eprintid: 10189676 rev_number: 8 eprint_status: archive userid: 699 dir: disk0/10/18/96/76 datestamp: 2024-03-25 16:20:18 lastmod: 2024-03-25 16:20:18 status_changed: 2024-03-25 16:20:18 type: working_paper metadata_visibility: show sword_depositor: 699 creators_name: Su, Nanchi creators_name: Liu, Fan creators_name: Masouros, Christos creators_name: Alexandropoulos, George C creators_name: Xiong, Yifeng creators_name: Zhang, Qinyu title: Secure ISAC MIMO Systems: Exploiting Interference With Bayesian Cramér-Rao Bound Optimization ispublished: pub divisions: UCL divisions: B04 divisions: C05 divisions: F46 keywords: Integrated sensing and communication, physical layer security, successive convex approximation, Bayesian Cramer-Rao bound, constructive interference note: This is an Open Access paper published under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) Licence (https://creativecommons.org/licenses/by-nc-nd/4.0/). abstract: In this paper, we present a signaling design for secure integrated sensing and communication (ISAC) systems comprising a dual-functional multi-input multi-output (MIMO) base station (BS) that simultaneously communicates with multiple users while detecting targets present in their vicinity, which are regarded as potential eavesdroppers. In particular, assuming that the distribution of each parameter to be estimated is known \textit{a priori}, we focus on optimizing the targets' sensing performance. To this end, we derive and minimize the Bayesian Cramér-Rao bound (BCRB), while ensuring certain communication quality of service (QoS) by exploiting constructive interference (CI). The latter scheme enforces that the received signals at the eavesdropping targets fall into the destructive region of the signal constellation, to deteriorate their decoding probability, thus enhancing the ISAC's system physical-layer security (PLS) capability. To tackle the nonconvexity of the formulated problem, a tailored successive convex approximation method is proposed for its efficient solution. Our extensive numerical results verify the effectiveness of the proposed secure ISAC design showing that the proposed algorithm outperforms block-level precoding techniques. date: 2024-01-30 date_type: published publisher: ArXiv official_url: https://doi.org/10.48550/arXiv.2401.16778 oa_status: green full_text_type: pub language: eng primo: open primo_central: open_green verified: verified_manual elements_id: 2252065 lyricists_name: Masouros, Christos lyricists_id: CMASO14 actors_name: Masouros, Christos actors_id: CMASO14 actors_role: owner full_text_status: public publication: CoRR volume: abs/24 place_of_pub: Ithaca, NY, USA pages: 6 citation: Su, Nanchi; Liu, Fan; Masouros, Christos; Alexandropoulos, George C; Xiong, Yifeng; Zhang, Qinyu; (2024) Secure ISAC MIMO Systems: Exploiting Interference With Bayesian Cramér-Rao Bound Optimization. ArXiv: Ithaca, NY, USA. Green open access document_url: https://discovery.ucl.ac.uk/id/eprint/10189676/1/2401.16778.pdf