(Translated by https://www.hiragana.jp/)
Securing the Sensing Functionality in ISAC Networks: An Artificial Noise Design
License: CC BY 4.0
arXiv:2312.00981v1 [eess.SP] 02 Dec 2023

Securing the Sensing Functionality in ISAC Networks: An Artificial Noise Design

Jiaqi Zou, , Christos Masouros, , Fan Liu,  Songlin Sun Jiaqi Zou is with the School of Information and Communication Engineering, Beijing University of Posts and Telecommunications (BUPT), Beijing, 100876, China, and also with the Department of Electrical and Electronic Engineering, University College London, London, WC1E 7JE, UK (e-mail: jqzou@bupt.edu.cn). Christos Masouros is with the Department of Electronic and Electrical Engineering, University College London, London, WC1E 7JE, UK (e-mail: chris.masouros@ieee.org).Fan Liu is with the Department of Electrical and Electronic Engineering, Southern University of Science and Technology, Shenzhen 518055, China (e-mail: liuf6@sustech.edu.cn).Songlin Sun is with Beijing University of Posts and Telecommunications (BUPT), Beijing, 100876, China (e-mail: slsun@bupt.edu.cn).
Abstract

Integrated sensing and communications (ISAC) systems employ dual-functional signals to simultaneously accomplish radar sensing and wireless communication tasks. However, ISAC systems open up new sensing security vulnerabilities to malicious illegitimate eavesdroppers (Eves) that can also exploit the transmitted waveform to extract sensing information from the environment. In this paper, we investigate the beamforming design to enhance the sensing security of an ISAC system, where the communication user (CU) serves as a sensing Eve. Our objective is to maximize the mutual information (MI) for the legitimate radar sensing receiver while considering the constraint of the MI for the Eve and the quality of service to the CUs. Then, we consider the artificial noise (AN)-aided beamforming to further enhance the sensing security. Simulation results demonstrate that our proposed methods achieve MI improvement of the legitimate receiver while limiting the sensing MI of the Eve, compared with the baseline scheme, and that the utilization of AN further contributes to sensing security.

Index Terms:
Integrated sensing and communications, sensing security, mutual information, artificial noise.

I Introduction

Integrated sensing and communications (ISAC) is identified as a key 6G technology that will support various futuristic applications through the co-design of sensing and communication functionalities. In particular, supported by the implementation of the dual-functional waveform and the base stations (BSs), ISAC provides a step change from the spectral coexistence of radar and communication systems to the shared utilization of costly hardware platforms. Inspired by these favorable characteristics, various designs have been proposed for the dual-functional waveforms to promote sensing and communication performance. For example, recent works in [1] minimized the beampattern matching error for radar sensing, and [2] considered the Cramér-Rao bound (CRB) minimization subject to the minimum signal-to-interference-plus-noise ratio (SINR) constraints for each communication user (CU). However, the aforementioned works have overlooked the consideration of security issues, which avail unique vulnerabilities in ISAC systems.

Due to the inherent broadcast nature of wireless signals, it is inevitable that wireless communication/sensing systems are susceptible to potential security threats. Compared with the communication-only systems, ISAC systems encounter more intricate security issues which can be generally categorized into the information security for communication and the sensing security for radar. The former arises from the fact that the probing ISAC waveform is modulated with information, which could potentially be leaked to the sensed targets that can act as eavesdroppers (Eves). To deal with this, physical layer security schemes have been proposed, such as [3] that maximized the secrecy rate by jointly optimizing the beamforming vector, the duration of snapshots, and the covariance matrix of the artificial noise (AN). Besides, the work in [4] optimizes the beamforming and AN design to minimize the signal-to-noise ratio (SNR) at the Eve. In contrast, the sensing security for radar has not been well investigated. In particular, the transmitted waveform could be exploited by the communication user serving as malicious passive sensing Eve s to extract sensing information about targets or their environment, which poses significant challenges and the need to secure the sensing functionality of ISAC networks.

Against this background, our work proposes to address the sensing security issue for ISAC systems, which to the best of our knowledge, has not been investigated in the literature. In particular, we consider a bi-static ISAC scenario, where the users that are granted access only to communication services, can exploit the ISAC signals for illegitimate sensing and therefore take the role of sensing Eves. In this scenario, the legitimate receiver and the Eve conduct sensing with the dual-functional ISAC waveforms. We formulate the problem to maximize the radar mutual information (MI) of the legitimate receiver, subject to MI of the Eve, the minimum SINR constraints for each CU and the maximum transmit power budget. Since the formulated problem is nonconvex, we propose a successive convex approximation (SCA) method combined with semidefinite relaxation (SDR) to deal with the non-convexity. Furthermore, we propose an AN-aided method where we firstly give the derivation of sensing MI with AN and then jointly optimize the beamforming and the covariance of AN. Simulation results demonstrate significant improvement in the sensing MI of our proposed methods compared with the baseline and also reveal that through adding AN to the transmit signals of the BS, the secure sensing performance can be effectively improved.

II System Model

Refer to caption
Figure 1: System model.

We consider a bistatic multiple-input multiple-output (MIMO) ISAC system, which consists of a central BS transmitting dual-functional signals to a legitimate radar receiver and K𝐾Kitalic_K single-antenna CUs. Simultaneously, a CU serves as an unauthorized sensing Eve who perfectly knows/intercepts the transmitted signals and also wishes to sense the targets/environment. We assume that the transmitter is equipped with a uniform linear array (ULA) of Ntsubscript𝑁𝑡N_{t}italic_N start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT antennas and that the legitimate receiver and the Eve are equipped with Nrsubscript𝑁𝑟N_{r}italic_N start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT and Nesubscript𝑁𝑒N_{e}italic_N start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT antennas, respectively.

II-A Communication Signal Model and Metrics

Let 𝐡kNt×1subscript𝐡𝑘superscriptsubscript𝑁𝑡1{\bf h}_{k}\in\mathbb{C}^{N_{t}\times 1}bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT × 1 end_POSTSUPERSCRIPT represent the communication channel vector for the k𝑘kitalic_k-th use. We assume that the channel follows a slow-fading block Rician fading channel, given as

𝐡k=KkKk+1𝐡LoS,k+1Kk+1𝐡NLoS,k,subscript𝐡𝑘subscript𝐾𝑘subscript𝐾𝑘1subscript𝐡𝐿𝑜𝑆𝑘1subscript𝐾𝑘1subscript𝐡𝑁𝐿𝑜𝑆𝑘\displaystyle\mathbf{h}_{k}=\sqrt{\frac{K_{k}}{K_{k}+1}}\mathbf{h}_{LoS,k}+% \sqrt{\frac{1}{K_{k}+1}}\mathbf{h}_{NLoS,k},bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = square-root start_ARG divide start_ARG italic_K start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG start_ARG italic_K start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT + 1 end_ARG end_ARG bold_h start_POSTSUBSCRIPT italic_L italic_o italic_S , italic_k end_POSTSUBSCRIPT + square-root start_ARG divide start_ARG 1 end_ARG start_ARG italic_K start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT + 1 end_ARG end_ARG bold_h start_POSTSUBSCRIPT italic_N italic_L italic_o italic_S , italic_k end_POSTSUBSCRIPT , (1)

where Kksubscript𝐾𝑘K_{k}italic_K start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT denotes the Rician factor of the channel between the k𝑘kitalic_k-th CU and the BS. 𝐡LoS,ksubscript𝐡𝐿𝑜𝑆𝑘\mathbf{h}_{LoS,k}bold_h start_POSTSUBSCRIPT italic_L italic_o italic_S , italic_k end_POSTSUBSCRIPT denotes the deterministic LoS channel component with 𝐡LoS,k=[1,,ejπぱい(Nt1)cosθしーたk]subscript𝐡𝐿𝑜𝑆𝑘1superscript𝑒𝑗𝜋subscript𝑁𝑡1𝑐𝑜𝑠subscript𝜃𝑘\mathbf{h}_{LoS,k}=\left[1,\cdots,e^{-j\pi(N_{t}-1)cos\theta_{k}}\right]bold_h start_POSTSUBSCRIPT italic_L italic_o italic_S , italic_k end_POSTSUBSCRIPT = [ 1 , ⋯ , italic_e start_POSTSUPERSCRIPT - italic_j italic_πぱい ( italic_N start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT - 1 ) italic_c italic_o italic_s italic_θしーた start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUPERSCRIPT ], where θしーたk[0,πぱい]subscript𝜃𝑘0𝜋\theta_{k}\in[0,\pi]italic_θしーた start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ [ 0 , italic_πぱい ] is the angle-of-arrival (AoA) of the line-of-sight (LoS) link from the k𝑘kitalic_k-th CU to the BS and we assume half-wavelength antenna spacing. 𝐡NLoS,ksubscript𝐡𝑁𝐿𝑜𝑆𝑘\mathbf{h}_{NLoS,k}bold_h start_POSTSUBSCRIPT italic_N italic_L italic_o italic_S , italic_k end_POSTSUBSCRIPT represents the random scattered components whose elements follows 𝒞𝒩(0,1)𝒞𝒩01\mathcal{CN}(0,1)caligraphic_C caligraphic_N ( 0 , 1 ).

Let us denote the beamforming matrix as 𝐖=[𝐰1,𝐰2,,𝐰k]𝒞Nt×K𝐖subscript𝐰1subscript𝐰2subscript𝐰𝑘superscript𝒞subscript𝑁𝑡𝐾\mathbf{W}=[\mathbf{w}_{1},\mathbf{w}_{2},\cdots,\mathbf{w}_{k}]\in\mathcal{C}% ^{N_{t}\times K}bold_W = [ bold_w start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , bold_w start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , ⋯ , bold_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ] ∈ caligraphic_C start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT × italic_K end_POSTSUPERSCRIPT, where 𝐰kNt×1subscript𝐰𝑘superscriptsubscript𝑁𝑡1{\bf w}_{k}\in\mathbb{C}^{N_{t}\times 1}bold_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ blackboard_C start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT × 1 end_POSTSUPERSCRIPT stands for the beamforming vector of the k𝑘kitalic_k-th user. Then, the transmitted signal at the l𝑙litalic_l-th time slot can be expressed as

𝐱[l]=𝐖𝐬[l],𝐱delimited-[]𝑙𝐖𝐬delimited-[]𝑙\displaystyle\mathbf{x}[l]=\mathbf{Ws}[l],bold_x [ italic_l ] = bold_Ws [ italic_l ] , (2)

where 𝐬[l]𝒞K×1𝐬delimited-[]𝑙superscript𝒞𝐾1\mathbf{s}[l]\in\mathcal{C}^{K\times 1}bold_s [ italic_l ] ∈ caligraphic_C start_POSTSUPERSCRIPT italic_K × 1 end_POSTSUPERSCRIPT includes K𝐾Kitalic_K parallel communication symbol streams to be communicated to K𝐾Kitalic_K users. Without loss of generality, we assume the communication symbols have unit power, i.e., 𝔼[𝐬[l]𝐬[l]H]=𝐈𝔼delimited-[]𝐬delimited-[]𝑙𝐬superscriptdelimited-[]𝑙𝐻𝐈\mathbb{E}[\mathbf{s}[l]\mathbf{s}[l]^{H}]=\mathbf{I}blackboard_E [ bold_s [ italic_l ] bold_s [ italic_l ] start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ] = bold_I, and the communication channel matrix is perfectly estimated and known at the BS side. Then, we have the SINR at the k𝑘kitalic_k-th CU as

SINRk=|𝐡kH𝐰k|2σしぐまc2+j=1,jkK|𝐡kH𝐰j|2,subscriptSINR𝑘superscriptsuperscriptsubscript𝐡𝑘𝐻subscript𝐰𝑘2superscriptsubscript𝜎𝑐2superscriptsubscriptformulae-sequence𝑗1𝑗𝑘𝐾superscriptsuperscriptsubscript𝐡𝑘𝐻subscript𝐰𝑗2\displaystyle\text{SINR}_{k}=\frac{\left|{\bf h}_{k}^{H}{\bf w}_{k}\right|^{2}% }{\sigma_{c}^{2}+\sum_{j=1,j\neq k}^{K}\left|{\bf h}_{k}^{H}{\bf w}_{j}\right|% ^{2}},SINR start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = divide start_ARG | bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT bold_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG italic_σしぐま start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + ∑ start_POSTSUBSCRIPT italic_j = 1 , italic_j ≠ italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT | bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT bold_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT | start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG , (3)

where σしぐまc2superscriptsubscript𝜎𝑐2\sigma_{c}^{2}italic_σしぐま start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT is the variance of additive white Gaussian noise (AWGN).

II-B Radar Signal Model

We consider a bistatic radar sensing scenario where the transmitted signals are shared between the transmitter and receiver through a control center. Denoting 𝐗=[𝐱[1],𝐱[2],,𝐱[L]]𝒞Nt×L𝐗𝐱delimited-[]1𝐱delimited-[]2𝐱delimited-[]𝐿superscript𝒞subscript𝑁𝑡𝐿\mathbf{X}=[\mathbf{x}[1],\mathbf{x}[2],\cdots,\mathbf{x}[L]]\in\mathcal{C}^{N% _{t}\times L}bold_X = [ bold_x [ 1 ] , bold_x [ 2 ] , ⋯ , bold_x [ italic_L ] ] ∈ caligraphic_C start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT × italic_L end_POSTSUPERSCRIPT as the transmitted waveform during L𝐿Litalic_L time slots, the received signal matrix at the legitimate receiver and the Eve can be expressed, respectively, as

𝐘r=𝐇r(𝜽r)𝐗+𝐙r,𝐘e=𝐇e(𝜽e)𝐗+𝐙e,formulae-sequencesubscript𝐘𝑟subscript𝐇𝑟subscript𝜽𝑟𝐗subscript𝐙𝑟subscript𝐘𝑒subscript𝐇𝑒subscript𝜽𝑒𝐗subscript𝐙𝑒\displaystyle\mathbf{Y}_{r}=\mathbf{H}_{r}(\bm{\theta}_{r})\mathbf{X}+\mathbf{% Z}_{r},\mathbf{Y}_{e}=\mathbf{H}_{e}(\bm{\theta}_{e})\mathbf{X}+\mathbf{Z}_{e},bold_Y start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT = bold_H start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ( bold_italic_θしーた start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ) bold_X + bold_Z start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT , bold_Y start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT = bold_H start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ( bold_italic_θしーた start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ) bold_X + bold_Z start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT , (4)

where 𝐙rsubscript𝐙𝑟\mathbf{Z}_{r}bold_Z start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT and 𝐙esubscript𝐙𝑒\mathbf{Z}_{e}bold_Z start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT are the noise matrices at the legitimate receiver and the Eve, respectively and each columns of 𝐙rsubscript𝐙𝑟\mathbf{Z}_{r}bold_Z start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT and 𝐙esubscript𝐙𝑒\mathbf{Z}_{e}bold_Z start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT follow 𝒞𝒩(𝟎,σしぐまr2𝐈)𝒞𝒩0superscriptsubscript𝜎𝑟2𝐈\mathcal{CN}(\mathbf{0},\sigma_{r}^{2}\mathbf{I})caligraphic_C caligraphic_N ( bold_0 , italic_σしぐま start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT bold_I ) and 𝒞𝒩(𝟎,σしぐまe2𝐈)𝒞𝒩0superscriptsubscript𝜎𝑒2𝐈\mathcal{CN}(\mathbf{0},\sigma_{e}^{2}\mathbf{I})caligraphic_C caligraphic_N ( bold_0 , italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT bold_I ), respectively. 𝐇rsubscript𝐇𝑟\mathbf{H}_{r}bold_H start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT and 𝐇esubscript𝐇𝑒\mathbf{H}_{e}bold_H start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT are the target response matrices from the transmitter to the legitimate receiver and the Eve, respectively, which are determined by the target parameters of interests 𝜽rsubscript𝜽𝑟\bm{\theta}_{r}bold_italic_θしーた start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT and 𝜽esubscript𝜽𝑒\bm{\theta}_{e}bold_italic_θしーた start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT. Note that 𝜽r𝜽esubscript𝜽𝑟subscript𝜽𝑒\bm{\theta}_{r}\neq\bm{\theta}_{e}bold_italic_θしーた start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ≠ bold_italic_θしーた start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT since the legitimate receiver and the Eve may have different sensing interests to estimate different angles and ranges, etc. Aside of 𝐇rsubscript𝐇𝑟\mathbf{H}_{r}bold_H start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT, we note that 𝐇esubscript𝐇𝑒\mathbf{H}_{e}bold_H start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT can also be known at the BS by exploiting the knowledge of the Eve’s location which is typical information exchanged with the BS, since the Eve is also a legitimate CU.

To measure the sensing performance at the receivers, we adopt the mutual information between the received radar signal and target response matrix as the performance metric for radar sensing, which has been extensively discussed in the literature [5]. It’s also implied in [6] that the MI characterizes the capability of radar to estimate the parameters describing the target. Following [7], the sensing MI of the legitimate receiver can be given as

Ir(𝐘r;𝜽r|𝐗)=Ir(𝐘r;𝐇r|𝐗).subscript𝐼𝑟subscript𝐘𝑟conditionalsubscript𝜽𝑟𝐗subscript𝐼𝑟subscript𝐘𝑟conditionalsubscript𝐇𝑟𝐗\displaystyle I_{r}(\mathbf{Y}_{r};\bm{\theta}_{r}|\mathbf{X})=I_{r}(\mathbf{Y% }_{r};\mathbf{H}_{r}|\mathbf{X}).italic_I start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ( bold_Y start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ; bold_italic_θしーた start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT | bold_X ) = italic_I start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ( bold_Y start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ; bold_H start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT | bold_X ) . (5)

Vectorizing 𝐘𝐘\mathbf{Y}bold_Y, we have

vec(𝐘r)=𝐗~𝐡r+𝐳r,vecsubscript𝐘𝑟~𝐗subscript𝐡𝑟subscript𝐳𝑟\displaystyle\mathrm{vec}(\mathbf{Y}_{r})=\tilde{\mathbf{X}}\mathbf{h}_{r}+% \mathbf{z}_{r},roman_vec ( bold_Y start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ) = over~ start_ARG bold_X end_ARG bold_h start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT + bold_z start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT , (6)

where 𝐗~=𝐗T𝐈Nr~𝐗tensor-productsuperscript𝐗𝑇subscript𝐈subscript𝑁𝑟\tilde{\mathbf{X}}=\mathbf{X}^{T}\otimes\mathbf{I}_{N_{r}}over~ start_ARG bold_X end_ARG = bold_X start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ⊗ bold_I start_POSTSUBSCRIPT italic_N start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT, 𝐡r=vec(𝐇r)subscript𝐡𝑟vecsubscript𝐇𝑟\mathbf{h}_{r}=\mathrm{vec}(\mathbf{H}_{r})bold_h start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT = roman_vec ( bold_H start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ), and 𝐳r=vec(𝐙r)subscript𝐳𝑟vecsubscript𝐙𝑟\mathbf{z}_{r}=\mathrm{vec}(\mathbf{Z}_{r})bold_z start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT = roman_vec ( bold_Z start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT )[8, Eq. 1.11.20]. Following the assumptions are also used in [5], we assume the target response vector 𝐡rsubscript𝐡𝑟\mathbf{h}_{r}bold_h start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT is zero-mean circular-symmetric Gaussian distributed with covariance 𝐑hsubscript𝐑\mathbf{R}_{h}bold_R start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT. As the transmitted waveform is perfectly known, the MI between 𝐘rsubscript𝐘𝑟\mathbf{Y}_{r}bold_Y start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT and 𝐇rsubscript𝐇𝑟\mathbf{H}_{r}bold_H start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT at the legitimate receiver can be expressed as

Ir(𝐘r;𝐇r|𝐗)subscript𝐼𝑟subscript𝐘𝑟conditionalsubscript𝐇𝑟𝐗\displaystyle I_{r}(\mathbf{Y}_{r};\mathbf{H}_{r}|\mathbf{X})italic_I start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ( bold_Y start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ; bold_H start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT | bold_X ) =h(𝐘r|𝐗)h(𝐘r|𝐇r,𝐗)absentconditionalsubscript𝐘𝑟𝐗conditionalsubscript𝐘𝑟subscript𝐇𝑟𝐗\displaystyle=h(\mathbf{Y}_{r}|\mathbf{X})-h(\mathbf{Y}_{r}|\mathbf{H}_{r},% \mathbf{X})= italic_h ( bold_Y start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT | bold_X ) - italic_h ( bold_Y start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT | bold_H start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT , bold_X ) (7a)
=logdet(𝐈+σしぐまr2𝐗~𝐑hr𝐗~H)absent𝐈superscriptsubscript𝜎𝑟2~𝐗subscript𝐑subscript𝑟superscript~𝐗𝐻\displaystyle=\log\det(\mathbf{I}+\sigma_{r}^{-2}\tilde{\mathbf{X}}\mathbf{R}_% {h_{r}}\tilde{\mathbf{X}}^{H})= roman_log roman_det ( bold_I + italic_σしぐま start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT over~ start_ARG bold_X end_ARG bold_R start_POSTSUBSCRIPT italic_h start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT over~ start_ARG bold_X end_ARG start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ) (7b)
=logdet(𝐈+σしぐまr2𝐑hr(𝐗𝐗T𝐈Nr)),absent𝐈superscriptsubscript𝜎𝑟2subscript𝐑subscript𝑟tensor-productsuperscript𝐗superscript𝐗𝑇subscript𝐈subscript𝑁𝑟\displaystyle=\log\det(\mathbf{I}+\sigma_{r}^{-2}\mathbf{R}_{h_{r}}(\mathbf{X}% ^{\ast}\mathbf{X}^{T}\otimes\mathbf{I}_{N_{r}})),= roman_log roman_det ( bold_I + italic_σしぐま start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT bold_R start_POSTSUBSCRIPT italic_h start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( bold_X start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT bold_X start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ⊗ bold_I start_POSTSUBSCRIPT italic_N start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT ) ) , (7c)

where we used the property of matrix determinant that det(𝐈+𝐀𝐁)=det(𝐈+𝐁𝐀)det𝐈𝐀𝐁det𝐈𝐁𝐀\mathrm{det}(\mathbf{I}+\mathbf{AB})=\mathrm{det}(\mathbf{I}+\mathbf{BA})roman_det ( bold_I + bold_AB ) = roman_det ( bold_I + bold_BA ). Let 𝐑hr=𝐔r𝚲r𝐔rHsubscript𝐑subscript𝑟subscript𝐔𝑟subscript𝚲𝑟superscriptsubscript𝐔𝑟𝐻\mathbf{R}_{h_{r}}=\mathbf{U}_{r}\mathbf{\Lambda}_{r}\mathbf{U}_{r}^{H}bold_R start_POSTSUBSCRIPT italic_h start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT = bold_U start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT bold_Λらむだ start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT bold_U start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT be the eigenvalue decomposition of 𝐑hrsubscript𝐑subscript𝑟\mathbf{R}_{h_{r}}bold_R start_POSTSUBSCRIPT italic_h start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT, and 𝐊𝐊\mathbf{K}bold_K be a real commutation matrix satisfying 𝐊𝐊T=𝐈superscript𝐊𝐊𝑇𝐈\mathbf{K}\mathbf{K}^{T}=\mathbf{I}bold_KK start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT = bold_I. We then have

Irsubscript𝐼𝑟\displaystyle I_{r}italic_I start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT =logdet(𝐈+σしぐまr2𝚲r𝐔rH𝐊(𝐈Nr𝐗𝐗T)𝐊T𝐔r)absent𝐈superscriptsubscript𝜎𝑟2subscript𝚲𝑟superscriptsubscript𝐔𝑟𝐻𝐊tensor-productsubscript𝐈subscript𝑁𝑟superscript𝐗superscript𝐗𝑇superscript𝐊𝑇subscript𝐔𝑟\displaystyle=\log\det(\mathbf{I}+\sigma_{r}^{-2}\mathbf{\Lambda}_{r}\mathbf{U% }_{r}^{H}\mathbf{K}(\mathbf{I}_{N_{r}}\otimes\mathbf{X}^{\ast}\mathbf{X}^{T})% \mathbf{K}^{T}\mathbf{U}_{r})= roman_log roman_det ( bold_I + italic_σしぐま start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT bold_Λらむだ start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT bold_U start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT bold_K ( bold_I start_POSTSUBSCRIPT italic_N start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT ⊗ bold_X start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT bold_X start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ) bold_K start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT bold_U start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT )
=logdet(𝐈+σしぐまr2L𝚲ri=1Nr𝐏i𝐑𝐗𝐏iH),absent𝐈superscriptsubscript𝜎𝑟2𝐿subscript𝚲𝑟superscriptsubscript𝑖1subscript𝑁𝑟subscript𝐏𝑖superscriptsubscript𝐑𝐗superscriptsubscript𝐏𝑖𝐻\displaystyle=\log\det(\mathbf{I}+\sigma_{r}^{-2}L\mathbf{\Lambda}_{r}\sum_{i=% 1}^{N_{r}}\mathbf{P}_{i}\mathbf{R}_{\mathbf{X}}^{\ast}\mathbf{P}_{i}^{H}),= roman_log roman_det ( bold_I + italic_σしぐま start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT italic_L bold_Λらむだ start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUPERSCRIPT bold_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT bold_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ) , (8)

where 𝐏=𝐔rH𝐊=[𝐏1,𝐏2,,𝐏Nr]𝐏superscriptsubscript𝐔𝑟𝐻𝐊subscript𝐏1subscript𝐏2subscript𝐏subscript𝑁𝑟\mathbf{P}=\mathbf{U}_{r}^{H}\mathbf{K}=[\mathbf{P}_{1},\mathbf{P}_{2},\cdots,% \mathbf{P}_{N_{r}}]bold_P = bold_U start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT bold_K = [ bold_P start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , bold_P start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , ⋯ , bold_P start_POSTSUBSCRIPT italic_N start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT ] and 𝐑𝐗subscript𝐑𝐗\mathbf{R}_{\mathbf{X}}bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT denotes the covariance matrix of the transmit signal, given as  [2]

𝐑𝐗=1L𝐗𝐗H𝐖𝐖H=k=1K𝐰k𝐰kH,subscript𝐑𝐗1𝐿superscript𝐗𝐗𝐻superscript𝐖𝐖𝐻superscriptsubscript𝑘1𝐾subscript𝐰𝑘superscriptsubscript𝐰𝑘𝐻\displaystyle{\bf R}_{\mathbf{X}}=\frac{1}{L}{\bf X}{\bf X}^{H}\approx{\bf W}{% \bf W}^{H}=\sum_{k=1}^{K}{\bf w}_{k}{\bf w}_{k}^{H},bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT = divide start_ARG 1 end_ARG start_ARG italic_L end_ARG bold_XX start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ≈ bold_WW start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT = ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT bold_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT , (9)

where the approximation holds when L𝐿Litalic_L is large enough. Similarly, the MI between 𝐘rsubscript𝐘𝑟\mathbf{Y}_{r}bold_Y start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT and 𝐇rsubscript𝐇𝑟\mathbf{H}_{r}bold_H start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT at the Eve can be expressed as

Ie(𝐘e;𝐇e|𝐗)subscript𝐼𝑒subscript𝐘𝑒conditionalsubscript𝐇𝑒𝐗\displaystyle I_{e}(\mathbf{Y}_{e};\mathbf{H}_{e}|\mathbf{X})\!\!italic_I start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ( bold_Y start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ; bold_H start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT | bold_X ) =logdet(𝐈+σしぐまe2𝐑he(𝐗𝐗T𝐈Ne))absent𝐈superscriptsubscript𝜎𝑒2subscript𝐑subscript𝑒tensor-productsuperscript𝐗superscript𝐗𝑇subscript𝐈subscript𝑁𝑒\displaystyle=\log\det(\mathbf{I}+\sigma_{e}^{-2}\mathbf{R}_{h_{e}}(\mathbf{X}% ^{\ast}\mathbf{X}^{T}\otimes\mathbf{I}_{N_{e}}))= roman_log roman_det ( bold_I + italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT bold_R start_POSTSUBSCRIPT italic_h start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( bold_X start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT bold_X start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ⊗ bold_I start_POSTSUBSCRIPT italic_N start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUBSCRIPT ) )
=logdet(𝐈+σしぐまe2L𝚲ei=1Ne𝐐i𝐑𝐗𝐐iH),absent𝐈superscriptsubscript𝜎𝑒2𝐿subscript𝚲𝑒superscriptsubscript𝑖1subscript𝑁𝑒subscript𝐐𝑖superscriptsubscript𝐑𝐗superscriptsubscript𝐐𝑖𝐻\displaystyle=\log\det(\mathbf{I}+\sigma_{e}^{-2}L\mathbf{\Lambda}_{e}\sum_{i=% 1}^{N_{e}}{\mathbf{Q}}_{i}\mathbf{R}_{\mathbf{X}}^{\ast}\mathbf{Q}_{i}^{H}),= roman_log roman_det ( bold_I + italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT italic_L bold_Λらむだ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUPERSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ) , (10)

where 𝐑hesubscript𝐑subscript𝑒\mathbf{R}_{h_{e}}bold_R start_POSTSUBSCRIPT italic_h start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUBSCRIPT denotes the covariance of zero-mean circular-symmetric Gaussian distributed 𝐡e=vec(𝐇e)subscript𝐡𝑒vecsubscript𝐇𝑒\mathbf{h}_{e}=\mathrm{vec}(\mathbf{H}_{e})bold_h start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT = roman_vec ( bold_H start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ), whose eigenvalue decomposition is given as 𝐑he=𝐔e𝚲e𝐔eHsubscript𝐑subscript𝑒subscript𝐔𝑒subscript𝚲𝑒superscriptsubscript𝐔𝑒𝐻\mathbf{R}_{h_{e}}=\mathbf{U}_{e}\mathbf{\Lambda}_{e}\mathbf{U}_{e}^{H}bold_R start_POSTSUBSCRIPT italic_h start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUBSCRIPT = bold_U start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT bold_Λらむだ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT bold_U start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT. 𝐐=𝐔eH𝐊=[𝐐1,𝐐2,,𝐐Ne]𝐐superscriptsubscript𝐔𝑒𝐻𝐊subscript𝐐1subscript𝐐2subscript𝐐subscript𝑁𝑒{\mathbf{Q}}=\mathbf{U}_{e}^{H}\mathbf{K}=[{\mathbf{Q}}_{1},{\mathbf{Q}}_{2},% \cdots,{\mathbf{Q}}_{N_{e}}]bold_Q = bold_U start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT bold_K = [ bold_Q start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , bold_Q start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , ⋯ , bold_Q start_POSTSUBSCRIPT italic_N start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUBSCRIPT ].

III Beamforming Design for Sensing Security without AN

In this section, we first investigate the beamforming design without the aid of AN to guarantee secure sensing. Our objective is to maximize the MI of the legitimate receiver while keeping the MI of the Eve lower than the preset threshold, and satisfying multiple users’ required SINR and the power budget. The optimization problem can be formulated as follows

max{𝐖k}k=1Ksubscriptsuperscriptsubscriptsubscript𝐖𝑘𝑘1𝐾\displaystyle\max_{\left\{\mathbf{W}_{k}\right\}_{k=1}^{K}}roman_max start_POSTSUBSCRIPT { bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT end_POSTSUBSCRIPT Ir=logdet(𝐈+σしぐまr2L𝚲ri=1Nr𝐏i𝐑𝐗𝐏iH)subscript𝐼𝑟𝐈superscriptsubscript𝜎𝑟2𝐿subscript𝚲𝑟superscriptsubscript𝑖1subscript𝑁𝑟subscript𝐏𝑖superscriptsubscript𝐑𝐗superscriptsubscript𝐏𝑖𝐻\displaystyle I_{r}=\log\det\left(\mathbf{I}+\sigma_{r}^{-2}L\mathbf{\Lambda}_% {r}\sum_{i=1}^{N_{r}}\mathbf{P}_{i}\mathbf{R}_{\mathbf{X}}^{\ast}\mathbf{P}_{i% }^{H}\right)italic_I start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT = roman_log roman_det ( bold_I + italic_σしぐま start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT italic_L bold_Λらむだ start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUPERSCRIPT bold_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT bold_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ) (11a)
s.t.formulae-sequencest\displaystyle\mathrm{s.t.}~{}roman_s . roman_t . Ie=logdet(𝐈+σしぐまe2L𝚲ei=1Ne𝐐i𝐑𝐗𝐐iH)ϵ,subscript𝐼𝑒𝐈superscriptsubscript𝜎𝑒2𝐿subscript𝚲𝑒superscriptsubscript𝑖1subscript𝑁𝑒subscript𝐐𝑖superscriptsubscript𝐑𝐗superscriptsubscript𝐐𝑖𝐻italic-ϵ\displaystyle I_{e}=\log\det\left(\mathbf{I}+\sigma_{e}^{-2}L\mathbf{\Lambda}_% {e}\sum_{i=1}^{N_{e}}\mathbf{Q}_{i}\mathbf{R}_{\mathbf{X}}^{\ast}\mathbf{Q}_{i% }^{H}\right)\leq\epsilon,italic_I start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT = roman_log roman_det ( bold_I + italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT italic_L bold_Λらむだ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUPERSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ) ≤ italic_ϵ , (11b)
tr(𝐑𝐗)P0,trsubscript𝐑𝐗subscript𝑃0\displaystyle\text{tr}(\mathbf{R}_{\mathbf{X}})\leq P_{0},tr ( bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) ≤ italic_P start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT , (11c)
tr(𝐡k𝐖k𝐡kH)k=1,kiKtr(𝐡k𝐖i𝐡kH)+σしぐまc2γがんまk,k,trsubscript𝐡𝑘subscript𝐖𝑘superscriptsubscript𝐡𝑘𝐻superscriptsubscriptformulae-sequence𝑘1𝑘𝑖𝐾trsubscript𝐡𝑘subscript𝐖𝑖superscriptsubscript𝐡𝑘𝐻superscriptsubscript𝜎𝑐2subscript𝛾𝑘for-all𝑘\displaystyle\frac{\text{tr}\left(\mathbf{h}_{k}\mathbf{W}_{k}\mathbf{h}_{k}^{% H}\right)}{\sum\nolimits_{k=1,k\neq i}^{K}\text{tr}\left(\mathbf{h}_{k}\mathbf% {W}_{i}\mathbf{h}_{k}^{H}\right)+\sigma_{c}^{2}}\geq\gamma_{k},\forall k,divide start_ARG tr ( bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ) end_ARG start_ARG ∑ start_POSTSUBSCRIPT italic_k = 1 , italic_k ≠ italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT tr ( bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_W start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ) + italic_σしぐま start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG ≥ italic_γがんま start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , ∀ italic_k , (11d)
𝐑𝐗=k=1K𝐖k,𝐖k0,rank(𝐖k)=1,k,formulae-sequencesubscript𝐑𝐗superscriptsubscript𝑘1𝐾subscript𝐖𝑘formulae-sequencesucceeds-or-equalssubscript𝐖𝑘0ranksubscript𝐖𝑘1for-all𝑘\displaystyle\mathbf{R}_{\mathbf{X}}=\!\sum_{k=1}^{K}\mathbf{W}_{k},\mathbf{W}% _{k}\!\succeq\!0,\text{rank}(\mathbf{W}_{k})=1,\forall k,bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ⪰ 0 , rank ( bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) = 1 , ∀ italic_k , (11e)

where 𝐖k=𝐰k𝐰kHsubscript𝐖𝑘subscript𝐰𝑘superscriptsubscript𝐰𝑘𝐻\mathbf{W}_{k}=\mathbf{w}_{k}\mathbf{w}_{k}^{H}bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = bold_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT. In general, it is challenging to solve problem (III) directly, due to the nonconvexity of the constraint (11b), (11d), and the rank-1 constraint in (11e). For addressing the nonconvex constraint (11b), we notice that Iesubscript𝐼𝑒I_{e}italic_I start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT is a concave function in 𝐑𝐗subscript𝐑𝐗\mathbf{R}_{\mathbf{X}}bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT. Thus, we give the upper-bound of (11b) based on first-order Taylor expansion at a given transmit covariance matrix 𝐑~𝐗=k=1K𝐖~ksubscript~𝐑𝐗superscriptsubscript𝑘1𝐾subscript~𝐖𝑘\tilde{\mathbf{R}}_{\mathbf{X}}=\sum_{k=1}^{K}\tilde{\mathbf{W}}_{k}over~ start_ARG bold_R end_ARG start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT over~ start_ARG bold_W end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT as

I~esubscript~𝐼𝑒absent\displaystyle\tilde{I}_{e}\triangleqover~ start_ARG italic_I end_ARG start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ≜ f(𝐑~𝐗)+tr(Re(2σしぐまe2Li=1Ne𝐐iT(𝐌1)𝚲e𝐐i𝐑𝐗))𝑓subscript~𝐑𝐗trRe2superscriptsubscript𝜎𝑒2𝐿superscriptsubscript𝑖1subscript𝑁𝑒superscriptsubscript𝐐𝑖𝑇superscriptsuperscript𝐌1subscript𝚲𝑒superscriptsubscript𝐐𝑖subscript𝐑𝐗\displaystyle f(\tilde{\mathbf{R}}_{\mathbf{X}})+\mathrm{tr}\left(\mathrm{Re}% \left(2\sigma_{e}^{-2}L\sum_{i=1}^{N_{e}}\mathbf{Q}_{i}^{T}(\mathbf{M}^{-1})^{% \ast}\mathbf{\Lambda}_{e}\mathbf{Q}_{i}^{\ast}\mathbf{R_{X}}\right)\right)italic_f ( over~ start_ARG bold_R end_ARG start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) + roman_tr ( roman_Re ( 2 italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT italic_L ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUPERSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ( bold_M start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT bold_Λらむだ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) )
tr(Re(2σしぐまe2Li=1Ne𝐐iT(𝐌1)𝚲e𝐐i𝐑~𝐗)).trRe2superscriptsubscript𝜎𝑒2𝐿superscriptsubscript𝑖1subscript𝑁𝑒superscriptsubscript𝐐𝑖𝑇superscriptsuperscript𝐌1subscript𝚲𝑒superscriptsubscript𝐐𝑖subscript~𝐑𝐗\displaystyle-\mathrm{tr}\left(\mathrm{Re}\left(2\sigma_{e}^{-2}L\sum_{i=1}^{N% _{e}}\mathbf{Q}_{i}^{T}(\mathbf{M}^{-1})^{\ast}\mathbf{\Lambda}_{e}\mathbf{Q}_% {i}^{\ast}\tilde{\mathbf{R}}_{\mathbf{X}}\right)\right).- roman_tr ( roman_Re ( 2 italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT italic_L ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUPERSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ( bold_M start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT bold_Λらむだ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT over~ start_ARG bold_R end_ARG start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) ) . (12)

where 𝐌=𝐈+σしぐまe2L𝚲ei=1Ne𝐐i𝐑~X𝐐iH𝐌𝐈superscriptsubscript𝜎𝑒2𝐿subscript𝚲𝑒superscriptsubscript𝑖1subscript𝑁𝑒subscript𝐐𝑖superscriptsubscript~𝐑𝑋superscriptsubscript𝐐𝑖𝐻\mathbf{M}=\mathbf{I}+\sigma_{e}^{-2}L\mathbf{\Lambda}_{e}\sum_{i=1}^{N_{e}}% \mathbf{Q}_{i}\tilde{\mathbf{R}}_{X}^{\ast}\mathbf{Q}_{i}^{H}bold_M = bold_I + italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT italic_L bold_Λらむだ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUPERSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT over~ start_ARG bold_R end_ARG start_POSTSUBSCRIPT italic_X end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT. The details are given in Appendix A. As such, it can be easily observed that the approximated function is convex on 𝐑𝐗subscript𝐑𝐗\mathbf{R}_{\mathbf{X}}bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT. Thus, 𝐑𝐗subscript𝐑𝐗\mathbf{R}_{\mathbf{X}}bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT can be iteratively obtained by updating 𝐑~𝐗subscript~𝐑𝐗\tilde{\mathbf{R}}_{\mathbf{X}}over~ start_ARG bold_R end_ARG start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT.

Then, we focus on dealing with the rank-1 constraint in (11e), which can be equivalently transformed into an equivalent linear matrix inequality (LMI) as

[𝐖k𝐰k𝐰kH1]0,succeeds-or-equalsmatrixsubscript𝐖𝑘subscript𝐰𝑘superscriptsubscript𝐰𝑘𝐻10\displaystyle\begin{bmatrix}\mathbf{W}_{k}&\mathbf{w}_{k}\\ \mathbf{w}_{k}^{H}&1\end{bmatrix}\succeq 0,[ start_ARG start_ROW start_CELL bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_CELL start_CELL bold_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL bold_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT end_CELL start_CELL 1 end_CELL end_ROW end_ARG ] ⪰ 0 , (13c)
tr(𝐖k)𝐰kH𝐰k0,k.trsubscript𝐖𝑘subscriptsuperscript𝐰𝐻𝑘subscript𝐰𝑘0for-all𝑘\displaystyle\operatorname{tr}(\mathbf{W}_{k})-\mathbf{w}^{H}_{k}\mathbf{w}_{k% }\leq 0,\forall k.roman_tr ( bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) - bold_w start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ≤ 0 , ∀ italic_k . (13d)

Additionally, the non-convexity in (13d) can be handled by the first-order Taylor expansions at 𝐰~ksubscript~𝐰𝑘\tilde{\mathbf{w}}_{k}over~ start_ARG bold_w end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT as

tr(𝐖k)𝐰~kH𝐰~k2Re(𝐰~kH𝐰k)0,trsubscript𝐖𝑘superscriptsubscript~𝐰𝑘𝐻subscript~𝐰𝑘2Resuperscriptsubscript~𝐰𝑘𝐻subscript𝐰𝑘0\displaystyle\operatorname{tr}(\mathbf{W}_{k})-{\tilde{\mathbf{w}}_{k}}^{H}% \tilde{\mathbf{w}}_{k}-2\operatorname{Re}\left(\tilde{\mathbf{w}}_{k}^{H}% \mathbf{w}_{k}\right)\leq 0,roman_tr ( bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) - over~ start_ARG bold_w end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT over~ start_ARG bold_w end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT - 2 roman_Re ( over~ start_ARG bold_w end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT bold_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) ≤ 0 , (14)

where Re()Re\operatorname{Re}(\cdot)roman_Re ( ⋅ ) denotes the real part of the argument and 𝐰~ksubscript~𝐰𝑘\tilde{\mathbf{w}}_{k}over~ start_ARG bold_w end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT can be updated at each iteration. Therefore, a convex approximation of problem (III) is reformulated as

max{𝐰k,𝐖k}k=1KIrsubscriptsuperscriptsubscriptsubscript𝐰𝑘subscript𝐖𝑘𝑘1𝐾subscript𝐼𝑟\displaystyle\max_{\left\{\mathbf{w}_{k},\mathbf{W}_{k}\right\}_{k=1}^{K}}I_{r}roman_max start_POSTSUBSCRIPT { bold_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT end_POSTSUBSCRIPT italic_I start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT (15a)
s.t.formulae-sequence𝑠𝑡\displaystyle s.t.~{}italic_s . italic_t . I~eϵ,subscript~𝐼𝑒italic-ϵ\displaystyle\tilde{I}_{e}\leq\epsilon,over~ start_ARG italic_I end_ARG start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ≤ italic_ϵ , (15b)
tr(𝐑𝐗)P0,trsubscript𝐑𝐗subscript𝑃0\displaystyle\text{tr}(\mathbf{R}_{\mathbf{X}})\leq P_{0},tr ( bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) ≤ italic_P start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT , (15c)
𝐖k0,𝐑𝐗=k=1K𝐖k,formulae-sequencesucceeds-or-equalssubscript𝐖𝑘0subscript𝐑𝐗superscriptsubscript𝑘1𝐾subscript𝐖𝑘\displaystyle{\bf W}_{k}\succeq 0,\mathbf{R}_{\mathbf{X}}=\!\sum_{k=1}^{K}% \mathbf{W}_{k},bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ⪰ 0 , bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , (15d)
tr(𝐡k𝐖k𝐡kH)γがんまkki,k=1Ktr(𝐡k𝐖k𝐡kH)γがんまkσしぐまc2,k,trsubscript𝐡𝑘subscript𝐖𝑘superscriptsubscript𝐡𝑘𝐻subscript𝛾𝑘superscriptsubscriptformulae-sequence𝑘𝑖𝑘1𝐾trsubscript𝐡𝑘subscript𝐖𝑘superscriptsubscript𝐡𝑘𝐻subscript𝛾𝑘superscriptsubscript𝜎𝑐2for-all𝑘\displaystyle\text{tr}\left(\mathbf{h}_{k}\mathbf{W}_{k}\mathbf{h}_{k}^{H}% \right)-\gamma_{k}\!\!\!\!\!\sum_{k\neq i,k=1}^{K}\!\!\!\!\!\text{tr}\left(% \mathbf{h}_{k}\mathbf{W}_{k}\mathbf{h}_{k}^{H}\right)\!\geq\!\gamma_{k}\sigma_% {c}^{2},\forall k,tr ( bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ) - italic_γがんま start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_k ≠ italic_i , italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT tr ( bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ) ≥ italic_γがんま start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT italic_σしぐま start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT , ∀ italic_k , (15e)
(13c),(14),italic-(13citalic-)italic-(14italic-)\displaystyle\eqref{eq:rank1a},\eqref{eq:rank1bconvex},italic_( italic_) , italic_( italic_) ,

which is easily shown to be convex, and hence, 𝐖ksubscript𝐖𝑘\mathbf{W}_{k}bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT can be iteratively obtained by solving problem (III) based on updating 𝐰~ksubscript~𝐰𝑘\tilde{\mathbf{w}}_{k}over~ start_ARG bold_w end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT and 𝐖~ksubscript~𝐖𝑘\tilde{\mathbf{W}}_{k}over~ start_ARG bold_W end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT in an iterative manner. However, due to the stringent requirement introduced by (15b) and (13d), it is generally non-trivial to directly obtain a feasible solution as an initial point. Alternatively, we can adopt the penalty SCA [9] and introduce auxiliary variables p¯,ρろーk,κかっぱ¯𝑝subscript𝜌𝑘𝜅\bar{p},\rho_{k},\kappaover¯ start_ARG italic_p end_ARG , italic_ρろー start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , italic_κかっぱ to transform problem (III) into

max{𝐰k,𝐖k,ρろーk}k=1K,κかっぱIrp¯κかっぱp¯k=1Kρろーksubscriptsuperscriptsubscriptsubscript𝐰𝑘subscript𝐖𝑘subscript𝜌𝑘𝑘1𝐾𝜅subscript𝐼𝑟¯𝑝𝜅¯𝑝superscriptsubscript𝑘1𝐾subscript𝜌𝑘\displaystyle\max_{\left\{\mathbf{w}_{k},\mathbf{W}_{k},\rho_{k}\right\}_{k=1}% ^{K},\kappa}I_{r}-\bar{p}\kappa-\bar{p}\sum_{k=1}^{K}\rho_{k}roman_max start_POSTSUBSCRIPT { bold_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , italic_ρろー start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT , italic_κかっぱ end_POSTSUBSCRIPT italic_I start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT - over¯ start_ARG italic_p end_ARG italic_κかっぱ - over¯ start_ARG italic_p end_ARG ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT italic_ρろー start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT (16a)
s.t.formulae-sequence𝑠𝑡\displaystyle s.t.~{}~{}italic_s . italic_t . I~eϵ+κかっぱ,subscript~𝐼𝑒italic-ϵ𝜅\displaystyle\tilde{I}_{e}\leq\epsilon+\kappa,over~ start_ARG italic_I end_ARG start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ≤ italic_ϵ + italic_κかっぱ , (16b)
tr(𝐖k)𝐰~kH𝐰~k2Re(𝐰~kH𝐰k)ρろーk,trsubscript𝐖𝑘superscriptsubscript~𝐰𝑘𝐻subscript~𝐰𝑘2Resuperscriptsubscript~𝐰𝑘𝐻subscript𝐰𝑘subscript𝜌𝑘\displaystyle\operatorname{tr}(\mathbf{W}_{k})-{\tilde{\mathbf{w}}_{k}}^{H}% \tilde{\mathbf{w}}_{k}-2\operatorname{Re}\left(\tilde{\mathbf{w}}_{k}^{H}% \mathbf{w}_{k}\right)\leq\rho_{k},roman_tr ( bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) - over~ start_ARG bold_w end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT over~ start_ARG bold_w end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT - 2 roman_Re ( over~ start_ARG bold_w end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT bold_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) ≤ italic_ρろー start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , (16c)
(13c),(15c),(15d),(15e),italic-(13citalic-)italic-(15citalic-)italic-(15ditalic-)italic-(15eitalic-)\displaystyle\eqref{eq:rank1a},\eqref{eq:p1-power},\eqref{eq:p1-2c},\eqref{eq:% p1-2d},italic_( italic_) , italic_( italic_) , italic_( italic_) , italic_( italic_) , (16d)

where p¯¯𝑝\bar{p}over¯ start_ARG italic_p end_ARG and ρろーk,κかっぱsubscript𝜌𝑘𝜅\rho_{k},\kappaitalic_ρろー start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , italic_κかっぱ denote the weight coefficient and the penalty terms, respectively. We present the proposed iterative algorithm in Algorithm 1.

Algorithm 1 : Proposed Iterative Algorithm for Handling (III)
  Randomly set {𝐰k(0),𝐖k(0)}superscriptsubscript𝐰𝑘0superscriptsubscript𝐖𝑘0\{\mathbf{w}_{k}^{(0)},\mathbf{W}_{k}^{(0)}\}{ bold_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( 0 ) end_POSTSUPERSCRIPT , bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( 0 ) end_POSTSUPERSCRIPT }, p¯(0)=103superscript¯𝑝0superscript103\bar{p}^{(0)}=10^{-3}over¯ start_ARG italic_p end_ARG start_POSTSUPERSCRIPT ( 0 ) end_POSTSUPERSCRIPT = 10 start_POSTSUPERSCRIPT - 3 end_POSTSUPERSCRIPT, λらむだ>1𝜆1\lambda>1italic_λらむだ > 1, i=0𝑖0i=0italic_i = 0;
  repeat
     ii+1𝑖𝑖1i\leftarrow i+1italic_i ← italic_i + 1 ;
     𝐰~k(i),𝐖~k(i)𝐰k(i1),𝐖k(i1)formulae-sequencesuperscriptsubscript~𝐰𝑘𝑖superscriptsubscript~𝐖𝑘𝑖superscriptsubscript𝐰𝑘𝑖1superscriptsubscript𝐖𝑘𝑖1\tilde{\mathbf{w}}_{k}^{(i)},\tilde{\mathbf{W}}_{k}^{(i)}\leftarrow\mathbf{w}_% {k}^{(i-1)},\mathbf{W}_{k}^{(i-1)}over~ start_ARG bold_w end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_i ) end_POSTSUPERSCRIPT , over~ start_ARG bold_W end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_i ) end_POSTSUPERSCRIPT ← bold_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_i - 1 ) end_POSTSUPERSCRIPT , bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_i - 1 ) end_POSTSUPERSCRIPT;
     Solve problem (III) to obtain the optimal 𝐰k(i),𝐖k(i)superscriptsubscript𝐰𝑘𝑖superscriptsubscript𝐖𝑘𝑖\mathbf{w}_{k}^{(i)},\mathbf{W}_{k}^{(i)}bold_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_i ) end_POSTSUPERSCRIPT , bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_i ) end_POSTSUPERSCRIPT;
     p¯(i)λらむだp¯(i1)superscript¯𝑝𝑖𝜆superscript¯𝑝𝑖1\bar{p}^{(i)}\leftarrow\lambda\bar{p}^{(i-1)}over¯ start_ARG italic_p end_ARG start_POSTSUPERSCRIPT ( italic_i ) end_POSTSUPERSCRIPT ← italic_λらむだ over¯ start_ARG italic_p end_ARG start_POSTSUPERSCRIPT ( italic_i - 1 ) end_POSTSUPERSCRIPT
  until both Ir(i)Ir(i1)superscriptsubscript𝐼𝑟𝑖superscriptsubscript𝐼𝑟𝑖1I_{r}^{(i)}-I_{r}^{(i-1)}italic_I start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_i ) end_POSTSUPERSCRIPT - italic_I start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_i - 1 ) end_POSTSUPERSCRIPT and the penalty terms ρろーk,κかっぱsubscript𝜌𝑘𝜅\rho_{k},\kappaitalic_ρろー start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , italic_κかっぱ are significantly small.

IV MI Gap Maximization with AN

In this section, we consider utilizing AN to assist secure sensing. We assume the instantaneous AN, 𝐍𝐍\mathbf{N}bold_N, is shared with the legitimate receiver by the control center but remains unknown to the Eve. Firstly, we give the received signal at the legitimate receiver as

𝐘r=𝐇r(𝜽r)𝐗+𝐇r(𝜽r)𝐍+𝐙r.subscript𝐘𝑟subscript𝐇𝑟subscript𝜽𝑟𝐗subscript𝐇𝑟subscript𝜽𝑟𝐍subscript𝐙𝑟\displaystyle\mathbf{Y}_{r}=\mathbf{H}_{r}(\bm{\theta}_{r})\mathbf{X}+\mathbf{% H}_{r}(\bm{\theta}_{r})\mathbf{N}+\mathbf{Z}_{r}.bold_Y start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT = bold_H start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ( bold_italic_θしーた start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ) bold_X + bold_H start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ( bold_italic_θしーた start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ) bold_N + bold_Z start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT . (17)

Then, the MI of the legitimate receiver can be expressed as

Ir(𝐘r;𝜽r|𝐗,𝐍)=Ir(𝐘r;𝐇r|𝐗,𝐍)subscript𝐼𝑟subscript𝐘𝑟conditionalsubscript𝜽𝑟𝐗𝐍subscript𝐼𝑟subscript𝐘𝑟conditionalsubscript𝐇𝑟𝐗𝐍\displaystyle~{}I_{r}(\mathbf{Y}_{r};\bm{\theta}_{r}|\mathbf{X},\mathbf{N})=I_% {r}(\mathbf{Y}_{r};\mathbf{H}_{r}|\mathbf{X},\mathbf{N})italic_I start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ( bold_Y start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ; bold_italic_θしーた start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT | bold_X , bold_N ) = italic_I start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ( bold_Y start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ; bold_H start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT | bold_X , bold_N )
=h(𝐘r|𝐗,𝐍)h(𝐘r|𝐇r,𝐗,𝐍)absentconditionalsubscript𝐘𝑟𝐗𝐍conditionalsubscript𝐘𝑟subscript𝐇𝑟𝐗𝐍\displaystyle=h(\mathbf{Y}_{r}|\mathbf{X},\mathbf{N})-h(\mathbf{Y}_{r}|\mathbf% {H}_{r},\mathbf{X},\mathbf{N})= italic_h ( bold_Y start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT | bold_X , bold_N ) - italic_h ( bold_Y start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT | bold_H start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT , bold_X , bold_N )
=logdet(𝐈+σしぐまr2(𝐗~+𝐍~)𝐑hr(𝐗~+𝐍~)H)absent𝐈superscriptsubscript𝜎𝑟2~𝐗~𝐍subscript𝐑subscript𝑟superscript~𝐗~𝐍𝐻\displaystyle=\log\det(\mathbf{I}+\sigma_{r}^{-2}(\tilde{\mathbf{X}}+\tilde{% \mathbf{N}})\mathbf{R}_{h_{r}}(\tilde{\mathbf{X}}+\tilde{\mathbf{N}})^{H})= roman_log roman_det ( bold_I + italic_σしぐま start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT ( over~ start_ARG bold_X end_ARG + over~ start_ARG bold_N end_ARG ) bold_R start_POSTSUBSCRIPT italic_h start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( over~ start_ARG bold_X end_ARG + over~ start_ARG bold_N end_ARG ) start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT )
=logdet(𝐈+σしぐまr2(𝐗~+𝐍~)H(𝐗~+𝐍~)𝐑hr)absent𝐈superscriptsubscript𝜎𝑟2superscript~𝐗~𝐍𝐻~𝐗~𝐍subscript𝐑subscript𝑟\displaystyle=\log\det(\mathbf{I}+\sigma_{r}^{-2}(\tilde{\mathbf{X}}+\tilde{% \mathbf{N}})^{H}(\tilde{\mathbf{X}}+\tilde{\mathbf{N}})\mathbf{R}_{h_{r}})= roman_log roman_det ( bold_I + italic_σしぐま start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT ( over~ start_ARG bold_X end_ARG + over~ start_ARG bold_N end_ARG ) start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ( over~ start_ARG bold_X end_ARG + over~ start_ARG bold_N end_ARG ) bold_R start_POSTSUBSCRIPT italic_h start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT )
(a)logdet(𝐈+σしぐまr2L𝐊(𝐈Nr(𝐑𝐗*+𝐑𝐍*))𝐊T𝐑hr)𝑎𝐈superscriptsubscript𝜎𝑟2𝐿𝐊tensor-productsubscript𝐈subscript𝑁𝑟subscriptsuperscript𝐑𝐗subscriptsuperscript𝐑𝐍superscript𝐊𝑇subscript𝐑subscript𝑟\displaystyle\overset{(a)}{\approx}\log\det\left(\mathbf{I}+\sigma_{r}^{-2}L% \mathbf{K}(\mathbf{I}_{N_{r}}\otimes\left({\mathbf{R}}^{*}_{\mathbf{X}}+{% \mathbf{R}}^{*}_{\mathbf{N}}\right))\mathbf{K}^{T}\mathbf{R}_{h_{r}}\right)start_OVERACCENT ( italic_a ) end_OVERACCENT start_ARG ≈ end_ARG roman_log roman_det ( bold_I + italic_σしぐま start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT italic_L bold_K ( bold_I start_POSTSUBSCRIPT italic_N start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT ⊗ ( bold_R start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT + bold_R start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT start_POSTSUBSCRIPT bold_N end_POSTSUBSCRIPT ) ) bold_K start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT bold_R start_POSTSUBSCRIPT italic_h start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT )
=logdet(𝐈+σしぐまr2L𝚲ri=1Nr𝐏i(𝐑𝐗+𝐑𝐍)𝐏iH),absent𝐈superscriptsubscript𝜎𝑟2𝐿subscript𝚲𝑟superscriptsubscript𝑖1subscript𝑁𝑟subscript𝐏𝑖superscriptsubscript𝐑𝐗superscriptsubscript𝐑𝐍superscriptsubscript𝐏𝑖𝐻\displaystyle=\log\det\left(\mathbf{I}+\sigma_{r}^{-2}L\mathbf{\Lambda}_{r}% \sum_{i=1}^{N_{r}}\mathbf{P}_{i}(\mathbf{R}_{\mathbf{X}}^{\ast}+\mathbf{R}_{% \mathbf{N}}^{\ast})\mathbf{P}_{i}^{H}\right),= roman_log roman_det ( bold_I + italic_σしぐま start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT italic_L bold_Λらむだ start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUPERSCRIPT bold_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT + bold_R start_POSTSUBSCRIPT bold_N end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ) bold_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ) , (18)

where 𝐍~=𝐍T𝐈Nr~𝐍tensor-productsuperscript𝐍𝑇subscript𝐈subscript𝑁𝑟\tilde{\mathbf{N}}=\mathbf{N}^{T}\otimes\mathbf{I}_{N_{r}}over~ start_ARG bold_N end_ARG = bold_N start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ⊗ bold_I start_POSTSUBSCRIPT italic_N start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUBSCRIPT and 𝐑𝐍=1L𝐍𝐍Hsubscript𝐑𝐍1𝐿superscript𝐍𝐍𝐻{\mathbf{R}}_{\mathbf{N}}=\frac{1}{L}\mathbf{N}\mathbf{N}^{H}bold_R start_POSTSUBSCRIPT bold_N end_POSTSUBSCRIPT = divide start_ARG 1 end_ARG start_ARG italic_L end_ARG bold_NN start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT.

On the other hand, as the Eve has no prior knowledge of AN, the received signal and the MI at the Eve can be given as

𝐘e=𝐇e(𝜽e)𝐗+𝐇e(𝜽e)𝐍+𝐙e,subscript𝐘𝑒subscript𝐇𝑒subscript𝜽𝑒𝐗subscript𝐇𝑒subscript𝜽𝑒𝐍subscript𝐙𝑒\displaystyle\mathbf{Y}_{e}=\mathbf{H}_{e}(\bm{\theta}_{e})\mathbf{X}+\mathbf{% H}_{e}(\bm{\theta}_{e})\mathbf{N}+\mathbf{Z}_{e},bold_Y start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT = bold_H start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ( bold_italic_θしーた start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ) bold_X + bold_H start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ( bold_italic_θしーた start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ) bold_N + bold_Z start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT , (19)

and

Ie(𝐘e;𝜽e|𝐗)=Ie(𝐘r;𝐇e|𝐗)=h(𝐘e|𝐗)h(𝐘e|𝐇e,𝐗),subscript𝐼𝑒subscript𝐘𝑒conditionalsubscript𝜽𝑒𝐗subscript𝐼𝑒subscript𝐘𝑟conditionalsubscript𝐇𝑒𝐗conditionalsubscript𝐘𝑒𝐗conditionalsubscript𝐘𝑒subscript𝐇𝑒𝐗\displaystyle~{}I_{e}(\mathbf{Y}_{e};\bm{\theta}_{e}|\mathbf{X})=I_{e}(\mathbf% {Y}_{r};\mathbf{H}_{e}|\mathbf{X})=h(\mathbf{Y}_{e}|\mathbf{X})-h(\mathbf{Y}_{% e}|\mathbf{H}_{e},\mathbf{X}),italic_I start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ( bold_Y start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ; bold_italic_θしーた start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT | bold_X ) = italic_I start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ( bold_Y start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ; bold_H start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT | bold_X ) = italic_h ( bold_Y start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT | bold_X ) - italic_h ( bold_Y start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT | bold_H start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT , bold_X ) , (20)

respectively. Then, we have

h(𝐘e|𝐇e,𝐗)conditionalsubscript𝐘𝑒subscript𝐇𝑒𝐗\displaystyle h(\mathbf{Y}_{e}|\mathbf{H}_{e},\mathbf{X})italic_h ( bold_Y start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT | bold_H start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT , bold_X )
=\displaystyle== 𝒳,𝒴,f(𝐗,𝐘,𝐇)logf(𝐘|𝐗,𝐇)𝑑𝐗𝑑𝐘𝑑𝐇subscript𝒳𝒴𝑓𝐗𝐘𝐇𝑓conditional𝐘𝐗𝐇differential-d𝐗differential-d𝐘differential-d𝐇\displaystyle-\int_{\mathcal{X,Y,H}}f(\mathbf{X},\mathbf{Y},\mathbf{H})\log f(% \mathbf{Y}|\mathbf{X},\mathbf{H})d\mathbf{X}d\mathbf{Y}d\mathbf{H}- ∫ start_POSTSUBSCRIPT caligraphic_X , caligraphic_Y , caligraphic_H end_POSTSUBSCRIPT italic_f ( bold_X , bold_Y , bold_H ) roman_log italic_f ( bold_Y | bold_X , bold_H ) italic_d bold_X italic_d bold_Y italic_d bold_H
=\displaystyle== 𝒳,f(𝐗,𝐇)𝒴f(𝐘|𝐗,𝐇)logf(𝐘|𝐗,𝐇)𝑑𝐘𝑑𝐗𝑑𝐇subscript𝒳𝑓𝐗𝐇subscript𝒴𝑓conditional𝐘𝐗𝐇𝑓conditional𝐘𝐗𝐇differential-d𝐘differential-d𝐗differential-d𝐇\displaystyle-\int_{\mathcal{X,H}}f(\mathbf{X},\mathbf{H})\int_{\mathcal{Y}}f(% \mathbf{Y}|\mathbf{X},\mathbf{H})\log f(\mathbf{Y}|\mathbf{X},\mathbf{H})d% \mathbf{Y}d\mathbf{X}d\mathbf{H}- ∫ start_POSTSUBSCRIPT caligraphic_X , caligraphic_H end_POSTSUBSCRIPT italic_f ( bold_X , bold_H ) ∫ start_POSTSUBSCRIPT caligraphic_Y end_POSTSUBSCRIPT italic_f ( bold_Y | bold_X , bold_H ) roman_log italic_f ( bold_Y | bold_X , bold_H ) italic_d bold_Y italic_d bold_X italic_d bold_H
=\displaystyle== 𝒳,f(𝐗,𝐇)log((2πぱいe)ndet(L(𝐑𝐍𝐈Ne)𝐡e𝐡eH+σしぐまe2𝐈))𝑑𝐗𝑑𝐇subscript𝒳𝑓𝐗𝐇superscript2𝜋𝑒𝑛𝐿tensor-productsuperscriptsubscript𝐑𝐍subscript𝐈subscript𝑁𝑒subscript𝐡𝑒superscriptsubscript𝐡𝑒𝐻superscriptsubscript𝜎𝑒2𝐈differential-d𝐗differential-d𝐇\displaystyle\!\!\int_{\mathcal{X,H}}\!\!\!\!\!\!\!\!f(\mathbf{X},\mathbf{H})% \log\left(\left(2\pi e\right)^{n}\!\!\det\left(L(\mathbf{R}_{\mathbf{N}}^{\ast% }\!\!\otimes\!\mathbf{I}_{N_{e}}\!\!)\mathbf{h}_{e}\mathbf{h}_{e}^{H}\!\!+\!\!% \sigma_{e}^{2}\mathbf{I}\right)\right)\!\!d\mathbf{X}d\mathbf{H}∫ start_POSTSUBSCRIPT caligraphic_X , caligraphic_H end_POSTSUBSCRIPT italic_f ( bold_X , bold_H ) roman_log ( ( 2 italic_πぱい italic_e ) start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT roman_det ( italic_L ( bold_R start_POSTSUBSCRIPT bold_N end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ⊗ bold_I start_POSTSUBSCRIPT italic_N start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUBSCRIPT ) bold_h start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT bold_h start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT + italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT bold_I ) ) italic_d bold_X italic_d bold_H
\displaystyle\approx 1Jj=1Jlogdet(2πぱいeL(𝐑𝐍𝐈Ne)𝐡e,j𝐡e,jH+σしぐまe2𝐈),1𝐽superscriptsubscript𝑗1𝐽2𝜋𝑒𝐿tensor-productsuperscriptsubscript𝐑𝐍subscript𝐈subscript𝑁𝑒subscript𝐡𝑒𝑗superscriptsubscript𝐡𝑒𝑗𝐻superscriptsubscript𝜎𝑒2𝐈\displaystyle\frac{1}{J}\sum_{j=1}^{J}\log\det\left(2\pi eL(\mathbf{R}_{% \mathbf{N}}^{\ast}\otimes\mathbf{I}_{N_{e}})\mathbf{h}_{e,j}\mathbf{h}_{e,j}^{% H}+\sigma_{e}^{2}\mathbf{I}\right),divide start_ARG 1 end_ARG start_ARG italic_J end_ARG ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_J end_POSTSUPERSCRIPT roman_log roman_det ( 2 italic_πぱい italic_e italic_L ( bold_R start_POSTSUBSCRIPT bold_N end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ⊗ bold_I start_POSTSUBSCRIPT italic_N start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUBSCRIPT ) bold_h start_POSTSUBSCRIPT italic_e , italic_j end_POSTSUBSCRIPT bold_h start_POSTSUBSCRIPT italic_e , italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT + italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT bold_I ) ,
=\displaystyle== 1Jj=1Jlogdet(2πぱいeL𝐊(𝐈Ne𝐑𝐍)𝐊T𝐡e,j𝐡e,jH+σしぐまe2𝐈)1𝐽superscriptsubscript𝑗1𝐽2𝜋𝑒𝐿𝐊tensor-productsubscript𝐈subscript𝑁𝑒superscriptsubscript𝐑𝐍superscript𝐊𝑇subscript𝐡𝑒𝑗superscriptsubscript𝐡𝑒𝑗𝐻superscriptsubscript𝜎𝑒2𝐈\displaystyle\frac{1}{J}\sum_{j=1}^{J}\log\det\left(2\pi eL\mathbf{K}(\mathbf{% I}_{N_{e}}\otimes\mathbf{R}_{\mathbf{N}}^{\ast})\mathbf{K}^{T}\mathbf{h}_{e,j}% \mathbf{h}_{e,j}^{H}+\sigma_{e}^{2}\mathbf{I}\right)divide start_ARG 1 end_ARG start_ARG italic_J end_ARG ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_J end_POSTSUPERSCRIPT roman_log roman_det ( 2 italic_πぱい italic_e italic_L bold_K ( bold_I start_POSTSUBSCRIPT italic_N start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUBSCRIPT ⊗ bold_R start_POSTSUBSCRIPT bold_N end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ) bold_K start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT bold_h start_POSTSUBSCRIPT italic_e , italic_j end_POSTSUBSCRIPT bold_h start_POSTSUBSCRIPT italic_e , italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT + italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT bold_I ) (21)

where 𝐡e,j(𝜽)subscript𝐡𝑒𝑗𝜽\mathbf{h}_{e,j}(\bm{\theta})bold_h start_POSTSUBSCRIPT italic_e , italic_j end_POSTSUBSCRIPT ( bold_italic_θしーた ) is the j𝑗jitalic_j-th sample of the random variable 𝐡e(𝜽)subscript𝐡𝑒𝜽\mathbf{h}_{e}(\bm{\theta})bold_h start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ( bold_italic_θしーた ). However, it’s still difficult to derive the exact expression of h(𝐘e|𝐗)conditionalsubscript𝐘𝑒𝐗h(\mathbf{Y}_{e}|\mathbf{X})italic_h ( bold_Y start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT | bold_X ) due to the additive non-Gaussian noise of 𝐇e(𝜽e)𝐍subscript𝐇𝑒subscript𝜽𝑒𝐍\mathbf{H}_{e}(\bm{\theta}_{e})\mathbf{N}bold_H start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ( bold_italic_θしーた start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ) bold_N. To deal with this, we can give the upper bound of h(𝐘e|𝐗)conditionalsubscript𝐘𝑒𝐗h(\mathbf{Y}_{e}|\mathbf{X})italic_h ( bold_Y start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT | bold_X ) as

h(𝐘e|𝐗)=logdet(2πぱいe(σしぐまe2𝐈+𝐑HN)),conditionalsubscript𝐘𝑒𝐗2𝜋𝑒superscriptsubscript𝜎𝑒2𝐈subscript𝐑𝐻𝑁\displaystyle h(\mathbf{Y}_{e}|\mathbf{X})=\log\det\left(2\pi e\left(\sigma_{e% }^{2}\mathbf{I}+\mathbf{R}_{HN}\right)\right),italic_h ( bold_Y start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT | bold_X ) = roman_log roman_det ( 2 italic_πぱい italic_e ( italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT bold_I + bold_R start_POSTSUBSCRIPT italic_H italic_N end_POSTSUBSCRIPT ) ) , (22)

where 𝐑HNsubscript𝐑𝐻𝑁\mathbf{R}_{HN}bold_R start_POSTSUBSCRIPT italic_H italic_N end_POSTSUBSCRIPT denotes the covariance of vec(𝐇𝐍)vec𝐇𝐍\mathrm{vec}(\mathbf{HN})roman_vec ( bold_HN ), given as

𝐑HNsubscript𝐑𝐻𝑁\displaystyle\mathbf{R}_{HN}\!\!bold_R start_POSTSUBSCRIPT italic_H italic_N end_POSTSUBSCRIPT =𝔼𝐇,𝐍[(𝐈L𝐇e)vec(𝐍)(vec(𝐍))H(𝐈L𝐇e)H]absentsubscript𝔼𝐇𝐍delimited-[]tensor-productsubscript𝐈𝐿subscript𝐇𝑒vec𝐍superscriptvec𝐍𝐻superscripttensor-productsubscript𝐈𝐿subscript𝐇𝑒𝐻\displaystyle=\mathbb{E}_{\mathbf{H},\mathbf{N}}\left[\left(\mathbf{I}_{L}% \otimes\mathbf{H}_{e}\right)\mathrm{vec}(\mathbf{N})\left(\mathrm{vec}(\mathbf% {N})\right)^{H}\left(\mathbf{I}_{L}\otimes\mathbf{H}_{e}\right)^{H}\right]= blackboard_E start_POSTSUBSCRIPT bold_H , bold_N end_POSTSUBSCRIPT [ ( bold_I start_POSTSUBSCRIPT italic_L end_POSTSUBSCRIPT ⊗ bold_H start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ) roman_vec ( bold_N ) ( roman_vec ( bold_N ) ) start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ( bold_I start_POSTSUBSCRIPT italic_L end_POSTSUBSCRIPT ⊗ bold_H start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ]
=𝔼𝐇[(𝐈L𝐇e)𝔼𝐇[vec(𝐍)(vec(𝐍))H](𝐈L𝐇e)H]absentsubscript𝔼𝐇delimited-[]tensor-productsubscript𝐈𝐿subscript𝐇𝑒subscript𝔼𝐇delimited-[]vec𝐍superscriptvec𝐍𝐻superscripttensor-productsubscript𝐈𝐿subscript𝐇𝑒𝐻\displaystyle=\mathbb{E}_{\mathbf{H}}\!\!\left[\left(\mathbf{I}_{L}\otimes% \mathbf{H}_{e}\right)\mathbb{E}_{\mathbf{H}}\!\!\left[\mathrm{vec}(\mathbf{N})% \left(\mathrm{vec}(\mathbf{N})\right)^{H}\right]\!\!\left(\mathbf{I}_{L}% \otimes\mathbf{H}_{e}\right)^{H}\right]= blackboard_E start_POSTSUBSCRIPT bold_H end_POSTSUBSCRIPT [ ( bold_I start_POSTSUBSCRIPT italic_L end_POSTSUBSCRIPT ⊗ bold_H start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ) blackboard_E start_POSTSUBSCRIPT bold_H end_POSTSUBSCRIPT [ roman_vec ( bold_N ) ( roman_vec ( bold_N ) ) start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ] ( bold_I start_POSTSUBSCRIPT italic_L end_POSTSUBSCRIPT ⊗ bold_H start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ]
=𝔼𝐇[(𝐈L𝐇e)(𝐈L𝐑𝐍)(𝐈L𝐇e)H]absentsubscript𝔼𝐇delimited-[]tensor-productsubscript𝐈𝐿subscript𝐇𝑒tensor-productsubscript𝐈𝐿subscript𝐑𝐍superscripttensor-productsubscript𝐈𝐿subscript𝐇𝑒𝐻\displaystyle=\mathbb{E}_{\mathbf{H}}\left[\left(\mathbf{I}_{L}\otimes\mathbf{% H}_{e}\right)\left(\mathbf{I}_{L}\otimes\mathbf{R}_{\mathbf{N}}\right)\left(% \mathbf{I}_{L}\otimes\mathbf{H}_{e}\right)^{H}\right]= blackboard_E start_POSTSUBSCRIPT bold_H end_POSTSUBSCRIPT [ ( bold_I start_POSTSUBSCRIPT italic_L end_POSTSUBSCRIPT ⊗ bold_H start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ) ( bold_I start_POSTSUBSCRIPT italic_L end_POSTSUBSCRIPT ⊗ bold_R start_POSTSUBSCRIPT bold_N end_POSTSUBSCRIPT ) ( bold_I start_POSTSUBSCRIPT italic_L end_POSTSUBSCRIPT ⊗ bold_H start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ]
1Jj=1J(𝐈L𝐇e,j)(𝐈L𝐑𝐍)(𝐈L𝐇e,j)Habsent1𝐽superscriptsubscript𝑗1𝐽tensor-productsubscript𝐈𝐿subscript𝐇𝑒𝑗tensor-productsubscript𝐈𝐿subscript𝐑𝐍superscripttensor-productsubscript𝐈𝐿subscript𝐇𝑒𝑗𝐻\displaystyle\approx\frac{1}{J}\sum_{j=1}^{J}\left(\mathbf{I}_{L}\otimes% \mathbf{H}_{e,j}\right)\left(\mathbf{I}_{L}\otimes\mathbf{R}_{\mathbf{N}}% \right)\left(\mathbf{I}_{L}\otimes\mathbf{H}_{e,j}\right)^{H}≈ divide start_ARG 1 end_ARG start_ARG italic_J end_ARG ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_J end_POSTSUPERSCRIPT ( bold_I start_POSTSUBSCRIPT italic_L end_POSTSUBSCRIPT ⊗ bold_H start_POSTSUBSCRIPT italic_e , italic_j end_POSTSUBSCRIPT ) ( bold_I start_POSTSUBSCRIPT italic_L end_POSTSUBSCRIPT ⊗ bold_R start_POSTSUBSCRIPT bold_N end_POSTSUBSCRIPT ) ( bold_I start_POSTSUBSCRIPT italic_L end_POSTSUBSCRIPT ⊗ bold_H start_POSTSUBSCRIPT italic_e , italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT (23)

Combining with (21), we give the approximate upper bound of Iesubscript𝐼𝑒I_{e}italic_I start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT as

I¯e=subscript¯𝐼𝑒absent\displaystyle\bar{I}_{e}=over¯ start_ARG italic_I end_ARG start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT = logdet(σしぐまe2𝐈+1Jj=1J(𝐈L𝐇e,j)(𝐈L𝐑𝐍)(𝐈L𝐇e,j)H)superscriptsubscript𝜎𝑒2𝐈1𝐽superscriptsubscript𝑗1𝐽tensor-productsubscript𝐈𝐿subscript𝐇𝑒𝑗tensor-productsubscript𝐈𝐿subscript𝐑𝐍superscripttensor-productsubscript𝐈𝐿subscript𝐇𝑒𝑗𝐻\displaystyle\log\!\det\!\!\left(\!\!\sigma_{e}^{2}\mathbf{I}\!\!+\!\!\frac{1}% {J}\sum_{j=1}^{J}\left(\mathbf{I}_{L}\otimes\mathbf{H}_{e,j}\right)\left(% \mathbf{I}_{L}\otimes\mathbf{R}_{\mathbf{N}}\right)\left(\mathbf{I}_{L}\otimes% \mathbf{H}_{e,j}\right)^{H}\!\!\right)roman_log roman_det ( italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT bold_I + divide start_ARG 1 end_ARG start_ARG italic_J end_ARG ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_J end_POSTSUPERSCRIPT ( bold_I start_POSTSUBSCRIPT italic_L end_POSTSUBSCRIPT ⊗ bold_H start_POSTSUBSCRIPT italic_e , italic_j end_POSTSUBSCRIPT ) ( bold_I start_POSTSUBSCRIPT italic_L end_POSTSUBSCRIPT ⊗ bold_R start_POSTSUBSCRIPT bold_N end_POSTSUBSCRIPT ) ( bold_I start_POSTSUBSCRIPT italic_L end_POSTSUBSCRIPT ⊗ bold_H start_POSTSUBSCRIPT italic_e , italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT )
1Jj=1Jlogdet(L𝐊(𝐈Ne𝐑𝐍)𝐊T𝐡e,j𝐡e,jH+σしぐまe2𝐈).1𝐽superscriptsubscript𝑗1𝐽𝐿𝐊tensor-productsubscript𝐈subscript𝑁𝑒superscriptsubscript𝐑𝐍superscript𝐊𝑇subscript𝐡𝑒𝑗superscriptsubscript𝐡𝑒𝑗𝐻superscriptsubscript𝜎𝑒2𝐈\displaystyle-\frac{1}{J}\sum_{j=1}^{J}\log\det\left(L\mathbf{K}(\mathbf{I}_{N% _{e}}\otimes\mathbf{R}_{\mathbf{N}}^{\ast})\mathbf{K}^{T}\mathbf{h}_{e,j}% \mathbf{h}_{e,j}^{H}+\sigma_{e}^{2}\mathbf{I}\right).- divide start_ARG 1 end_ARG start_ARG italic_J end_ARG ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_J end_POSTSUPERSCRIPT roman_log roman_det ( italic_L bold_K ( bold_I start_POSTSUBSCRIPT italic_N start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUBSCRIPT ⊗ bold_R start_POSTSUBSCRIPT bold_N end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ) bold_K start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT bold_h start_POSTSUBSCRIPT italic_e , italic_j end_POSTSUBSCRIPT bold_h start_POSTSUBSCRIPT italic_e , italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT + italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT bold_I ) .

Then, the problem of sensing security with AN can be formulated as

max{𝐖k}k=1K,𝐑𝐍Ir(𝐘r;𝜽r|𝐗,𝐍)subscriptsuperscriptsubscriptsubscript𝐖𝑘𝑘1𝐾subscript𝐑𝐍subscript𝐼𝑟subscript𝐘𝑟conditionalsubscript𝜽𝑟𝐗𝐍\displaystyle\max_{\left\{\mathbf{W}_{k}\right\}_{k=1}^{K},\mathbf{R}_{\mathbf% {N}}}I_{r}(\mathbf{Y}_{r};\bm{\theta}_{r}|\mathbf{X},\mathbf{N})roman_max start_POSTSUBSCRIPT { bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT , bold_R start_POSTSUBSCRIPT bold_N end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_I start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ( bold_Y start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT ; bold_italic_θしーた start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT | bold_X , bold_N ) (24a)
s.t.formulae-sequencest\displaystyle\mathrm{s.t.}~{}roman_s . roman_t . I¯eϵ,subscript¯𝐼𝑒italic-ϵ\displaystyle\bar{I}_{e}\leq\epsilon,over¯ start_ARG italic_I end_ARG start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ≤ italic_ϵ , (24b)
tr(𝐡k𝐖k𝐡kH)k=1,kiKtr(𝐡k𝐖i𝐡kH)+𝐡k𝐑𝐍𝐡kH+σしぐまc2γがんまk,k,trsubscript𝐡𝑘subscript𝐖𝑘superscriptsubscript𝐡𝑘𝐻superscriptsubscriptformulae-sequence𝑘1𝑘𝑖𝐾trsubscript𝐡𝑘subscript𝐖𝑖superscriptsubscript𝐡𝑘𝐻subscript𝐡𝑘subscript𝐑𝐍superscriptsubscript𝐡𝑘𝐻superscriptsubscript𝜎𝑐2subscript𝛾𝑘for-all𝑘\displaystyle\frac{\text{tr}\left(\mathbf{h}_{k}\mathbf{W}_{k}\mathbf{h}_{k}^{% H}\right)}{\sum\nolimits_{k=1,k\neq i}^{K}\text{tr}\left(\mathbf{h}_{k}\mathbf% {W}_{i}\mathbf{h}_{k}^{H}\right)+\mathbf{h}_{k}\mathbf{R}_{\mathbf{N}}\mathbf{% h}_{k}^{H}+\sigma_{c}^{2}}\geq\gamma_{k},\forall k,divide start_ARG tr ( bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ) end_ARG start_ARG ∑ start_POSTSUBSCRIPT italic_k = 1 , italic_k ≠ italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT tr ( bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_W start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ) + bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT bold_R start_POSTSUBSCRIPT bold_N end_POSTSUBSCRIPT bold_h start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT + italic_σしぐま start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG ≥ italic_γがんま start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , ∀ italic_k , (24c)
tr(k=1K𝐖k+𝐑𝐍)P0,trsuperscriptsubscript𝑘1𝐾subscript𝐖𝑘subscript𝐑𝐍subscript𝑃0\displaystyle\text{tr}\left(\sum_{k=1}^{K}\mathbf{W}_{k}+\mathbf{R}_{\mathbf{N% }}\right)\leq P_{0},tr ( ∑ start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT + bold_R start_POSTSUBSCRIPT bold_N end_POSTSUBSCRIPT ) ≤ italic_P start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT , (24d)
(11e).italic-(11eitalic-)\displaystyle\eqref{eq:p1e}.italic_( italic_) .

As previously discussed, the formulated problem is not convex due to the nonconvexity of (24b). Hence, we introduce an auxiliary matrix 𝐐𝐐\mathbf{Q}bold_Q and reformulate (24b) based on the Taylor expansion at 𝐐~~𝐐\tilde{\mathbf{Q}}over~ start_ARG bold_Q end_ARG as

logdet(𝐐~)+tr(𝐐~(𝐐𝐐~))~𝐐tr~𝐐𝐐~𝐐\displaystyle\log\det(\tilde{\mathbf{Q}})+\mathrm{tr}(\tilde{\mathbf{Q}}(% \mathbf{Q}-\tilde{\mathbf{Q}}))roman_log roman_det ( over~ start_ARG bold_Q end_ARG ) + roman_tr ( over~ start_ARG bold_Q end_ARG ( bold_Q - over~ start_ARG bold_Q end_ARG ) ) (25a)
1Jj=1Jlogdet(L𝐊(𝐈Ne𝐑𝐍)𝐊T𝐡e,j𝐡e,jH+σしぐまe2𝐈)ϵ,1𝐽superscriptsubscript𝑗1𝐽𝐿𝐊tensor-productsubscript𝐈subscript𝑁𝑒superscriptsubscript𝐑𝐍superscript𝐊𝑇subscript𝐡𝑒𝑗superscriptsubscript𝐡𝑒𝑗𝐻superscriptsubscript𝜎𝑒2𝐈italic-ϵ\displaystyle-\frac{1}{J}\sum_{j=1}^{J}\log\det\left(L\mathbf{K}(\mathbf{I}_{N% _{e}}\otimes\mathbf{R}_{\mathbf{N}}^{\ast})\mathbf{K}^{T}\mathbf{h}_{e,j}% \mathbf{h}_{e,j}^{H}+\sigma_{e}^{2}\mathbf{I}\right)\leq\epsilon,- divide start_ARG 1 end_ARG start_ARG italic_J end_ARG ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_J end_POSTSUPERSCRIPT roman_log roman_det ( italic_L bold_K ( bold_I start_POSTSUBSCRIPT italic_N start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUBSCRIPT ⊗ bold_R start_POSTSUBSCRIPT bold_N end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ) bold_K start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT bold_h start_POSTSUBSCRIPT italic_e , italic_j end_POSTSUBSCRIPT bold_h start_POSTSUBSCRIPT italic_e , italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT + italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT bold_I ) ≤ italic_ϵ ,
𝐐(σしぐまe2𝐈+1Jj=1J(𝐈L𝐇e,j)(𝐈L𝐑𝐍)(𝐈L𝐇e,j)H)0.succeeds-or-equals𝐐superscriptsubscript𝜎𝑒2𝐈1𝐽superscriptsubscript𝑗1𝐽tensor-productsubscript𝐈𝐿subscript𝐇𝑒𝑗tensor-productsubscript𝐈𝐿subscript𝐑𝐍superscripttensor-productsubscript𝐈𝐿subscript𝐇𝑒𝑗𝐻0\displaystyle\mathbf{Q}\!-\!\left(\!\sigma_{e}^{2}\mathbf{I}\!\!+\!\!\frac{1}{% J}\sum_{j=1}^{J}\left(\mathbf{I}_{L}\otimes\mathbf{H}_{e,j}\right)\left(% \mathbf{I}_{L}\otimes\mathbf{R}_{\mathbf{N}}\right)\left(\mathbf{I}_{L}\otimes% \mathbf{H}_{e,j}\right)^{H}\!\right)\!\succeq\!0.bold_Q - ( italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT bold_I + divide start_ARG 1 end_ARG start_ARG italic_J end_ARG ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_J end_POSTSUPERSCRIPT ( bold_I start_POSTSUBSCRIPT italic_L end_POSTSUBSCRIPT ⊗ bold_H start_POSTSUBSCRIPT italic_e , italic_j end_POSTSUBSCRIPT ) ( bold_I start_POSTSUBSCRIPT italic_L end_POSTSUBSCRIPT ⊗ bold_R start_POSTSUBSCRIPT bold_N end_POSTSUBSCRIPT ) ( bold_I start_POSTSUBSCRIPT italic_L end_POSTSUBSCRIPT ⊗ bold_H start_POSTSUBSCRIPT italic_e , italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ) ⪰ 0 . (25b)

Therefore, a convex approximation of problem (IV) is reformulated as

max{𝐰k,𝐖k}k=1K,𝐑𝐍Irsubscriptsuperscriptsubscriptsubscript𝐰𝑘subscript𝐖𝑘𝑘1𝐾subscript𝐑𝐍subscript𝐼𝑟\displaystyle\max_{\left\{\mathbf{w}_{k},\mathbf{W}_{k}\right\}_{k=1}^{K},% \mathbf{R}_{\mathbf{N}}}I_{r}roman_max start_POSTSUBSCRIPT { bold_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , bold_W start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } start_POSTSUBSCRIPT italic_k = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_K end_POSTSUPERSCRIPT , bold_R start_POSTSUBSCRIPT bold_N end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_I start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT (26a)
s.t.formulae-sequencest\displaystyle\mathrm{s.t.}~{}roman_s . roman_t . (13c),(14),(15d),(24c),(24d),(25a),(25b),italic-(13citalic-)italic-(14italic-)italic-(15ditalic-)italic-(24citalic-)italic-(24ditalic-)italic-(25aitalic-)italic-(25bitalic-)\displaystyle\eqref{eq:rank1a},\eqref{eq:rank1bconvex},\eqref{eq:p1-2c},\eqref% {eq:p2sinr},\eqref{eq:p2d},\eqref{eq:ie1},\eqref{eq:ie2},italic_( italic_) , italic_( italic_) , italic_( italic_) , italic_( italic_) , italic_( italic_) , italic_( italic_) , italic_( italic_) , (26b)

which can be solved in a similar iterative manner as in Algorithm 1.

V Simulation Results

In this section, we provide numerical analysis to evaluate the performance of the proposed algorithms, including secure sensing de without AN and MI gap maximization with AN. We consider a dual-functional BS transceiver equipped with Ntsubscript𝑁𝑡N_{t}italic_N start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT = 6 transmit antennas for MIMO radar sensing and multi-user communication, serving K=3𝐾3K=3italic_K = 3 CUs where one of the CU serves as the sensing Eve. The legitimate radar receiver is equipped with Nr=2subscript𝑁𝑟2N_{r}=2italic_N start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT = 2 receive antennas. Unless stated otherwise, the available power budget Pmax=30subscript𝑃max30P_{\text{max}}=30italic_P start_POSTSUBSCRIPT max end_POSTSUBSCRIPT = 30 dBm and the frame length L=30𝐿30L=30italic_L = 30. We adopt the widely-used multi-user broadcasting beamforming design [10, Sec. 7.6.1] as the baseline.

Fig. 2 firstly demonstrates the convergence behavior of the proposed method without the aid of AN, under different power budgets and numbers of users. It can be seen that all three cases converge after 3 iterations, which verifies the fast convergence rate and the efficiency of our proposed alternating algorithm. With increasing P0subscript𝑃0P_{0}italic_P start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT, the MI increases, since more power budget can be utilized to sense the target and satisfy the SINR constraints of multiple users. Moreover, increasing the number of CUs leads to a slight reduction in the sensing performance.

Fig. 3 compares the MI performance with different transmitted power budgets, compared with the baseline scheme. It can be seen that the gap between Irsubscript𝐼𝑟I_{r}italic_I start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT and Iesubscript𝐼𝑒I_{e}italic_I start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT of the proposed algorithms is always larger than that of the baseline scheme, and over 2 times higher with the increase of transmit power budget. Moreover, it can be observed that the use of AN further improves the sensing MI of the legitimate receiver and enlarges the MI gap.

Refer to caption
Figure 2: MI of the legitimate receiver versus the number of iterations. The limitation of Eve’s MI is ϵ=5italic-ϵ5\epsilon=5italic_ϵ = 5 nats and SINR threshold is γがんまk=20subscript𝛾𝑘20\gamma_{k}=20italic_γがんま start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = 20 dB.
Refer to caption
Figure 3: MI versus the transmit power budget, in both with and without AN-aided case, compared with the baseline. The limitation of the MI of the Eve is set as ϵ=5italic-ϵ5\epsilon=5italic_ϵ = 5 nats and the SINR threshold is γがんまk=28dBsubscript𝛾𝑘28𝑑𝐵\gamma_{k}=28dBでしべるitalic_γがんま start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = 28 italic_d italic_B.

VI Conclusion

This paper addressed the sensing security issue for ISAC systems by beamforming design. The MI of radar sensing between the legitimate receiver was maximized while taking into account the MI of the potential Eve, power budget, and SINR constraints. Additionally, we adopted AN to further guarantee secure sensing. Simulation results demonstrated the effectiveness of the proposed methods in achieving a superior MI compared to the baseline scheme, with the AN further contributing to sensing security.

Appendix A

Here, we provide the proof for the MI approximation for the Eve in (10) based on a Taylor series expansion. First, defining f(𝐑𝐗)=logdet(𝐈+σしぐまe2T𝚲ei=1Nr𝐐i𝐑𝐗𝐐iH)𝑓subscript𝐑𝐗𝐈superscriptsubscript𝜎𝑒2𝑇subscript𝚲𝑒superscriptsubscript𝑖1subscript𝑁𝑟subscript𝐐𝑖superscriptsubscript𝐑𝐗superscriptsubscript𝐐𝑖𝐻f(\mathbf{R}_{\mathbf{X}})=\log\det(\mathbf{I}+\sigma_{e}^{-2}T\mathbf{\Lambda% }_{e}\sum_{i=1}^{N_{r}}\mathbf{Q}_{i}\mathbf{R}_{\mathbf{X}}^{\ast}\mathbf{Q}_% {i}^{H})italic_f ( bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) = roman_log roman_det ( bold_I + italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT italic_T bold_Λらむだ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_r end_POSTSUBSCRIPT end_POSTSUPERSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ) ,we have the Jacobian matrix of f(𝐑𝐗)𝑓subscript𝐑𝐗f(\mathbf{R}_{\mathbf{X}})italic_f ( bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) expressed as

D𝐑𝐗f(𝐑𝐗)=σしぐまe2Ti=1Ne𝐐iH𝐌1𝚲e𝐐i.subscriptDsuperscriptsubscript𝐑𝐗𝑓subscript𝐑𝐗superscriptsubscript𝜎𝑒2𝑇superscriptsubscript𝑖1subscript𝑁𝑒superscriptsubscript𝐐𝑖𝐻superscript𝐌1subscript𝚲𝑒subscript𝐐𝑖\displaystyle\mathrm{D}_{\mathbf{R}_{\mathbf{X}}^{\ast}}f(\mathbf{R_{X}})=% \sigma_{e}^{-2}T\sum_{i=1}^{N_{e}}\mathbf{Q}_{i}^{H}\mathbf{M}^{-1}\mathbf{% \Lambda}_{e}\mathbf{Q}_{i}.roman_D start_POSTSUBSCRIPT bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT italic_f ( bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) = italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT italic_T ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUPERSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT bold_M start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT bold_Λらむだ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT . (27)

Following [10, Sec. 1.1.11] and [8, Sec. 3.1], the gradient of f(𝐑𝐗)𝑓subscript𝐑𝐗f(\mathbf{R_{X}})italic_f ( bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) can be given as

𝐑𝐗f(𝐑𝐗)subscriptsubscript𝐑𝐗𝑓subscript𝐑𝐗\displaystyle\nabla_{\mathbf{R_{X}}}f(\mathbf{R_{X}})∇ start_POSTSUBSCRIPT bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_f ( bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) =2𝐑𝐗f(𝐑𝐗)=2σしぐまe2Ti=1Ne𝐐iT𝚲e(𝐌1)T𝐐i,absent2subscriptsubscriptsuperscript𝐑𝐗𝑓subscript𝐑𝐗2superscriptsubscript𝜎𝑒2𝑇superscriptsubscript𝑖1subscript𝑁𝑒superscriptsubscript𝐐𝑖𝑇subscript𝚲𝑒superscriptsuperscript𝐌1𝑇superscriptsubscript𝐐𝑖\displaystyle=2\nabla_{\mathbf{R^{\ast}_{X}}}f(\mathbf{R_{X}})=2\sigma_{e}^{-2% }T\sum_{i=1}^{N_{e}}\mathbf{Q}_{i}^{T}\mathbf{\Lambda}_{e}(\mathbf{M}^{-1})^{T% }\mathbf{Q}_{i}^{\ast},= 2 ∇ start_POSTSUBSCRIPT bold_R start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_f ( bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) = 2 italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT italic_T ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUPERSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT bold_Λらむだ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ( bold_M start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT , (28)

Then, an affine Taylor series approximation of f(𝐑𝐗)𝑓subscript𝐑𝐗f(\mathbf{R_{X}})italic_f ( bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) at 𝐑𝐗=𝐑~𝐗subscript𝐑𝐗subscript~𝐑𝐗\mathbf{R_{X}}=\tilde{\mathbf{R}}_{\mathbf{X}}bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT = over~ start_ARG bold_R end_ARG start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT can be written as

f(𝐑𝐗)f(𝐑~𝐗)+tr(Re(f(𝐑~𝐗)H(𝐑𝐗𝐑~𝐗)))similar-to-or-equals𝑓subscript𝐑𝐗𝑓subscript~𝐑𝐗trRe𝑓superscriptsubscript~𝐑𝐗𝐻subscript𝐑𝐗subscript~𝐑𝐗\displaystyle f(\mathbf{R_{X}})\simeq f(\tilde{\mathbf{R}}_{\mathbf{X}})+% \mathrm{tr}\left(\mathrm{Re}\left(\nabla f(\tilde{\mathbf{R}}_{\mathbf{X}})^{H% }\left(\mathbf{R_{X}}-\tilde{\mathbf{R}}_{\mathbf{X}}\right)\right)\right)italic_f ( bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) ≃ italic_f ( over~ start_ARG bold_R end_ARG start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) + roman_tr ( roman_Re ( ∇ italic_f ( over~ start_ARG bold_R end_ARG start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT italic_H end_POSTSUPERSCRIPT ( bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT - over~ start_ARG bold_R end_ARG start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) ) )
=\displaystyle== f(𝐑~𝐗)+tr(Re(2σしぐまe2Ti=1Ne𝐐iT(𝐌1)𝚲e𝐐i𝐑𝐗))𝑓subscript~𝐑𝐗trRe2superscriptsubscript𝜎𝑒2𝑇superscriptsubscript𝑖1subscript𝑁𝑒superscriptsubscript𝐐𝑖𝑇superscriptsuperscript𝐌1subscript𝚲𝑒superscriptsubscript𝐐𝑖subscript𝐑𝐗\displaystyle f(\tilde{\mathbf{R}}_{\mathbf{X}})+\mathrm{tr}\left(\mathrm{Re}% \left(2\sigma_{e}^{-2}T\sum_{i=1}^{N_{e}}\mathbf{Q}_{i}^{T}(\mathbf{M}^{-1})^{% \ast}\mathbf{\Lambda}_{e}\mathbf{Q}_{i}^{\ast}\mathbf{R_{X}}\right)\right)italic_f ( over~ start_ARG bold_R end_ARG start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) + roman_tr ( roman_Re ( 2 italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT italic_T ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUPERSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ( bold_M start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT bold_Λらむだ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT bold_R start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) )
tr(Re(2σしぐまe2Ti=1Ne𝐐iT(𝐌1)𝚲e𝐐i𝐑~𝐗))trRe2superscriptsubscript𝜎𝑒2𝑇superscriptsubscript𝑖1subscript𝑁𝑒superscriptsubscript𝐐𝑖𝑇superscriptsuperscript𝐌1subscript𝚲𝑒superscriptsubscript𝐐𝑖subscript~𝐑𝐗\displaystyle-\mathrm{tr}\left(\mathrm{Re}\left(2\sigma_{e}^{-2}T\sum_{i=1}^{N% _{e}}\mathbf{Q}_{i}^{T}(\mathbf{M}^{-1})^{\ast}\mathbf{\Lambda}_{e}\mathbf{Q}_% {i}^{\ast}\tilde{\mathbf{R}}_{\mathbf{X}}\right)\right)- roman_tr ( roman_Re ( 2 italic_σしぐま start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT italic_T ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT end_POSTSUPERSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ( bold_M start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT bold_Λらむだ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT bold_Q start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT over~ start_ARG bold_R end_ARG start_POSTSUBSCRIPT bold_X end_POSTSUBSCRIPT ) ) (29)

References

  • [1] H. Hua, J. Xu, and T. X. Han, “Optimal transmit beamforming for integrated sensing and communication,” IEEE Trans. Veh. Technol., Mar. 2023.
  • [2] F. Liu, Y.-F. Liu, A. Li, C. Masouros, and Y. C. Eldar, “Cramér-Rao bound optimization for joint radar-communication beamforming,” IEEE Trans. Signal Process., vol. 70, pp. 240–253, Dec. 2021.
  • [3] D. Xu, X. Yu, D. W. K. Ng, A. Schmeink, and R. Schober, “Robust and secure resource allocation for ISAC systems: A novel optimization framework for variable-length snapshots,” IEEE Trans. Commun., vol. 70, no. 12, pp. 8196–8214, Dec. 2022.
  • [4] N. Su, F. Liu, and C. Masouros, “Secure radar-communication systems with malicious targets: Integrating radar, communications and jamming functionalities,” IEEE Trans. Wireless Commun., vol. 20, no. 1, pp. 83–95, Jan. 2020.
  • [5] Y. Yang and R. S. Blum, “MIMO radar waveform design based on mutual information and minimum mean-square error estimation,” IEEE Trans. Aerosp. Electron. Syst., vol. 43, no. 1, pp. 330–343, Jan. 2007.
  • [6] M. R. Bell, “Inform