- Research
- Open Access
- Published:

# On the average secrecy capacity for indoor visible light communication systems

*Journal of the European Optical Society-Rapid Publications*
**volume 16**, Article number: 11 (2020)

## Abstract

For visible light communication (VLC), the light signals are transmitted without optical fibers or any sort of wave-guiding. Due to the inherent broadcast nature, physical-layer security emerges as a promising method to protect information delivery from eavesdropping. As for the secrecy capacity of VLC channel, there exist two features. In one way, the limited optical power makes the common capacity expressions in radio-frequency (RF) communication unapplicable for VLC. In another way, several correlated geometrical parameters directly alters the Lambertian model of indoor VLC channel, which gives the secrecy capacity more meanings. However, the issue considering both aspects has not been studied recently. In this paper, from the practical scenarios, we extract a typical geometrical model to reveal the mobility principles of the legitimate receiver and the eavesdroppers. Then, we character two typical distributions of the geometrical parameter. Correspondingly, we derive the upper and lower bounds on the average secrecy capacity, which have the closed forms. Finally, simulation results show that our upper and lower bounds are tight at high optical signal-to-noise rates (OSNRs). Moreover, the geometrical features of VLC systems and distribution parameters of the receiver mobility are effectively reveal by the bounds.

## Introduction

In recent years, because of the light-emitting diodes (LEDs) widely deployed for energy conservation in practical illumination, visible light communication (VLC) is currently considered as one of the most indispensable green communication technologies and has attracted considerable attention [1–3]. For VLC, despite LOS propagation and better signal confinement, the light signals are transmitted without optical fibers or any sort of wave-guiding. The inherent broadcast nature makes VLC links inherently susceptible to eavesdropping by unintended or unauthorized users having access to the physical area illuminated by the data transmitters. Typical scenarios include public areas such as classrooms, offices, libraries, cafes and so on. Therefore, physical-layer security emerged as a promising method [4] to complement conventional encryption techniques and provide a first line of defense against eavesdropping attacks.

By contrast to radio-frequency (RF) communication, there exist two main features in the secrecy capacity. Intensity modulation with direct detection (IM/DD), which modulates the input data into the light beams emitted from LEDs [5–7], is always employed in indoor VLC system.

**Feature 1:** The optical intensity signals are limited to be a nonnegative real variable and ought to be less than the eye-safety standard[5, 6]. So, Gaussian distribution is not necessarily followed by the capacity-achieving input distribution [8], thus making the secrecy capacity expressions in RF communication not suitable for VLC.

**Feature 2:** Compared with the log-normal or Gaussian distribution, the Lambertian is often assumed to be a model of indoor VLC channel, which directly changes with several geometrical parameters, relating to the transmitters and receivers spatial locations [5–7]. Obviously, the geometrical feature give the secrecy performance of VLC channels more meanings.

In [9], Shannon pioneered the framework of information-theoretic security. Wyner in [10] proposed a fundamental infromation-theoretic security measure, termed as the secrecy capacity. Motivated by Wyner’s work, many studies [11–16] on the secrecy performance of Gaussian wiretap channels were considered. However, despite that there exist many studies on the secrecy performance for RF communication, the corresponding study for VLC channel is rare.

As for IM/DD channels, Shannon referred to the challenge in deriving an analytical capacity expression for peak-limited channels [17]. In [8], the upper and lower capacity bounds were derived with the additive Gaussian channel, while a discrete Gaussian distribution is utilized in [18] to research the problem [19–22] studied the capacity bounds of optical wireless channels. Furthermore, as for the secrecy performance, [23] derived the lower and upper bounds on the secrecy capacity of the scalar Gaussian wiretap channel subject to amplitude constraints. Mukherjee [24] analyzed the secret-key transmission strategy of multiple-input single-output (MISO) VLC systems after deriving the upper and lower bounds. Shen et al. [25] employed transmit beamforming and jamming techniques to enhance the secrecy for MISO-VLC systems. However, they all didn’t consider the geometrical property of indoor VLC systems. Particularly, although [26] derive the closed-form analytical expressions for secrecy outage probability and the average secrecy capacity, the study was based on the secrecy capacity expression of Gaussian channel. From the above, the issue considering both features has not been studied currently.

Because of the above-mentioned factors, in this paper, we research the relation between the secrecy capacity with the geometrical property, based on the power-limited channel capacity. Particularly, we extract a typical geometrical model from the practical scenarios, which reveals the mobility principles of the legitimate receiver and the eavesdroppers. Then, we character two typical distributions of the geometrical parameter. Accordingly, the upper and lower bounds of the average secrecy capacity are derived, which have the closed forms and are related to the geometrical parameters of VLC systems and distribution parameters of the receiver mobility. Finally, simulation results show that our upper and lower bounds are tight at high OSNRs and the geometrical feature are effectually revealed.

For conciseness, the key notations throughout the paper are summarized in the following Table 1.

## System model

In this paper, a typical indoor VLC system is considered, which with a LED as the transmitter and a photo-detector as a legitimate receiver. Moreover, there exist some eavesdroppers, which locate in the same communication region and try to eavesdrop the information between the LED and the legitimate receiver. As shown in Fig. 1, the scenario is common, such as the office, the classroom, the airport lounge and so on.

The signals received by the legitimate receiver and the *i*th (*i*≥1) eavesdroppers are given by

where \( w_{0},w_{i} \!\! \sim \!\! \mathcal {N}_{\mathbb {R}}\left (0,\sigma ^{2}\right)\) denote the additive Gaussian noise. For simplicity, let us denote the legitimate receiver as the 0th receiver.

- 1.
*Optical Power Constraint.*For illumination and eye-safety consideration, the optical average power*ε*, the input signal*X*, and peak power*A*are constrained as$$ \begin{aligned} \text{Pr}(0 \leq X \leq A) =1, \end{aligned} $$(2)$$ \mathbb{E}[\!X] \leq \varepsilon, $$(3)\(X \in \mathbb {R}_{0}^{+}\). The optical average-to-peak power ratio (APPR) is defined as

$$ \alpha \triangleq \frac{\varepsilon}{A}, $$(4)where 0<

*α*≤1. - 2.
*Geometrical Property.*Although RF channel often considers multipath effect, line-of-sight (LOS) path is often assumed to exist in the typical indoor point-to-point channel. The channel gain*h*_{i}, (*i*≥0) is derived by the Lambertian model [8, 9] as$$ h_{i} =\left\{ \begin{aligned} & \frac{{{S}_{r}}\left(m\text{+}1 \right)}{2\pi D_{ij}^{2}}{{\cos }^{m}}\left(\phi \right)\cos \left(\psi \right),0\le \psi \le {{\Psi }_{c}},\\ & 0,\psi >{{\Psi }_{c}}, \\ \end{aligned} \right. $$(5)where

*ϕ*is the emergence angle of transmitter and*ψ*being the incidence angle of receiver.*S*_{r}is the detector acreage,*D*_{ij}denotes the distance between the transmitter and receiver, and*Ψ*_{c}is the detector field-of-view (FOV) semiangle. \(\Phi _{\frac {1}{2}}\) is the transmitter half-power semiangle. The Lamberts mode order is derived by$$ m = -\frac{\ln(2)}{\ln\left(\cos\left(\Phi_{\frac{1}{2}}\right)\right)}. $$(6)

In this paper, let *ϕ*=*ψ* and meanwhile \(\cos (\phi)\! =\! \cos (\psi)\! =\! \frac {l}{D}\). Additional, (5) can be rewritten as

When scenario is given, the *S*_{r}, *m* being fixed, *h* is related to the movement of the receiver, calculated by *l* and *d*_{i}. \(M =l\cdot \tan {\Phi _{\frac {1}{2}}}\) represents the maximum value of *d*, which is the radius of illumination region \(\mathcal {R}\). Here, The distribution of *d*_{i} under the given *l* mainly attract our attention.

where *x*_{i}, *y*_{i} are the coordinate values.

According to the distinct features of VLC channel, our problem can be summarized as follows:

**Problem 1:**

Considering the geometrical property and the optical power constraint, how to derive the closed-form expression for average secrecy capacity. The mathematical model involved is given as ([27])

Combining (7) and (9), the average secrecy capacity \(\bar {\mathcal {C}}_{s}\) of the legitimate receiver with the *i*th (*i*≥1) eavesdropper can be given as

where \( \mathcal {C}_{s}(d_{0}, d_{i})\) is analyzed in (11), (12) and (13). The term *f*(*d*_{0},*d*_{i}) is the joint probability density function (PDF) and the terms of *f*(*d*_{0}),*f*(*d*_{i}) represent the indoor human mobility, respectively. Without loss of generality, we assume that the mobilities of the eavesdroppers and the legitimate receiver are independent with each other. Thus, we have *f*(*d*_{0},*d*_{i})=*f*(*d*_{0})*f*(*d*_{i}), making the transformation of (*c*_{0}).

## Average secrecy capacity

Based on (10), we firstly analyze the bounds on the secrecy capacity \(\mathcal {C}_{s}\). Then, by characterising the geometrical property of the practical scenarios, we extract two typical distribution model of *d*_{i},(*i*≥0), which is related to *h*_{i},(*i*≥0). Further, we correspondingly derive the lower bounds on the average secrecy capacity.

### Bounds on secrecy capacity \(\mathcal {C}_{s}\)

Based on the definition of capacity [28], due to the constraints (2) and (3) for VLC, the capacity-achieving input distribution does not always follow Gaussian distribution [8]. Thus, the common Shannon formula in RF communication can not be applied in VLC.

According to [23], the secrecy capacity of the legitimate receiver with the *i*th (*i*≥1) eavesdropper is lower-bounded by each of the following two bounds

and is upper-bounded by

Note that as analyzed in [23], the lower bounds and upper bounds on the secrecy capacity are tight at asymptotically high SNR. Where *δ* is a free parameter such that *δ*>0 and *σ*^{2} is variance of the additive Gaussian noise. Other parameter is metioned above. Due to that (12) and (13) have the simpler expression, we will utilize them to analyze the average secrecy capacity in the following.

### Mobility model of *d*_{i}

Here, we firstly model the geometrical distribution of typical scenarios. For the practical scenarios such as the classroom, the airport lounge and so on, we tend to move within a relatively region. Without loss of generality, let us assume that each receiver locates at a relatively-fixed region.

Figure 2 shows the sketch of our mobility model. The *i*th (*i*≥0) receiver moves within the corresponding circle with the radius *u*_{i}. *t*_{i} is the distance between the center of the circle *O*_{i} to the center of illumination region. We use a 3-D cartesian coordinate system at the receivers height to identify their locations. The origin (0,0) corresponds to the room center. Then, we have

where *t*_{i1} and *t*_{i2} are coordinate of *O*_{i}. Although our human mobility is various from person to person, there exist some basic principles. Here two typical mobility types are mainly proposed as follows:

*Type of main location.*This means that the possibility of sitting in a main location is often much larger than the surrounding area. In the practical restaurant, cafes and so on, we tend to sit at the desks or the other relatively-fixed location. Typically, as for the*i*th receiver, we model*f*(*d*_{i}) in (10) as the 2-dimension Gaussian distribution at the receiver height, i.e.,$$ \begin{aligned} & f(d_{i}) = \frac{1}{2\pi \zeta_{i1} \zeta_{i2} }e^{- \frac{(x_{i} - t_{i1})^{2}}{2 \zeta_{i1}^{2}} - \frac{(y_{i} -t_{i2})^{2}}{2 \zeta_{i2}^{2}}}, (i \geq 0). \end{aligned} $$(15)Note that it is simple to extend (15) to the specific human mobility, by adjusting

*ζ*_{i1},*ζ*_{i2},*t*_{i1},*t*_{i2}. Here, the other scenarios are based on a scenario of one LED and one main location. Furthermore, let us assume^{Footnote 1}*ζ*_{i1}=*ζ*_{i2}=*ζ*_{i}≠0. Then, (15) can be transformed as$$ \begin{aligned} & f(d_{i}) = \frac{1}{2\pi \zeta_{i}^{2} }e^{- \frac{(x_{i} - t_{i1})^{2}+(y_{i} -t_{i2})^{2}}{2 \zeta_{i}^{2}} }, (i \geq 0). \end{aligned} $$(16)*Type of random walk.*The meaning is that the possibilities of the receiver at any point within the circle are same. For example, we often randomly and steadyly walk in the relatively-fixed region. Typically,*f*(*d*_{i}) is modeled as the uniform distribution, i.e.,$$ \begin{aligned} f(d_{i}) = \frac{1}{\pi u_{i}^{2}}, (i \geq 0), \end{aligned} $$(17)and the other random-walk scenarioswhich is based on it. For the practical random walk

^{Footnote 2}, we can readily deduce the corresponding average secrecy capacity with the same manner as the case of (17).

For simplicity, let us make some notations.

For the legitimate receiver and the *i*th (*i*≥1) eavesdropper,

And then, the following Theorem 1 illuminates the results for the average secrecy capacity, Appendix Appendix illuminates the proof of which.

For indoor VLC system, the upper bounds on the average secrecy capacity under different geometrical model are given as follows:

1) When \(f(d_{i}) = \frac {1}{2\pi \zeta _{i}^{2} }e^{- \frac {(x_{i} - t_{i1})^{2}+(y_{i} -t_{i2})^{2}}{2 \zeta _{i}^{2}} }\). \(\bar {\mathcal {C}}_{s}\) is upper-bounded by

$$ \begin{aligned} & \bar{\mathcal{C}}_{s} \leq \frac{\left(1- e^{-\frac{u_{0}^{2}}{2\zeta_{0}^{2}}}\right)\left(1- e^{-\frac{u_{i}^{2}}{2\zeta_{i}^{2}}}\right)}{4} \mathcal{G}_{1}(u_{0},t_{0},u_{i},t_{i}), \end{aligned} $$(20)\(\bar {\mathcal {C}}_{s}\) is lower-bounded by one of the following bounds

$$ \begin{aligned} & \bar{\mathcal{C}}_{s} \geq \frac{\left(1- e^{-\frac{u_{0}^{2}}{2\zeta_{0}^{2}}}\right)\left(1- e^{-\frac{u_{i}^{2}}{2\zeta_{i}^{2}}}\right)}{4} \mathcal{G}_{2}(u_{0},t_{0},u_{i},t_{i}),~~~ \end{aligned} $$(21)$$ \begin{aligned} & \bar{\mathcal{C}}_{s} \geq \left(1- e^{-\frac{u_{0}^{2}}{2\zeta_{0}^{2}}}\right)\left(1- e^{-\frac{u_{i}^{2}}{2\zeta_{i}^{2}}}\right) \left[{\vphantom{\frac{ p_{1}(h_{0L}) +p_{1}(h_{0R}) }{4}}} - p_{3} +\right.\\ & \hspace{10mm} \left.\frac{ p_{1}(h_{0L}) +p_{1}(h_{0R}) }{4} -\frac{p_{2}(h_{iL}) + p_{2}(h_{iR})}{2} \right]. \end{aligned} $$(22)2)When \(f(d_{i}) = \frac {1}{\pi u_{i}^{2}}\). \(\bar {\mathcal {C}}_{s}\) is upper-bounded as

$$ \begin{aligned} & \bar{\mathcal{C}}_{s} \leq \frac{1}{4}\mathcal{G}_{1}(u_{0},t_{0},u_{i},t_{i}), \end{aligned} $$(23)

\(\bar {\mathcal {C}}_{s}\) is lower-bounded by one of the following bounds

Among them, *p*_{1}(·),*p*_{2}(·),*p*_{3} are defined in (54), (55) and (56). The terms of \(\mathcal {G}_{1}(u_{0},t_{0},u_{i},t_{i}),\mathcal {G}_{2}(u_{0},t_{0},u_{i},t_{i})\) are given in (26) and (27).

In Theorem 1,

## Simulation results

In this section, the tightness and the geometrical feature of our upper and lower bounds on the average secrecy capacity are analyzed in Theorem 1. We consider a scenario with several users under a LED as our simulation environment. \(\frac {A}{\sigma }\) represents the OSNR. High OSNRs are the practical application zone, because of typical indoor illumination levels can offer at least 40dB OSNR at the receiver [5]. Note that we use “Ratio” to express \(\frac {u_{i}}{\zeta _{i}}\). Notation "U-B" denotes the simulation for the upper bound and Notation "L-B" for the lower bound.

Figure 3 shows the average secrecy capacity bounds under *l* = 1.5m, 2.5m, 3.5m, with *d*_{i} yielding to the Gaussian distribution. Figure 4 plots the similar curves under different \(\frac {u_{i}}{\zeta _{i}}\) = 1, 2, 3. Figure 5 shows that under different *t*_{i} = 2.2m, 5.2m, 7.2m. As shown in figures, when *l* increases, the average secrecy capacity degrades. When the distribution parameters of \(\frac {u_{i}}{\zeta _{i}}\), *t*_{i} increase, the average secrecy capacity can be improved. As shown in Theorem 1, the bounds are effective to reveal the geometrical features of VLC systems and distribution parameters of the receiver mobility.

Figure 6 shows the average secrecy capacity bounds under different *l*, with *d*_{i} yielding to the uniform distribution. Figure 7 plots the similar curves under different *t*_{i}.In one way, we can observe that the same principle that when l increases, the average secrecy capacity degrades. When the distribution parameters of ti increase, the average secrecy capacity can be improved. In another way, by combing Fig. 3 with Figs. 5, 6 with Fig. 7, different PDF of the receiver mobility has different secrecy capacity even if under same parameters. This also reveals the influence of the geometrical property on the secrecy capacity, as shown in Theorem 1.

Moreover, according to Figs. 2, 3, 4 and 5, the lower bound in 22 keeps the relatively-stable gap with the upper bound in (21), while the lower bound in (23) has a relatively-varying gap. At the lower OSNRs, the former gap is smaller than the latter gap. At the higher OSNRs, the former gap is larger than the latter gap. Due to that typical indoor illumination levels can offer high OSNR at the receiver [5], high OSNRs are the practical application zone. From the results, under different conditions, our bounds just perform the better tightness at high OSNRs.

## Conclusion

Due to the inherent broadcast nature of VLC channels, physical-layer security emerged as a promising method to protect information delivery from eavesdropping. There exist two features within the secrecy capacity. The limited optical power makes the common capacity expressions in radio-frequency (RF) communication not suitable for VLC. In another way, the Lambertian model of indoor VLC channel directly changes with several related geometrical parameters, which makes the secrecy capacity more meanings. However, the study considering both aspects does not been carried out currently. This paper extracted a typical geometrical model from the practical scenario to reveal the mobility principles of the legitimate receiver and the eavesdroppers. Then, by characterizing two typical distributions of the geometrical parameter, we derived the corresponding upper- and lower- bounds on the average secrecy capacity, which have the closed forms. Simulation results reveal that our bounds are tight at high optical signal-to-noise rates (OSNRs). Moreover, the geometrical features of VLC systems and distribution parameters of the receiver mobility can be effectively revealed by the bounds.

## Appendix

For simplicity, let

where \(T_{1} = \frac {S_{r} (m+1)l^{m+1}}{2\pi }\), \(T_{2} = \frac {m+3}{2}\). For indoor VLC system, \(m = -\frac {\ln (2)}{\ln \left (\cos \left (\Phi _{\frac {1}{2}}\right)\right)}>0\). Thus

Note that in (28) and (33), the subscript of *i*=0 is for the legitimate receiver, while the subscripts of *i*≥1 are for the eavesdroppers.

Here, we divide the circle \(\mathcal {S}_{i}\), as shown in Fig. 8. For *i*∈[0,*N*], we have

which means that the possibilities of the receiver *d*_{i}(*x*_{i},*y*_{i}) locating at \(\mathcal {S}_{il}\), \(\mathcal {S}_{ir}\) are equal. When *d*_{i}(*x*_{i},*y*_{i}) lies in the half-circle \(\mathcal {S}_{il}\), we have

When *d*_{i}(*x*_{i},*y*_{i}) lies in the half-circle \(\mathcal {S}_{ir}\), we have

By using the polar coordinate system, let

### Proof of upper bounds (20) and (23)

We derive the upper bounds based on (13) and (10). Then, we have

Based on (28), the terms of *w*_{1},*w*_{2} are given by

Next, we derive the upper bounds under two typical distribution.

*1) When Gaussian distribution.*

For (35) and (36), let us denote

where the terms of *a*_{1}(*d*_{0}),*a*_{1}(*d*_{1}),*a*_{2},*a*_{3} are given in the following,

Similarly,

With *T*_{2}>0 in (29), *a*_{2}(*d*_{0}) can be upper-bounded by

where the transformation of (*c*_{1}) is due to (30) and the approximation of (*c*_{2}) is based on (31), (32). Note that *a*_{2} is calculated in (40).

The term of *a*_{1}(*d*_{i}) can be bounded by

where the transformation of (*c*_{3}) is due to (30) and the approximation of (*c*_{4}) is based on (31), (32). Note that *a*_{3} is calculated in (41).

Finally, combining (34) with (42), (43), we can obtain

This completes the proof of (20).

*2) When uniform distribution.*

For the *i*th (*i*≥0) receiver,

Then, using the similar method of proofing (44), we have

This completes the proof of (23).

### Proof of lower bound (21) and (24)

We derive the upper bounds based on (12) and (10). Then, we have

*1) When Gaussian Distribution.* It is easy to know that

where *a*_{2},*a*_{3} are in (40) and (41). Applying to the similar method of proofing (44), we have

Then, the average secrecy capacity is lower-bounded by

*2) When Uniform Distribution.* It is easy to get

This completes the proofs of (21) and (24

### Proof of lower bounds (22) and (25)

For simplicity, let us denote the lower bound in (11) as

where the functions of *p*_{1}(*x*),*p*_{2}(*x*),*p*_{3} are

We can observe that *p*_{1}(*h*_{B}) has no relation with *h*_{E}, while *p*_{2}(*h*_{E}) has no relation with *h*_{B}. Moreover, *p*_{3} has no relation with *h*_{B},*h*_{E}. Then, the corresponding \(\bar {\mathcal {C}}_{s}(h_{B}, h_{E})\) can be lower-bounded as

Applying to the similar method of proofing (44), (57) can be further approximated as

where

When Uniform Distribution, \(\int \!\!\!\!\int \limits _{\mathcal {S}_{0}}f(d_{0})~\mathrm {d} \tau _{0} \int \!\!\!\!\int \limits _{\mathcal {S}_{i}} f(d_{i}) ~\mathrm {d} \tau _{i} = 1\). When Gaussian Distribution, \(\int \!\!\!\!\int \limits _{\mathcal {S}_{0}}f(d_{0})~\mathrm {d} \tau _{0} \int \!\!\!\!\int \limits _{\mathcal {S}_{i}} f(d_{i}) ~\mathrm {d} \tau _{i} = \left (1- e^{-\frac {u_{0}^{2}}{2\zeta _{0}^{2}}}\right)\left (1- e^{-\frac {u_{i}^{2}}{2\zeta _{i}^{2}}}\right) \).

## Availability of data and materials

Availability of data and materials.

## Notes

Here, we consider the simple case of

*ζ*_{i1}=*ζ*_{i2}, which can be simply transformed to the other practical scenarios.Although our mobility may not be the whole region \(\mathcal {R}\), there only exists a change of the integration region in (10).

## References

Elgala, H., Mesleh, R., Haas, H.: Indoor optical wireless communication: Potential and state-of-the-art. IEEE Commun. Mag. 2011(49), 56–62. https://doi.org/10.1109/MCOM.2011.6011734.

Minh, H. L., Ghassemlooy, Z., O’Brien, D., Faulkner, G.: Indoor Gigabit optical wireless communications: Challenges and possibilities. In:

*Proc. 12th Int. Conf. Transp. Opt. Netw.*, pp. 1–6 (2010). https://doi.org/10.1109/ICTON.2010.5549136.Uddin, M. S., Chowdhury, M. Z., Jang, Y. M.: Priority-based resource allocation scheme for visible light communication. In:

*Proc. 2nd Int. Conf. Ubiquit. Future Netw*, pp. 247–250 (2010). https://doi.org/10.1109/ICUFN.2010.5547195.Pan, G., Tang, C., Zhang, X., Li, T., Weng, Y., Chen, Y.: Physicallayer security over non-small-scale fading channels. IEEE Trans. Veh. Technol.65, 1326–1339 (2016). https://doi.org/10.1109/TVT.2015.2412140.

Komine, T., Nakagawa, M.: Fundamental analysis for visible-light communication system using LED lights. IEEE Trans. Consum. Electron.50, 100–107 (2004). https://doi.org/10.1109/TCE.2004.1X277847.

Nuwanpriya, A., Ho, S. w., Chen, C. S.: Indoor MIMO visible light communications: Novel angle diversity receivers for mobile users. IEEE J. Sel. Areas Commun.33, 1780–1792 (2015). https://doi.org/10.1109/JSAC.2015.2432514.

Zeng, L., O’Brien, D., Minh, H., Faulkner, G., Lee, K., Jung, D., Oh, Y., Won, E. T.: High data rate multiple input multiple output (MIMO) optical wireless communications using white LED lighting. IEEE J. Sel. Areas Commun.27, 1654–1662 (2009). https://doi.org/10.1109/JSAC.2009.091215.

Lapidoth, A., Moser, S., Wigger, M.: On the capacity of free-space optical intensity channels. IEEE Trans. Inf. Theory. 55, 4449–4461 (2009). https://doi.org/10.1109/TIT.2009.2027522.

Shannon, C. E.: Communication theory of secrecy systems. Bell Syst. Tech. J.28, 656–715 (1949). https://doi.org/10.1002/j.1538-7305.1949.tb00928.x.

Wyner, A. D.: The wire-tap channel. Bell Syst. Tech. J. 54, 1355–1387 (1975). https://doi.org/10.1002/j.1538-7305.1975.tb02040.x.

Leung-Yan-Cheong, S., Hellman, M.: The Gaussian wire-tap channel. IEEE Trans. Inf. Theory. 24, 451–456 (1978). https://doi.org/10.1109/tit.1978.1055917.

Shafiee, S., Liu, N., Ulukus, S.: Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel. IEEE Trans. Inf. Theory. 55, 4033–4039 (2009). https://doi.org/10.1109/tit.2009.2025549.

Liu, R., Poor, H.: Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages. IEEE Trans. Inf. Theory. 55, 1235–1249 (2009). https://doi.org/10.1109/TIT.2008.2011448.

Liu, T., Shamai, S.: A note on the secrecy capacity of the multipleantenna wiretap channel. IEEE Trans. Inf. Theory. 55, 2547–2553 (2009). https://doi.org/10.1109/tit.2009.2018322.

Khisti, A., Wornell, G. W.: Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel. IEEE Trans. Inf. Theory. 56, 5515–5532 (2010). https://doi.org/10.1109/tit.2010.2068852.

Oggier, F., VHassibi, B.: The secrecy capacity of the MIMO wiretap channel. IEEE Trans. Inf. Theory. 57, 4961–4972 (2011). https://doi.org/10.1109/ISIT.2008.4595041.

Shannon, C. E.: A mathematical theory of communication. Bell Syst. Tech. J.27, 379–423 (1948). https://doi.org/10.1002/j.1538-7305.1948.tb00917.x.

Farid, A. A., Hranilovic, S.: Capacity bounds for wireless optical intensity channels with Gaussian noise. IEEE Trans. Inf. Theory. 56, 6066–6077 (2010).

Moser, S. M.: Capacity results of an optical intensity channel with inputdependent Gaussian noise. IEEE Trans. Inf. Theory. 58, 207–223 (2012). https://doi.org/10.1109/tit.2010.2080470.

[, 12] Wang, J. B., Hu, Q. S., Wang, J., Chen, M., Wang, J. Y.: Tight bounds on channel capacity for dimmable visible light communications. J. Lightw. Technol.31, 3771–3779 (2013). https://doi.org/10.1109/JLT.2013.2286088.

Chaaban, A., Morvan, J., Alouini, M.: Free-space optical communications: Capacity bounds, approximations, and a new sphere-packing perspective. IEEE Trans. Commun.64, 1176–1191 (2016). https://doi.org/10.1109/TCOMM.2016.2524569.

Jiang, R., Wang, Z., Wang, Q.: A tight upper bound on channel capacity for visible light communications. IEEE Commu. Lett.20, 97–100 (2016). https://doi.org/10.1109/LCOMM.2015.2497694.

Mostafa, A., Lampe, L.: Physical-layer security for MISO visible light communication channels. IEEE J. Sel. Areas Commun.33, 1806–1818 (2015). https://doi.org/10.1109/JSAC.2015.2432513.

Mukherjee, A.: Secret-key agreement for security in multi-emitter visible light communication systems. IEEE Commun. Lett.20, 1361–1364 (2016). https://doi.org/10.1109/LCOMM.2016.2558562.

Shen, H., Deng, Y., Xu, W., Zhao, C.: Secrecy-oriented transmitter optimization for visible light communication systems. IEEE Photon. J.8 (2016). https://doi.org/10.1109/jphot.2016.2598684.

Pan, G., Ye, J., Ding, Z.: On Secure VLC Systems With Spatially Random Terminals. IEEE Commun. Lett.21, 492–495 (2017). https://doi.org/10.1109/LCOMM.2016.2643632.

Bloch, M., Barros, J.: Physical-Layer Security: From Information Theory to Security Engineering. Cambridge Univ. Press, Cambridge, U.K. (2011).

Cover, T. M., Thomas, J. A.: Elements of Information Theory, 2nd. Wiley, New York (2006).

## Acknowledgements

Authors sincerely thank all teachers and graduate students of National Digital Switching System Engineering Technological Research Center for their constant support to the research activity. Especially for Yijun Zhu, Chao Wang.

## Funding

The work of this paper was supported in part by the National Key Research and Development Project under Grant 2018YFB1801903, in part by the National Natural Science Foundation of China (NSFC) under Grant 61671477, 61901524 and in part by the China Postdoctoral Science Foundation under Grant 2019M663477.

## Author information

### Affiliations

### Contributions

Project administration and Writing–original draft, Jun Zheng Zhang and Ke Ke. All authors read and approved the final manuscript.

### Corresponding author

## Ethics declarations

### Competing interests

The authors declare no conflict of interest.

## Additional information

### Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

## Rights and permissions

**Open Access** This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

## About this article

### Cite this article

Zhang, J.Z., Ke, K. On the average secrecy capacity for indoor visible light communication systems.
*J. Eur. Opt. Soc.-Rapid Publ.* **16, **11 (2020). https://doi.org/10.1186/s41476-020-00132-9

Received:

Accepted:

Published:

DOI: https://doi.org/10.1186/s41476-020-00132-9

### Keywords

- Visible light communication
- Geometrical property
- Average secrecy capacity
- Upper and lower bounds