Abstract
This paper studies the use of secret key agreement for single-input single-output (SISO) visible light communication (VLC) systems. Specifically, we put forward a scheme for secret key generation and analyze the secret key rate in SISO VLC systems. First, we derive the secret key capacity bounds. Then, we analyze the achievable secret key rate distribution versus the illegal receiver’s location when the legal receiver’s location is fixed. Meanwhile, we deduce the average secret key capacity using random geometry knowledge when all the receivers’ positions are unknown. We also analyze the impact of employing a protected zone on the average secret key capacity and observe that a protected zone can obviously improve the secret performance. Finally, simulations are presented to verify the theoretical analysis.
1. Introduction
With the development of the Internet of Things (IoT), communication technology is facing new challenges. Traditional radio frequency (RF) resources cannot fully meet the needs of data transmission, requiring us to explore new spectrum resources. VLC has become a candidate technology for 6G mobile communication due to its advantages such as an ultrawide spectrum, high speed, and implementation of illumination and communication simultaneously. Since the light propagates along a straight line, VLC provides better signal confinement and higher security compared to traditional RF communication systems. Nevertheless, because it is inherently of a broadcast nature, information can be eavesdropped by unintended users located within the same light emitting diode (LED) lighting area. Consequently, the security of the VLC system is a critical challenge that needs to be addressed.
Physical layer security, as a technology that combines security and communication, has become an effective supplement to traditional network security encryption methods. There are two types of physical layer security methods [1]: one type is commonly known as keyless security, which is based on the wiretap channel model [2] and assumes that the eavesdropped channel is a degraded channel of the legitimate receiver. In recent years, much work has investigated keyless security [3,4,5,6,7,8] in VLC networks. The other type is secret key agreement, which focuses on generating secret keys from common randomness via public discussion [1,9,10]. In [9], Maurer first proposed the scheme that the legitimate parties generate a key over a public and error-free feedback channel, with the eavesdropper having no information on the key. Then, in [10], Ahlswede gave and proved the achievable secret key rates and the secret key capacity of the source-type model and channel-type model for secret key agreement. Maurer and Wolf subsequently extended the analysis of secure shared keys in the presence of active eavesdroppers in [11,12,13] .
Hershey first proposed utilizing wireless channel characteristics for secure key communication in [14]. Following more than 20 years of extensive research and technological advancement, secret key agreement mechanisms have been effectively implemented across various wireless communication systems including but not limited to RF networks [15,16], optical fiber networks [17], and underwater acoustic channels [18]. In some fields of the Optical Industrial Internet of Things (OIIoT), where RF communication is impractical and there is a demand high confidentiality, such as military-industrial manufacturing, the nuclear energy industry, and smart healthcare, the physical layer secret key mechanism emerges as a promising option for lightweight standalone secrecy solutions.
Current investigations in secret key agreement security predominantly concentrate on two key dimensions: (i) theoretical analysis of secret key capacity [19,20] and (ii) strategies for secret key distillation [16,21]. The secret key capacity analysis, which determines the fundamental limits of secret key generation performance, can provide guidance for actual key generation technology [1,22]. This paper focuses on the analysis of secret key capacity in VLC networks.
Although secret key capacity has been widely studied in the RF field, the developed theory cannot be directly applied to VLC scenarios. Due to the amplitude constraints of transmitted signals, it becomes more complex in VLC systems. To the best of our knowledge, only [23] has investigated the performance of secret key agreement in VLC systems with amplitude-constrained transmitted signals. In [23], the author studied secret key generation for multiple-input single-output (MISO) VLC networks. Specifically, the author obtained the analytical bounds of secret key capacity and proposed a beamforming method for secret key improvement. However, in the process of deriving the bounds on secret key capacity, the author scaled the secret key capacity to the secrecy capacity, as demonstrated in the proof of proposition 1 in [23]. Beyond [23], Alresheedi, M.T. et al. [24,25] investigated secret key generation from the bipolar optical orthogonal frequency division multiplexing (OFDM) samples. Nevertheless, this approach does not directly utilize the transmitted optical signal as the secret key source.
In this paper, we study the secret key agreement for SISO VLC systems. Specifically, we derive the analytical bounds on secret key capacity and the achievable secret key rate in some typical VLC scenarios. The major contributions of this work are summarized as follows.
- We analyze a secret key agreement scheme in SISO VLC systems, explore the secret key rate performance, and derive the analytic expressions of bounds on secrecy key capacity.
- Based on the lower bound of secret key capacity, we consider the situation in which all receivers’ positions are unknown and uniformly distributed within the designated range. We analyze the average secret key capacity and discuss the improvement of the secret performance by employing a protected zone.
- Furthermore, we numerically analyze the distribution of the achievable secret key rate in a typical indoor VLC scenario, where the legitimate receiver is positioned at the center of the receiving plane and an eavesdropper is located at any position on the receiving plane or on the window.
- Simulations are also presented to validate the theoretical analysis of the average secret key capacity and demonstrate the improved secrecy performance by introducing a protected zone.
The rest of this paper is arranged as follows. The system model of SISO VLC communication and the secret key background are presented in Section 2. The secret key capacity bounds are studied in Section 3. Then, we derive the average secret key capacity with randomly distributed terminals in Section 4. The numerical investigations and their implications are presented in Section 5 and Section 6, respectively. Finally, this article is summarized in Section 7.
2. System Model
Depending on the origin of randomness, secret key agreement is categorized into two fundamental models: the source-type model, in which all terminals share the correlated source observations, and channel-type model, in which one terminal transmits random symbols to others via a broadcast channel. Here, we consider the channel-type model as shown in Figure 1, where Alice is a transmitter, Bob is a legitimate receiver, and Eve is an eavesdropper. Alice and Bob intend to agree on common secret keys from the transmitted optical signal via public discussion. Alice is equipped with a single LED fixture, while both the legitimate receiver and the eavesdropper are equipped with a photo-diode (PD). The signals at the receivers can be described as
where x is the transmitted signal from the transmitter. and are zero-mean AWGN samples at the receivers. Considering that Bob and Eve are in the same environment, we can assume that the noise power is the same, i.e., . and represent the VLC channel gains from Alice to Bob and from Alice to Eve, respectively. The details of the channel gain will be discussed later.
Figure 1.
A SISO VLC system for secret key agreement.
Because of the inherent dynamic limitations of LED, the modulating signal must satisfy certain amplitude constraints to avoid clipping distortion. The transmitted signal must be subject to the constraint of peak amplitude in VLC systems:
where A is the optical peak power of the LED.
2.1. The VLC Channel Gain
The channel gain from one transmitter to one receiver can be modeled as [26]
where denotes the mode order of the Lambertian emission, denotes the half-power angle of the LED, d denotes the distance from the transmitter to the receiver, denotes the angle between the emission light and the normal vector of the transmitter, denotes the angle between the incident light and the normal vector of the receiver, is the field-of-view (FOV) at the receiver, and denotes the effective area of the PD and can be expressed as [26]
where n is the refractive index of the optical concentrator and denotes the physical area of the PD.
2.2. Secret Key Agreement and Secret Key Capacity
Alice and Bob intend to establish a secret key for secure communication, and thus they need to employ a secret key agreement strategy which contains the following four steps. First, Alice transmits random signals, and Bob receives the correlated signals. Second, Alice and Bob quantize their correlated observations into random sequences. Then, in order to obtain a common random sequence, they exchange messages over a public and error-free channel, which can be observed by Eve. Last, using a hash function for privacy amplification, the two partners reach the secret key, which is entirely hidden from Eve.
Ahlswede gave and proved the achievable secret key rates of source-type models and channel-type models. The maximum achievable secret key rate is defined as the secret key capacity. The secret key capacity is given as [10]
When forms a Markov chain, is independent of if given X, and it follows that [1]
Then, we can rewrite the secret key capacity as
where is a probability distribution over the finite set X, and x is subject to for a VLC network.
3. Bounds on Secret Key Capacity
Following the approach adopted in [27], considering a sufficient statistic keeping mutual information unchanged [28], we can replace with an equivalent channel capacity , and it follows that
where is the equivalent Gaussian noise with a variance , and the relationship between and , can be expressed as
Then, we can rewrite the secret key capacity as
Due to the amplitude constraints of x, the optimization of (11) is complex and only numerical results of the secret key capacity can be derived. Nevertheless, we know that the closed-form expression is important in order to assess the achievable secret key rate and extract secret key. So, in the next part, we focus on analyzing the closed-form bounds on secret key capacity.
From (11), we can see that the secret key capacity is transformed into an equivalent secrecy capacity of the eavesdropper channel, so we can use a similar approach as in [5] to derive the bounds on secret key capacity. However, we need to note that secret key capacity and secrecy capacity are different conceptions. In addition, because the mutual information of the equivalent channel is different, the bounds results must be different.
Using the similar approach to [5], we can derive the lower bound on secret key capacity. The details are discussed in the following.
3.1. Lower Bound
With the peak amplitude constraint, based on (11), we can verify that the following secret key rate is achievable, so it can be taken as a lower bound of secret key capacity for SISO VLC systems. The process follows as
where inequality (a) follows from the lower bound for using the entropy-power inequality and the upper bound for using . Inequality (b) is obtained by choosing a uniform distribution for instead of the maximization.
where is about 2.3625. From this expression, we find that the lower bound of the secret key capacity is bigger than that of the secrecy capacity in the same situation [5] (Equation (10)). In particular, we can see that even if Bob’s channel is worse than that of Eve, a nonzero secret key rate can still be achieved. This means that we can secure message by using secret key agreement in this situation, because the classical eavesdropping encoding methods do not work.
3.2. Upper Bound
If we relax the peak power constraint to the average power constraint , an upper bound can be concluded as follows:
It can be seen that is always positive, no matter whether the condition of Bob’s channel is better or worse than that of Eve. This result is consistent with Equation (17) of [27] and half of the upper bound on secret key capacity in [23].
Figure 2 shows the secret key capacity bounds of Equations (13) and (14). We take , and 1000, which include the channel situations for a common indoor VLC communication environment. We can see that the lower and upper bounds of the secret key capacity exhibit a trend similar to that of the secrecy capacity reported in [5], albeit with significantly higher values. It is shown that the upper and lower bounds are tight at both asymptotically low and high SNR levels. Given that typical indoor VLC environments can provide at least 40 dB of receiver SNR, these bounds are particularly relevant in practical scenarios.
Figure 2.
Secret key capacity bounds of the SISO VLC system.
4. Secret Key Rate with Randomly Distributed Terminals
In the previous section, all the receivers’ positions are assumed to be known; however, this is applicable only in some scenarios. Next, we will investigate the secret key performance when all the receivers’ CSI are unknown.
We still consider a scenario with one legitimate receiver and one eavesdropper, but considering that the receivers are usually deployed randomly and uniformly, we will model the scenario as all the terminals are uniformly positioned and analyze the average secret key capacity using the stochastic geometry in [29,30]. To improve the secret key performance, we will introduce a protected zone. This introduction is reasonable in a VLC scenario because the eavesdropper cannot be too close to the transmitter, subject to the restrictions imposed by the transmitter. Furthermore, we analyze the improvement of average secret key capacity by employing the protected zone.
The LED is fixed on the ceiling directly above the central point O. Because the illumination area of the LED on the receiving plane is circular, in this section, we will model the receiving plane as as a circular region with a central point O and a radius D. Bob is uniformly distributed within the receiving plane, so the probability density function (PDF) of Bob’s position is
The protected zone is also geometrically modeled as a circular region with the same central point O and a radius P (). Eve is uniformly distributed in the receiving plane but outside of the protected zone. The probability density function (PDF) of Bob’s position is
Without loss of generality, it can be assumed that the normal direction of the PD is perpendicular to the receiving plane, so , Z is the vertical distance between the receiver plane and the ceiling, while ()) represents the distance from Bob or Eve to point O. Then, we can rewrite the channel gain as
where .
Based on (16), the CDF and PDF of can be similarly derived as and . Using the same method of obtaining (20), we can derive the PDF of
where , and in (20) and (21) are given as
From the lower bound (13), we can deduce the average secret key capacity for the random VLC network as
5. Simulation Results
To verify the analytical results of the previous sections, we provide numerical simulation results in this section. The main parameters used in this paper are the same as those provided in [5] and are shown in Table 1. The room dimensions are , and the distance from the receiving plane to the room ground is m. The average electrical noise power is dBm. We take the center of the room floor as the coordinate origin (0, 0, 0), so the coordinate of the receiving plane center O is (0, 0, 0.85). The LED is fixed at the ceiling and the coordinate of it is (0, 0, 3). There is a window in the room, the area of which is , , .
Table 1.
VLC network simulation parameters.
5.1. Eve’s Known CSI
Figure 3 presents the achievable secret key rate (see (13)) against the location of the eavesdropper on the receiving plane. Bob is located at the center of the receiving plane, the optical power of the LED is 1 W, and the average electrical noise power is dBm. The figure demonstrates several interesting phenomena. First, the further away Eve is from Bob, the larger the achievable secret key rate is, especially when Eve moves into the corner, when it reaches to a maximum secret key rate of 2.44 nats per channel use. Furthermore, even in the worst-case scenario where Eve occupies the central position (with channel conditions matching Bob’s), it still yields a positive achievable secret key rate of 0.17 nats per channel use as theoretically anticipated (see (13)), which demonstrates the robustness of the secret key scheme.
Figure 3.
Achievable secret key rate versus the location of Eve on the receiving plane. Bob is at .
Figure 4 presents the distribution of the achievable secret key rate versus Eve’s location in relation to the window, while Bob is still located at . As illustrated in Figure 4, we can achieve a secret key rate of at least 1.28 nats for every channel use. In addition, if the Z-axis coordinate of Eve in relation to the window exceeds 1.6 m, due to the limitation of FOV, Eve cannot receive the LED signals and the secret key rate can reach to communication rate.
Figure 4.
Achievable secret key rate versus the location of Eve in relation to the window. Bob is at .
5.2. Randomly Distributed Terminals
Figure 5 presents the average secret key capacity versus the square of the amplitude constraint for different values of P (P is the radius of the the protected zone), when m and dBm. We obtain the simulation results by running Monte-Carlo experiments. As shown in Figure 5, first increases and then tends to stabilize with the increase in . Moreover, as the radius P of the protected zone increases, the average secret key capacity increases dramatically; this is because the equivalent distance from Eve to Alice is further than from Bob to Alice. Therefore, we can conclude that introducing a protected zone is an effective transmission strategy to improve secret key performance. Of course, we need to have a tradeoff between the secrecy performance and the complexity of the systems in the actual system design.
Figure 5.
Average secret key capacity versus the square of the amplitude constraint for different P values when m and dBm.
6. Discussion
In this paper, we propose a novel secret key generation scheme for SISO VLC systems and establish both lower and upper bounds for the secret key capacity. Through numerical simulations, we demonstrate three critical phenomena: (i) The spatial dependency of the physical layer secret key in VLC systems is observed, which can also be found in keyless security research [5,32]. (ii) The robustness of our secret key scheme is observed, as even when the eavesdropper’s channel quality is comparable to that of the legitimate receiver, a non-negative achievable secret key rate can still be guaranteed. This is consistent with research [1,9], but the keyless method does not work in this situation [2]. (iii) Enhanced security effectiveness is achieved through protected zone implementation [30]. We notice that, for the case of a SISO VLC system, the secret key rate is finite; this motivates future exploration of multi-transmitter or multi-eavesdropper scenarios and security-enhancing technologies such as reconfigurable intelligent surfaces (RIS) [33]. We believe that this work can provide valuable knowledge about physical layer security in VLC networks and provide a reference for further work on the subject.
7. Conclusions
We have studied the use of secret key agreement for SISO VLC systems and established the analytical bounds on secret key capacity. On the base of the lower bound, we numerically analyzed the achievable secret key rate distribution when the legitimate receiver’s position is fixed and the eavesdropper is located at different positions in a room. Furthermore, considering the random and uniform distribution of the receivers’ locations, we deduced the average secret key capacity using stochastic geometric modeling and established a protected zone to improve the secret key capacity. The derived results can provide a theoretical foundation for extracting physical layer secret keys in SISO VLC systems and further theoretical research. In our future work, we will explore the use of secret key agreement in MISO VLC scenarios and design some schemes to enhance the secret key capacity.
Author Contributions
Conceptualization, D.G.; methodology, D.G.; software, D.G.; validation, X.X.; formal analysis, D.G.; investigation, D.G.; resources, D.G.; data curation, K.T.; writing—original draft preparation, D.G.; writing—review and editing, J.Z.; visualization, D.G.; supervision, G.X.; project administration, J.Z.; funding acquisition, J.Z. All authors have read and agreed to the published version of the manuscript.
Funding
This research was supported by the National Natural Science Foundation of China (NSFC) under grant 62331024 and the National Key Research and Development Program of China under grant (2022YFB2802804).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.
Conflicts of Interest
The authors declare no conflicts of interest.
References
- Bloch, M.; Barros, J. Physical-Layer Security: From Information Theory to Security Engineering; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
- Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
- Arfaoui, M.A.; Soltani, M.D.; Tavakkolnia, I.; Ghrayeb, A.; Safari, M.; Assi, C.M.; Haas, H. Physical Layer Security for Visible Light Communication Systems: A Survey. IEEE Commun. Surv. Tutor. 2020, 22, 1887–1908. [Google Scholar] [CrossRef]
- Wang, J.Y.; Liu, C.; Wang, J.B.; Wu, Y.; Lin, M.; Cheng, J. Physical-Layer Security for Indoor Visible Light Communications: Secrecy Capacity Analysis. IEEE Trans. Commun. 2018, 66, 6423–6436. [Google Scholar] [CrossRef]
- Mostafa, A.; Lampe, L. Physical-Layer Security for MISO Visible Light Communication Channels. IEEE J. Sel. Areas Commun. 2015, 33, 1806–1818. [Google Scholar] [CrossRef]
- Wang, F.; Liu, C.; Wang, Q.; Zhang, J.; Zhang, R.; Yang, L.L.; Hanzo, L. Optical Jamming Enhances the Secrecy Performance of the Generalized Space-Shift-Keying-Aided Visible-Light Downlink. IEEE Trans. Commun. 2018, 66, 4087–4102. [Google Scholar] [CrossRef]
- Sun, S.; Yang, F.; Song, J.; Han, Z. Optimization on Multiuser Physical Layer Security of Intelligent Reflecting Surface-Aided VLC. IEEE Wirel. Commun. Lett. 2022, 11, 1344–1348. [Google Scholar] [CrossRef]
- Liu, S.; Liu, X.; Du, X.; Guizani, M. Smart Jamming for Secrecy: Deep Reinforcement Learning Enabled Secure Visible Light Communication. IEEE Trans. Wirel. Commun. 2024, 23, 17915–17928. [Google Scholar] [CrossRef]
- Maurer, U. Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 1993, 39, 733–742. [Google Scholar] [CrossRef]
- Ahlswede, R.; Csiszar, I. Common randomness in information theory and cryptography. I. Secret sharing. IEEE Trans. Inf. Theory 1993, 39, 1121–1132. [Google Scholar] [CrossRef]
- Maurer, U.; Wolf, S. Secret-key agreement over unauthenticated public channels. I. Definitions and a completeness result. IEEE Trans. Inf. Theory 2003, 49, 822–831. [Google Scholar] [CrossRef]
- Maurer, U.; Wolf, S. Secret-key agreement over unauthenticated public channels—Part II: The simulatability condition. IEEE Trans. Inf. Theory 2003, 49, 832–838. [Google Scholar] [CrossRef]
- Maurer, U.; Wolf, S. Secret-key agreement over unauthenticated public channels. II. Privacy amplification. IEEE Trans. Inf. Theory 2003, 49, 839–851. [Google Scholar] [CrossRef]
- Hershey, J.; Hassan, A.; Yarlagadda, R. Unconventional cryptographic keying variable management. IEEE Trans. Commun. 1995, 43, 3–6. [Google Scholar] [CrossRef]
- Hua, Y. Generalized channel probing and generalized pre-processing for secret key generation. IEEE Trans. Signal Process. 2023, 71, 1067–1082. [Google Scholar] [CrossRef]
- Hu, L.; Li, G.; Hu, A.; Ng, D.W.K. Exploiting malicious RIS for secret key acquisition in physical-layer key generation. IEEE Wirel. Commun. Lett. 2023, 13, 417–421. [Google Scholar] [CrossRef]
- Wang, X.; Zhang, J.; Li, Y.; Zhao, Y.; Yang, X. Secure Key Distribution System Based on Optical Channel Physical Features. IEEE Photonics J. 2019, 11, 7205311. [Google Scholar] [CrossRef]
- Diamant, R.; Casari, P.; Ardizzon, F.; Tomasin, S.; Sherlock, B.; Corner, T.; Neasham, J. Channel-Based Key Generation for Secure Underwater Acoustic Communications. IEEE Trans. Wirel. Commun. 2025. [Google Scholar] [CrossRef]
- Nitinawarat, S.; Narayan, P. Secret Key Generation for Correlated Gaussian Sources. IEEE Trans. Inf. Theory 2012, 58, 3373–3391. [Google Scholar] [CrossRef]
- Tu, W.; Goldenbaum, M.; Lai, L.; Poor, H.V. On Simultaneously Generating Multiple Keys in a Joint Source-Channel Model. IEEE Trans. Inf. Forensics Secur. 2017, 12, 298–308. [Google Scholar] [CrossRef]
- Azimi-Sadjadi, B.; Kiayias, A.; Mercado, A.; Yener, B. Robust key generation from signal envelopes in wireless networks. In Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 2 November–31 October 2007; pp. 401–410. [Google Scholar]
- Rezki, Z.; Zorgui, M.; Alomair, B.; Alouini, M.S. Secret Key Agreement: Fundamental Limits and Practical Challenges. IEEE Wirel. Commun. 2017, 24, 72–79. [Google Scholar] [CrossRef]
- Mukherjee, A. Secret-Key Agreement for Security in Multi-Emitter Visible Light Communication Systems. IEEE Commun. Lett. 2016, 20, 1361–1364. [Google Scholar] [CrossRef]
- Al-Moliki, Y.M.; Alresheedi, M.T.; Al-Harthi, Y. Robust Key Generation From Optical OFDM Signal in Indoor VLC Networks. IEEE Photonics Technol. Lett. 2016, 28, 2629–2632. [Google Scholar] [CrossRef]
- Alresheedi, M.T. Improving the Confidentiality of VLC Channels: Physical-Layer Security Approaches. In Proceedings of the 2020 22nd International Conference on Transparent Optical Networks (ICTON), Bari, Italy, 19–23 July 2020; pp. 1–5. [Google Scholar] [CrossRef]
- Komine, T.; Nakagawa, M. Fundamental analysis for visible-light communication system using LED lights. IEEE Trans. Consum. Electron. 2004, 50, 100–107. [Google Scholar] [CrossRef]
- Zorgui, M.; Rezki, Z.; Alomair, B.; Alouini, M.S. Secret-Key Agreement with Public Discussion Subject to an Amplitude Constraint. IEEE Commun. Lett. 2016, 20, 1124–1127. [Google Scholar] [CrossRef]
- Cover, T.M. Elements of Information Theory; John Wiley & Sons: Hoboken, NJ, USA, 1999. [Google Scholar]
- Pan, G.; Ye, J.; Ding, Z. On Secure VLC Systems with Spatially Random Terminals. IEEE Commun. Lett. 2017, 21, 492–495. [Google Scholar] [CrossRef]
- Wang, J.Y.; Qiu, Y.; Lin, S.H.; Wang, J.B.; Lin, M.; Liu, C. On the Secrecy Performance of Random VLC Networks with Imperfect CSI and Protected Zone. IEEE Syst. J. 2020, 14, 4176–4187. [Google Scholar] [CrossRef]
- Kelly, F.P. Probability; Cambridge University Press: Cambridge, UK, 1996. [Google Scholar]
- Arfaoui, M.A.; Ghrayeb, A.; Assi, C. Secrecy Rate Closed-Form Expressions for the SISO VLC Wiretap Channel with Discrete Input Signaling. IEEE Commun. Lett. 2018, 22, 1382–1385. [Google Scholar] [CrossRef]
- Khoshafa, M.H.; Maraqa, O.; Moualeu, J.M.; Aboagye, S.; Ngatched, T.M.; Ahmed, M.H.; Gadallah, Y.; Di Renzo, M. RIS-assisted physical layer security in emerging RF and optical wireless communication systems: A comprehensive survey. IEEE Commun. Surv. Tutor. 2024. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).