Joint Secure Transceiver Design for Integrated Sensing and Communication

This paper studies the joint secure transceiver design for the full-duplex integrated sensing and communication (ISAC) system, in which the base station performs the target tracking and communicates with the downlink and the uplink users by reusing the resources. Here, the target, referred to as Eve...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on wireless communications Vol. 23; no. 10; pp. 13377 - 13393
Main Authors He, Boxiang, Wang, Fanggang, Cheng, Julian
Format Journal Article
LanguageEnglish
Published New York IEEE 01.10.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This paper studies the joint secure transceiver design for the full-duplex integrated sensing and communication (ISAC) system, in which the base station performs the target tracking and communicates with the downlink and the uplink users by reusing the resources. Here, the target, referred to as Eve, is a potential eavesdropper with the intention of intercepting both the downlink and the uplink information. The security problem of the full-duplex ISAC system has not been studied well, where the sensing and communication signals suffer from the serious interference. In this paper, we jointly design the information beamformer, the radar waveform, the uplink communication receive filter, and the radar receive filter to achieve the downlink and uplink communication security and the target tracking. Specifically, both the Eve's signal-to-interference-plus-noise ratio minimization and the secrecy rate maximization problems, subject to the sensing and the communication constraints, are formulated for the ISAC system from the perspectives of the quality of service and the secrecy rate. An iterative algorithm is proposed for solving the formulated problems. We prove that, under appropriate conditions, the proposed iterative algorithm converges to the Karush-Kuhn-Tucker optimal point of the original problem without the rank 1 constraint. We further extend the joint design to the case of the imperfect wiretap channel and the angle uncertainty. Numerical results show that our scheme remarkably outperforms the benchmark approaches. The performance is close to that of designing the secure communication and the sensing separately.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1536-1276
1558-2248
DOI:10.1109/TWC.2024.3400849