READ ME File For 'Optical Jamming Enhances the Secrecy Performance of the Generalized Space Shift Keying Aided Visible Light Downlink'
Dataset DOI: £¿£¿£¿£¿£¿£¿£¿£¿£¿£¿£¿£¿£¿10.5258/SOTON/D0315
ReadMe Author: Fasong Wang, Southampton Wireless Group, Electronics and Computer Science, University of Southampton
This dataset supports the publication:
Wang, Fasong Wang; Liu, Chaowen Li; Wang, Qi; Zhang, Jiankang; Zhang, Rong; Yang Lie-Liang; Hanzo, Lajos.
Optical Jamming Enhances the Secrecy Performance of the Generalized Space Shift Keying Aided Visible Light Downlink.
IEEE Transactions on Communications.
This dataset contains which are used for generating Fig.2 to Fig.11. These figures are plotted using Matlab. The scripts of Matlab are also included in the folds for each figures. In order to generate these figures, you should install Matlab
https://www.mathworks.com/
The figures are as follows:
Fig. 2 Illustration of how to obtain the MI between S and E as well as its lower bound performance, using the parameters of Tables I and II, and the results were calculated from (24) and (26) of the aboved mentioned paper. (a) $N_t = 2, 4, n_t = 1$ in the SSK-VLC and (b) $N_t = 8, n_t = 1, 2$ in the SSK- and GSSK-VLC systems with and without optical jamming.
Fig. 3 The upper bound, lower bound and approximation of achievable secrecy rate performance between S and D (a) $N_t = 2, 4, n_t = 1$ in the SSK-VLC system and (b) $N_t = 8, n_t = 1, 2$ in the SSK- and GSSK-VLC systems with optical jamming. The results were calculated from (23), (25), (29) and (38) of the aboved mentioned paper.
Fig. 4 AMI between S and D as well as that between S and E, and achievable secrecy rate performance (a) $N_t = 2, 4, n_t = 1$ in the SSK-VLC and (b) $N_t = 8, n_t = 1, 2$ in the SSK- and GSSK-VLC systems with and without optical jamming. The results were calculated from (23), (24) and (31) of the aboved mentioned paper.
Fig. 5 Secrecy rate achieved by the SSK-VLC system with optical jamming, where $N_t = 4, n_t = 1$. (a) 3D mesh plot; (b) 2D contour plot. The results were calculated from (31) of the aboved mentioned paper, D is fixed.
Fig. 6 Secrecy rate achieved by the GSSK-VLC system with optical jamming, wher $N_t = 8, n_t = 2$. (a) 3D mesh plot; (b) 2D contour plot. The results were calculated from (31) of the aboved mentioned paper, D is fixed.
Fig. 7 Secrecy rate achieved by the GSSK-VLC system with optical jamming. (a) 3D mesh plot; (b) 2D contour plot. The results were calculated
from (31) of the aboved mentioned paper, E is fixed.
Fig. 8 (a) Achievable secrecy rate of the GSSK-VLC systems vs. the power sharing factor $\kappa$ at low SNRs, when $\bar{d} > \bar{g}$;
(b) $\mathbb{I}_S^J(h_{\text{D}}; Y) - \mathbb{I}_S^J(h_{\text{E}}; Z)$ results of the GSSK-VLC systems vs. the power sharing factor $\kappa$ at low SNRs, where $\bar{d} < \bar{g}$. The results were calculated from Theorem 3 and (50) of the aboved mentioned paper.
Fig. 9 Optimal power sharing factor $\kappa$ for the optical jamming aided GSSK-VLC systems in the high-SNR region. The results were calculated from (34) and (35) of the aboved mentioned paper.
Fig.10 Optimal power sharing factor $\kappa$ and corresponding achievable secrecy rate versus SNR at high-SNR region. (a) $N_t = 2, n_t = 1$; (b) $N_t = 4, n_t = 1$; (c) $N_t = 8, n_t = 1$; (d) $N_t = 8, n_t = 2$. The results were calculated from (34) and (35) of the aboved mentioned paper.
Fig.11 Secrecy performance of the GSSK-VLC systems considered vs $\kappa$ and SNR. (a) $N_t = 2, n_t = 1$; (b) $N_t = 4, n_t = 1$; (c) $N_t = 8, n_t = 1$; (d) $N_t = 8, n_t = 2$. The results were calculated from (34) and (35) of the aboved mentioned paper.
Date of data collection: November 17th, 2017, March 10th 2018
Information about geographic location of data collection: University of Southampton, U.K.
Related projects:
BEAM-ME-UP - ERC Advanced, L Hanzo (European Union), 1/03/13 --- 28/02/18
Date that the file was created: April 2018