Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Secure communication for FSO links in the presence of eavesdropper with generic location and orientation

Open Access Open Access

Abstract

When the beam waist at the receiver is significantly larger than the receiver size, free-space optical (FSO) links may be vulnerable to some optical tapping risks at the physical layer. In this paper, we conduct a new framework for the analysis of the secrecy performance in terms of the secrecy outage probability (SOP) of FSO systems affected by gamma-gamma (GG) turbulence-induced fading channels with pointing errors. As a key feature, we evaluate the SOP in the presence of an external eavesdropper with generic location and orientation. For that reason, a new misalignment error model is proposed to consider a non-orthogonal optical beam with respect to the photodetector plane at the eavesdropper’s receiver, where the effective area is determined by a rotated ellipse. New approximate and asymptotic solutions at high signal-to-noise-ratio (SNR) for the secrecy performance are obtained in closed-form, which are verified by exact Monte Carlo simulations. By using the developed expressions, we analyze in greater detail some effects such as the SNR of the eavesdropper’s channel, the normalized beamwidth at the receiver-side, and the location and orientation of the eavesdropper on the secrecy performance for different turbulence conditions.

© 2019 Optical Society of America under the terms of the OSA Open Access Publishing Agreement

1. Introduction

Currently, the global data traffic in wireless communication networks continue growing exponentially, mainly due to the increase in mobile broadband. In this way, security issues of wireless communication systems have attracted considerable attention in the last decade. Furthermore, it is expected that this great interest in physical layer security issues continues growing in the coming years with the emerging implementation of 5G networks and beyond [1]. A secure transmission in the presence of an external eavesdropper is a vital research problem in communication and information theory. In this scenario, the transmitter wants to send classified messages to the receiver and also wants to keep a hearer as ignorant of these messages as possible.

According to recent research on optical communications, it has been shown that optical networks are vulnerable to some types of attacks at the physical layer [2]. Even when fiber-optic transmission systems are able to offer large capacities over long distances, optical wired links can suffer from some simple eavesdropping attacks at the physical layer [3]. In relation to optical transmission in unguided media such as free-space optical (FSO) communication [4], and visible light communication (VLC) [57], they are not interception-free. It is generally accepted that FSO communication systems have attracted widespread interest for a number of years due to the remarkable variety of applications that they can offer by using a large capacity [8]. For this reason, there is growing interest in privacy and security issues of FSO communication systems in the presence of an external eavesdropper that can extract information from the legitimate transmission. Furthermore, FSO is a line-of-sight (LOS) technology in nature, providing not only immunity to RF interference, but also robustness to eavesdropping. However, some authors have demonstrated that eavesdropping in the context of FSO systems may occur when a wiretapper is hidden in the top of the same building as the main receiver. This is mainly due to the fact that the beam waist at the receiver is significantly larger than the receiver size as a consequence of the spreading of the laser beam through atmosphere [9]. Thus, one potential eavesdropping will take place when the eavesdropper is located in the divergence region of the received optical beam. For long FSO distances, the eavesdropper also has a greater opportunity for eavesdropping by capturing radiated power. For all these motives, physical layer security in FSO systems is presently considered as an open, challenging area by the research community. Unlike the traditional encryption technologies in upper layer, no secret key is required in physical layer security, exploiting the characteristics of fading channels to guarantee perfect secrecy [10,11].

Traditionally, physical layer security has been considered as a problem of radio-frequency (RF) systems. A great deal of research has been reported over the last decade [1216] (and references therein). In [12], security issues are studied over $\alpha$-$\mu$ fading channels. The use of multiple-inputs/single-output (MISO) systems was considered in [13], and the use of single-input/multiple-output (SIMO) systems in [14]. Moreover, a comprehensive analysis of physical layer security was reported in [15] for multiple-inputs/multiple-outputs (MIMO) systems, and in [16] for cooperative systems.

Due to the fact that FSO technology is inherently much safer than RF technology, the state-of-the-art of physical layer security for FSO communication is still under developed [1723]. In relation to passive eavesdropping, the secrecy outage probability (SOP) for FSO links in the presence of an external eavesdropper was analyzed over Málaga atmospheric turbulence channels without considering pointing error effects in [17,21]. In [20], the effect of channel imperfections on security issues for mixed RF/FSO relay networks is analyzed in detail. In [22], the SOP is evaluated for a mixed RF/FSO communication system based on decode-and-forward (DF) relaying. Regarding active eavesdropping scenarios, the average secrecy capacity (ASC) was studied for mixed RF/FSO relay networks in [18,19], where eavesdropping is only produced in the RF link. In [23], the ASC was considered over Málaga turbulence with zero boresight misalignment errors, not taking into consideration the eavesdropper’s location on the pointing error model. In contrast to the aforementioned literature, the zero boresight pointing errors model previously assumed in the FSO wiretap channel proved to be insufficient due to the very highly directive nature of laser-based communication systems. It is crucial to consider a nonzero boresight pointing error model for the FSO wiretap channel to include the eavesdropper’s location since it is logic to think that the eavesdropper is not in the LOS of the legitimate transmitter. Mathematically speaking, this translates into a nonzero boresight pointing error due to the fact that the eavesdropper is able to capture radiated power. To the best of our knowledge, the study of the secrecy performance of terrestrial FSO links assuming an external eavesdropper with generic location and orientation is still an open research problem.

In this paper, we conduct a careful investigation of the secrecy performance of terrestrial FSO links over gamma-gamma (GG) fading channels with misalignment errors, assuming an external eavesdropper with generic location and orientation to fill the gap in the current literature. We derive new approximate closed-form expressions for the SOP and the probability of strictly positive secrecy capacity (SPSC), which are verified by exact Monte Carlo simulations for moderate-to-strong turbulence conditions. We also develop new asymptotic solutions at high signal-to-noise-ratio (SNR) for the SOP and the probability of SPSC to get more remarks about the impact of some important system parameters such as the SNR of the eavesdropper’s channel, the normalized beamwidth at the receiver-side, and the location and orientation of the eavesdropper on the secrecy performance. Due to the fact that the eavesdropper presents a generic position and orientation in this analysis, we also propose a new misalignment error model to take into consideration a non-orthogonal optical beam with respect to the photodetector plane at the eavesdropper’s receiver, where the effective area is determined by a rotated ellipse. Thus, we refine not only the current pointing error model, but also the well-established channel model over GG atmospheric turbulence to consider a much more real FSO scenario by including the aforementioned new key aspects, where some attacks at the physical layer can take place. Unlike the current literature [17,22,23], the importance of this study lies in the fact that considering an external eavesdropper with generic location and orientation as well as assuming two different pointing error distributions for the desired and wiretap FSO links due to the very highly directive nature of laser-based communication systems. In line with this, one of the most interesting conclusions is that the eavesdropper’s location and its orientation plays quite an important role in secrecy performance.

The remainder of this paper is arranged as follows. In Sections 2 and 3, the problem definition and the FSO wiretap channel model are examined, respectively. The new misalignment error model that takes into consideration a non-orthogonal optical beam with respect to the photodetector plane at the eavesdropper’s receiver is included in Appendix A. The SOP and the probability of SPSC are carefully analyzed in Section 4, and some numerical results and discussion are provided in Section 5. Finally, the paper is concluded in Section 6.

2. Problem definition

We assume a classic Wyner’s wiretap channel [24], where two legitimate peers want to communicate (Alice and Bob) with each other in the presence of an external eavesdropper (Eve) with generic location and orientation, as shown in Fig. 1. When eavesdropping takes place, Eve is able to capture a portion of the power emitted by Alice since both Bob and Eve are located in the top of the same building, and the beamwidth at the receiver is large enough. We also consider that the legitimate peers and the eavesdropper are fixed devices, as usually assumed in the deployment of FSO links [25]. Hereinafter, the subscript $m$ is used as follows: $m=B$ for Bob, and $m=E$ for Eve. For the sake of simplicity, let us assume that $d_{B}\simeq d_{E}$ (with $d_{m}$ denoting the FSO link distance between Alice and the receiver $m$) due to the fact that the effective areas associated with each of the photodetectors are located in the same transverse plane of the incident wave, i.e., $xy$-plane. This assumption can be perfectly applied to this analysis since $d_{m}$ is much bigger than the distance between Bob and Eve.

 figure: Fig. 1.

Fig. 1. Illustration of the geographical location of Bob and Eve, where the boresight displacement $s^{2}=\mu _{x}^{2}+\mu _{y}^{2}$ represents the eavesdropper’s location in the $xy$-plane, and the angles $\theta$ and $\phi$ represent the orientation of the eavesdropper’s receiver in ${x}$-axis and ${y}$-axis, respectively.

Download Full Size | PDF

The major aspect of this study is twofold: a) we assume different fading distributions for the misalignment error at the receivers; b) we also assume that the optical beam is non-orthogonal with respect to the photodetector plane at Eve, i.e., the eavesdropper may present another orientation that leads to a rotation in $x$-axis by an angle $\theta$ and/or in $y$-axis by an angle $\phi$. In other words, the fraction of the power collected at Eve is not determined by the area of a circular receiver aperture, but also by the effective area that, in this case, is determined by the area of a rotated ellipse in $xy$-plane, as also shown in Fig. 1.

At the legitimate receiver Bob, we consider a zero boresight pointing error model, in which the legitimate transmitter is perfectly aligned with the main receiver and the optical beam is orthogonal with the photodetector plane, leading to a Rayleigh distributed pointing error. On the other hand, a nonzero boresight pointing error model is considered at Eve to include the eavesdropper’s location, where the optical beam is non-orthogonal with respect to the photodetector plane. A useful way to include the eavesdropper’s location is to assume a different fading distribution for the pointing error at Eve. The eavesdropper’s location can be interpreted as an inherent boresight displacement, as defined in [26], since Alice is aligned with Bob. This leads to a lognormal-Rice distributed pointing error [27] at Eve. Moreover, we assume that the spacing $s$ is larger than the atmospheric coherence length to consider uncorrelated FSO channels [28]. Since the atmospheric coherence length is on the order of centimeters, both receivers will be enough separated to consider uncorrelated fading.

3. System and channel models

Let us assume a generic intensity-modulation and direct-detection (IM/DD) FSO link using on-off keying (OOK) modulation, where the received electrical signal for the considered link is given by

$${y_{m} = h_{m} R x + z_{m},\quad x\in\{0,2P_t\},}$$
where $R$ ($A/W$) is the detector responsivity, assumed hereinafter set to be the unity, $x$ is the transmitted signal and the symbols are taken with the same probability from an OOK constellation such that $x\in \{0,2P_{t}\}$ with $P_{t}$ the average optical power, $h_{m}$ denotes the unified fading channel coefficient, and $z_{m}$ is additive white Gaussian noise (AWGN) with zero mean and variance $\sigma _{n}^{2}=N_{0}/2$. In this case, the received electrical SNR for the considered FSO link is defined as in [29,30] as follows
$$\textrm{SNR}(h_{m})=\frac{2P_{t}^{2}T_b}{\sigma_{n}^{2}}h_{m}^2=4\gamma_{m}h_{m}^2,$$
where $T_{b}$ is the bit period, and $\gamma _{m}$ is the transmit SNR in absence of fading, and $h_{m}=L_{m}\cdot h_{a}\cdot h_{p}$ with $L_{m}$ being the atmospheric attenuation [31], $h_{a}$ the atmospheric turbulence following the GG model [32], and $h_{p}$ the pointing error [27,30,33]. Next, we examine the different pointing error models assumed here.

3.1 Pointing error modeling of Bob

At the legitimate receiver Bob, where the fraction of the collected power is determined by the detector area, i.e., by the area of a circle of radius $a$, the attenuation due to geometric spread and pointing errors can be directly approximated, as in [30, Eq. (9)], as follows

$$h_{p}^{\textrm{Bob}}(r_{B};z)\approx A_{B}\exp\left(\frac{-2r_{B}^{2}}{\omega_{z_{eqB}}^{2}}\right),$$
where $r_{B}$ is the radial displacement at Bob, $A_B=[\textrm {erf}(v_{B})]^2$ is the fraction of the collected power at $r_{B}=0$, $v_{B}=\sqrt {\pi }a/\sqrt {2}\omega _z$, and $\omega _{z_{eqB}}^2$ is the equivalent beamwidth. In this model, $r_{B}$ is a Rayleigh distributed pointing error, where the same jitter variances ($\sigma _{x}=\sigma _{y}=\sigma _s$) and zero boresight displacement ($\mu _{x}=\mu _{y}=0$) are considered. Note that $x$ and $y$ represent the horizontal displacement and the elevation, respectively. Therefore, the probability density function (PDF) of the pointing error at Bob is expressed as in [30] as
$$f_{h_{p}}^{\textrm{Bob}}(h)=\frac{\varphi_{B}^{2}}{A_{B}^{\varphi_{B}^{2}}}h^{\varphi_{B}^{2}-1}, \hspace{.2cm}0\leq h\leq A_{B},$$
where $\varphi _{B}=\omega _{z_{eqB}}/2\sigma _{s}$.

3.2 Pointing error modeling of Eve

Unlike the previous pointing error model, where the optical beam is assumed to be orthogonal with respect to the photodetector plane and the fraction of the collected power is determined by the detector area, this assumption may not hold at the eavesdropper’s receiver since Eve could be aligned with another transmitter and, hence, this one may present another position and orientation. Thus, the fraction of the power collected at Eve is determined by the area of a rotated ellipse, where one of the axis is $a$ (the radius of the circular receiver aperture at Eve), and the other one is defined as $\rho =a\cos \phi \cdot \cos \theta$. Recently, a new statistical modeling for FSO fronthaul channels was proposed in [34], where the transceiver presents both random position and random orientation. Contrary to [34], the eavesdropper’s position is considered to be fixed in this statistical model and, hence, the proposed statistical model for pointing errors reuses known expressions for the geometric losses that are modified when the fraction of the power collected at Eve is determined by the area of a rotated ellipse in the transverse plane of the incident wave. In Appendix A, the parameter $\rho$ is derived in greater detail. Hereinafter, the parameter $\rho$ is called rotation parameter and represents the eavesdropper’s orientation. As also demonstrated in Appendix A, the attenuation due to geometric spread and pointing errors at the eavesdropper’s receiver Eve can be approximated as follows

$$h_{p}^{\textrm{Eve}}(r_{E};z)\approx A_{0}\exp\left(\frac{-2r_{E}^{2}}{\omega_{z_{eqE}}^2}\right),$$
where $r_{E}$ is the radial displacement at Eve, $A_0=[\textrm {erf}(v_{E})]^{2}$ is the fraction of the collected power at $r_{E}=0$, $v_{E}=\sqrt {\pi }\sqrt {a^{2}\cos \theta \cos \phi }/\sqrt {2}\omega _z$, and $\omega _{z_{eqE}}^2$ is the equivalent beamwidth. Notice that the area reduction by considering a rotated ellipse as an effective area instead of a circle is determined by the normalized rotation parameter as $1-\rho /a$. Interestingly, from a physical layer security point of view, the worst case study is when $\rho /a=1$ since both Bob and Eve present the same orientation and the optical beam is orthogonal with respect to the receiver plane in both photodetectors. However, when $\rho /a=0$, Eve will not be able to capture radiated power at all. Another potential scenario would be when the eavesdropper is really close to Bob or is able to block the received optical beam in order to collect a larger amount of radiated power. This case would be represented when $s=0$, as shown in Fig. 1. This scenario is considered as blocking case instead of eavesdropping one since the main receiver could notice that the received power is notably reduced and stop receiving.

It must be noted that the radiated power captured by Eve is determined by the effective area, which depends mainly on how apart the rotated ellipse is from the beamwidth center. For that reason, $r_{E}$ follows the lognormal-Rice distribution [27], where the same jitter variances ($\sigma _{x}=\sigma _{y}=\sigma _s$) and a nonzero boresight displacement ($s^{2}=\mu _{x}^{2}+\mu _{y}^{2}$) are considered. This assumption has not been considered in any early paper. The PDF of the radial displacement $r_{E}$ was obtained in [27, Eq. (4)], which appears quite cumbersome to use. Hence, we approximate accurately the lognormal-rice distribution by a modified Rayleigh distribution as presented in [33, Eq. (11)] as follows

$$f_{r_{E}}(r)=\frac{r}{\sigma_{s}^{2}}\exp\left(-\frac{r^{2}+s^{2}}{2\sigma_{s}^{2}}\right)I_{0}\left(\frac{rs}{\sigma_{s}^{2}}\right)\simeq\frac{r}{\sigma_{E}^{2}}\exp\left(-\frac{r^{2}}{2\sigma_{E}^{2}}\right),$$
where $\sigma _{E}^{2}=\left ((3/2)\sigma _{s}^{4}s^{2}+\sigma _{s}^{6}\right )^{1/3}$ [33, Eq. (9)]. It is noteworthy to mention that this approximation is currently being used for the optics community to analyze the impact of nonzero boresight pointing errors on the performance of FSO communication systems [35,36]. This approximation allows us to derive an approximate closed-form solution for the unified fading channel. Thus, the PDF of the pointing error at Eve is given by
$$f_{h_{p}}^{\textrm{Eve}}(h)\simeq\frac{\varphi_{E}^{2}}{A_{E}^{\varphi_{E}^{2}}}h^{\varphi_{E}^{2}-1}, \hspace{.2cm}0\leq h\leq A_{E},$$
where $\varphi _{E}=\omega _{z_{eqE}}/2\sigma _{E}$, and $A_{E}$ was also obtained in [33, Eq. (15)] as
$$A_{E}=A_{0}e^{\left(4\sigma_{s}\left(\sqrt{s^{2}+\sigma_{s}^{2}}-\sigma_{s}\right)-2\sigma_{s}^{2}\right)/\omega_{z_{eqE}}^{2}}.$$
As can be observed from the expression of $\sigma _{E}$, this parameter considers a nonzero boresight displacement in addition to the random jitter variances in the wiretap FSO link. Finally, we summarize the generic pointing error parameters for Bob and Eve in Table 1, and the specific pointing error parameters in Table 2.

Tables Icon

Table 1. Generic pointing error parameters for Bob and Eve.

Tables Icon

Table 2. Specific pointing error parameters for Bob and Eve.

3.3 Unified fading channel

The PDF of the FSO communication link when GG turbulence of parameters $\alpha _{m}$ and $\beta _{m}$ is considered [32] in the presence of pointing errors modeled by Rayleigh distributions is expressed as in [33] as follows

$$f_{h_{m}}(h)=\frac{\varphi_{m}^{2}h^{{-}1}}{\Gamma(\alpha_{m})\Gamma(\beta_{m})}G_{1,3}^{3,0}\left[\frac{\alpha_{m}\beta_{m}}{A_{m}L_{m}}h\left| \begin{array}{c} \varphi_{m}^{2}+1 \\ \varphi_{m}^{2},\alpha_{m},\beta_{m} \end{array}\right. \right], \hspace{.2cm}h\geq 0,$$
where $G_{p,q}^{m,n}[\cdot ]$ is the Meijer’s G-function [37, Eq. (8.2.1)]. The cumulative distribution function (CDF) is readily derived by using [37, Eq. (1.16.2.1)] as follows
$$F_{h_{m}}(h)=\frac{\varphi_{m}^{2}}{\Gamma(\alpha_{m})\Gamma(\beta_{m})}G_{2,4}^{3,1}\left[\frac{\alpha_{m}\beta_{m}}{A_{m}L_{m}}h\left| \begin{array}{c} 1,\varphi_{m}^{2}+1 \\ \varphi_{m}^{2},\alpha_{m},\beta_{m},0 \end{array}\right. \right], \hspace{.2cm}h\geq 0.$$
When plane wave propagation is considered, $\alpha _{m}$ and $\beta _{m}$ are obtained as in [38]. Note that both the PDF in Eq. (9) and the CDF in Eq. (10) for the desired link represent exact solutions for the unified fading channel, whereas for the wiretap link represent approximate solutions, allowing us to study security issues in FSO communication systems.

4. Secrecy outage probability (SOP) analysis

In this section, the SOP and the probability of SPSC of FSO systems in the presence of an external eavesdropper with generic location and orientation are analyzed. It should be noted that both the SOP and the probability of SPSC are performance metrics to study physical layer security of passive eavesdropping FSO scenarios since the channel state information (CSI) of the eavesdropper’s channel is not known at the transmitter-side. Hence, perfect secrecy cannot be achieved. We only assume the knowledge of the CSI at the receiver-side. In this situation, the SOP becomes important and significant as it gives a probabilistic measure of how the instantaneous secrecy capacity is below a given expected secrecy rate. The secrecy capacity $C_{s}$ is defined as the maximum achievable secrecy rate, and is computed as in [10] as follows

$$C_{s}=[C_{B}-C_{E}]^{+},$$
where $[x]^{+}=\textrm {max}(x,0)$, $C_{B}$ is the instantaneous capacity of the legitimate transmission (Alice-Bob), and $C_{E}$ is the instantaneous capacity of the wiretap channel (Alice-Eve). In general, $C_{m}$ is defined as $C_{m}=B\log _{2}(1+4\gamma _{m}h_{m}^{2})$, where $B$ is the channel bandwidth. Note that the capacity for terrestrial FSO links based on IM/DD systems is a lower bound [39]. Due to the fact that both scintillation and dynamic misalignment lead to a slow fading, the SOP of FSO links is adopted as a more suitable performance metric than the average secrecy capacity. Thus, the SOP is defined as the outage probability of the secrecy capacity that is given by
$$P_{\textrm{out}}(R_{s}):=\textrm{Pr}\left[C_{s}<R_{s}\right],$$
where $R_{s}$ is defined as the expected secrecy rate and, hence, if $R_{s}>C_{s}$, information theoretic security may be compromised. As the transmitter has no info about the CSI at Eve, this one will transmit information at a constant rate of $R_{s}$. From Eq. (11), we can compute the SOP as follows
$$P_{\textrm{out}}(R_{s}):=\textrm{Pr}\left[\log_{2}\left(\frac{1+4\gamma_{B}h_{B}^{2}}{1+4\gamma_{E}h_{E}^{2}}\right)<R_{s}\right]=\int_{0}^{\infty}\!\!\!F_{h_{B}}\left(\sqrt{\frac{2^{R_{s}}(1+4\gamma_{E}h^{2})-1}{4\gamma_{B}}}\right)f_{h_{E}}(h)dh.$$
The probability of SPSC is defined as
$$\textrm{Pr}\left[C_{s}>0\right]=1-\left.\textrm{Pr}\left[C_{s}<R_{s}\right]\right\vert_{R_{s}=0}^{}.$$
To the best of our knowledge, the integral in Eq. (13) cannot be expressed in closed-form and, hence, we have to invoke another kind of approximation. To deal with this, both a lower bound (LB) and an asymptotic solution at high SNR are derived, which will be validated by exact Monte Carlo simulations in the next section. Thus, a lower bound for the SOP can be derived as
$$P_{\textrm{out}}^{\textrm{LB}}(R_{s})\simeq\int_{0}^{\infty}\!\!\!F_{h_{B}}\left(2^{R_{s}/2}\left(\frac{\gamma_{E}}{\gamma_{B}}\right)^{1/2}h\right)f_{h_{E}}(h)dh.$$
Substituting Eqs. (9) and (10) into Eq. (15), we can express the above integral in terms of the Meijer’s G-function with the help of [37, Eq. (2.24.1.1)]. Therefore, a lower bound for the SOP can be expressed as follows
$$\begin{aligned} &P_{\textrm{out}}^{\textrm{LB}}(R_{s})\simeq\frac{\varphi_{B}^{2}\varphi_{E}^{2}}{\Gamma(\alpha_{B})\Gamma(\beta_{B})\Gamma(\alpha_{E})\Gamma(\beta_{E})} \\ &\times G_{5,5}^{4,3}\left[\frac{\alpha_{E}\beta_{E}A_{B}L_{B}}{\alpha_{B}\beta_{B}A_{E}L_{E}}2^{-\frac{R_{s}}{2}}\left(\frac{\gamma_{B}}{\gamma_{E}}\right)^{\frac{1}{2}}\left| \begin{array}{c} 1-\varphi^{2}_{B},1-\alpha_{B},1-\beta_{B},1,1+\varphi^{2}_{E}\\ \varphi^{2}_{E},\alpha_{E},\beta_{E},0,-\varphi^{2}_{B} \end{array}\right. \right]. \end{aligned}$$
At the same time, a lower bound for the probability of SPSC can be easily computed as
$$\textrm{Pr}^{\textrm{LB}}\left[C_{s}>0\right]\simeq1-\left. P_{\textrm{out}}^{\textrm{LB}}(R_{s})\right\vert_{R_{s}=0}^{}.$$

4.1 Asymptotic secrecy outage probability analysis

In order to get more remarks, an asymptotic solution for the SOP can be easily obtained at high SNR. To do that, the CDF of $h_{B}$ is approximated by a single polynomial term as $F_{h_{B}}(h)\doteq \frac {a_B}{b_{B}}h^{b_{B}}$. In this way, different expressions for $F_{h_{B}}(h)$ are derived depending on the relation between $\varphi _{B}^2$ and $\textrm {min}(\alpha _{B},\beta _{B})$. When plane wave propagation is assumed, the minimum value between $\alpha _{B}$ and $\beta _{B}$ is equal to $\beta _{B}$ [40]. Therefore, the CDF of $h_{B}$ is approximated as in [33, Eq. (18)] as follows

$$ F_{h_{B}}(h)\doteq\hat{F}_{h_{B}}(h)=\frac{a_B}{b_{B}}h^{b_{B}}=\left\lbrace \begin{array}{l} \frac{\varphi_{B}^2(\alpha_{B}\beta_{B})^{\beta_{B}}\Gamma (\alpha_{B}-\beta_{B})h^{\beta_{B}}}{\beta_{B}({A_{B}L_B)}^{\beta_{B}}\Gamma (\alpha_{B})\Gamma (\beta_{B})\left(\varphi_{B}^2-\beta_{B}\right) },\quad\varphi_{B}^2 > \beta_{B} \\ \frac{\varphi_{B}^2 \Gamma \left(\alpha_{B} -\varphi_{B}^2\right) \Gamma \left(\beta_{B}-\varphi_{B}^2\right)h^{\varphi_{B}^{2}}}{\varphi_{B}^2{(\alpha_{B}\beta_{B})^{-\varphi_{B}^2}(A_{0}L_B)}^{\varphi_{B}^2} \Gamma (\alpha_{B}) \Gamma (\beta_{B})},\varphi_{B}^2 < \beta_{B} \end{array} \right. $$
Now, substituting Eq. (18) into Eq. (13) and applying some easy algebraic manipulations, we obtain the following integral for the asymptotic solution of the SOP as follows
$$ P_{\textrm{out}}(R_{s})\doteq\frac{a_{B}2^{\frac{R_{s}b_{B}}{2}}}{b_{B}}\left(\frac{\gamma_{B}}{\gamma_{E}}\right)^{-\frac{b_{B}}{2}}\int_{0}^{\infty}\left(h^{2}+\frac{1-2^{{-}R_{s}}}{4\gamma_{E}}\right)^{\frac{b_{B}}{2}}f_{h_{E}}(h)dh. $$
The above integral can be solved by making the change of variable of $t=h^{2}$ and, then, we can use [37, Eq. (2.24.2.4)] in order to express the above integral in terms of the Meijer’s G-function, yielding
$$\begin{aligned} &P_{\textrm{out}}(R_{s})\doteq\left(\frac{2^{{-}b_{B}-3}a_{B}(2^{R_{s}}-1)^{b_{B/2}}}{\pi b_{B}\Gamma({-}b_{B}/2)}\right)\times\left(\frac{2^{\alpha_{E}+\beta_{E}}\varphi_{E}^{2}}{\Gamma(\alpha_{E})\Gamma(\beta_{E})}\right) \\ &\times G_{3,7}^{7,1}\left[\left(\frac{\alpha_{E}\beta_{E}}{A_{E}L_{E}}\right)^{2}\frac{(1-2^{{-}R_{s}})}{64\gamma_{E}}\left| \begin{array}{c} 1,\frac{1+\varphi^{2}_{E}}{2},\frac{2+\varphi^{2}_{E}}{2}\\ -\frac{b_{B}}{2},\frac{\varphi^{2}_{E}}{2},\frac{1+\varphi^{2}_{E}}{2},\frac{\alpha_{E}}{2},\frac{1+\alpha_{E}}{2},\frac{\beta_{E}}{2},\frac{1+\beta_{E}}{2} \end{array}\right. \right]\times \gamma_{B}^{{-}b_{B}/2}. \end{aligned}$$
It can be deduced from Eq. (20) that the asymptotic closed-form solution of the SOP at high SNR behaves asymptotically as $P_{\textrm {out}}(R_{s})\doteq \left (S_{c}\cdot \gamma _{B}\right )^{-S_{d}}$, where $S_d$ and $S_c$ denote the secrecy diversity order and the secrecy gain, respectively. On the one hand, $S_{d}$ determines the slope of the SOP versus SNR curve, at high SNR, in a log-log scale. On the other hand, $S_c$ determines the shift of the curve in SNR in decibels, as defined for bit error rate (BER) performance in [41]. As can be also observed, the secrecy diversity order depends completely on the main channel, i.e., the secrecy diversity order is determined by $S_{d}=\textrm {min}(\beta _{B},\varphi _{B}^{2})$. On the contrary, the secrecy gain depends not only on the main channel, but also on the eavesdropper’s channel.

At this point, it would be interesting to compare and contrast the asymptotic solution of the SOP obtained here with the asymptotic solution of the outage capacity with no eavesdropper in order to analyze the influence of some important system parameters such as the SNR of the eavesdropper’s channel, the normalized beamwidth at the receiver-side, and the location and orientation of the eavesdropper on the secrecy gain. The asymptotic expression for the outage capacity with no eavesdropper was derived in [42, Eq. (7)] as

$$P_{\textrm{out}}^{\textrm{no Eve}}(R_{s})\doteq\left(O_{c}\cdot\gamma_{B}\right)^{{-}O_{d}}=\left[\left(\frac{a_{B}(2^{R_{s}}-1)^{b_{B}/2}}{b_{B}2^{b_{B}}}\right)^{{-}2/b_{B}}\cdot\gamma_{B}\right]^{{-}b_{B}/2},$$
where $O_{c}$ and $O_{d}$ denote the coding gain and the outage diversity, respectively. The parameters $a_{B}$ and $b_{B}$ were obtained in Eq. (18).

5. Numerical results and discussion

Some numerical results are presented in this Section for the secrecy outage performance under clear visibility conditions when a value of the expected secrecy rate of $R_{s}=0.5$ bit/channel use is considered. The FSO system setup considered here, which is used in most practical terrestrial FSO links [25], is summarized in Table 3. In addition, both the SOP and the probability of SPSC are evaluated for different severity of pointing errors. Note that while the SOP gives information of how the instantaneous secrecy capacity is below a given expected secrecy rate, the probability of SPSC gives information of the probability of existence of a safe communication.

Tables Icon

Table 3. FSO system parameters.

In Fig. 2, the approximate SOP derived in Eq. (16) and the corresponding asymptotic solution derived in Eq. (20) are plotted as a function of $\gamma _{B}$, i.e. the SNR of the main channel, for different eavesdropper’s locations of $(\mu _{x}/a,\mu _{y}/a)=\{(1,1),(4,1),(6,3)\}$ and different eavesdropper’s orientation of $\rho /a=\{0.4,0.7,1\}$ in order to see how these parameters impact on the SOP. As can be observed, the approximation based on a lower-bound presents a good agreement for the considered FSO scenarios in relation to the exact Monte Carlo simulation results. At the same time, the asymptotic results also presents an excellent agreement at high SNR. As a benchmark, the results corresponding to the outage capacity performance with no eavesdropper are also included. It should be highlighted that the secrecy diversity order is fully dependent on the main channel, i.e., $S_{d}=b_{B}=\textrm {min}(\beta _{B},\varphi _{B}^{2})$. In other words, all curves present the same slope, i.e. $b_{B}$, but different shifts or SNR gap because of the normalized rotation parameter $\rho /a$. The impact of the eavesdropper’s channel on secure transmission for FSO systems is only reflected on the secrecy gain. As expected, the SOP is strongly dependent on the normalized rotation parameter. Interestingly, the maximum SOP is achieved when the normalized rotation parameter is set to $\rho /a=1$, as commented in Section 3. Additionally, as $\rho /a$ approaches zero, the SOP decreases, obtaining a performance very close to the outage capacity with no eavesdropper. In other words, the capacity of capturing radiated power by Eve decreases considerably. It is also observed that the secrecy outage is less likely at high SNR when $\gamma _{B}>\gamma _{E}$. In this SNR range, the secure communication is mainly dominated by the main channel. It is also confirmed that when the eavesdropper is nearby the legitimate receiver, the secrecy outage is more likely to happen regardless of the severity of pointing errors.

 figure: Fig. 2.

Fig. 2. Secrecy outage probability, $P_{\textrm {out}}(R_{s})$, as a function of $\gamma _{B}$ for different severity of pointing errors and different values of $\gamma _{E}$ when an expected secrecy rate of $R_{s}=0.5$ bits/channel use and a value of $C_{n}^{2}=2\times 10^{-14}$ $m^{-2/3}$ are considered.

Download Full Size | PDF

In Fig. 3, the probability of SPSC obtained in Eq. (14) is plotted for the same set of parameters considered in Fig. 2. The same conclusions can be drawn from these results with regard to the eavesdropper’s channel. At this point, we have to highlight that the lower bound derived in this section represents a very accurate approximation in the analysis of secrecy issues of FSO communication systems. What we observe in this figure is the probability of existence of a safe communication, i.e., the probability of $C_{s}>0$. Obviously, as the SNR of the main channel increases, the probability of SPSC gets close to 1, indicating that the probability of a safe communication is every time more likely. Contrary to Fig. 2, as $\rho /a$ approaches zero, the probability of SPSC increases and, hence, improving the probability of a safe communication.

 figure: Fig. 3.

Fig. 3. Probability of SPSC, $\textrm {Pr}\left [C_{s}>0\right ]$, as a function of $\gamma _{B}$ for different severity of pointing errors and different values of $\gamma _{E}$ when a value of $C_{n}^{2}=2\times 10^{-14}$ $m^{-2/3}$ is considered.

Download Full Size | PDF

5.1 Miscellaneous

For a better understanding of the impact of the eavesdropper’s channel conditions on the SOP from moderate to strong turbulence conditions, we can quantify the SNR gap or loss between the outage capacity with no eavesdropper and the SOP with eavesdropper as follows

$$\begin{aligned} &Loss_{\textrm{Eve}}[dB]\triangleq 10\log_{10}\!\left[\frac{O_{c}}{S_{c}}\right]=\frac{20}{b_{B}} \\ &\!\!\times\!\log_{10}\!\!\left[\frac{2^{\alpha_{E}+\beta_{E}}\varphi_{E}^{2}}{8\pi\Gamma(\alpha_{E})\Gamma(\beta_{E})}G_{3,7}^{7,1}\!\!\left[\left(\frac{\alpha_{E}\beta_{E}}{A_{E}L_{E}}\right)^{2}\!\!\frac{(1-2^{{-}R_{s}})}{64\gamma_{E}}\left| \begin{array}{c}\!\!\!\! \!\!1,\frac{1+\varphi^{2}_{E}}{2},\frac{2+\varphi^{2}_{E}}{2}\\ \!\!-\frac{b_{B}}{2},\frac{\varphi^{2}_{E}}{2},\frac{1+\varphi^{2}_{E}}{2},\frac{\alpha_{E}}{2},\frac{1+\alpha_{E}}{2},\frac{\beta_{E}}{2},\frac{1+\beta_{E}}{2} \end{array}\!\!\!\!\right. \right]\right]\!\!. \end{aligned}$$
In Fig. 4, $Loss_{\textrm {Eve}}$[dB] is depicted as a function of $\gamma _{E}$ for different eavesdropper’s location of $(\mu _{x}/a,\mu _{y}/a)=\{(4,1),(6,3)\}$ and different eavesdropper’s orientation of $\rho /a=\{0.4,0.7,1\}$. A normalized beamwidth value of $\omega _{z}/a=10$ is assumed when different normalized jitter variances of $\sigma _{s}/a=\{2,4,6\}$ are considered. It can be observed that this loss increases with increasing $\gamma _{E}$. On the one hand, this growth presents an interesting behavior since for small values of $\gamma _{E}$ we can confirm that the secure communication is not compromised at all since the performance is very close to the outage capacity with no eavesdropper regardless of the channel conditions. On the other hand, when $\gamma _{E}$ takes larger values than 30 dB approximately, the SNR gap or loss notably increases with increasing $\gamma _{E}$. More importantly, we can see that for larger amounts of misalignment, i.e. for a normalized jitter variance of $\sigma _{s}/a=6$, the SNR gap or loss is reduced, not allowing the eavesdropper to capture more power. Note that this loss is mitigated even more when the eavesdropper is located a little bit further away from the center of the beamwidth, as observed in Figs. 4(a2) and 4(b2).

 figure: Fig. 4.

Fig. 4. Loss, $Loss_{\textrm {Eve}}$[dB], for (a) moderate, and (b) strong turbulence conditions as a function of $\gamma _{E}$ when an expected secrecy rate of $R_{s}=0.5$ bits/channel use and different eavesdropper’s locations and different severity of pointing errors are assumed.

Download Full Size | PDF

In Fig. 5, $Loss_{\textrm {Eve}}$[dB] is depicted as a function of the normalized beamwidth $\omega _z/a$ for the same set of parameters assumed in the previous figure. As can be observed, the impact of eavesdropper’s location and its orientation is really relevant, mainly when a larger value of $\gamma _{E}$ is used, i.e., $\gamma _{E}=40$ dB. Additionally, we can see that there is a maximum value of $Loss_{\textrm {Eve}}$[dB], in which the secure transmission between Alice and Bob can be truly compromised. As a general point of view, we can say that for small values of $\gamma _{E}$, the secure transmission between Alice and Bob is not compromised. This loss may be reduced when the normalized beamwidth is wider since it is possible to reduce the power incident on a fixed-size receiver increasing the beamwidth. Additionally, we can also see in this figure that the normalized beamwidth value that gets the maximum value of $Loss_{\textrm {Eve}}$[dB] depends on neither the rotation parameter $\rho /a$ nor the value of $\gamma _{E}$. This is an interesting point since this maximum value represents the maximum loss from the secrecy performance point of view.

 figure: Fig. 5.

Fig. 5. Loss, $Loss_{\textrm {Eve}}$[dB], for (a) moderate, and (b) strong turbulence conditions as a function of $\gamma _{E}$ when an expected secrecy rate of $R_{s}=0.5$ bits/channel use and a value of the normalized jitter variance of $\sigma _{s}/a=2$ are assumed.

Download Full Size | PDF

In Fig. 6, $Loss_{\textrm {Eve}}$[dB] is depicted as a function of the normalized horizontal displacement of the eavesdropper $\mu _{x}/a$ when the normalized vertical displacement is set to $\mu _{y}/a=2$. In Figs. 6(a1) and 6(b1), $Loss_{\textrm {Eve}}$[dB] is plotted for different eavesdropper’s orientation of $\rho /a=\{0.4,0.6,0.8\}$ when $\gamma _{E}=60$ dB. In Figs. 6(a2) and 6(b2), $Loss_{\textrm {Eve}}$[dB] is plotted for different values of $\gamma _{E}$. Finally, in Figs. 6(a3) and 6(b3), $Loss_{\textrm {Eve}}$[dB] is plotted for different severity of pointing errors of $\sigma _{s}/a=\{2,4,6\}$. As we can observe from Fig. 6, both the location and the orientation of the eavesdropper play a fundamental role in the SOP performance of FSO communication systems. On the one hand, it is evident that in Figs. 6(a1), 6(b1), 6(a2) and 6(b2) the larger normalized rotation parameter as well as the larger value of $\gamma _{E}$, the closer to the outage capacity with no eavesdropper when pointing errors are not significant. On the other hand, when pointing errors become significant, for instance in Figs. 6(a3) and 6(b3) for $\sigma _{s}/a=6$, this can result in improving the SOP performance, permitting the eavesdropper to recollect less radiated power.

 figure: Fig. 6.

Fig. 6. Loss, $Loss_{\textrm {Eve}}$[dB], for (a) moderate, and (b) strong turbulence conditions as a function of the normalized horizontal displacement of the eavesdropper $\mu _{x}/a$ when an expected secrecy rate of $R_{s}=0.5$ bits/channel use is assumed and the normalized vertical displacement is set to $\mu _{y}/a=2$ .

Download Full Size | PDF

As we said in Section 2, we have considered in this paper that both the legitimate receiver Bob and the eavesdropper’s receiver Eve are located in the top of the same building. For that reason, only small variations along the $z$-axis could take place in a real FSO scenario. On the one hand, the corresponding parameters of atmospheric turbulence, i.e. $\alpha _{m}$ and $\beta _{m}$, take the same value approximately for small variations over FSO distances when this one is on the order of a few kilometers [40]. On the other hand, according to the expression of the beam waist of a Gaussian beam propagating in atmospheric turbulence [43], the beamwidth also take the same value approximately for small variations over long distances. This comments have been confirmed by Monte Carlo simulations. Hence, the same outcomes are derived for small variations of the eavesdropper’s location along the $z$-axis.

In the light of these results, we can observe in Figs. 4, 5 and 6 how secrecy performance depends strongly on the location and the orientation of the eavesdropper. From the SOP performance point of view, the worst FSO scenario and, at the same time, the FSO scenario that is less likely to happen is when the normalized rotation parameters is set to $\rho /a=1$, i.e., when the optical beamwidth is also orthogonal with respect to the photodetector plane at Eve. In this case, the SOP performance decreases considerably since Eve is able to capture more radiated power in comparison with other FSO scenarios such as $\rho /a=\{0.4, 0.7\}$, where the optical beam is non-orthogonal with respect to the photodetector plane.

Last but not least, the effect of different turbulence conditions, i.e. from moderate to strong, on $Loss_{\textrm {Eve}}$[dB] has also been studied. As we can observe in Figs. 4, 5 and 6, it can be concluded that in general strong turbulence channels present a greater robustness to eavesdropping than moderate turbulence channels. Furthermore, from the viewpoint of the normalized beamwidth at the receiver-side, we can quantify from Fig. (5) the impact of the strength of turbulence when $\gamma _{E}=40$ dB by obtaining values of $Loss_{\textrm {Eve}}=\{1.5,1.35,1.04\}$ dB for different eavesdropper’s orientation of $\rho /a=\{1,0.7,0.4\}$ when the eavesdropper’s location is set to $(\mu _{x}/a,\mu _{y}/a)=(4,1)$, and values of $Loss_{\textrm {Eve}}=\{0.87,0.66,0.34\}$ dB for different eavesdropper’s orientation of $\rho /a=\{1,0.7,0.4\}$ when the eavesdropper’s location is set to $(\mu _{x}/a,\mu _{y}/a)=(6,3)$. Thus, we can conclude that the impact of the strength of turbulence gradually decreases as the eavesdropper gets further away from the beam center. At the same time, the eavesdropper’s capacity to capture more radiated power also decreases with increasing the strength of turbulence. On the other hand, when the quality of the eavesdropper’s channel is low, for instance when $\gamma _{E}=10$ dB, the impact of the strength of turbulence is not significant since the secrecy performance is really close to the outage performance with no eavesdropper regardless of the turbulence conditions.

6. Concluding remarks

This paper carefully investigates the secrecy performance over GG fading channels with pointing errors in the presence of an external eavesdropper with generic location and orientation. New bounds for the SOP and the probability of SPSC have been obtained, which have been verified by exact Monte Carlo simulations for moderate-to-strong turbulence conditions.

On the one hand, our findings suggest that adding the eavesdropper’s location to the wiretap FSO channel model along with the orientation represents a step forward in physical layer security for FSO communication. The secrecy performance in FSO systems is fully dependent not only on the eavesdropper’s location and its orientation, but also on the beam footprint at the receiver-side, which is non-orthogonal with respect to the photodetector plane at Eve. The results presented here conclude that the secrecy performance is strongly dependent on the location and the orientation of the eavesdropper, resulting in a less secure communication between peers as a consequence of Eve. In fact, a greater normalized beamwidth as well as larger amounts of misalignment could increase the achievable secrecy rate, permitting the eavesdropper to recollect less radiated power and, hence, making the communication robuster. In short, the secrecy performance for terrestrial FSO links results in being a sophisticated balance of the normalized beamwidth, the eavesdropper’s location and its orientation, as well as how significant pointing errors are at the receiver-side.

On the other hand, the robustness of FSO communication to some optical tapping risks has been confirmed since the secrecy performance is quite close to the performance with no observer for small values of the SNR at Eve or when the observer is not located near Bob. Moreover, from the behavior of the SOP at high SNR, we conclude that the secrecy diversity order does not depend on the eavesdropper channel, being completely dependent on the main channel. Nevertheless, the eavesdropper channel presents a remarkable impact on the secrecy gain.

Finally, the secrecy performance of FSO communication could be enhanced via MIMO schemes to significantly mitigate the effect of fading in FSO channels by creating spatial diversity. This finding is promising and should be also explored in drone-based FSO communication to be able to study how larger amounts of misalignment impact on the performance of this upcoming systems, where the optical beam is non-orthogonal with respect to the photodetector plane.

Appendix A

As a first step, let us assume that the effective area in the transverse plane of the incident wave is an ellipse, where the lengths of the semi-axes are $a$ and $b$ along the $x$-axis and $y$-axis, respectively. Thus, the fraction of the collected power at the eavesdropper’s receiver can be expressed as

$$h_{p}^{Eve_{x}}(r;z)=\int_{{-}a}^{a}\int_{\frac{-b}{a}\sqrt{a^{2}-x^{2}}}^{\frac{b}{a}\sqrt{a^{2}-x^{2}}}\frac{2}{\pi\omega_{z}^{2}}\exp\left({-}2\frac{(x-r^{2})+y^{2}}{\omega_{z}^{2}}\right)dydx.$$
From the above integral, we can observe that the resultant ellipse presents a major and minor axis of $a$ and $b$, respectively. Due to the asymmetry nature of the problem, the loss factor due to pointing errors $h_{p}^{\textrm {Eve}}$ is sensitive to the direction of integration. For this reason, the fraction of the collected power can also be calculated as
$$ h_{p}^{Eve_{y}}(r;z)=\int_{{-}a}^{a}\int_{\frac{-b}{a}\sqrt{a^{2}-x^{2}}}^{\frac{b}{a}\sqrt{a^{2}-x^{2}}}\frac{2}{\pi\omega_{z}^{2}}\exp\left({-}2\frac{x^{2}+(y-r^{2})}{\omega_{z}^{2}}\right)dydx. $$
It is true that $h_{p}^{\textrm {Eve}}$ should be evaluated in 3D dimensions, but for the sake of simplicity we can take the average result between the best and the worst cases, i.e., the average result between Eqs. (26) and (27) as follows
$$h_{p}^{\textrm{Eve}}(r;z)\approx\frac{1}{2}h_{p}^{Eve_{x}}(r;z)+\frac{1}{2}h_{p}^{Eve_{y}}(r;z).$$
The above integral can be approximated by using the same approach as in [30, appendix] as
$$h_{p}^{\textrm{Eve}}(r;z)\approx A_{0}\exp\left(\frac{-2r^{2}}{\omega_{z_{eq}}^2}\right).$$
The accuracy of the above approximation will be checked at the end of this appendix.

As a second step, we assume that the eavesdropper’s receiver is rotated by an angle $\theta$ in $x$-axis, and by an angle $\phi$ in the $y$-axis, as shown in Fig. 1. Now, we will demonstrate that the rotation of the eavesdropper’s receiver in both axis results in an effective area that is equivalent to a rotated ellipse where one of the axis is $a$ (the radius of the circular receiver aperture at Eve) and the other one is defined as $a\cos \phi \cdot \cos \theta$. In other words, in this second step we can see that the rotation of the eavesdropper’s receiver reduces to the considered one in the first step with $b=a\cos \phi \cdot \cos \theta$.

Let us assume that the rotation is made first in the $y$-axis and, then, in the $x$-axis since this operation is not commutative. To do that, we have to apply rotation matrix to the rotated circular aperture (Eve) to compute the projected geometric figure in the $xy$-plane, which is a rotated ellipse. The following two basic rotation matrices rotate vectors with a general 3-D rotation through counterclockwise angles $\theta$ and $\phi$ about the $x$-, $y$-axis, respectively. They are used here to produce the desired effect, i.e the rotated ellipse, and expressed as follows

$$R_{x}(\theta)=\left[\begin{matrix} 1 & 0 & 0\\ 0 & \cos\theta & -\sin\theta\\ 0 & \sin\theta & \cos\theta \end{matrix}\right],\quad\quad R_{y}(\phi)=\left[\begin{matrix} \cos\phi & 0 & \sin\phi \\ 0 & 1 & 0\\ -\sin\phi & 0 & \cos\phi \end{matrix}\right]. $$
Using the sine and cosine functions, a parametric representation of the circle $x^{2}+y^{2}=a^{2}$ can be obtained as
$$[x,y,z]^\intercal=[a\cos u, a\sin u, 0]^\intercal,\quad\quad 0\leq u \leq 2\pi.$$
Now, we apply the rotation matrices in Eq. (27) to the circular aperture by using its parametric equation as follows
$$ R_{x}(\theta)\cdot R_{y}(\phi)\cdot\left[\begin{matrix} x\\ y\\ z\end{matrix}\right] =\left[\begin{matrix} 1 & 0 & 0\\ 0 & \cos\theta & -\sin\theta\\ 0 & \sin\theta & \cos\theta \end{matrix}\right]\left[\begin{matrix} \cos\phi & 0 & \sin\phi \\ 0 & 1 & 0\\ -\sin\phi & 0 & \cos\phi \end{matrix}\right] \cdot\left[\begin{matrix} a\cos u\\ a\sin u\\ 0 \end{matrix}\right]. $$
By solving the above product of matrices, we can obtain the following projected rotated ellipse in the $xy$-plane as follows
$$\left[\begin{matrix} x\\ y\\ z\end{matrix}\right] =\left[\begin{matrix} a\cos u\cdot\cos\phi\\ a\cos\theta\cdot\sin u + a\cos u\cdot\sin\theta\cdot\sin\phi\\ 0 \end{matrix}\right].$$
By making some algebraic manipulations, we obtain the quadratic form of a rotated ellipse as
$$ x^{2}\left(\sec^{2}\phi+\tan^{2}\theta\tan^{2}\phi\right)+y^{2}\left(\sec^{2}\theta\right)-xy\left(2\sec\theta\tan\theta\tan\phi\right)=a^{2}. $$
From the above equation, we can observe that the projected figure is a rotated ellipse due to the fact that the cross product is not equal to zero. Additionally, the quadratic form can be easily written in matrix notation, yielding
$$ \left[\begin{matrix} x & y \end{matrix}\right]\cdot\underbrace{\left[\begin{matrix} \sec^{2}\phi+\tan^{2}\theta\tan^{2}\phi & \sec\theta\tan\theta\tan\phi\\ \sec\theta\tan\theta\tan\phi & \sec^{2}\theta \end{matrix}\right]}_{M}\left[\begin{matrix} x\\ y \end{matrix}\right]=a^{2}, $$
where the matrix $M$ is called the matrix of the quadratic form. For the sake of clarity, we can see in Fig. 1 that the original $xy$-coordinate system with origin $O$ is moved to the $u v$-coordinate system with the same origin $O$, i.e., the projected figure is a rotated ellipse, where the coordinate axes are rotated. Note that as $M$ is a symmetric matrix then $M$ is orthogonally diagonalizable. In this way, Eq. (32) can be expressed as
$$\left[\begin{matrix} u & v \end{matrix}\right]\cdot\underbrace{\left[\begin{matrix} \lambda_{1}& 0\\ 0& \lambda_{2} \end{matrix}\right]}_{D} \cdot\left[\begin{matrix} u\\ v \end{matrix}\right]=1,$$
where $D$ is the diagonal matrix, and $\lambda _{1}=a^{2}$ and $\lambda _{2}=a^{2}\cos ^{2}\theta \cos ^{2}\phi$ are the eigenvalues of the matrix $M$. Hence, the quadratic form of this new ellipse is given by
$$\frac{u^{2}}{a^{2}}+\frac{v^{2}}{a^{2}\cos^{2}\theta\cos^{2}\phi}=1.$$
We have demonstrated that the rotation of the eavesdropper’s receiver by an angle $\phi$ in the $y$-axis and by an angle $\theta$ in $x$-axis results in an effective area that is equivalent to a rotated ellipse in the $xy$-plane, where the semi-axis length along the $x$-axis is $a$ (the radius of the circular aperture at Eve), and the semi-axis length along the $y$-axis is defined as $\rho =a\cos \phi \cdot \cos \theta$. Therefore, the fraction of the collected power at the eavesdropper’s receiver of radius $a$ in the transverse plane of the incident wave can be expressed from Eq. (25) and substituting $b=\rho$ as
$$ h_{p}^{\textrm{Eve}}(r;z)\approx\left.\frac{1}{2}h_{p}^{Eve_{x}}(r;z)\right\vert_{b=a\cos\phi\cdot\cos\theta}^{}+\left.\frac{1}{2}h_{p}^{Eve_{y}}(r;z)\right\vert_{b=a\cos\phi\cdot\cos\theta}^{}. $$
The above integral can be approximated in the same way as Eq. (26) as
$$h_{p}^{\textrm{Eve}}(r;z)\approx A_{0}\exp\left(\frac{-2r^{2}}{\omega_{z_{eq}}^2}\right),$$
where $A_0=[\textrm {erf}(v^2)]$ is the fraction of the collected power at $r=0$, $v=\sqrt {\pi }\sqrt {a^{2}\cos \theta \cos \phi }/\sqrt {2}\omega _z$, and $\omega _{z_{eq}}^2=\omega _z^2\sqrt {\pi }\textrm {erf}(v)/2v\exp (-v^2)$ is the equivalent beamwidth. Both the exact expression in Eq. (23) and the approximate expression when the effective area is a rotated ellipse in Eq. (35) are illustrated in Fig. 7.

 figure: Fig. 7.

Fig. 7. Exact and approximate values of $h_{p}$ when the effective area is a rotated ellipse for different values of the normalized rotation parameter $\rho /a$ and the normalized beamwidth $\omega _{z}/a$. Note that Eqs. (26), (27) and (28) have been evaluated through numerical integration.

Download Full Size | PDF

Funding

Qatar National Library (QNL); Ooredoo Research Sponsorship 2015; Texas A&M University at Qatar (TAMUQ) RRSG 2019.

References

1. A. Hyadi, Z. Rezki, and M.-S. Alouini, “An overview of physical layer security in wireless communication systems with CSIT uncertainty,” IEEE Access 4, 6121–6132 (2016). [CrossRef]  

2. N. Skorin-Kapov, M. Furdek, S. Zsigmond, and L. Wosinska, “Physical-layer security in evolving optical networks,” IEEE Commun. Mag. 54(8), 110–117 (2016). [CrossRef]  

3. K. Guan, J. Cho, and P. J. Winzer, “Physical layer security in fiber-optic MIMO-SDM systems: An overview,” Opt. Commun. 408, 31–41 (2018). [CrossRef]  

4. H. Endo, M. Fujiwara, M. Kitamura, T. Ito, M. Toyoshima, Y. Takayama, H. Takenaka, R. Shimizu, N. Laurenti, G. Vallone, P. Villoresi, T. Aoki, and M. Sasaki, “Free-space optical channel estimation for physical layer security,” Opt. Express 24(8), 8940–8955 (2016). [CrossRef]  

5. J.-Y. Wang, C. Liu, J.-B. Wang, Y. Wu, M. Lin, and J. Cheng, “Physical-layer security for indoor visible light communications: Secrecy capacity analysis,” IEEE Trans. Commun. 66(12), 6423–6436 (2018). [CrossRef]  

6. J.-Y. Wang, H. Ge, M. Lin, J.-B. Wang, J. Dai, and M.-S. Alouini, “On the secrecy rate of spatial modulation based indoor visible light communications,” arXiv preprint arXiv:1906.09512 (2019).

7. M. A. Arfaoui, M. D. Soltani, I. Tavakkolnia, A. Ghrayeb, C. Assi, M. Safari, and H. Haas, “Physical layer security for visible light communication systems: A survey,” arXiv preprint arXiv:1905.11450 (2019).

8. M. A. Khalighi and M. Uysal, “Survey on free space optical communication: A communication theory perspective,” Commun. Surv. & Tutorials, IEEE 16(4), 2231–2258 (2014). [CrossRef]  

9. M. Eghbal and J. Abouei, “Security enhancement in free-space optics using acousto-optic deflectors,” IEEE/OSA J. Opt. Commun. Netw. 6(8), 684–694 (2014). [CrossRef]  

10. M. Bloch, J. Barros, M. R. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Trans. Inf. Theory 54(6), 2515–2534 (2008). [CrossRef]  

11. Y. Liang, H. V. Poor, and S. Shamai, “Secure communication over fading channels,” IEEE Trans. Inf. Theory 54(6), 2470–2492 (2008). [CrossRef]  

12. H. Lei, I. S. Ansari, G. Pan, B. Alomair, and M.-S. Alouini, “Secrecy capacity analysis over $\alpha -\mu$ fading channels,” IEEE Commun. Lett. 21(6), 1445–1448 (2017). [CrossRef]  

13. Z. Rezki, B. Alomair, and M.-S. Alouini, “On the secrecy capacity of the MISO wiretap channel under imperfect channel estimation,” in Global Communications Conference (GLOBECOM), 2014 IEEE, 1602–1607 (2014).

14. H. Lei, H. Zhang, I. S. Ansari, C. Gao, Y. Guo, G. Pan, and K. A. Qaraqe, “Secrecy outage performance for SIMO underlay cognitive radio systems with generalized selection combining over Nakagami-$m$ channels,” IEEE Trans. Veh. Technol. 65(12), 10126–10132 (2016). [CrossRef]  

15. L. Wang, M. Elkashlan, J. Huang, R. Schober, and R. K. Mallik, “Secure transmission with antenna selection in MIMO Nakagami-$m$ fading channels,” IEEE Transactions on Wirel. Commun. 13(11), 6054–6067 (2014). [CrossRef]  

16. B. Van Nguyen, H. Jung, and K. Kim, “Physical layer security schemes for full-duplex cooperative systems: State of the art and beyond,” IEEE Commun. Mag. 56(11), 131–137 (2018). [CrossRef]  

17. F. J. Lopez-Martinez, G. Gomez, and J. M. Garrido-Balsells, “Physical-layer security in free-space optical communications,” IEEE Photonics J. 7(2), 1–2 (2015). [CrossRef]  

18. H. Lei, Z. Dai, I. S. Ansari, K.-H. Park, G. Pan, and M.-S. Alouini, “On secrecy performance of mixed RF-FSO systems,” IEEE Photonics J. 9(4), 1–14 (2017). [CrossRef]  

19. H. Lei, Z. Dai, K.-H. Park, W. Lei, G. Pan, and M.-S. Alouini, “Secrecy outage analysis of mixed RF-FSO downlink SWIPT systems,” IEEE Trans. Commun. 66(12), 6384–6395 (2018). [CrossRef]  

20. H. Lei, H. Luo, K.-H. Park, Z. Ren, G. Pan, and M.-S. Alouini, “Secrecy outage analysis of mixed RF-FSO systems with channel imperfection,” IEEE Photonics J. 10(3), 1–13 (2018). [CrossRef]  

21. J. Wang, C. Liu, J. Wang, J. Dai, M. Lin, and M. Chen, Secrecy outage probability analysis over Malaga-Malaga fading channels, in International Conference on Communications (ICC), 2018 IEEE, 1, 6, (2018).

22. X. Pan, H. Ran, G. Pan, Y. Xie, and J. Zhang, “On secrecy analysis of DF based dual hop mixed RF-FSO systems,” IEEE Access 7, 66725–66730 (2019). [CrossRef]  

23. M. J. Saber and S. M. S. Sadough, “On secure free-space optical communications over Málaga turbulence channels,” IEEE Wirel. Commun. Lett. 6(2), 274–277 (2017). [CrossRef]  

24. A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J. 54(8), 1355–1387 (1975). [CrossRef]  

25. S. Bloom, E. Korevaar, J. Schuster, and H. Willebrand, “Understanding the performance of free-space optics [invited],” J. optical Netw. 2(6), 178–200 (2003). [CrossRef]  

26. R. Boluda-Ruiz, A. García-Zambrana, B. Castillo-Vázquez, and C. Castillo-Vázquez, “Impact of nonzero boresight pointing error on ergodic capacity of MIMO FSO communication systems,” Opt. Express 24(4), 3513–3534 (2016). [CrossRef]  

27. F. Yang, J. Cheng, and T. Tsiftsis, “Free-space optical communication with nonzero boresight pointing errors,” IEEE Trans. Commun. 62(2), 713–725 (2014). [CrossRef]  

28. R. Boluda-Ruiz, A. García-Zambrana, B. Castillo-Vázquez, and C. Castillo-Vázquez, “On the capacity of MISO FSO systems over gamma-gamma and misalignment fading channels,” Opt. Express 23(17), 22371–22385 (2015). [CrossRef]  

29. J. M. Kahn and J. R. Barry, “Wireless infrared communications,” Proc. IEEE 85(2), 265–298 (1997). [CrossRef]  

30. A. A. Farid and S. Hranilovic, “Outage capacity optimization for free-space optical links with pointing errors,” J. Lightwave Technol. 25(7), 1702–1710 (2007). [CrossRef]  

31. I. I. Kim, B. McArthur, and E. J. Korevaar, “Comparison of laser beam propagation at 785 nm and 1550 nm in fog and haze for optical wireless communications,” in Information Technologies 2000, (International Society for Optics and Photonics, 2001), 26, 37, (2000).

32. L. Andrews, R. Phillips, and C. Hopen, Laser beam scintillation with applications , vol. 99 (SPIE press, 2001).

33. R. Boluda-Ruiz, A. García-Zambrana, C. Castillo-Vázquez, and B. Castillo-Vázquez, “Novel approximation of misalignment fading modeled by Beckmann distribution on free-space optical links,” Opt. Express 24(20), 22635–22649 (2016). [CrossRef]  

34. M. Najafi, H. Ajam, V. Jamali, P. D. Diamantoulakis, G. K. Karagiannidis, and R. Schober, “Statistical modeling of FSO fronthaul channel for drone-based networks,” in 2018 IEEE International Conference on Communications (ICC), 1–7, (2018).

35. H. Arezumand, H. Zamiri-Jafarian, and E. Soleimani-Nasab, “Exact and asymptotic analysis of partial relay selection for cognitive RF-FSO systems with non-zero boresight pointing errors,” IEEE Access 7, 58611–58625 (2019). [CrossRef]  

36. G. K. Varotsos, H. E. Nistazakis, W. Gappmair, H. G. Sandalidis, and G. S. Tombras, “SIMO subcarrier PSK FSO links with phase noise and non-zero boresight pointing errors over turbulence channels,” IET Commun. 13(7), 831–836 (2019). [CrossRef]  

37. A. P. Prudnikov, Y. A. Brychkov, and O. I. Marichev, Integrals and series Volume 3: More Special Functions, vol. 3 (Gordon and Breach Science Publishers, 1999).

38. M. A. Al-Habash, L. C. Andrews, and R. L. Phillips, “Mathematical model for the irradiance probability density function of a laser beam propagating through turbulent media,” Opt. Eng. 40(8), 1554 (2001). [CrossRef]  

39. A. Lapidoth, S. Moser, and M. Wigger, “On the capacity of free-space optical intensity channels,” IEEE Trans. Inf. Theory 55(10), 4449–4461 (2009). [CrossRef]  

40. N. Wang and J. Cheng, “Moment-based estimation for the shape parameters of the gamma-gamma atmospheric turbulence model,” Opt. Express 18(12), 12824–12831 (2010). [CrossRef]  

41. Z. Wang and G. B. Giannakis, “A simple and general parameterization quantifying performance in fading channels,” IEEE Trans. Commun. 51(8), 1389–1398 (2003). [CrossRef]  

42. C. Castillo-Vazquez, R. Boluda-Ruiz, B. Castillo-Vazquez, and A. Garcia-Zambrana, “Outage performance of DF relay-assisted FSO communications using time-diversity,” IEEE Photonics Technol. Lett. 27(11), 1149–1152 (2015). [CrossRef]  

43. J. C. Ricklin and F. M. Davidson, “Atmospheric turbulence effects on a partially coherent Gaussian beam: implications for free-space laser communication,” J. Opt. Soc. Am. A 19(9), 1794–1802 (2002). [CrossRef]  

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (7)

Fig. 1.
Fig. 1. Illustration of the geographical location of Bob and Eve, where the boresight displacement $s^{2}=\mu _{x}^{2}+\mu _{y}^{2}$ represents the eavesdropper’s location in the $xy$-plane, and the angles $\theta$ and $\phi$ represent the orientation of the eavesdropper’s receiver in ${x}$-axis and ${y}$-axis, respectively.
Fig. 2.
Fig. 2. Secrecy outage probability, $P_{\textrm {out}}(R_{s})$, as a function of $\gamma _{B}$ for different severity of pointing errors and different values of $\gamma _{E}$ when an expected secrecy rate of $R_{s}=0.5$ bits/channel use and a value of $C_{n}^{2}=2\times 10^{-14}$ $m^{-2/3}$ are considered.
Fig. 3.
Fig. 3. Probability of SPSC, $\textrm {Pr}\left [C_{s}>0\right ]$, as a function of $\gamma _{B}$ for different severity of pointing errors and different values of $\gamma _{E}$ when a value of $C_{n}^{2}=2\times 10^{-14}$ $m^{-2/3}$ is considered.
Fig. 4.
Fig. 4. Loss, $Loss_{\textrm {Eve}}$[dB], for (a) moderate, and (b) strong turbulence conditions as a function of $\gamma _{E}$ when an expected secrecy rate of $R_{s}=0.5$ bits/channel use and different eavesdropper’s locations and different severity of pointing errors are assumed.
Fig. 5.
Fig. 5. Loss, $Loss_{\textrm {Eve}}$[dB], for (a) moderate, and (b) strong turbulence conditions as a function of $\gamma _{E}$ when an expected secrecy rate of $R_{s}=0.5$ bits/channel use and a value of the normalized jitter variance of $\sigma _{s}/a=2$ are assumed.
Fig. 6.
Fig. 6. Loss, $Loss_{\textrm {Eve}}$[dB], for (a) moderate, and (b) strong turbulence conditions as a function of the normalized horizontal displacement of the eavesdropper $\mu _{x}/a$ when an expected secrecy rate of $R_{s}=0.5$ bits/channel use is assumed and the normalized vertical displacement is set to $\mu _{y}/a=2$ .
Fig. 7.
Fig. 7. Exact and approximate values of $h_{p}$ when the effective area is a rotated ellipse for different values of the normalized rotation parameter $\rho /a$ and the normalized beamwidth $\omega _{z}/a$. Note that Eqs. (26), (27) and (28) have been evaluated through numerical integration.

Tables (3)

Tables Icon

Table 1. Generic pointing error parameters for Bob and Eve.

Tables Icon

Table 2. Specific pointing error parameters for Bob and Eve.

Tables Icon

Table 3. FSO system parameters.

Equations (36)

Equations on this page are rendered with MathJax. Learn more.

y m = h m R x + z m , x { 0 , 2 P t } ,
SNR ( h m ) = 2 P t 2 T b σ n 2 h m 2 = 4 γ m h m 2 ,
h p Bob ( r B ; z ) A B exp ( 2 r B 2 ω z e q B 2 ) ,
f h p Bob ( h ) = φ B 2 A B φ B 2 h φ B 2 1 , 0 h A B ,
h p Eve ( r E ; z ) A 0 exp ( 2 r E 2 ω z e q E 2 ) ,
f r E ( r ) = r σ s 2 exp ( r 2 + s 2 2 σ s 2 ) I 0 ( r s σ s 2 ) r σ E 2 exp ( r 2 2 σ E 2 ) ,
f h p Eve ( h ) φ E 2 A E φ E 2 h φ E 2 1 , 0 h A E ,
A E = A 0 e ( 4 σ s ( s 2 + σ s 2 σ s ) 2 σ s 2 ) / ω z e q E 2 .
f h m ( h ) = φ m 2 h 1 Γ ( α m ) Γ ( β m ) G 1 , 3 3 , 0 [ α m β m A m L m h | φ m 2 + 1 φ m 2 , α m , β m ] , h 0 ,
F h m ( h ) = φ m 2 Γ ( α m ) Γ ( β m ) G 2 , 4 3 , 1 [ α m β m A m L m h | 1 , φ m 2 + 1 φ m 2 , α m , β m , 0 ] , h 0.
C s = [ C B C E ] + ,
P out ( R s ) := Pr [ C s < R s ] ,
P out ( R s ) := Pr [ log 2 ( 1 + 4 γ B h B 2 1 + 4 γ E h E 2 ) < R s ] = 0 F h B ( 2 R s ( 1 + 4 γ E h 2 ) 1 4 γ B ) f h E ( h ) d h .
Pr [ C s > 0 ] = 1 Pr [ C s < R s ] | R s = 0 .
P out LB ( R s ) 0 F h B ( 2 R s / 2 ( γ E γ B ) 1 / 2 h ) f h E ( h ) d h .
P out LB ( R s ) φ B 2 φ E 2 Γ ( α B ) Γ ( β B ) Γ ( α E ) Γ ( β E ) × G 5 , 5 4 , 3 [ α E β E A B L B α B β B A E L E 2 R s 2 ( γ B γ E ) 1 2 | 1 φ B 2 , 1 α B , 1 β B , 1 , 1 + φ E 2 φ E 2 , α E , β E , 0 , φ B 2 ] .
Pr LB [ C s > 0 ] 1 P out LB ( R s ) | R s = 0 .
F h B ( h ) F ^ h B ( h ) = a B b B h b B = { φ B 2 ( α B β B ) β B Γ ( α B β B ) h β B β B ( A B L B ) β B Γ ( α B ) Γ ( β B ) ( φ B 2 β B ) , φ B 2 > β B φ B 2 Γ ( α B φ B 2 ) Γ ( β B φ B 2 ) h φ B 2 φ B 2 ( α B β B ) φ B 2 ( A 0 L B ) φ B 2 Γ ( α B ) Γ ( β B ) , φ B 2 < β B
P out ( R s ) a B 2 R s b B 2 b B ( γ B γ E ) b B 2 0 ( h 2 + 1 2 R s 4 γ E ) b B 2 f h E ( h ) d h .
P out ( R s ) ( 2 b B 3 a B ( 2 R s 1 ) b B / 2 π b B Γ ( b B / 2 ) ) × ( 2 α E + β E φ E 2 Γ ( α E ) Γ ( β E ) ) × G 3 , 7 7 , 1 [ ( α E β E A E L E ) 2 ( 1 2 R s ) 64 γ E | 1 , 1 + φ E 2 2 , 2 + φ E 2 2 b B 2 , φ E 2 2 , 1 + φ E 2 2 , α E 2 , 1 + α E 2 , β E 2 , 1 + β E 2 ] × γ B b B / 2 .
P out no Eve ( R s ) ( O c γ B ) O d = [ ( a B ( 2 R s 1 ) b B / 2 b B 2 b B ) 2 / b B γ B ] b B / 2 ,
L o s s Eve [ d B ] 10 log 10 [ O c S c ] = 20 b B × log 10 [ 2 α E + β E φ E 2 8 π Γ ( α E ) Γ ( β E ) G 3 , 7 7 , 1 [ ( α E β E A E L E ) 2 ( 1 2 R s ) 64 γ E | 1 , 1 + φ E 2 2 , 2 + φ E 2 2 b B 2 , φ E 2 2 , 1 + φ E 2 2 , α E 2 , 1 + α E 2 , β E 2 , 1 + β E 2 ] ] .
h p E v e x ( r ; z ) = a a b a a 2 x 2 b a a 2 x 2 2 π ω z 2 exp ( 2 ( x r 2 ) + y 2 ω z 2 ) d y d x .
h p E v e y ( r ; z ) = a a b a a 2 x 2 b a a 2 x 2 2 π ω z 2 exp ( 2 x 2 + ( y r 2 ) ω z 2 ) d y d x .
h p Eve ( r ; z ) 1 2 h p E v e x ( r ; z ) + 1 2 h p E v e y ( r ; z ) .
h p Eve ( r ; z ) A 0 exp ( 2 r 2 ω z e q 2 ) .
R x ( θ ) = [ 1 0 0 0 cos θ sin θ 0 sin θ cos θ ] , R y ( ϕ ) = [ cos ϕ 0 sin ϕ 0 1 0 sin ϕ 0 cos ϕ ] .
[ x , y , z ] = [ a cos u , a sin u , 0 ] , 0 u 2 π .
R x ( θ ) R y ( ϕ ) [ x y z ] = [ 1 0 0 0 cos θ sin θ 0 sin θ cos θ ] [ cos ϕ 0 sin ϕ 0 1 0 sin ϕ 0 cos ϕ ] [ a cos u a sin u 0 ] .
[ x y z ] = [ a cos u cos ϕ a cos θ sin u + a cos u sin θ sin ϕ 0 ] .
x 2 ( sec 2 ϕ + tan 2 θ tan 2 ϕ ) + y 2 ( sec 2 θ ) x y ( 2 sec θ tan θ tan ϕ ) = a 2 .
[ x y ] [ sec 2 ϕ + tan 2 θ tan 2 ϕ sec θ tan θ tan ϕ sec θ tan θ tan ϕ sec 2 θ ] M [ x y ] = a 2 ,
[ u v ] [ λ 1 0 0 λ 2 ] D [ u v ] = 1 ,
u 2 a 2 + v 2 a 2 cos 2 θ cos 2 ϕ = 1.
h p Eve ( r ; z ) 1 2 h p E v e x ( r ; z ) | b = a cos ϕ cos θ + 1 2 h p E v e y ( r ; z ) | b = a cos ϕ cos θ .
h p Eve ( r ; z ) A 0 exp ( 2 r 2 ω z e q 2 ) ,
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.