Secure ISAC MIMO systems: exploiting interference with Bayesian Cramér–Rao bound optimization
Abstract In this paper, we present a signaling design for secure integrated sensing and communication (ISAC) systems comprising a dual-functional multi-input multi-output base station that simultaneously communicates with multiple users while detecting targets present in their vicinity, which are re...
Saved in:
| Main Authors: | , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
SpringerOpen
2025-02-01
|
| Series: | EURASIP Journal on Wireless Communications and Networking |
| Subjects: | |
| Online Access: | https://doi.org/10.1186/s13638-025-02428-1 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849768150009118720 |
|---|---|
| author | Nanchi Su Fan Liu Christos Masouros George C. Alexandropoulos Yifeng Xiong Qinyu Zhang |
| author_facet | Nanchi Su Fan Liu Christos Masouros George C. Alexandropoulos Yifeng Xiong Qinyu Zhang |
| author_sort | Nanchi Su |
| collection | DOAJ |
| description | Abstract In this paper, we present a signaling design for secure integrated sensing and communication (ISAC) systems comprising a dual-functional multi-input multi-output base station that simultaneously communicates with multiple users while detecting targets present in their vicinity, which are regarded as potential eavesdroppers. In particular, assuming that the distribution of each parameter to be estimated is known a priori, we focus on optimizing the targets’ sensing performance. To this end, we derive and minimize the Bayesian Cramér–Rao bound, while ensuring certain communication quality of service by exploiting constructive interference. The latter scheme enforces that the received signals at the eavesdropping targets fall into the destructive region of the signal constellation, to deteriorate their decoding probability, thus enhancing the ISAC’s system physical layer security capability. To tackle the nonconvexity of the formulated problem, a tailored successive convex approximation method is proposed for its efficient solution. Our extensive numerical results verify the effectiveness of the proposed secure ISAC design showing that the proposed algorithm outperforms block-level precoding techniques. |
| format | Article |
| id | doaj-art-fe0b0169e74647f68aa6ecbdd845f616 |
| institution | DOAJ |
| issn | 1687-1499 |
| language | English |
| publishDate | 2025-02-01 |
| publisher | SpringerOpen |
| record_format | Article |
| series | EURASIP Journal on Wireless Communications and Networking |
| spelling | doaj-art-fe0b0169e74647f68aa6ecbdd845f6162025-08-20T03:03:55ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14992025-02-012025111410.1186/s13638-025-02428-1Secure ISAC MIMO systems: exploiting interference with Bayesian Cramér–Rao bound optimizationNanchi Su0Fan Liu1Christos Masouros2George C. Alexandropoulos3Yifeng Xiong4Qinyu Zhang5Guangdong Provincial Key Laboratory of Aerospace Communication and Networking Technology, Harbin Institute of Technology (Shenzhen)School of System Design and Intelligent Manufacturing, Southern University of Science and TechnologyDepartment of Electronic and Electrical Engineering, University College LondonDepartment of Informatics and Telecommunications, National and Kapodistrian University of AthensSchool of Information and Electronic Engineering, Beijing University of Posts and TelecommunicationsGuangdong Provincial Key Laboratory of Aerospace Communication and Networking Technology, Harbin Institute of Technology (Shenzhen)Abstract In this paper, we present a signaling design for secure integrated sensing and communication (ISAC) systems comprising a dual-functional multi-input multi-output base station that simultaneously communicates with multiple users while detecting targets present in their vicinity, which are regarded as potential eavesdroppers. In particular, assuming that the distribution of each parameter to be estimated is known a priori, we focus on optimizing the targets’ sensing performance. To this end, we derive and minimize the Bayesian Cramér–Rao bound, while ensuring certain communication quality of service by exploiting constructive interference. The latter scheme enforces that the received signals at the eavesdropping targets fall into the destructive region of the signal constellation, to deteriorate their decoding probability, thus enhancing the ISAC’s system physical layer security capability. To tackle the nonconvexity of the formulated problem, a tailored successive convex approximation method is proposed for its efficient solution. Our extensive numerical results verify the effectiveness of the proposed secure ISAC design showing that the proposed algorithm outperforms block-level precoding techniques.https://doi.org/10.1186/s13638-025-02428-1Integrated sensing and communicationPhysical layer securitySuccessive convex approximationBayesian Cramér–Rao boundConstructive interference |
| spellingShingle | Nanchi Su Fan Liu Christos Masouros George C. Alexandropoulos Yifeng Xiong Qinyu Zhang Secure ISAC MIMO systems: exploiting interference with Bayesian Cramér–Rao bound optimization EURASIP Journal on Wireless Communications and Networking Integrated sensing and communication Physical layer security Successive convex approximation Bayesian Cramér–Rao bound Constructive interference |
| title | Secure ISAC MIMO systems: exploiting interference with Bayesian Cramér–Rao bound optimization |
| title_full | Secure ISAC MIMO systems: exploiting interference with Bayesian Cramér–Rao bound optimization |
| title_fullStr | Secure ISAC MIMO systems: exploiting interference with Bayesian Cramér–Rao bound optimization |
| title_full_unstemmed | Secure ISAC MIMO systems: exploiting interference with Bayesian Cramér–Rao bound optimization |
| title_short | Secure ISAC MIMO systems: exploiting interference with Bayesian Cramér–Rao bound optimization |
| title_sort | secure isac mimo systems exploiting interference with bayesian cramer rao bound optimization |
| topic | Integrated sensing and communication Physical layer security Successive convex approximation Bayesian Cramér–Rao bound Constructive interference |
| url | https://doi.org/10.1186/s13638-025-02428-1 |
| work_keys_str_mv | AT nanchisu secureisacmimosystemsexploitinginterferencewithbayesiancramerraoboundoptimization AT fanliu secureisacmimosystemsexploitinginterferencewithbayesiancramerraoboundoptimization AT christosmasouros secureisacmimosystemsexploitinginterferencewithbayesiancramerraoboundoptimization AT georgecalexandropoulos secureisacmimosystemsexploitinginterferencewithbayesiancramerraoboundoptimization AT yifengxiong secureisacmimosystemsexploitinginterferencewithbayesiancramerraoboundoptimization AT qinyuzhang secureisacmimosystemsexploitinginterferencewithbayesiancramerraoboundoptimization |