Secure ISAC MIMO systems: exploiting interference with Bayesian Cramér–Rao bound optimization

Abstract In this paper, we present a signaling design for secure integrated sensing and communication (ISAC) systems comprising a dual-functional multi-input multi-output base station that simultaneously communicates with multiple users while detecting targets present in their vicinity, which are re...

Full description

Saved in:
Bibliographic Details
Main Authors: Nanchi Su, Fan Liu, Christos Masouros, George C. Alexandropoulos, Yifeng Xiong, Qinyu Zhang
Format: Article
Language:English
Published: SpringerOpen 2025-02-01
Series:EURASIP Journal on Wireless Communications and Networking
Subjects:
Online Access:https://doi.org/10.1186/s13638-025-02428-1
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849768150009118720
author Nanchi Su
Fan Liu
Christos Masouros
George C. Alexandropoulos
Yifeng Xiong
Qinyu Zhang
author_facet Nanchi Su
Fan Liu
Christos Masouros
George C. Alexandropoulos
Yifeng Xiong
Qinyu Zhang
author_sort Nanchi Su
collection DOAJ
description Abstract In this paper, we present a signaling design for secure integrated sensing and communication (ISAC) systems comprising a dual-functional multi-input multi-output base station that simultaneously communicates with multiple users while detecting targets present in their vicinity, which are regarded as potential eavesdroppers. In particular, assuming that the distribution of each parameter to be estimated is known a priori, we focus on optimizing the targets’ sensing performance. To this end, we derive and minimize the Bayesian Cramér–Rao bound, while ensuring certain communication quality of service by exploiting constructive interference. The latter scheme enforces that the received signals at the eavesdropping targets fall into the destructive region of the signal constellation, to deteriorate their decoding probability, thus enhancing the ISAC’s system physical layer security capability. To tackle the nonconvexity of the formulated problem, a tailored successive convex approximation method is proposed for its efficient solution. Our extensive numerical results verify the effectiveness of the proposed secure ISAC design showing that the proposed algorithm outperforms block-level precoding techniques.
format Article
id doaj-art-fe0b0169e74647f68aa6ecbdd845f616
institution DOAJ
issn 1687-1499
language English
publishDate 2025-02-01
publisher SpringerOpen
record_format Article
series EURASIP Journal on Wireless Communications and Networking
spelling doaj-art-fe0b0169e74647f68aa6ecbdd845f6162025-08-20T03:03:55ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14992025-02-012025111410.1186/s13638-025-02428-1Secure ISAC MIMO systems: exploiting interference with Bayesian Cramér–Rao bound optimizationNanchi Su0Fan Liu1Christos Masouros2George C. Alexandropoulos3Yifeng Xiong4Qinyu Zhang5Guangdong Provincial Key Laboratory of Aerospace Communication and Networking Technology, Harbin Institute of Technology (Shenzhen)School of System Design and Intelligent Manufacturing, Southern University of Science and TechnologyDepartment of Electronic and Electrical Engineering, University College LondonDepartment of Informatics and Telecommunications, National and Kapodistrian University of AthensSchool of Information and Electronic Engineering, Beijing University of Posts and TelecommunicationsGuangdong Provincial Key Laboratory of Aerospace Communication and Networking Technology, Harbin Institute of Technology (Shenzhen)Abstract In this paper, we present a signaling design for secure integrated sensing and communication (ISAC) systems comprising a dual-functional multi-input multi-output base station that simultaneously communicates with multiple users while detecting targets present in their vicinity, which are regarded as potential eavesdroppers. In particular, assuming that the distribution of each parameter to be estimated is known a priori, we focus on optimizing the targets’ sensing performance. To this end, we derive and minimize the Bayesian Cramér–Rao bound, while ensuring certain communication quality of service by exploiting constructive interference. The latter scheme enforces that the received signals at the eavesdropping targets fall into the destructive region of the signal constellation, to deteriorate their decoding probability, thus enhancing the ISAC’s system physical layer security capability. To tackle the nonconvexity of the formulated problem, a tailored successive convex approximation method is proposed for its efficient solution. Our extensive numerical results verify the effectiveness of the proposed secure ISAC design showing that the proposed algorithm outperforms block-level precoding techniques.https://doi.org/10.1186/s13638-025-02428-1Integrated sensing and communicationPhysical layer securitySuccessive convex approximationBayesian Cramér–Rao boundConstructive interference
spellingShingle Nanchi Su
Fan Liu
Christos Masouros
George C. Alexandropoulos
Yifeng Xiong
Qinyu Zhang
Secure ISAC MIMO systems: exploiting interference with Bayesian Cramér–Rao bound optimization
EURASIP Journal on Wireless Communications and Networking
Integrated sensing and communication
Physical layer security
Successive convex approximation
Bayesian Cramér–Rao bound
Constructive interference
title Secure ISAC MIMO systems: exploiting interference with Bayesian Cramér–Rao bound optimization
title_full Secure ISAC MIMO systems: exploiting interference with Bayesian Cramér–Rao bound optimization
title_fullStr Secure ISAC MIMO systems: exploiting interference with Bayesian Cramér–Rao bound optimization
title_full_unstemmed Secure ISAC MIMO systems: exploiting interference with Bayesian Cramér–Rao bound optimization
title_short Secure ISAC MIMO systems: exploiting interference with Bayesian Cramér–Rao bound optimization
title_sort secure isac mimo systems exploiting interference with bayesian cramer rao bound optimization
topic Integrated sensing and communication
Physical layer security
Successive convex approximation
Bayesian Cramér–Rao bound
Constructive interference
url https://doi.org/10.1186/s13638-025-02428-1
work_keys_str_mv AT nanchisu secureisacmimosystemsexploitinginterferencewithbayesiancramerraoboundoptimization
AT fanliu secureisacmimosystemsexploitinginterferencewithbayesiancramerraoboundoptimization
AT christosmasouros secureisacmimosystemsexploitinginterferencewithbayesiancramerraoboundoptimization
AT georgecalexandropoulos secureisacmimosystemsexploitinginterferencewithbayesiancramerraoboundoptimization
AT yifengxiong secureisacmimosystemsexploitinginterferencewithbayesiancramerraoboundoptimization
AT qinyuzhang secureisacmimosystemsexploitinginterferencewithbayesiancramerraoboundoptimization