Papers
Topics
Authors
Recent
Detailed Answer
Quick Answer
Concise responses based on abstracts only
Detailed Answer
Well-researched responses based on abstracts and relevant paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses
Gemini 2.5 Flash
Gemini 2.5 Flash 71 tok/s
Gemini 2.5 Pro 52 tok/s Pro
GPT-5 Medium 18 tok/s Pro
GPT-5 High 15 tok/s Pro
GPT-4o 101 tok/s Pro
Kimi K2 196 tok/s Pro
GPT OSS 120B 467 tok/s Pro
Claude Sonnet 4 37 tok/s Pro
2000 character limit reached

Optimal Beamforming for Secure Integrated Sensing and Communication Exploiting Target Location Distribution (2312.13797v1)

Published 21 Dec 2023 in cs.IT, eess.SP, and math.IT

Abstract: In this paper, we study a secure integrated sensing and communication (ISAC) system where one multi-antenna base station (BS) simultaneously communicates with one single-antenna user and senses the location parameter of a target which serves as a potential eavesdropper via its reflected echo signals. In particular, we consider a challenging scenario where the target's location is unknown and random, while its distribution information is known a priori. First, we derive the posterior Cram\'er-Rao bound (PCRB) of the mean-squared error (MSE) in target location sensing, which has a complicated expression. To draw more insights, we derive a tight approximation of it in closed form, which indicates that the transmit beamforming should achieve a "probability-dependent power focusing" effect over possible target locations, with more power focused on highly-probable locations. Next, considering an artificial noise based beamforming structure, we formulate the transmit beamforming optimization problem to maximize the worst-case secrecy rate among all possible target (eavesdropper) locations, subject to a threshold on the sensing PCRB. The formulated problem is non-convex and difficult to solve. We show that the problem can be solved via a two-stage method, by first obtaining the optimal beamforming corresponding to any given threshold on the signal-to-interference-plus-noise ratio (SINR) at the eavesdropper, and then obtaining the optimal threshold via one-dimensional search. By applying the semi-definite relaxation (SDR) technique, we relax the first problem into a convex form and further prove that the relaxation is tight, based on which the optimal solution of the original beamforming optimization problem can be obtained with polynomial-time complexity. Then, we further propose two suboptimal solutions with lower complexity. Numerical results validate the effectiveness of our designs.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (30)
  1. K. Hou and S. Zhang, “Secure integrated sensing and communication exploiting target location distribution,” in Proc. IEEE Global Commun. Conf. (Globecom), Dec. 2023.
  2. W. Saad, M. Bennis, and M. Chen, “A vision of 6G wireless systems: Applications, trends, technologies, and open research problems,” IEEE Netw., vol. 34, no. 3, pp. 134–142, May 2020.
  3. F. Liu, Y. Cui, C. Masouros, J. Xu, T. X. Han, Y. C. Eldar, and S. Buzzi, “Integrated sensing and communications: Toward dual-functional wireless networks for 6G and beyond,” IEEE J. Sel. Areas Commun., vol. 40, no. 6, pp. 1728–1767, Jun. 2022.
  4. A. Liu, Z. Huang, M. Li, Y. Wan, W. Li, T. X. Han, C. Liu, R. Du, D. K. P. Tan, J. Lu, Y. Shen, F. Colone, and K. Chetty, “A survey on fundamental limits of integrated sensing and communication,” IEEE Commun. Surv. Tut., vol. 24, no. 2, pp. 994–1034, Feb. 2022.
  5. M. L. Rahman, J. A. Zhang, X. Huang, Y. J. Guo, and R. W. Heath, “Framework for a perceptive mobile network using joint communication and radar sensing,” IEEE Trans. Aerosp. Electron. Syst., vol. 56, no. 3, pp. 1926–1941, Jun. 2020.
  6. Q. Shi, L. Liu, S. Zhang, and S. Cui, “Device-free sensing in OFDM cellular network,” IEEE J. Sel. Areas Commun., vol. 40, no. 6, pp. 1838–1853, Jun. 2022.
  7. X. Cheng, D. Duan, S. Gao, and L. Yang, “Integrated sensing and communications (ISAC) for vehicular communication networks (VCN),” IEEE Internet Things J., vol. 9, no. 23, pp. 23 441–23 451, Jul. 2022.
  8. Z. Zhang, T. Jiang, and W. Yu, “Active sensing for localization with reconfigurable intelligent surface,” in Proc. IEEE Int. Conf. Commun. (ICC), May 2023.
  9. K. M. Attiah and W. Yu, “Active beamforming for integrated sensing and communication,” in Proc. IEEE Int. Conf. Commun. (ICC) Wkshps., May 2023.
  10. Z. Wei, F. Liu, C. Masouros, N. Su, and A. P. Petropulu, “Toward multi-functional 6G wireless networks: Integrating sensing, communication, and security,” IEEE Commun. Mag., vol. 60, no. 4, pp. 65–71, Apr. 2022.
  11. A. Deligiannis, A. Daniyan, S. Lambotharan, and J. A. Chambers, “Secrecy rate optimizations for MIMO communication radar,” IEEE Trans. Aerosp. Electron. Syst., vol. 54, no. 5, pp. 2481–2492, Oct. 2018.
  12. B. K. Chalise, M. G. Amin, and B. Himed, “Performance tradeoff in a unified passive radar and communications system,” IEEE Signal Process. Lett., vol. 24, no. 9, pp. 1275–1279, Sep. 2017.
  13. S. Ma, H. Sheng, R. Yang, H. Li, Y. Wu, C. Shen, N. Al-Dhahir, and S. Li, “Covert beamforming design for integrated radar sensing and communication systems,” IEEE Trans. Wireless Commun., vol. 22, no. 1, pp. 718–731, Jan. 2023.
  14. N. Su, F. Liu, Z. Wei, Y.-F. Liu, and C. Masouros, “Secure dual-functional radar-communication transmission: Exploiting interference for resilience against target eavesdropping,” IEEE Trans. Wireless Commun., vol. 21, no. 9, pp. 7238–7252, Mar. 2022.
  15. Z. Ren, L. Qiu, and J. Xu, “Optimal transmit beamforming for secrecy integrated sensing and communication,” in Proc. IEEE Int. Conf. Commun. (ICC), May 2022.
  16. W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, “QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach,” IEEE Trans. Signal Process, vol. 59, no. 3, pp. 1202–1216, Mar. 2011.
  17. M. Li, S. Kundu, D. A. Pados, and S. N. Batalama, “Waveform design for secure SISO transmissions and multicasting,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1864–1874, Sep. 2013.
  18. H. Reboredo, J. Xavier, and M. R. D. Rodrigues, “Filter design with secrecy constraints: The MIMO Gaussian wiretap channel,” IEEE Trans. Signal Process., vol. 61, no. 15, pp. 3799–3814, Aug. 2013.
  19. N. Su, F. Liu, and C. Masouros, “Secure radar-communication systems with malicious targets: Integrating radar, communications and jamming functionalities,” IEEE Trans. Wireless Commun., vol. 20, no. 1, pp. 83–95, Jan. 2021.
  20. M. Hua, Q. Wu, W. Chen, O. A. Dobre, and A. L. Swindlehurst, “Secure intelligent reflecting surface aided integrated sensing and communication,” IEEE Trans. Wireless Commun., Early Access.
  21. Z. Ren, L. Qiu, J. Xu, and D. W. K. Ng, “Robust transmit beamforming for secure integrated sensing and communication,” IEEE Trans. Commun., vol. 71, no. 9, pp. 5549–5564, Sep. 2023.
  22. D. Xu, X. Yu, D. W. K. Ng, A. Schmeink, and R. Schober, “Robust and secure resource allocation for ISAC systems: A novel optimization framework for variable-length snapshots,” IEEE Trans. Commun., vol. 70, no. 12, pp. 8196–8214, Dec. 2022.
  23. N. Su, F. Liu, and C. Masouros, “Sensing-assisted eavesdropper estimation: An ISAC breakthrough in physical layer security,” IEEE Trans. Wireless Commun., Early Access.
  24. C. Xu and S. Zhang, “MIMO radar transmit signal optimization for target localization exploiting prior information,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2023, pp. 310–315.
  25. C. Xu and S. Zhang, “MIMO integrated sensing and communication exploiting prior information,” [Online]. Available: https://arxiv.org/abs/2312.13048.
  26. Y. Liang, G. Kramer, H. V. Poor, and S. Shamai, “Compound wire-tap channels,” in Proc. 45th Ann. Allerton Conf. Commun., Contr., Comput., Sep. 2007, pp. 136–143.
  27. Y. Shen and M. Z. Win, “Fundamental limits of wideband localization—Part I: A general framework,” IEEE Trans. Inf. Theory, vol. 56, no. 10, pp. 4956–4980, Oct. 2010.
  28. L. Zhang, R. Zhang, Y. C. Liang, Y. Xin, and S. Cui, “On the relationship between the multi-antenna secrecy communications and cognitive radio communications,” IEEE Trans. Commun., vol. 58, no. 6, pp. 1877–1886, Jun. 2010.
  29. A. Charnes and W. W. Cooper, “Programming with linear fractional functions,” Naval Res. Logist. Quarter., vol. 9, pp. 181–186, Dec. 1962.
  30. L. Liu, R. Zhang, and K.-C. Chua, “Secrecy wireless information and power transfer with MISO beamforming,” IEEE Trans. Signal Process., vol. 62, no. 7, pp. 1850–1863, Apr. 2014.
Citations (7)
List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Follow-Up Questions

We haven't generated follow-up questions for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com