eprintid: 10189676
rev_number: 8
eprint_status: archive
userid: 699
dir: disk0/10/18/96/76
datestamp: 2024-03-25 16:20:18
lastmod: 2024-03-25 16:20:18
status_changed: 2024-03-25 16:20:18
type: working_paper
metadata_visibility: show
sword_depositor: 699
creators_name: Su, Nanchi
creators_name: Liu, Fan
creators_name: Masouros, Christos
creators_name: Alexandropoulos, George C
creators_name: Xiong, Yifeng
creators_name: Zhang, Qinyu
title: Secure ISAC MIMO Systems: Exploiting Interference With Bayesian Cramér-Rao Bound Optimization
ispublished: pub
divisions: UCL
divisions: B04
divisions: C05
divisions: F46
keywords: Integrated sensing and communication, physical layer security, successive convex approximation, Bayesian Cramer-Rao bound, constructive interference
note: This is an Open Access paper published under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) Licence (https://creativecommons.org/licenses/by-nc-nd/4.0/).
abstract: In this paper, we present a signaling design for secure integrated sensing and communication (ISAC) systems comprising a dual-functional multi-input multi-output (MIMO) base station (BS) that simultaneously communicates with multiple users while detecting targets present in their vicinity, which are regarded as potential eavesdroppers. In particular, assuming that the distribution of each parameter to be estimated is known \textit{a priori}, we focus on optimizing the targets' sensing performance. To this end, we derive and minimize the Bayesian Cramér-Rao bound (BCRB), while ensuring certain communication quality of service (QoS) by exploiting constructive interference (CI). The latter scheme enforces that the received signals at the eavesdropping targets fall into the destructive region of the signal constellation, to deteriorate their decoding probability, thus enhancing the ISAC's system physical-layer security (PLS) capability. To tackle the nonconvexity of the formulated problem, a tailored successive convex approximation method is proposed for its efficient solution. Our extensive numerical results verify the effectiveness of the proposed secure ISAC design showing that the proposed algorithm outperforms block-level precoding techniques.
date: 2024-01-30
date_type: published
publisher: ArXiv
official_url: https://doi.org/10.48550/arXiv.2401.16778
oa_status: green
full_text_type: pub
language: eng
primo: open
primo_central: open_green
verified: verified_manual
elements_id: 2252065
lyricists_name: Masouros, Christos
lyricists_id: CMASO14
actors_name: Masouros, Christos
actors_id: CMASO14
actors_role: owner
full_text_status: public
publication: CoRR
volume: abs/24
place_of_pub: Ithaca, NY, USA
pages: 6
citation:        Su, Nanchi;    Liu, Fan;    Masouros, Christos;    Alexandropoulos, George C;    Xiong, Yifeng;    Zhang, Qinyu;      (2024)    Secure ISAC MIMO Systems: Exploiting Interference With Bayesian Cramér-Rao Bound Optimization.                    ArXiv: Ithaca, NY, USA.       Green open access   
 
document_url: https://discovery.ucl.ac.uk/id/eprint/10189676/1/2401.16778.pdf