance than the system without an eavesdropper. It is because the existence of the eavesdropper increases the security risk of the system.

FIGURE 13
www.frontiersin.org

FIGURE 13. OP performance of systems with and without an RF eavesdropper when ξ = 0.2 and γth = 3.

Figure 14 illustrates the OP performance for systems with and without a VLC eavesdropper when ξ = 0.2 and γth = 3. As it is seen, the value of OP decreases with the increase in P, which is consistent with that in Figure 13. Moreover, it can be observed that for fixed σB and P, the value of OP becomes larger when the VLC link is eavesdropped upon.

FIGURE 14
www.frontiersin.org

FIGURE 14. OP performance of systems with and without a VLC eavesdropper when ξ = 0.2 and γth = 3.

6 Conclusion

In this article, we have studied the performance of a hybrid RF/VLC DF-based relaying network, in which two scenarios are taken into account: in one scenario, the VLC link is wiretapped, and in the other scenario, the RF link is wiretapped. The major conclusions of the study are given as follows:

1. We assume that the RF link experiences Nakagami-m fading and has path loss, and the non-negative and average optical intensity constraint in the VLC link is considered. The closed-form expressions of the lower bound of SOP and the probability of SPSC are derived, respectively. Numerical results show that theoretical results match simulation results well.

2. When the VLC link is eavesdropped upon, Bob’s (or Eve’s) noise standard deviation σB (or σE), the equivalent threshold of the SNR γth, and the floor radius D have strong impacts on the performance of SOP or the probability of SPSC. The increase in the σB and γth degrades the system secrecy performance, while the increase in σE and D will improve the secrecy performance.

3. If the RF link is eavesdropped upon, we can conclude that with the increase in d1, the system secrecy performance is degraded, whereas the increase in λ and d1' improves the secrecy performance.

4. The derived theoretical expressions in this study will enable communication system designers to quickly and accurately evaluate PLS performance of the hybrid RF/VLC system without time-intensive and laborious Monte-Carlo simulations.

In this study, the secrecy performance of the hybrid RF/indoor VLC system is analyzed. In future work, we will establish the channel model for outdoor VLC and continue to study the secrecy performance of the hybrid RF/outdoor VLC system. Moreover, we will also explore some secrecy performance improvement schemes of the hybrid system.

Data Availability Statement

The original contributions presented in the study are included in the article/Supplementary Material; further inquiries can be directed to the corresponding authors.

Author Contributions

JW and QW designed the research. JW, QW, and JL contributed with data acquisition, analysis, and discussion of results. BZ contributed to the data analysis. JL wrote the manuscript with input from all other authors.

Funding

This work is supported by the National Nature Science Foundation of China (61701254 and 11604133), the Science and Technology Plan of Youth Innovation Team for Universities of Shandong Province (2019KJJ019), the Introduction and Cultivation Plan of Youth Innovation Talents for Universities of Shandong Province, the Fund of the Shandong Key Laboratory of Optical Communication Science and Technology in Liaocheng University (SDOC201901), and the Open Project of Shanghai Key Laboratory of Trustworthy Computing.

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s Note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

Footnotes

1Note that the instantaneous SC in reference [18] is defined as the difference of channel capacities between the Alice–relay–Bob channel and the Alice–relay–Eve channel. Different from reference [18], the instantaneous SC in our study is defined as the minimum SC of the two hops, which is similar to that in reference [17].

2The orange rectangle in Figure 2 is determined by JB and JE, and the red straight line represents JB=γthJE. The integral region is the yellow enclosed area enclosed by the red straight line and the orange rectangle in Figure 2. The four cases in Figure 2 depend on the slope γth of the line and the ratio of JB and JE. According to mathematical knowledge, the value of Pr(JB<JEγth) is actually equal to the double integral on the integral region, and the calculation of the double integral is realized by the repeated integral.

3Similarly to Figure 2, the orange rectangle in Figure 3 is also determined by JB and JE, and the red straight line represents JB = JE. The integral region is also the yellow enclosed area enclosed by the red straight line and the orange rectangle in Figure 3. The four cases in Figure 3 depend on the slope 1 of the line and the ratio of JB and JE. According to mathematical knowledge, the value of Pr {JB > JE} is actually equal to the double integral on the integral region, and the calculation of the double integral is realized by the repeated integral.

References

1. Yang Z, Chen M, Wong KK, Poor HV, Cui S. Federated Learning for 6G: Applications, Challenges, and Opportunities. arXiv preprint arXiv:2101.01338 (2021).

Google Scholar

2. Wang J-Y, Yang Z, Wang Y, Chen M. On the Performance of Spatial Modulation Based Optical Wireless Communications. IEEE Photon Technol Lett (2016) 28:1. doi:10.1109/LPT.2016.2585502

CrossRef Full Text | Google Scholar

3. Tabassum H, Hossain E. Coverage and Rate Analysis for Co-existing RF/VLC Downlink Cellular Networks. IEEE Trans Wireless Commun (2018) 17:2588–601. doi:10.1109/TWC.2018.2799204

CrossRef Full Text | Google Scholar

4. Rakia T, Yang H-C, Gebali F, Alouini M-S. Optimal Design of Dual-Hop VLC/RF Communication System with Energy Harvesting. IEEE Commun Lett (2016) 20:1979–82. doi:10.1109/LCOMM.2016.2595561

CrossRef Full Text | Google Scholar

5. Kashef M, Ismail M, Abdallah M, Qaraqe KA, Serpedin E. Energy Efficient Resource Allocation for Mixed RF/VLC Heterogeneous Wireless Networks. IEEE J Select Areas Commun (2016) 34:883–93. doi:10.1109/JSAC.2016.2544618

CrossRef Full Text | Google Scholar

6. Hammouda M, Akin S, Vegni AM, Haas H, Peissig J. Link Selection in Hybrid RF/VLC Systems under Statistical Queueing Constraints. IEEE Trans Wireless Commun (2018) 17:2738–54. doi:10.1109/TWC.2018.2802937

CrossRef Full Text | Google Scholar

7. Kong J, Ismail M, Serpedin E, Qaraqe KA. Energy Efficient Optimization of Base Station Intensities for Hybrid RF/VLC Networks. IEEE Trans Wireless Commun (2019) 18:4171–83. doi:10.1109/TWC.2019.2922611

CrossRef Full Text | Google Scholar

8. Hsiao Y-C, Wu Y-C, Lin C. Energy-efficient Beamforming Design for MU-MISO Mixed RF/VLC Heterogeneous Wireless Networks. IEEE Trans Signal Process (2019) 67:3770–84. doi:10.1109/TSP.2019.2920612

CrossRef Full Text | Google Scholar

9. Marzban MF, Kashef M, Abdallah M, Khairy M. Beamforming and Power Allocation for Physical-Layer Security in Hybrid RF/VLC Wireless Networks. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC). Piscataway, New Jersey: IEEE (2017). p. 258–63.

CrossRef Full Text | Google Scholar

10. Rakia T, Yang HC, Gebali F, Alouini MS. Dual-hop VLC/RF Transmission System with Energy Harvesting Relay under Delay Constraint. In: 2016 IEEE Globecom Workshops (GC Wkshps). Piscataway, New Jersey: IEEE (2016). p. 1–6.

CrossRef Full Text | Google Scholar

11. Al-Khori J, Nauryzbayev G, Abdallah MM, Hamdi M. Secrecy Performance of Decode-And-Forward Based Hybrid RF/VLC Relaying Systems. IEEE Access (2019) 7:10844–56. doi:10.1109/ACCESS.2019.2891678

CrossRef Full Text | Google Scholar

12. Kumar A, Garg P, Gupta A. PLS Analysis in an Indoor Heterogeneous VLC/RF Network Based on Known and Unknown CSI. IEEE Syst J (2021) 15:68–76. doi:10.1109/JSYST.2020.2964033

CrossRef Full Text | Google Scholar

13. Wang J-Y, Qiu Y, Lin S-H, Wang J-B, Wang Q, Zhang B. Performance Analysis and Improvement for Secure VLC with SLIPT and Random Terminals. IEEE Access (2020) 8:73645–58. doi:10.1109/ACCESS.2020.2988470

CrossRef Full Text | Google Scholar

14. Zedini E, Soury H, Alouini M-S. On the Performance Analysis of Dual-Hop Mixed FSO/RF Systems. IEEE Trans Wireless Commun (2016) 15:3679–89. doi:10.1109/TWC.2016.2524685

CrossRef Full Text | Google Scholar

15. Yang L, Hasna MO, Gao X. Performance of Mixed RF/FSO with Variable Gain over Generalized Atmospheric Turbulence Channels. IEEE J Select Areas Commun (2015) 33:1913–24. doi:10.1109/JSAC.2015.2432471

CrossRef Full Text | Google Scholar

16. Soleimani-Nasab E, Uysal M. Generalized Performance Analysis of Mixed RF/FSO Cooperative Systems. IEEE Trans Wireless Commun (2016) 15:714–27. doi:10.1109/TWC.2015.2477400

CrossRef Full Text | Google Scholar

17. Pan X, Ran H, Pan G, Xie Y, Zhang J. On Secrecy Analysis of DF Based Dual Hop Mixed RF-FSO Systems. IEEE Access (2019) 7:66725–30. doi:10.1109/ACCESS.2019.2914227

CrossRef Full Text | Google Scholar

18. Lei H, Dai Z, Park K-H, Lei W, Pan G, Alouini M-S. Secrecy Outage Analysis of Mixed RF-FSO Downlink SWIPT Systems. IEEE Trans Commun (2018) 66:6384–95. doi:10.1109/TCOMM.2018.2865944

CrossRef Full Text | Google Scholar

19. Lei H, Dai Z, Ansari IS, Park K-H, Pan G, Alouini M-S. On Secrecy Performance of Mixed RF-FSO Systems. IEEE Photon J. (2017) 9:1–14. doi:10.1109/JPHOT.2017.2723422

CrossRef Full Text | Google Scholar

20. Lei H, Luo H, Park K-H, Ren Z, Pan G, Alouini M-S. Secrecy Outage Analysis of Mixed RF-FSO Systems with Channel Imperfection. IEEE Photon J. (2018) 10:1–13. doi:10.1109/JPHOT.2018.2835562

CrossRef Full Text | Google Scholar

21. Wang J-B, Hu Q-S, Wang J, Chen M, Wang J-Y. Tight Bounds on Channel Capacity for Dimmable Visible Light Communications. J Lightwave Technol (2013) 31:3771–9. doi:10.1109/JLT.2013.2286088

CrossRef Full Text | Google Scholar

22. Simon MK, Alouini MS. Digital Communication over Fading Channels. 2nd ed., Vol. 95. Hoboken, New Jersey: John Wiley & Sons (2005).

23. Jeffrey A, Zwillinger D. Table of Integrals, Series, and Products. Amsterdam, Netherlands: Elsevier (2007).

24. Komine T, Nakagawa M. Fundamental Analysis for Visible-Light Communication System Using LED Lights. IEEE Trans Consumer Electron (2004) 50:100–7. doi:10.1109/TCE.2004.1277847

CrossRef Full Text | Google Scholar

25. Yin L, Haas H. Physical-layer Security in Multiuser Visible Light Communication Networks. IEEE J Select Areas Commun (2018) 36:162–74. doi:10.1109/JSAC.2017.2774429

CrossRef Full Text | Google Scholar

26. Wang J-Y, Liu C, Wang J-B, Wu Y, Lin M, Cheng J. Physical-layer Security for Indoor Visible Light Communications: Secrecy Capacity Analysis. IEEE Trans Commun (2018) 66:6423–36. doi:10.1109/TCOMM.2018.2859943

CrossRef Full Text | Google Scholar

27. Ai Y, Mathur A, Cheffena M, Bhatnagar MR, Lei H. Physical Layer Security of Hybrid Satellite-FSO Cooperative Systems. IEEE Photon J (2019) 11:1–14. doi:10.1109/JPHOT.2019.2892618

CrossRef Full Text | Google Scholar

Keywords: visible light communications, radio frequency communications, secrecy outage probability, probability of strictly positive secrecy capacity, hybrid RF/VLC systems

Citation: Liu J, Wang J, Zhang B and Wang Q (2021) Secrecy Performance Analysis of Hybrid RF/VLC Dual-Hop Relaying Systems. Front. Phys. 9:683479. doi: 10.3389/fphy.2021.683479

Received: 21 March 2021; Accepted: 28 June 2021;
Published: 30 July 2021.

Edited by:

Haohai Yu, Shandong University, China

Reviewed by:

Qiong Wu, Jiangnan University, China
Shuai Ma, China University of Mining and Technology, China
Zhaohui Yang, King’s College London, United Kingdom

Copyright © 2021 Liu, Wang, Zhang and Wang. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Jinyuan Wang, jywang@njupt.edu.cn; Qinglin Wang, wangqinglin@lcu.edu.cn

Download