Open Access
This article is

- freely available
- re-usable

*Electronics*
**2019**,
*8*(4),
462;
https://doi.org/10.3390/electronics8040462

Article

On Secrecy Performance of the Strong User in MISO-NOMA Visible Light Communication System

^{1}

Key Laboratory of Cognitive Radio and Information Processing, Guilin University of Electronic Technology, Guilin 541004, China

^{2}

Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China

^{*}

Author to whom correspondence should be addressed.

Received: 24 March 2019 / Accepted: 24 April 2019 / Published: 25 April 2019

## Abstract

**:**

Since successive interference cancellation in non-orthogonal multiple access (NOMA) is enabled at the strong user to remove the signal of the weak user, if the information safety of the strong user cannot be ensured, neither can the weak user. The physical-layer security of the strong user in a two-user multiple-input single-output (MISO)-NOMA visible light communication (VLC) system in the presence of a passive eavesdropper was studied, with multiple light-emitting diodes (LEDs) transmitting and a photodiode (PD) receiver receiving. To demonstrate the superiority of the MISO-NOMA VLC system over the SISO-NOMA VLC system, numerical simulations were made, and results show that the secrecy outage probability (SOP) performance of the strong user in the MISO-NOMA VLC system is superior to that in the SISO-NOMA VLC system. Furthermore, the SOP of the strong user depends highly on the room arrangement, the difference between the legitimate channel and eavesdropper channel, and the properties of the LEDs and PD.

Keywords:

physical-layer security; visible light communication; multiple-input single-output; non-orthogonal multiple access; strong user## 1. Introduction

As a promising alternative complementary to current radio frequency (RF) wireless communications, visible light communication (VLC) can simultaneously provide illumination and data communication by exploiting the existing lighting infrastructure, and it has been regarded as a potential technology for indoor 5G communications, Internet of Things (IoTs), and device-to-device communications [1].

Due to the broadcasting nature, VLC is especially applicable for massive connectivity, supporting multiple users to access the same wireless resource. Non-orthogonal multiple access (NOMA) as a novel multiple access protocol where multiple users are multiplexed in the power domain via superposition coding at the transmitter and de-multiplexed by successive interference cancellation (SIC) at the receiver is particularly suitable for VLC systems. The throughput [2], coverage probability [3], reliability [4], spectral-energy efficiency [5], and users’ fairness [6] of NOMA VLC systems have been well investigated. Meanwhile, the security problem of NOMA VLC systems has become increasingly important [7]. If eavesdroppers appear at the same region illuminated by light-emitting diodes (LEDs) as the NOMA legitimate users, the useful information is inevitably susceptible to eavesdropping. Physical-layer security [8] has emerged as a promising approach to protect information from eavesdropping and has drawn much attention in recent years of those who aim to achieve secure transmission at the physical layer.

With the development of multi-antenna technology, optical multiple-input multiple-output (MIMO) or multiple-input single-output (MISO) VLC systems can greatly enhance physical-layer security by fully exploiting the spatial degree of freedom. Meanwhile, to satisfy the requirement of massive connectivity for the next wireless communication, there is an urgent need for multiple users to access the communication system. However, existing work on the security problem of MISO (or MIMO) VLC systems focused mainly on a single legitimate user suffering security threats from one or multiple eavesdroppers [9,10]. As to the existing MISO-VLC systems with multi-user [11,12], although precoding has been used to improve secrecy performance, multiple users access the system in the conventional orthogonal multiple access (OMA) scheme, which greatly limits the accessed number of users. Applying NOMA to a multi-user MISO VLC system can not only take advantage of the potential of NOMA to really support multiple users, but can also enhance the physical-layer security via multi-antenna technology, such as beamforming/precoding, artificial noise and transmit antenna selection technology, etc. However, thus far, the secrecy performance of a MISO-NOMA VLC system has not yet been studied. It is necessary to investigate the physical layer security of MISO-NOMA VLC systems. This is due to the fact that: (1) to effectively support massive connectivity, which is important for ensuring the forthcoming 5G network to support the IoTs functionalities, it is necessary to study on NOMA VLC systems; (2) in practical application, multiple LEDs are often deployed to meet the lighting requirements. Multiple LEDs assignment enables the MISO or MIMO transmission scheme and also constructs a multi-antenna transmitting system. To meet the practical LEDs assignment and further improve the physical-layer security performance of multiple NOMA users, multi-antenna technology with multiple LEDs at the transmitter could be adopted.

In this paper, we investigate the physical-layer security of a two-user MISO-NOMA VLC system, where multiple LEDs serve two legitimate users via downlink NOMA in the presence of a passive eavesdropper. All the LEDs are utilized to transmit signals with equal power. Both the legitimate users and the eavesdropper employ a photodiode (PD) receiver to detect and receive the optical signal. Selection combination technology is utilized at the legitimate users and the eavesdropper. The optical signal radiated from LED to the user with weak channel gain (called a weak user) should be first decoded by the user with strong channel gain (called a strong user) so as to enable SIC at the strong user. Therefore, the secrecy performance of the weak user is conditioned on the fact that the strong user does not release any information about the weak user [13]. Hence, the physical-layer security of the strong user in a two-user MISO-NOMA VLC system is analyzed and measured by the secrecy outage probability (SOP) performance criteria. To demonstrate the superiority of the MISO-NOMA VLC system over the single-input single-output (SISO) NOMA VLC system, numerical simulations are made based on typical parameters of indoor LED transmitters and PD receivers, and results show that the SOP performance of the strong user in the MISO-NOMA VLC system is superior to that in the SISO-NOMA VLC system. In addition, the SOP of the strong user depends highly on the room arrangement, the difference between the legitimate channel and the eavesdropper channel, and the properties of the LEDs and the PD.

It should be noted that in the proposed two-user MISO-NOMA VLC system, each of the legitimate users and the eavesdropper is with a single PD receiver, which is the most common case until now. As to a MIMO-NOMA VLC system where the legitimate users and/or the eavesdropper are with multiple PD receivers, it is necessary to take more factors into consideration, such as the geometric layout of the PD receivers and the complicated channel estimation [14,15] for the MIMO case, which would increase the difficulty of the system implementation and make the computational complexity high. However, MIMO technique is an efficient way to increase system capacity and extend system coverage, as will be studied in our future work.

The rest of this paper is organized as follows. In Section 2, the MISO-NOMA VLC system model is proposed, and the statistical characteristics of the intensity modulation direct detection (IM/DD) channel and the signal-to-noise ratio (SNR) is also investigated. In Section 3, the physical-layer security performance of the strong NOMA user is analyzed. Numerical results are presented in Section 4 to verify the theoretical analysis. Finally, conclusions are given in Section 5.

## 2. System Model

The MISO-NOMA VLC system is shown in Figure 1, where N

_{A}LEDs serves user u and user v via downlink NOMA in the presence of a passive Eve (eavesdropper). Each of the legitimate users and Eve is with a PD receiver (Series 5T, Centronic Silicon PD, Croydon, London, UK). All the PD receivers are within the illuminating region of LED (BXRA-56C5300-H-00, Bridgelux LED, Fremont, CA, USA), and selection combination is utilized at the legitimate users and Eve. Since the secrecy performance of the weak user is conditioned on the fact that the strong user does not release any information about the weak user, we put emphasis on the physical-layer security of the strong user.At the transmitting terminal, the signals of the two NOMA legitimate users are first superposed in power in an electrical domain. Then, a direct current (DC) bias is added to the superposition coding signal to satisfy a certain requirement of illumination before the electrical-to-optical conversion of LED. Hence, the signal from the T-th LED, T ∈{1, …, N

_{A}}, can be expressed as $x={a}_{T,u}\sqrt{P/{N}_{A}}{s}_{u}+{a}_{T,v}\sqrt{P/{N}_{A}}{s}_{v}+{I}_{\mathrm{DC}}$, where ${I}_{\mathrm{DC}}$ is the DC bias, which is utilized to set the average radiated optical power of LED and adjust the indoor illumination level; $P$ is the total electrical power of the signal in the electrical domain, and each LED transmits signal with equal power of $P/{N}_{A}$; ${s}_{i}$ represents the signal of the i-th legitimate user, $i\in \left\{u,\text{}v\right\}$, which is assumed to be with zero mean and $0\le \left|{s}_{i}\right|\le 1$; and ${a}_{T,i}$ is the power allocation coefficient of the T-th LED for the i-th legitimate user. Assuming the fixed power allocation scheme is used, then ${a}_{T,u}$ and ${a}_{T,v}$ remains constant for each LED and is respectively expressed as ${a}_{u}$ and ${a}_{v}$ below for simplicity. According to the NOMA principle, more power will be allocated to the weak user, while less power is allocated to the strong user for any LED, i.e., ${a}_{u}\ge {a}_{v}$. Since there exist only two NOMA users in the system, the coefficients should also satisfy ${a}_{u}^{2}+{a}_{v}^{2}=1$ and $0<{a}_{u}\le 1$, $0<{a}_{v}\le 1$. Due to the expectation $\mathbb{E}\left\{{{\displaystyle \sum}}_{i\in \left\{u,\text{}v\right\}}{a}_{i}\sqrt{P/{N}_{A}}{s}_{i}\right\}=0$, the superposition coding signal ${{\displaystyle \sum}}_{i\in \left\{u,\text{}v\right\}}{a}_{i}\sqrt{P/{N}_{A}}{s}_{i}$ does not contribute to the average optical power and therefore does not influence the illumination level. Due to the limited dynamic range and the linear electrical-to-optical conversion characteristics of LED, constraint $\left|{{\displaystyle \sum}}_{i\in \left\{u,\text{}v\right\}}{a}_{i}\sqrt{P/{N}_{A}}{s}_{i}\right|\le {I}_{DC}$ should also be satisfied, thus the signal at the input of the IM/DD channel can be a non-negative real signal.At the receiving terminal, the arrived optical intensity signal is first converted into a current signal via photo-electric conversion of the PD receiver, and then the constant DC offset is removed, and noise is added in the electrical domain. For the NOMA legitimate user i, the received signal can be given by ${y}_{i}={h}_{T,i}x+{n}_{T,i}$, where ${h}_{T,i}$ is the DC gain of the IM/DD channel between the T-th LED and the user i; ${n}_{T,i}$ is the additive white Gaussian noise of the channel and is assumed to be with zero mean and variance ${\sigma}^{2}$. Without loss of generality, it is assumed that the channel power gain satisfies $0<{h}_{T,u}^{2}\le {h}_{T,v}^{2}$, where ${h}_{T,u}^{2}$, ${h}_{T,v}^{2}$ is respectively the channel power gain of the weak user and the strong user. According to the NOMA principle, the strong user can perform SIC while the weak user cannot. Therefore, in the two-user MISO-NOMA VLC system, the peak SNR [10] in the channel from the T-th LED to the strong user v can be given by:

$${Q}_{T,v}=\frac{{h}_{T,v}^{2}{a}_{v}^{2}\rho}{{N}_{A}}$$

While the peak signal-to-interference-plus-noise ratio (SINR) in the channel from the T-th LED to the weak user u is:
where $\rho =P/{\sigma}^{2}$ is defined as the transmission SNR of the LED transmitter to the NOMA legitimate user.

$${Q}_{T,u}=\frac{{h}_{T,u}^{2}{a}_{u}^{2}}{{h}_{T,u}^{2}{a}_{v}^{2}+{N}_{A}/\rho}$$

Eve is assumed to be aware of the decoding orders and power allocation coefficients, and by adopting the multi-user detection technique, it can distinguish the multi-user signal and subtract the interference generated by the superposed signals from each other. This is a common assumption in analyzing the secrecy performance of the NOMA system [16,17]. The SNR for Eve to detect the message of user $i,\text{}i\in \left\{u,\text{}v\right\}$ can be given by ${Q}_{T,e\to i}=$ ${h}_{T,e}^{2}{a}_{i}^{2}{\rho}_{e}/{N}_{A}$, where ${\rho}_{e}=P/{\sigma}_{e}^{2}$ and ${\sigma}_{e}^{2}$ is the noise variance of the eavesdropper channel.

#### 2.1. Statistical Characteristics of the IM/DD Channel

In the IM/DD channel, information is carried by the optical intensity. The light from the LED is successively concentrated and filtered by an optical concentrator and a filter in front of the PD receiver. In general, the received signals at the PD receiver include both the line-of-sight (LOS) and the diffuse component. However, it has been demonstrated by Zeng et al. [18] that even the strongest diffuse component is at least 7 dB lower than the weakest LOS component. Hence, only the LOS path is taken into account in this paper. The cross-section and the top view of the IM/DD channel are shown in Figure 2.

If the LED works in a generalized Lambertian radiation pattern, the DC gain of the IM/DD channel from the T-th LED to user i can be described as ${h}_{T,i}=S\eta \left(m+1\right){\mathrm{cos}}^{m}\left({\varphi}_{T}\right)\mathrm{cos}\left({\phi}_{i}\right)$ $rect\left({\phi}_{i}/{\phi}_{1/2}\right){g}_{oc}\left({\phi}_{i}\right){g}_{of}\left({\phi}_{i}\right)/(2\pi {d}_{T,i}^{2})$, where ${\varphi}_{T}$ is the angle of irradiance with respect to the transmitting normal of the T-th LED plane; ${\phi}_{i}$ is the angle of incidence with respect to the receiving normal of the i-th PD receiver plane; ${\phi}_{1/2}$ is the field of view (FOV) of the PD receiver; $rect(\xb7)$ is a rectangular function and is equal to 1 only if ${\phi}_{i}\le {\phi}_{1/2}$, and the FOV of both the legitimate users and Eve is assumed to be wide enough to receive signal from LED; d

_{T,i}is the transmission distance between the T-th LED and the i-th PD receiver; $m$ is the order of Lambertian radiation, and $m=-ln2/ln\left(cos{\varphi}_{1/2}\right)$; ${\varphi}_{1/2}$ is the semi-angle at half illuminance of the LED; ${g}_{oc}$ is the optical concentrator gain and ${g}_{oc}\left({\phi}_{i}\right)={n}^{2}/{\mathrm{sin}}^{2}\left({\phi}_{1/2}\right)$, where $n$ is the refractive index of the optical concentrator utilized at the PD receiver front-end and ${g}_{of}$ is the optical filter coefficient; S and η are the effective physical detecting area and the responsivity of the PD receiver, respectively.For simplicity, it is assumed that ${g}_{oc}={g}_{of}=1$ and the PD receiver has strong adaptive adjustment ability, which is easy to implement in practical application, since various sensors such as the gyroscope sensor, the accelerometer sensor, and the electronic compass sensor are embedded in people’s hand phone, and then the incidence angle can be adjusted to be zero [19]. The two-dimensional illuminated region of the T-th LED on the PD receiver plane is assumed to be a circle with a radius of D, and the projection of the T-th LED on the PD receiver plane is located at the center, then we can get ${d}_{T,i}^{2}={r}_{T,i}^{2}+{L}^{2}$, where L is the vertical distance between the LED plane and the PD plane in three-dimensional space, and ${r}_{T,i}$ is the distance between the T-th LED projection and user i, as shown in Figure 2b. We can also get $\mathrm{cos}\left({\varphi}_{T}\right)=L/{d}_{T,i}$ from Figure 2a. Therefore, the channel power gain of the channel from the T-th LED to user i can be written as ${h}_{T,i}^{2}={\left[S\eta \left(m+1\right){L}^{m}/2\pi \right]}^{2}{\left({r}_{T,i}^{2}+{L}^{2}\right)}^{-\left(m+2\right)}\triangleq \hslash {\left({r}_{T,i}^{2}+{L}^{2}\right)}^{-\left(m+2\right)}$, where $\hslash ={\left[S\eta \left(m+1\right){L}^{m}/2\pi \right]}^{2}$ is often a constant.

Conditioned on the fact that the NOMA legitimate users $i,\text{}i\in \left\{u,\text{}v\right\}$ are uniformly located in this disc, the probability density function (PDF) of ${r}_{T,i}$ is given by $f({r}_{T,i})=2{r}_{T,i}/{D}^{2}$. Utilizing the method of calculating the function of random variables, the PDF of the unordered channel power gain can be given by:
and the cumulative distribution function (CDF) of the unordered channel power gain can be given by:
where ${\kappa}_{\mathrm{min}}\le {h}_{T,i}^{2}\le {\kappa}_{\mathrm{max}}$ and ${\kappa}_{\mathrm{min}}=\hslash {\left({D}^{2}+{L}^{2}\right)}^{-\left(m+2\right)},{\kappa}_{\mathrm{max}}=\hslash {\left({L}^{2}\right)}^{-\left(m+2\right)}$.

$$\stackrel{\u2323}{f}\left({h}_{T,i}^{2}\right)=\left|\frac{\partial {r}_{T,i}}{\partial {h}_{T,i}^{2}}\right|f\left({r}_{T,i}\right)=\frac{1}{m+2}{\hslash}^{\frac{1}{m+2}}\frac{1}{{D}^{2}}{\left({h}_{T,i}^{2}\right)}^{-\frac{1}{m+2}-1}$$

$$\begin{array}{cc}\hfill {\stackrel{\u2323}{F}}_{{h}_{T,i}^{2}}\left(x\right)& ={\displaystyle {\int}_{-\infty}^{x}{\stackrel{\u2323}{f}}_{{h}_{T,i}^{2}}\left(y\right)}dy={\displaystyle {\int}_{-\infty}^{{\kappa}_{\mathrm{min}}}0}dy+{\displaystyle {\int}_{{\kappa}_{\mathrm{min}}}^{x}{\stackrel{\u2323}{f}}_{{h}_{T,i}^{2}}\left(y\right)}dy\hfill \\ & =-{\hslash}^{\frac{1}{m+2}}\frac{1}{{D}^{2}}{x}^{-\frac{1}{m+2}}+\frac{{D}^{2}+{L}^{2}}{{D}^{2}}\hfill \end{array}$$

Adopting order statistics [20], the CDF of the ordered channel power gain for the two-user MISO-NOMA VLC system can be given by:

$${F}_{{h}_{T,i}^{2}}\left(x\right)=\frac{1}{2}{\left(-{\hslash}^{\frac{1}{m+2}}\frac{1}{{D}^{2}}{x}^{-\frac{1}{m+2}}+\frac{{D}^{2}+{L}^{2}}{{D}^{2}}\right)}^{2},i\in \left\{u,v\right\}$$

#### 2.2. Statistical Characteristic of the SNR

With the statistical characteristic of the channel, the CDF of the SNR of the strong user v can be given by:
and the CDF of the SINR of the weak user u can be given by:
where $\tilde{D}=\left({D}^{2}+{L}^{2}\right)/{D}^{2},\tilde{\hslash}=-{\left(\hslash \rho \right)}^{\frac{1}{m+2}}/{D}^{2},\tilde{m}=-1/\left(m+2\right)$.

$$\begin{array}{cc}\hfill {F}_{{Q}_{T,v}}\left(x\right)& =\mathbb{P}\left({Q}_{T,v}\le x\right)\hfill \\ & ={F}_{{h}_{T,v}^{2}}\left(\frac{x}{{a}_{v}^{2}\rho}\right)=\frac{1}{2}{\left[\tilde{\hslash}{\left({a}_{v}^{2}\right)}^{-\tilde{m}}{x}^{\tilde{m}}+\tilde{D}\right]}^{2}\hfill \end{array}$$

$${F}_{{Q}_{T,u}}\left(x\right)=\{\begin{array}{ll}\frac{1}{2}{\left[\tilde{\hslash}{\left({a}_{u}^{2}-x{a}_{v}^{2}\right)}^{-\tilde{m}}{x}^{\tilde{m}}+\tilde{D}\right]}^{2},& x<{a}_{u}^{2}/{a}_{v}^{2}\\ 1,& x\ge {a}_{u}^{2}/{a}_{v}^{2}\end{array}$$

Since the channel power gain of the eavesdropper channel is ${h}_{T,e}^{2}=\hslash {\left({r}_{T,e}^{2}+{L}^{2}\right)}^{-\left(m+2\right)}$ where ${r}_{T,e}$ is the distance between the T-th LED projection on the PD plane and Eve, the CDF of the SNR for Eve to detect the message of user i is given by ${F}_{{Q}_{T,e\to i}}\left(x\right)=\mathbb{P}\left({Q}_{T,e\to i}\le x\right)={\tilde{\hslash}}_{e}{\left({a}_{i}^{2}\right)}^{-\tilde{m}}{x}^{\tilde{m}}+\tilde{D}$, and the PDF of the SNR for Eve to detect the message of user i is given by:
where ${\tilde{\hslash}}_{e}=-{\left(\hslash {\rho}_{e}\right)}^{\frac{1}{m+2}}/{D}^{2}$.

$${f}_{{Q}_{T,e\to i}}\left(x\right)={\tilde{\hslash}}_{e}\tilde{m}{\left({a}_{i}^{2}\right)}^{-\tilde{m}}{x}^{\tilde{m}-1},i\in \left\{u,v\right\}$$

With these statistical characteristics known, it is suitable to use SOP to measure the secrecy performance. A secrecy outage event occurs when the secrecy rate of user k (k ∈{u, v}) is lower than the target rate, which can be written as ${P}_{k}=\mathbb{P}\left({C}_{k}<{R}_{th}\right)$, where $\mathbb{P}\left(x\right)$ is the probability of the occurrence of an event $x$; ${C}_{k}$ is the secrecy rate of user k and is given by ${C}_{k}={\left[{R}_{k}-{R}_{e}\right]}^{+}$, where ${R}_{k}$ and ${R}_{e}$ are respectively the achievable rate of the legitimate user and the eavesdropper, and [x]

^{+}= max{x, 0}; R_{th}is the predefined target rate.## 3. Secrecy Performance Analysis

The selection combination strategy is utilized at the PD receiver of the legitimate user and Eve. Then, the CDF of the SNR of the strong user v is given by:
and the CDF of the SNR of the weak user u is given by:
and the CDF of the SNR for Eve to detect the message of user i, i ∈{u, v} is given by:
and the PDF of the SNR for Eve to detect the message of user i, i ∈{u, v} is given by:

$$\begin{array}{cc}\hfill {F}_{{Q}_{T,v}}\left(x\right)& =\mathrm{P}\left(\underset{1\le T\le {N}_{A}}{max}{Q}_{T,v}<x\right)={\left[\mathrm{P}\left({Q}_{T,v}<x\right)\right]}^{{N}_{A}}\hfill \\ & ={\left[\frac{1}{2}{\left({N}_{A}^{\tilde{m}}\tilde{\hslash}{\left({a}_{v}^{2}\right)}^{-\tilde{m}}{x}^{\tilde{m}}+\tilde{D}\right)}^{2}\right]}^{{N}_{A}}\hfill \end{array}$$

$$\begin{array}{cc}\hfill {F}_{{Q}_{T,u}}\left(x\right)& =\mathrm{P}(\underset{1\le T\le {N}_{A}}{\mathrm{max}}{Q}_{T,u}<x)={\left[\mathrm{P}\left({Q}_{T,u}<x\right)\right]}^{{N}_{A}}\hfill \\ & =\{\begin{array}{cc}{\left[\frac{1}{2}{\left({N}_{A}^{\tilde{m}}\tilde{\hslash}{\left({a}_{u}^{2}-x{a}_{v}^{2}\right)}^{-\tilde{m}}{x}^{\tilde{m}}+\tilde{D}\right)}^{2}\right]}^{{N}_{A}},& x<{a}_{u}^{2}/{a}_{v}^{2}\hfill \\ 1,& x\ge {a}_{u}^{2}/{a}_{v}^{2}\hfill \end{array}\hfill \end{array}$$

$${F}_{{Q}_{T,e\to i}}\left(x\right)=\mathrm{P}\left(\underset{1\le T\le {N}_{A}}{max}{Q}_{T,e\to i}<x\right)={\left[{N}_{A}^{\tilde{m}}{\tilde{\hslash}}_{e}{\left({a}_{i}^{2}\right)}^{-\tilde{m}}{x}^{\tilde{m}}+\tilde{D}\right]}^{{N}_{A}}$$

$${f}_{{Q}_{T,e\to i}}\left(x\right)={N}_{A}^{\tilde{m}+1}{\tilde{\hslash}}_{e}\tilde{m}{\left({a}_{i}^{2}\right)}^{-\tilde{m}}{\left[{N}_{A}^{\tilde{m}}{\tilde{\hslash}}_{e}{\left({a}_{i}^{2}\right)}^{-\tilde{m}}{x}^{\tilde{m}}+\tilde{D}\right]}^{{N}_{A}-1}{x}^{\tilde{m}-1}$$

For the MISO-NOMA VLC system, where two NOMA users are in the presence of a single eavesdropper, all LEDs are utilized to transmit signals with equal power, and the selection combination scheme is employed at the PD receiver for both the NOMA legitimate users and the eavesdropper. Then, the SOP of the strong user in the system can be given by:

$$\begin{array}{cc}\hfill {P}_{v}& =\mathrm{P}\left[\frac{1}{2}{\mathrm{log}}_{2}\left(1+\underset{1\le T\le {N}_{A}}{max}{Q}_{T,v}\right)-\frac{1}{2}{\mathrm{log}}_{2}\left(1+\underset{1\le T\le {N}_{A}}{max}{Q}_{T,e\to v}\right)<{R}_{th}\right]\hfill \\ & ={\displaystyle {\int}_{0}^{+\infty}{F}_{{Q}_{T,v}}\left({2}^{2{R}_{th}}\left(1+x\right)-1\right){f}_{{Q}_{T,e\to v}}\left(x\right)dx}\hfill \end{array}$$

Substituting (9) and (12) into (13), we get the SOP of the strong user, which is given by:
where $\mho \left(k\right)={\displaystyle {\int}_{0}^{+\infty}{\left[1-{2}^{2{R}_{th}}\left(1+x\right)\right]}^{\tilde{m}}{}^{k}}{x}^{\tilde{m}-1}{x}^{\tilde{m}w}dx$. First, utilizing the power series expansion formula in [21] [Equation (1.110)] to expand ${\left[1-{2}^{2{R}_{th}}\left(1+x\right)\right]}^{\tilde{m}}{}^{k}$, then keeping the first two terms and neglecting the higher order terms, we get:
where ${Q}_{\mathrm{min}}\le {Q}_{T,e\to v}\le {Q}_{\mathrm{max}},{Q}_{\mathrm{min}}={a}_{v}^{2}{\rho}_{e}\hslash {\left({D}^{2}+{L}^{2}\right)}^{-\left(m+2\right)},{Q}_{\mathrm{max}}={a}_{v}^{2}{\rho}_{e}\hslash {\left({L}^{2}\right)}^{-\left(m+2\right)}.$

$$\begin{array}{ll}\hfill {P}_{v}=& {\tilde{D}}^{3{N}_{A}-1}{2}^{-{N}_{A}}{N}_{A}^{\tilde{m}+1}{\tilde{\hslash}}_{e}\tilde{m}{\left({a}_{v}^{2}\right)}^{-\tilde{m}}{\displaystyle \sum _{k=0}^{2{N}_{A}}{\displaystyle \sum _{w=0}^{{N}_{A}-1}}}\hfill \\ & \left(\begin{array}{l}2{N}_{A}\\ k\end{array}\right)\left(\begin{array}{l}{N}_{A}-1\\ w\end{array}\right){\left[{\left(-1\right)}^{\tilde{m}}{\tilde{D}}^{-1}{N}_{A}^{\tilde{m}}\tilde{\hslash}{\left({a}_{v}^{2}\right)}^{-\tilde{m}}\right]}^{k}{\left[{\tilde{D}}^{-1}{N}_{A}^{\tilde{m}}{\tilde{\hslash}}_{e}{\left({a}_{v}^{2}\right)}^{-\tilde{m}}\right]}^{w}\mho \left(k\right)\hfill \end{array}$$

$$\begin{array}{cc}\hfill \mho \left(k\right)& ={\displaystyle {\int}_{0}^{+\infty}\left[1-{2}^{2{R}_{th}}\tilde{m}k\left(1+x\right)\right]{x}^{\tilde{m}+\tilde{m}w-1}dx}\hfill \\ & ={\frac{1-{2}^{2{R}_{th}}\tilde{m}k}{\tilde{m}+\tilde{m}w}{x}^{\tilde{m}+\tilde{m}w}|}_{{Q}_{\mathrm{min}}/{N}_{A}}^{{Q}_{\mathrm{max}}/{N}_{A}}{-\frac{{2}^{2{R}_{th}}\tilde{m}k}{\tilde{m}+\tilde{m}w+1}{x}^{\tilde{m}+\tilde{m}w+1}|}_{{Q}_{\mathrm{min}}/{N}_{A}}^{{Q}_{\mathrm{max}}/{N}_{A}}\hfill \end{array}$$

## 4. Numerical Results

In this section, we present insightful numerical results to disclose the SOP performance of the strong NOMA user.

The SOP performance of the strong user versus a different number of LEDs is plotted in Figure 3. It can be seen that the SOP performance of the MISO-NOMA VLC system (N

_{A}> 1) is superior to that of the SISO-NOMA VLC system (N_{A}= 1). The SOP in the case of N_{A}= 1 is consistent with the result of [7], where only a single LED is used, and multi-antenna technology has not been adopted.It can be seen from Figure 4 that reducing the distance from the LED transmitting plane to the PD receiving plane can reduce the SOP, and this is due to the fact that the condition of the main channel gets better at a shorter relative distance between the LED transmitting plane to the PD receiving plane. Thus, we come to the conclusion that room arrangement has great influence on the secrecy performance with the location of the receiving plane remaining unchanged.

The SOP performance of the strong user versus different physical detecting areas of PD is plotted in Figure 5, and we can see that enlarging the physical detecting area of PD can reduce the SOP. It can be seen from Figure 6 that when the LED transmission power is given, increasing the ratio of $\rho $ to ${\rho}_{e}$ can make the SOP of the strong user decrease. This is because the channel difference is enlarged between the strong legitimate channel and the eavesdropper channel with the increase of the ratio. Hence, in practical application, if the strong user could be far enough from the eavesdropper, the SOP of the strong user would remain at a moderate level.

Extending the approaches of the paper to a MIMO-NOMA VLC system with multiple LEDs transmitting and multiple PDs receiving would be of interest as a future direction. For a MIMO-NOMA VLC system, in addition to the above mentioned factors, how the geometric layout of the PD receivers, such as the respective orientation and the relative distance from each other, affects the security performance of the system should also be taken into account. Additionally, the complexity of various channel estimation algorithms for the MIMO case, such as the zero forcing, the least mean square, and the recursive least square algorithm, should also be compared and analyzed.

## 5. Conclusions

In this paper, we specifically consider the physical-layer security performance of the strong user in a MISO-NOMA VLC system with two legitimate users in the presence of a passive eavesdropper. All the LEDs are utilized to transmit signal, while a PD receiver with the selection combination approach is used at the two legitimate users and Eve. Numerical results show that the SOP performance of the strong user in the MISO-NOMA VLC system is superior to that in the SISO case. In addition, the SOP of the strong user in the MISO-NOMA VLC system depends highly on the room arrangement, the difference between the legitimate channel and the eavesdropper channel, and the properties of the LEDs and the PD.

## Author Contributions

Conceptualization, X.Z. and J.S.; Formal analysis, X.Z. and J.S.; Funding acquisition, X.Z. and J.S.; Investigation, X.Z. and J.S.; Methodology, X.Z. and J.S.; Project administration, J.S.; Software, X.Z. and J.S.; Validation, J.S.; Visualization, X.Z.; Writing—original draft, X.Z. and J.S.

## Funding

This research was funded by the National Natural Science Foundation of China, grant number 61862016, and the Guangxi Natural Science Foundation, grant number 2018GXNSFAA294093 and 2017GXNSFAA198283, and the Key Laboratory of Cognitive Radio and Information Processing (Guilin University of Electronic Technology), grant number CRKL180108, and the Guangxi Key Laboratory of Trusted Software, grant number KX201723.

## Conflicts of Interest

The authors declare no conflict of interest.

## References

- Ishikawa, N.; Sugiura, S.; Hanzo, L. 50 years of permutation, spatial and index modulation: From classic RF to visible light communications and data storage. IEEE Commun. Surv. Tut.
**2018**, 20, 1905–1938. [Google Scholar] [CrossRef] - Marshoud, H.; Muhaidat, S.; Sofotasios, P.C.; Hussain, S.; Imran, M.A.; Sharif, B.S. Optical non-orthogonal multiple access for visible light communication. IEEE Wirel. Commun.
**2018**, 25, 82–88. [Google Scholar] [CrossRef] - Yin, L.; Popoola, W.O.; Wu, X.; Haas, H. Performance evaluation of non-orthogonal multiple access in visible light communication. IEEE Trans. Commun.
**2016**, 64, 5162–5175. [Google Scholar] [CrossRef] - Marshoud, H.; Kapinas, V.M.; Karagiannidis, G.K.; Muhaidat, S. Non-orthogonal multiple access for visible light communications. IEEE Photon. Tech. Lett.
**2016**, 28, 51–54. [Google Scholar] [CrossRef] - Nauryzbayev, G.; Abdallah, M.; Elgala, H. On the performance of NOMA-enabled spectrally and energy efficient OFDM (SEE-OFDM) for indoor visible light communications. In Proceedings of the IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal, 3–6 June 2018; pp. 1–5. [Google Scholar]
- Yang, Z.; Xu, W.; Li, Y. Fair non-orthogonal multiple access for visible light communication downlinks. IEEE Wirel. Commun. Lett.
**2017**, 6, 66–69. [Google Scholar] [CrossRef] - Zhao, X.; Chen, H.; Sun, J. On physical-layer security in multiuser visible light communication systems with non-orthogonal multiple access. IEEE Access
**2018**, 6, 34004–34017. [Google Scholar] [CrossRef] - Yin, L.; Haas, H. Physical-layer security in multiuser visible light communication networks. IEEE J. Sel. Areas Commun.
**2018**, 36, 162–174. [Google Scholar] [CrossRef] - Mostafa, A.; Lampe, L. Optimal and robust beamforming for secure transmission in MISO visible-light communication links. IEEE Trans. Signal Process.
**2016**, 64, 6501–6516. [Google Scholar] [CrossRef] - Cho, S.; Chen, G.; Coon, J.P. Securing visible light communication systems by beamforming in the presence of randomly distributed eavesdroppers. IEEE Trans. Wirel. Commun.
**2018**, 17, 2918–2931. [Google Scholar] [CrossRef] - Arfaoui, M.A.; Ghrayeb, A.; Assi, C. Secrecy performance of multi-user MISO VLC broadcast channels with confidential messages. IEEE Trans. Wirel. Commun.
**2018**, 17, 7789–7800. [Google Scholar] [CrossRef] - Pham, T.V.; Hayashi, T.; Pham, A.T. Artificial-noise-aided precoding design for multi-user visible light communication channels. IEEE Access
**2019**, 7, 3767–3777. [Google Scholar] [CrossRef] - Feng, Y.; Yan, S.; Yang, Z. Secure transmission to the strong user in non-orthogonal multiple access. IEEE Commun. Lett.
**2018**, 22, 2623–2626. [Google Scholar] [CrossRef] - Rana, M.M.; Hosain, M.K. Adaptive channel estimation techniques for MIMO OFDM systems. Int. J. Adv. Comput. Sci. Appl. (IJACSA)
**2010**, 6, 134–138. [Google Scholar] - Rana, M.M. Performance comparison of LMS and RLS channel estimation algorithms for 4G MIMO systems. In Proceedings of the 14th International Conference on Computer and Information Technology (ICCIT), Dhaka, Bangladesh, 22–24 December 2011; pp. 1–5. [Google Scholar]
- Liu, Y.; Qin, Z.; Elkashlan, M.; Gao, Y.; Hanzos, L. Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Trans. Wirel. Commun.
**2017**, 16, 1656–1672. [Google Scholar] [CrossRef] - He, B.; Liu, A.; Yang, N.; Lau, V.K.N. On the design of secure non-orthogonal multiple access systems. IEEE J. Sel. Areas Commun.
**2017**, 35, 2196–2206. [Google Scholar] [CrossRef] - Zeng, L.; O’Brien, D.C.; Minh, H.L.; Faulkner, G.E.; Lee, K.; Jung, D.; Oh, Y.; Won, E.T. High data rate multiple input multiple output (MIMO) optical wireless communications using white LED lighting. IEEE J. Sel. Areas Commun.
**2009**, 27, 1654–1662. [Google Scholar] [CrossRef] - Yasir, M.; Ho, S.; Vellambi, B.N. Indoor positioning system using visible light and accelerometer. J. Lightwave Tech.
**2014**, 32, 3306–3316. [Google Scholar] [CrossRef] - Ahsanullah, M.; Nevzorov, V.B.; Shakil, M. An Introduction to Order Statistics, 3rd ed.; Atlantis Press: Paris, France, 2013; pp. 15–21. [Google Scholar]
- Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products, 7th ed.; Jeffrey, A., Zwillinger, D., Eds.; Elsevier: Amsterdam, The Netherlands, 2007; p. 25. [Google Scholar]

**Figure 1.**Multiple-input single-output non-orthogonal multiple access visible light communication (MISO-NOMA VLC) system model.

**Figure 2.**(

**a**) Cross-section view of the intensity modulation direct detection (IM/DD) channel; (

**b**) top view of the IM/DD channel.

**Figure 3.**Secrecy outage probability (SOP) of the strong user versus the number of light-emitting diodes (LEDs).

**Figure 4.**SOP of the strong user versus the distance from the LED transmitting plane to the photodiode (PD) receiving plane.

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).