Next Article in Journal
Seamless Integration of UOWC/MMF/FSO Systems Using Orbital Angular Momentum Beams for Enhanced Data Transmission
Previous Article in Journal
Supercontinuum Generation in Suspended Core Fibers Based on Intelligent Algorithms
Previous Article in Special Issue
WDM-PON Free Space Optical (FSO) System Utilizing LDPC Decoding for Enhanced Cellular C-RAN Fronthaul Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secret Key Agreement for SISO Visible Light Communication Systems

Information Engineering University, Zhengzhou 450001, China
*
Author to whom correspondence should be addressed.
Photonics 2025, 12(5), 498; https://doi.org/10.3390/photonics12050498
Submission received: 17 March 2025 / Revised: 27 April 2025 / Accepted: 13 May 2025 / Published: 16 May 2025

Abstract

:
This paper studies the use of secret key agreement for single-input single-output (SISO) visible light communication (VLC) systems. Specifically, we put forward a scheme for secret key generation and analyze the secret key rate in SISO VLC systems. First, we derive the secret key capacity bounds. Then, we analyze the achievable secret key rate distribution versus the illegal receiver’s location when the legal receiver’s location is fixed. Meanwhile, we deduce the average secret key capacity using random geometry knowledge when all the receivers’ positions are unknown. We also analyze the impact of employing a protected zone on the average secret key capacity and observe that a protected zone can obviously improve the secret performance. Finally, simulations are presented to verify the theoretical analysis.

1. Introduction

With the development of the Internet of Things (IoT), communication technology is facing new challenges. Traditional radio frequency (RF) resources cannot fully meet the needs of data transmission, requiring us to explore new spectrum resources. VLC has become a candidate technology for 6G mobile communication due to its advantages such as an ultrawide spectrum, high speed, and implementation of illumination and communication simultaneously. Since the light propagates along a straight line, VLC provides better signal confinement and higher security compared to traditional RF communication systems. Nevertheless, because it is inherently of a broadcast nature, information can be eavesdropped by unintended users located within the same light emitting diode (LED) lighting area. Consequently, the security of the VLC system is a critical challenge that needs to be addressed.
Physical layer security, as a technology that combines security and communication, has become an effective supplement to traditional network security encryption methods. There are two types of physical layer security methods [1]: one type is commonly known as keyless security, which is based on the wiretap channel model [2] and assumes that the eavesdropped channel is a degraded channel of the legitimate receiver. In recent years, much work has investigated keyless security [3,4,5,6,7,8] in VLC networks. The other type is secret key agreement, which focuses on generating secret keys from common randomness via public discussion [1,9,10]. In [9], Maurer first proposed the scheme that the legitimate parties generate a key over a public and error-free feedback channel, with the eavesdropper having no information on the key. Then, in [10], Ahlswede gave and proved the achievable secret key rates and the secret key capacity of the source-type model and channel-type model for secret key agreement. Maurer and Wolf subsequently extended the analysis of secure shared keys in the presence of active eavesdroppers in [11,12,13] .
Hershey first proposed utilizing wireless channel characteristics for secure key communication in [14]. Following more than 20 years of extensive research and technological advancement, secret key agreement mechanisms have been effectively implemented across various wireless communication systems including but not limited to RF networks [15,16], optical fiber networks [17], and underwater acoustic channels [18]. In some fields of the Optical Industrial Internet of Things (OIIoT), where RF communication is impractical and there is a demand high confidentiality, such as military-industrial manufacturing, the nuclear energy industry, and smart healthcare, the physical layer secret key mechanism emerges as a promising option for lightweight standalone secrecy solutions.
Current investigations in secret key agreement security predominantly concentrate on two key dimensions: (i) theoretical analysis of secret key capacity [19,20] and (ii) strategies for secret key distillation [16,21]. The secret key capacity analysis, which determines the fundamental limits of secret key generation performance, can provide guidance for actual key generation technology [1,22]. This paper focuses on the analysis of secret key capacity in VLC networks.
Although secret key capacity has been widely studied in the RF field, the developed theory cannot be directly applied to VLC scenarios. Due to the amplitude constraints of transmitted signals, it becomes more complex in VLC systems. To the best of our knowledge, only [23] has investigated the performance of secret key agreement in VLC systems with amplitude-constrained transmitted signals. In [23], the author studied secret key generation for multiple-input single-output (MISO) VLC networks. Specifically, the author obtained the analytical bounds of secret key capacity and proposed a beamforming method for secret key improvement. However, in the process of deriving the bounds on secret key capacity, the author scaled the secret key capacity to the secrecy capacity, as demonstrated in the proof of proposition 1 in [23]. Beyond [23], Alresheedi, M.T. et al. [24,25] investigated secret key generation from the bipolar optical orthogonal frequency division multiplexing (OFDM) samples. Nevertheless, this approach does not directly utilize the transmitted optical signal as the secret key source.
In this paper, we study the secret key agreement for SISO VLC systems. Specifically, we derive the analytical bounds on secret key capacity and the achievable secret key rate in some typical VLC scenarios. The major contributions of this work are summarized as follows.
  • We analyze a secret key agreement scheme in SISO VLC systems, explore the secret key rate performance, and derive the analytic expressions of bounds on secrecy key capacity.
  • Based on the lower bound of secret key capacity, we consider the situation in which all receivers’ positions are unknown and uniformly distributed within the designated range. We analyze the average secret key capacity and discuss the improvement of the secret performance by employing a protected zone.
  • Furthermore, we numerically analyze the distribution of the achievable secret key rate in a typical indoor VLC scenario, where the legitimate receiver is positioned at the center of the receiving plane and an eavesdropper is located at any position on the receiving plane or on the window.
  • Simulations are also presented to validate the theoretical analysis of the average secret key capacity and demonstrate the improved secrecy performance by introducing a protected zone.
The rest of this paper is arranged as follows. The system model of SISO VLC communication and the secret key background are presented in Section 2. The secret key capacity bounds are studied in Section 3. Then, we derive the average secret key capacity with randomly distributed terminals in Section 4. The numerical investigations and their implications are presented in Section 5 and Section 6, respectively. Finally, this article is summarized in Section 7.

2. System Model

Depending on the origin of randomness, secret key agreement is categorized into two fundamental models: the source-type model, in which all terminals share the correlated source observations, and channel-type model, in which one terminal transmits random symbols to others via a broadcast channel. Here, we consider the channel-type model as shown in Figure 1, where Alice is a transmitter, Bob is a legitimate receiver, and Eve is an eavesdropper. Alice and Bob intend to agree on common secret keys from the transmitted optical signal via public discussion. Alice is equipped with a single LED fixture, while both the legitimate receiver and the eavesdropper are equipped with a photo-diode (PD). The signals at the receivers can be described as
y B = h B x + n B
y E = h E x + n E
where x is the transmitted signal from the transmitter. n B ( 0 , σ B 2 ) and n E ( 0 , σ E 2 ) are zero-mean AWGN samples at the receivers. Considering that Bob and Eve are in the same environment, we can assume that the noise power is the same, i.e., σ B 2 = σ E 2 = σ 2 . h B and h E represent the VLC channel gains from Alice to Bob and from Alice to Eve, respectively. The details of the channel gain will be discussed later.
Because of the inherent dynamic limitations of LED, the modulating signal must satisfy certain amplitude constraints to avoid clipping distortion. The transmitted signal must be subject to the constraint of peak amplitude in VLC systems:
x A
where A is the optical peak power of the LED.

2.1. The VLC Channel Gain

The channel gain from one transmitter to one receiver can be modeled as [26]
h = ( m + 1 ) A r 2 π d 2 cos m ( ϕ ) cos ( ψ ) , 0 ψ ψ fov 0 , ψ > ψ fov
where m = ln 2 ln ( cos ϕ 1 2 ) denotes the mode order of the Lambertian emission, ϕ 1 2 denotes the half-power angle of the LED, d denotes the distance from the transmitter to the receiver, ϕ denotes the angle between the emission light and the normal vector of the transmitter, ψ denotes the angle between the incident light and the normal vector of the receiver, ψ fov is the field-of-view (FOV) at the receiver, and A r denotes the effective area of the PD and can be expressed as [26]
A r = n 2 sin 2 ( ψ fov ) A P D
where n is the refractive index of the optical concentrator and A P D denotes the physical area of the PD.

2.2. Secret Key Agreement and Secret Key Capacity

Alice and Bob intend to establish a secret key for secure communication, and thus they need to employ a secret key agreement strategy which contains the following four steps. First, Alice transmits random signals, and Bob receives the correlated signals. Second, Alice and Bob quantize their correlated observations into random sequences. Then, in order to obtain a common random sequence, they exchange messages over a public and error-free channel, which can be observed by Eve. Last, using a hash function for privacy amplification, the two partners reach the secret key, which is entirely hidden from Eve.
Ahlswede gave and proved the achievable secret key rates of source-type models and channel-type models. The maximum achievable secret key rate is defined as the secret key capacity. The secret key capacity is given as [10]
max I X ; Y B I Y B ; Y E , I X ; Y E I Y B ; Y E C S K min I X ; Y B , I X ; Y B Y E
When Y B X Y E forms a Markov chain, Y B is independent of Y E if given X, and it follows that [1]
I X ; Y B Y E = I X ; Y B I Y B ; Y E
Then, we can rewrite the secret key capacity as
C S K = max p x I X ; Y B , Y E I X ; Y E
where { p x } x X is a probability distribution over the finite set X, and x is subject to x A for a VLC network.

3. Bounds on Secret Key Capacity

Following the approach adopted in [27], considering a sufficient statistic keeping mutual information unchanged [28], we can replace I X ; Y B , Y E with an equivalent channel capacity I X ; Y B E , and it follows that
I X ; Y B E = I X ; X + N B E
where N B E is the equivalent Gaussian noise with a variance σ B E 2 , and the relationship between σ B E 2 and σ B 2 , σ E 2 can be expressed as
1 σ B E 2 = h B 2 σ B 2 + h E 2 σ E 2
Then, we can rewrite the secret key capacity as
C S K = max p x I X ; Y B E I X ; Y E
Due to the amplitude constraints of x, the optimization of (11) is complex and only numerical results of the secret key capacity can be derived. Nevertheless, we know that the closed-form expression is important in order to assess the achievable secret key rate and extract secret key. So, in the next part, we focus on analyzing the closed-form bounds on secret key capacity.
From (11), we can see that the secret key capacity is transformed into an equivalent secrecy capacity of the eavesdropper channel, so we can use a similar approach as in [5] to derive the bounds on secret key capacity. However, we need to note that secret key capacity and secrecy capacity are different conceptions. In addition, because the mutual information of the equivalent channel is different, the bounds results must be different.
Using the similar approach to [5], we can derive the lower bound on secret key capacity. The details are discussed in the following.

3.1. Lower Bound

With the peak amplitude constraint, based on (11), we can verify that the following secret key rate is achievable, so it can be taken as a lower bound of secret key capacity for SISO VLC systems. The process follows as
C S K = max p X I X ; Y B E I X ; Y E = max p X ( h ( Y B E ) h ( N B E ) h ( Y E ) + h ( N E ) ) ( a ) max p X ( 1 2 log ( e 2 h ( X ) ) + e 2 h ( N B E ) ) h ( N B E ) 1 2 log ( 2 π e var ( Y E ) ) + h ( N E ) ) = max p X ( 1 2 log ( 1 + e 2 h ( X ) 2 π e σ B E 2 ) 1 2 log ( 1 + var ( h E X + N E ) σ E 2 ) ( b ) 1 2 log ( 6 h B 2 A 2 + 6 h E 2 A 2 + 3 π e σ 2 π e h E 2 A 2 + 3 π e σ 2 )
where inequality (a) follows from the lower bound for h ( Y B E ) using the entropy-power inequality h ( Y B E ) 1 2 log ( 1 + e 2 h ( X ) 2 π e σ B E 2 ) and the upper bound for h ( Y E ) using h ( Y E ) 1 2 log ( 2 π e var ( Y E ) ) . Inequality (b) is obtained by choosing a uniform distribution for p X instead of the maximization.
C S K d = 1 2 log ( 6 h B 2 A 2 + 6 h E 2 A 2 + 3 π e σ 2 π e h E 2 A 2 + 3 π e σ 2 ) , if λ h B 2 h E 2 0 , otherwise
where λ = 6 π e 6 is about 2.3625. From this expression, we find that the lower bound of the secret key capacity is bigger than that of the secrecy capacity in the same situation [5] (Equation (10)). In particular, we can see that even if Bob’s channel is worse than that of Eve, a nonzero secret key rate can still be achieved. This means that we can secure message by using secret key agreement in this situation, because the classical eavesdropping encoding methods do not work.

3.2. Upper Bound

If we relax the peak power constraint x A to the average power constraint E { X 2 } A 2 , an upper bound can be concluded as follows:
C S K 1 2 log ( 1 + A 2 ( h B 2 σ B 2 + h E 2 σ E 2 ) 1 + A 2 h E 2 σ E 2 ) = 1 2 log ( h B 2 A 2 + h E 2 A 2 + σ 2 h E 2 A 2 + σ 2 ) = C S K u
It can be seen that C S K u is always positive, no matter whether the condition of Bob’s channel is better or worse than that of Eve. This result is consistent with Equation (17) of [27] and half of the upper bound on secret key capacity in [23].
Figure 2 shows the secret key capacity bounds of Equations (13) and (14). We take h B 2 / h E 2 = 1 , 10 , 100 , and 1000, which include the channel situations for a common indoor VLC communication environment. We can see that the lower and upper bounds of the secret key capacity exhibit a trend similar to that of the secrecy capacity reported in [5], albeit with significantly higher values. It is shown that the upper and lower bounds are tight at both asymptotically low and high SNR levels. Given that typical indoor VLC environments can provide at least 40 dB of receiver SNR, these bounds are particularly relevant in practical scenarios.

4. Secret Key Rate with Randomly Distributed Terminals

In the previous section, all the receivers’ positions are assumed to be known; however, this is applicable only in some scenarios. Next, we will investigate the secret key performance when all the receivers’ CSI are unknown.
We still consider a scenario with one legitimate receiver and one eavesdropper, but considering that the receivers are usually deployed randomly and uniformly, we will model the scenario as all the terminals are uniformly positioned and analyze the average secret key capacity using the stochastic geometry in [29,30]. To improve the secret key performance, we will introduce a protected zone. This introduction is reasonable in a VLC scenario because the eavesdropper cannot be too close to the transmitter, subject to the restrictions imposed by the transmitter. Furthermore, we analyze the improvement of average secret key capacity by employing the protected zone.
The LED is fixed on the ceiling directly above the central point O. Because the illumination area of the LED on the receiving plane is circular, in this section, we will model the receiving plane as as a circular region with a central point O and a radius D. Bob is uniformly distributed within the receiving plane, so the probability density function (PDF) of Bob’s position is
f B o b = 1 π D 2
The protected zone is also geometrically modeled as a circular region with the same central point O and a radius P ( P < D ). Eve is uniformly distributed in the receiving plane but outside of the protected zone. The probability density function (PDF) of Bob’s position is
f E v e = 1 π ( D 2 P 2 )
Without loss of generality, it can be assumed that the normal direction of the PD is perpendicular to the receiving plane, so cos ϕ = cos ψ = Z Z 2 + r i 2 , Z is the vertical distance between the receiver plane and the ceiling, while r i ( i = B o r E )) represents the distance from Bob or Eve to point O. Then, we can rewrite the channel gain as
h i = A r R T Z m + 1 ( m + 1 ) 2 π ( Z 2 + r i 2 ) m + 3 2 = K ( Z 2 + r i 2 ) m + 3 2
where K = A r R T Z m + 1 ( m + 1 ) 2 π .
Based on (15), the cumulative distribution function (CDF) and the PDF of r B can be deduced as
F r B = r B 2 D 2
f r B = 2 r B D 2
According to (17)–(19), the PDF of h B 2 can be obtained as [31]
f h B 2 ( x ) = f r B ( x K 2 ) 1 m + 3 Z 2 × d d x ( x K 2 ) 1 m + 3 Z 2 = K 2 m + 3 x m + 4 m + 3 ( m + 3 ) D 2 , v min x v max
Based on (16), the CDF and PDF of r E can be similarly derived as F r E = r E 2 P 2 D 2 P 2 and f r E = 2 r E D 2 P 2 . Using the same method of obtaining (20), we can derive the PDF of h E 2
f h E 2 ( y ) = K 2 m + 3 y m + 4 m + 3 ( m + 3 ) ( D 2 P 2 ) , v min y v mid
where v min , v mid and v max in (20) and (21) are given as
v min = K 2 ( Z 2 + D 2 ) ( m + 3 )
v mid = K 2 ( Z 2 + P 2 ) ( m + 3 )
v max = K 2 Z ( 2 m + 6 )
From the lower bound (13), we can deduce the average secret key capacity for the random VLC network as
C ¯ S K d = v min v max f ( x ) d x v min v mid C S K d f ( y ) d y , if λ v mid v min v min v mid λ f ( x ) d x v min λ x C S K d f ( y ) d y + v mid λ v max f ( x ) d x v min v mid C S K d f ( y ) d y if λ v mid v min

5. Simulation Results

To verify the analytical results of the previous sections, we provide numerical simulation results in this section. The main parameters used in this paper are the same as those provided in [5] and are shown in Table 1. The room dimensions are 5 × 5 × 3 m 3 , and the distance from the receiving plane to the room ground is 0.85 m. The average electrical noise power is σ 2 = 98.82 dBm. We take the center of the room floor as the coordinate origin (0, 0, 0), so the coordinate of the receiving plane center O is (0, 0, 0.85). The LED is fixed at the ceiling and the coordinate of it is (0, 0, 3). There is a window in the room, the area of which is x = 2.5 m , 0.5 m y 0.5 m , 0.5 m z 1.5 m .

5.1. Eve’s Known CSI

Figure 3 presents the achievable secret key rate C S K d (see (13)) against the location of the eavesdropper on the receiving plane. Bob is located at the center O ( 0 , 0 , 0.85 ) of the receiving plane, the optical power of the LED is 1 W, and the average electrical noise power is 98.82 dBm. The figure demonstrates several interesting phenomena. First, the further away Eve is from Bob, the larger the achievable secret key rate is, especially when Eve moves into the corner, when it reaches to a maximum secret key rate of 2.44 nats per channel use. Furthermore, even in the worst-case scenario where Eve occupies the central position (with channel conditions matching Bob’s), it still yields a positive achievable secret key rate of 0.17 nats per channel use as theoretically anticipated (see (13)), which demonstrates the robustness of the secret key scheme.
Figure 4 presents the distribution of the achievable secret key rate C S K d versus Eve’s location in relation to the window, while Bob is still located at O ( 0 , 0 , 0.85 ) . As illustrated in Figure 4, we can achieve a secret key rate of at least 1.28 nats for every channel use. In addition, if the Z-axis coordinate of Eve in relation to the window exceeds 1.6 m, due to the limitation of FOV, Eve cannot receive the LED signals and the secret key rate can reach to communication rate.

5.2. Randomly Distributed Terminals

Figure 5 presents the average secret key capacity C ¯ S K d versus the square of the amplitude constraint A 2 for different values of P (P is the radius of the the protected zone), when D = 2.5 m and σ 2 = 98.82 dBm. We obtain the simulation results by running 10 5 Monte-Carlo experiments. As shown in Figure 5, C ¯ S K d first increases and then tends to stabilize with the increase in A 2 . Moreover, as the radius P of the protected zone increases, the average secret key capacity increases dramatically; this is because the equivalent distance from Eve to Alice is further than from Bob to Alice. Therefore, we can conclude that introducing a protected zone is an effective transmission strategy to improve secret key performance. Of course, we need to have a tradeoff between the secrecy performance and the complexity of the systems in the actual system design.

6. Discussion

In this paper, we propose a novel secret key generation scheme for SISO VLC systems and establish both lower and upper bounds for the secret key capacity. Through numerical simulations, we demonstrate three critical phenomena: (i) The spatial dependency of the physical layer secret key in VLC systems is observed, which can also be found in keyless security research [5,32]. (ii) The robustness of our secret key scheme is observed, as even when the eavesdropper’s channel quality is comparable to that of the legitimate receiver, a non-negative achievable secret key rate can still be guaranteed. This is consistent with research [1,9], but the keyless method does not work in this situation [2]. (iii) Enhanced security effectiveness is achieved through protected zone implementation [30]. We notice that, for the case of a SISO VLC system, the secret key rate is finite; this motivates future exploration of multi-transmitter or multi-eavesdropper scenarios and security-enhancing technologies such as reconfigurable intelligent surfaces (RIS) [33]. We believe that this work can provide valuable knowledge about physical layer security in VLC networks and provide a reference for further work on the subject.

7. Conclusions

We have studied the use of secret key agreement for SISO VLC systems and established the analytical bounds on secret key capacity. On the base of the lower bound, we numerically analyzed the achievable secret key rate distribution when the legitimate receiver’s position is fixed and the eavesdropper is located at different positions in a room. Furthermore, considering the random and uniform distribution of the receivers’ locations, we deduced the average secret key capacity using stochastic geometric modeling and established a protected zone to improve the secret key capacity. The derived results can provide a theoretical foundation for extracting physical layer secret keys in SISO VLC systems and further theoretical research. In our future work, we will explore the use of secret key agreement in MISO VLC scenarios and design some schemes to enhance the secret key capacity.

Author Contributions

Conceptualization, D.G.; methodology, D.G.; software, D.G.; validation, X.X.; formal analysis, D.G.; investigation, D.G.; resources, D.G.; data curation, K.T.; writing—original draft preparation, D.G.; writing—review and editing, J.Z.; visualization, D.G.; supervision, G.X.; project administration, J.Z.; funding acquisition, J.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Natural Science Foundation of China (NSFC) under grant 62331024 and the National Key Research and Development Program of China under grant (2022YFB2802804).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Bloch, M.; Barros, J. Physical-Layer Security: From Information Theory to Security Engineering; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
  2. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  3. Arfaoui, M.A.; Soltani, M.D.; Tavakkolnia, I.; Ghrayeb, A.; Safari, M.; Assi, C.M.; Haas, H. Physical Layer Security for Visible Light Communication Systems: A Survey. IEEE Commun. Surv. Tutor. 2020, 22, 1887–1908. [Google Scholar] [CrossRef]
  4. Wang, J.Y.; Liu, C.; Wang, J.B.; Wu, Y.; Lin, M.; Cheng, J. Physical-Layer Security for Indoor Visible Light Communications: Secrecy Capacity Analysis. IEEE Trans. Commun. 2018, 66, 6423–6436. [Google Scholar] [CrossRef]
  5. Mostafa, A.; Lampe, L. Physical-Layer Security for MISO Visible Light Communication Channels. IEEE J. Sel. Areas Commun. 2015, 33, 1806–1818. [Google Scholar] [CrossRef]
  6. Wang, F.; Liu, C.; Wang, Q.; Zhang, J.; Zhang, R.; Yang, L.L.; Hanzo, L. Optical Jamming Enhances the Secrecy Performance of the Generalized Space-Shift-Keying-Aided Visible-Light Downlink. IEEE Trans. Commun. 2018, 66, 4087–4102. [Google Scholar] [CrossRef]
  7. Sun, S.; Yang, F.; Song, J.; Han, Z. Optimization on Multiuser Physical Layer Security of Intelligent Reflecting Surface-Aided VLC. IEEE Wirel. Commun. Lett. 2022, 11, 1344–1348. [Google Scholar] [CrossRef]
  8. Liu, S.; Liu, X.; Du, X.; Guizani, M. Smart Jamming for Secrecy: Deep Reinforcement Learning Enabled Secure Visible Light Communication. IEEE Trans. Wirel. Commun. 2024, 23, 17915–17928. [Google Scholar] [CrossRef]
  9. Maurer, U. Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 1993, 39, 733–742. [Google Scholar] [CrossRef]
  10. Ahlswede, R.; Csiszar, I. Common randomness in information theory and cryptography. I. Secret sharing. IEEE Trans. Inf. Theory 1993, 39, 1121–1132. [Google Scholar] [CrossRef]
  11. Maurer, U.; Wolf, S. Secret-key agreement over unauthenticated public channels. I. Definitions and a completeness result. IEEE Trans. Inf. Theory 2003, 49, 822–831. [Google Scholar] [CrossRef]
  12. Maurer, U.; Wolf, S. Secret-key agreement over unauthenticated public channels—Part II: The simulatability condition. IEEE Trans. Inf. Theory 2003, 49, 832–838. [Google Scholar] [CrossRef]
  13. Maurer, U.; Wolf, S. Secret-key agreement over unauthenticated public channels. II. Privacy amplification. IEEE Trans. Inf. Theory 2003, 49, 839–851. [Google Scholar] [CrossRef]
  14. Hershey, J.; Hassan, A.; Yarlagadda, R. Unconventional cryptographic keying variable management. IEEE Trans. Commun. 1995, 43, 3–6. [Google Scholar] [CrossRef]
  15. Hua, Y. Generalized channel probing and generalized pre-processing for secret key generation. IEEE Trans. Signal Process. 2023, 71, 1067–1082. [Google Scholar] [CrossRef]
  16. Hu, L.; Li, G.; Hu, A.; Ng, D.W.K. Exploiting malicious RIS for secret key acquisition in physical-layer key generation. IEEE Wirel. Commun. Lett. 2023, 13, 417–421. [Google Scholar] [CrossRef]
  17. Wang, X.; Zhang, J.; Li, Y.; Zhao, Y.; Yang, X. Secure Key Distribution System Based on Optical Channel Physical Features. IEEE Photonics J. 2019, 11, 7205311. [Google Scholar] [CrossRef]
  18. Diamant, R.; Casari, P.; Ardizzon, F.; Tomasin, S.; Sherlock, B.; Corner, T.; Neasham, J. Channel-Based Key Generation for Secure Underwater Acoustic Communications. IEEE Trans. Wirel. Commun. 2025. [Google Scholar] [CrossRef]
  19. Nitinawarat, S.; Narayan, P. Secret Key Generation for Correlated Gaussian Sources. IEEE Trans. Inf. Theory 2012, 58, 3373–3391. [Google Scholar] [CrossRef]
  20. Tu, W.; Goldenbaum, M.; Lai, L.; Poor, H.V. On Simultaneously Generating Multiple Keys in a Joint Source-Channel Model. IEEE Trans. Inf. Forensics Secur. 2017, 12, 298–308. [Google Scholar] [CrossRef]
  21. Azimi-Sadjadi, B.; Kiayias, A.; Mercado, A.; Yener, B. Robust key generation from signal envelopes in wireless networks. In Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 2 November–31 October 2007; pp. 401–410. [Google Scholar]
  22. Rezki, Z.; Zorgui, M.; Alomair, B.; Alouini, M.S. Secret Key Agreement: Fundamental Limits and Practical Challenges. IEEE Wirel. Commun. 2017, 24, 72–79. [Google Scholar] [CrossRef]
  23. Mukherjee, A. Secret-Key Agreement for Security in Multi-Emitter Visible Light Communication Systems. IEEE Commun. Lett. 2016, 20, 1361–1364. [Google Scholar] [CrossRef]
  24. Al-Moliki, Y.M.; Alresheedi, M.T.; Al-Harthi, Y. Robust Key Generation From Optical OFDM Signal in Indoor VLC Networks. IEEE Photonics Technol. Lett. 2016, 28, 2629–2632. [Google Scholar] [CrossRef]
  25. Alresheedi, M.T. Improving the Confidentiality of VLC Channels: Physical-Layer Security Approaches. In Proceedings of the 2020 22nd International Conference on Transparent Optical Networks (ICTON), Bari, Italy, 19–23 July 2020; pp. 1–5. [Google Scholar] [CrossRef]
  26. Komine, T.; Nakagawa, M. Fundamental analysis for visible-light communication system using LED lights. IEEE Trans. Consum. Electron. 2004, 50, 100–107. [Google Scholar] [CrossRef]
  27. Zorgui, M.; Rezki, Z.; Alomair, B.; Alouini, M.S. Secret-Key Agreement with Public Discussion Subject to an Amplitude Constraint. IEEE Commun. Lett. 2016, 20, 1124–1127. [Google Scholar] [CrossRef]
  28. Cover, T.M. Elements of Information Theory; John Wiley & Sons: Hoboken, NJ, USA, 1999. [Google Scholar]
  29. Pan, G.; Ye, J.; Ding, Z. On Secure VLC Systems with Spatially Random Terminals. IEEE Commun. Lett. 2017, 21, 492–495. [Google Scholar] [CrossRef]
  30. Wang, J.Y.; Qiu, Y.; Lin, S.H.; Wang, J.B.; Lin, M.; Liu, C. On the Secrecy Performance of Random VLC Networks with Imperfect CSI and Protected Zone. IEEE Syst. J. 2020, 14, 4176–4187. [Google Scholar] [CrossRef]
  31. Kelly, F.P. Probability; Cambridge University Press: Cambridge, UK, 1996. [Google Scholar]
  32. Arfaoui, M.A.; Ghrayeb, A.; Assi, C. Secrecy Rate Closed-Form Expressions for the SISO VLC Wiretap Channel with Discrete Input Signaling. IEEE Commun. Lett. 2018, 22, 1382–1385. [Google Scholar] [CrossRef]
  33. Khoshafa, M.H.; Maraqa, O.; Moualeu, J.M.; Aboagye, S.; Ngatched, T.M.; Ahmed, M.H.; Gadallah, Y.; Di Renzo, M. RIS-assisted physical layer security in emerging RF and optical wireless communication systems: A comprehensive survey. IEEE Commun. Surv. Tutor. 2024. [Google Scholar] [CrossRef]
Figure 1. A SISO VLC system for secret key agreement.
Figure 1. A SISO VLC system for secret key agreement.
Photonics 12 00498 g001
Figure 2. Secret key capacity bounds of the SISO VLC system.
Figure 2. Secret key capacity bounds of the SISO VLC system.
Photonics 12 00498 g002
Figure 3. Achievable secret key rate C S K d versus the location of Eve on the receiving plane. Bob is at ( 0 , 0 , 0.85 ) .
Figure 3. Achievable secret key rate C S K d versus the location of Eve on the receiving plane. Bob is at ( 0 , 0 , 0.85 ) .
Photonics 12 00498 g003
Figure 4. Achievable secret key rate C S K d versus the location of Eve in relation to the window. Bob is at ( 0 , 0 , 0.85 ) .
Figure 4. Achievable secret key rate C S K d versus the location of Eve in relation to the window. Bob is at ( 0 , 0 , 0.85 ) .
Photonics 12 00498 g004
Figure 5. Average secret key capacity C ¯ S K d versus the square of the amplitude constraint A 2 for different P values when D = 2.5 m and σ 2 = 98.82 dBm.
Figure 5. Average secret key capacity C ¯ S K d versus the square of the amplitude constraint A 2 for different P values when D = 2.5 m and σ 2 = 98.82 dBm.
Photonics 12 00498 g005
Table 1. VLC network simulation parameters.
Table 1. VLC network simulation parameters.
ParameterValue
Room dimensions 5 × 5 × 3   m 3
Height of receivers 0.85 m
Semi-angle ϕ 1 2 60
Receiver FOV ψ fov 60
The physical area of PD A PD 1 cm 2
Lens refractive index n 1.5
Noise variance σ 2 −98.82 dBm
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Guo, D.; Zhang, J.; Xin, G.; Tian, K.; Xiao, X. Secret Key Agreement for SISO Visible Light Communication Systems. Photonics 2025, 12, 498. https://doi.org/10.3390/photonics12050498

AMA Style

Guo D, Zhang J, Xin G, Tian K, Xiao X. Secret Key Agreement for SISO Visible Light Communication Systems. Photonics. 2025; 12(5):498. https://doi.org/10.3390/photonics12050498

Chicago/Turabian Style

Guo, Dongqin, Jian Zhang, Gang Xin, Keming Tian, and Xingyu Xiao. 2025. "Secret Key Agreement for SISO Visible Light Communication Systems" Photonics 12, no. 5: 498. https://doi.org/10.3390/photonics12050498

APA Style

Guo, D., Zhang, J., Xin, G., Tian, K., & Xiao, X. (2025). Secret Key Agreement for SISO Visible Light Communication Systems. Photonics, 12(5), 498. https://doi.org/10.3390/photonics12050498

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop