Securing the Sensing Functionality in ISAC Networks: An Artificial Noise Design
Abstract
Integrated sensing and communications (ISAC) systems employ dual-functional signals to simultaneously accomplish radar sensing and wireless communication tasks. However, ISAC systems open up new sensing security vulnerabilities to malicious illegitimate eavesdroppers (Eves) that can also exploit the transmitted waveform to extract sensing information from the environment. In this paper, we investigate the beamforming design to enhance the sensing security of an ISAC system, where the communication user (CU) serves as a sensing Eve. Our objective is to maximize the mutual information (MI) for the legitimate radar sensing receiver while considering the constraint of the MI for the Eve and the quality of service to the CUs. Then, we consider the artificial noise (AN)-aided beamforming to further enhance the sensing security. Simulation results demonstrate that our proposed methods achieve MI improvement of the legitimate receiver while limiting the sensing MI of the Eve, compared with the baseline scheme, and that the utilization of AN further contributes to sensing security.
Index Terms:
Integrated sensing and communications, sensing security, mutual information, artificial noise.I Introduction
Integrated sensing and communications (ISAC) is identified as a key 6G technology that will support various futuristic applications through the co-design of sensing and communication functionalities. In particular, supported by the implementation of the dual-functional waveform and the base stations (BSs), ISAC provides a step change from the spectral coexistence of radar and communication systems to the shared utilization of costly hardware platforms. Inspired by these favorable characteristics, various designs have been proposed for the dual-functional waveforms to promote sensing and communication performance. For example, recent works in [1] minimized the beampattern matching error for radar sensing, and [2] considered the Cramér-Rao bound (CRB) minimization subject to the minimum signal-to-interference-plus-noise ratio (SINR) constraints for each communication user (CU). However, the aforementioned works have overlooked the consideration of security issues, which avail unique vulnerabilities in ISAC systems.
Due to the inherent broadcast nature of wireless signals, it is inevitable that wireless communication/sensing systems are susceptible to potential security threats. Compared with the communication-only systems, ISAC systems encounter more intricate security issues which can be generally categorized into the information security for communication and the sensing security for radar. The former arises from the fact that the probing ISAC waveform is modulated with information, which could potentially be leaked to the sensed targets that can act as eavesdroppers (Eves). To deal with this, physical layer security schemes have been proposed, such as [3] that maximized the secrecy rate by jointly optimizing the beamforming vector, the duration of snapshots, and the covariance matrix of the artificial noise (AN). Besides, the work in [4] optimizes the beamforming and AN design to minimize the signal-to-noise ratio (SNR) at the Eve. In contrast, the sensing security for radar has not been well investigated. In particular, the transmitted waveform could be exploited by the communication user serving as malicious passive sensing Eve s to extract sensing information about targets or their environment, which poses significant challenges and the need to secure the sensing functionality of ISAC networks.
Against this background, our work proposes to address the sensing security issue for ISAC systems, which to the best of our knowledge, has not been investigated in the literature. In particular, we consider a bi-static ISAC scenario, where the users that are granted access only to communication services, can exploit the ISAC signals for illegitimate sensing and therefore take the role of sensing Eves. In this scenario, the legitimate receiver and the Eve conduct sensing with the dual-functional ISAC waveforms. We formulate the problem to maximize the radar mutual information (MI) of the legitimate receiver, subject to MI of the Eve, the minimum SINR constraints for each CU and the maximum transmit power budget. Since the formulated problem is nonconvex, we propose a successive convex approximation (SCA) method combined with semidefinite relaxation (SDR) to deal with the non-convexity. Furthermore, we propose an AN-aided method where we firstly give the derivation of sensing MI with AN and then jointly optimize the beamforming and the covariance of AN. Simulation results demonstrate significant improvement in the sensing MI of our proposed methods compared with the baseline and also reveal that through adding AN to the transmit signals of the BS, the secure sensing performance can be effectively improved.
II System Model
We consider a bistatic multiple-input multiple-output (MIMO) ISAC system, which consists of a central BS transmitting dual-functional signals to a legitimate radar receiver and single-antenna CUs. Simultaneously, a CU serves as an unauthorized sensing Eve who perfectly knows/intercepts the transmitted signals and also wishes to sense the targets/environment. We assume that the transmitter is equipped with a uniform linear array (ULA) of antennas and that the legitimate receiver and the Eve are equipped with and antennas, respectively.
II-A Communication Signal Model and Metrics
Let represent the communication channel vector for the -th use. We assume that the channel follows a slow-fading block Rician fading channel, given as
(1) |
where denotes the Rician factor of the channel between the -th CU and the BS. denotes the deterministic LoS channel component with , where is the angle-of-arrival (AoA) of the line-of-sight (LoS) link from the -th CU to the BS and we assume half-wavelength antenna spacing. represents the random scattered components whose elements follows .
Let us denote the beamforming matrix as , where stands for the beamforming vector of the -th user. Then, the transmitted signal at the -th time slot can be expressed as
(2) |
where includes parallel communication symbol streams to be communicated to users. Without loss of generality, we assume the communication symbols have unit power, i.e., , and the communication channel matrix is perfectly estimated and known at the BS side. Then, we have the SINR at the -th CU as
(3) |
where is the variance of additive white Gaussian noise (AWGN).
II-B Radar Signal Model
We consider a bistatic radar sensing scenario where the transmitted signals are shared between the transmitter and receiver through a control center. Denoting as the transmitted waveform during time slots, the received signal matrix at the legitimate receiver and the Eve can be expressed, respectively, as
(4) |
where and are the noise matrices at the legitimate receiver and the Eve, respectively and each columns of and follow and , respectively. and are the target response matrices from the transmitter to the legitimate receiver and the Eve, respectively, which are determined by the target parameters of interests and . Note that since the legitimate receiver and the Eve may have different sensing interests to estimate different angles and ranges, etc. Aside of , we note that can also be known at the BS by exploiting the knowledge of the Eve’s location which is typical information exchanged with the BS, since the Eve is also a legitimate CU.
To measure the sensing performance at the receivers, we adopt the mutual information between the received radar signal and target response matrix as the performance metric for radar sensing, which has been extensively discussed in the literature [5]. It’s also implied in [6] that the MI characterizes the capability of radar to estimate the parameters describing the target. Following [7], the sensing MI of the legitimate receiver can be given as
(5) |
Vectorizing , we have
(6) |
where , , and [8, Eq. 1.11.20]. Following the assumptions are also used in [5], we assume the target response vector is zero-mean circular-symmetric Gaussian distributed with covariance . As the transmitted waveform is perfectly known, the MI between and at the legitimate receiver can be expressed as
(7a) | ||||
(7b) | ||||
(7c) |
where we used the property of matrix determinant that . Let be the eigenvalue decomposition of , and be a real commutation matrix satisfying . We then have
(8) |
where and denotes the covariance matrix of the transmit signal, given as [2]
(9) |
where the approximation holds when is large enough. Similarly, the MI between and at the Eve can be expressed as
(10) |
where denotes the covariance of zero-mean circular-symmetric Gaussian distributed , whose eigenvalue decomposition is given as . .
III Beamforming Design for Sensing Security without AN
In this section, we first investigate the beamforming design without the aid of AN to guarantee secure sensing. Our objective is to maximize the MI of the legitimate receiver while keeping the MI of the Eve lower than the preset threshold, and satisfying multiple users’ required SINR and the power budget. The optimization problem can be formulated as follows
(11a) | ||||
(11b) | ||||
(11c) | ||||
(11d) | ||||
(11e) |
where . In general, it is challenging to solve problem (III) directly, due to the nonconvexity of the constraint (11b), (11d), and the rank-1 constraint in (11e). For addressing the nonconvex constraint (11b), we notice that is a concave function in . Thus, we give the upper-bound of (11b) based on first-order Taylor expansion at a given transmit covariance matrix as
(12) |
where . The details are given in Appendix A. As such, it can be easily observed that the approximated function is convex on . Thus, can be iteratively obtained by updating .
Then, we focus on dealing with the rank-1 constraint in (11e), which can be equivalently transformed into an equivalent linear matrix inequality (LMI) as
(13c) | |||
(13d) |
Additionally, the non-convexity in (13d) can be handled by the first-order Taylor expansions at as
(14) |
where denotes the real part of the argument and can be updated at each iteration. Therefore, a convex approximation of problem (III) is reformulated as
(15a) | ||||
(15b) | ||||
(15c) | ||||
(15d) | ||||
(15e) | ||||
which is easily shown to be convex, and hence, can be iteratively obtained by solving problem (III) based on updating and in an iterative manner. However, due to the stringent requirement introduced by (15b) and (13d), it is generally non-trivial to directly obtain a feasible solution as an initial point. Alternatively, we can adopt the penalty SCA [9] and introduce auxiliary variables to transform problem (III) into
(16a) | ||||
(16b) | ||||
(16c) | ||||
(16d) |
where and denote the weight coefficient and the penalty terms, respectively. We present the proposed iterative algorithm in Algorithm 1.
IV MI Gap Maximization with AN
In this section, we consider utilizing AN to assist secure sensing. We assume the instantaneous AN, , is shared with the legitimate receiver by the control center but remains unknown to the Eve. Firstly, we give the received signal at the legitimate receiver as
(17) |
Then, the MI of the legitimate receiver can be expressed as
(18) |
where and .
On the other hand, as the Eve has no prior knowledge of AN, the received signal and the MI at the Eve can be given as
(19) |
and
(20) |
respectively. Then, we have
(21) |
where is the -th sample of the random variable . However, it’s still difficult to derive the exact expression of due to the additive non-Gaussian noise of . To deal with this, we can give the upper bound of as
(22) |
where denotes the covariance of , given as
(23) |
Combining with (21), we give the approximate upper bound of as
Then, the problem of sensing security with AN can be formulated as
(24a) | ||||
(24b) | ||||
(24c) | ||||
(24d) | ||||
As previously discussed, the formulated problem is not convex due to the nonconvexity of (24b). Hence, we introduce an auxiliary matrix and reformulate (24b) based on the Taylor expansion at as
(25a) | |||
(25b) |
Therefore, a convex approximation of problem (IV) is reformulated as
(26a) | ||||
(26b) |
which can be solved in a similar iterative manner as in Algorithm 1.
V Simulation Results
In this section, we provide numerical analysis to evaluate the performance of the proposed algorithms, including secure sensing de without AN and MI gap maximization with AN. We consider a dual-functional BS transceiver equipped with = 6 transmit antennas for MIMO radar sensing and multi-user communication, serving CUs where one of the CU serves as the sensing Eve. The legitimate radar receiver is equipped with receive antennas. Unless stated otherwise, the available power budget dBm and the frame length . We adopt the widely-used multi-user broadcasting beamforming design [10, Sec. 7.6.1] as the baseline.
Fig. 2 firstly demonstrates the convergence behavior of the proposed method without the aid of AN, under different power budgets and numbers of users. It can be seen that all three cases converge after 3 iterations, which verifies the fast convergence rate and the efficiency of our proposed alternating algorithm. With increasing , the MI increases, since more power budget can be utilized to sense the target and satisfy the SINR constraints of multiple users. Moreover, increasing the number of CUs leads to a slight reduction in the sensing performance.
Fig. 3 compares the MI performance with different transmitted power budgets, compared with the baseline scheme. It can be seen that the gap between and of the proposed algorithms is always larger than that of the baseline scheme, and over 2 times higher with the increase of transmit power budget. Moreover, it can be observed that the use of AN further improves the sensing MI of the legitimate receiver and enlarges the MI gap.
VI Conclusion
This paper addressed the sensing security issue for ISAC systems by beamforming design. The MI of radar sensing between the legitimate receiver was maximized while taking into account the MI of the potential Eve, power budget, and SINR constraints. Additionally, we adopted AN to further guarantee secure sensing. Simulation results demonstrated the effectiveness of the proposed methods in achieving a superior MI compared to the baseline scheme, with the AN further contributing to sensing security.
Appendix A
Here, we provide the proof for the MI approximation for the Eve in (10) based on a Taylor series expansion. First, defining ,we have the Jacobian matrix of expressed as
(27) |
Following [10, Sec. 1.1.11] and [8, Sec. 3.1], the gradient of can be given as
(28) |
Then, an affine Taylor series approximation of at can be written as
(29) |
References
- [1] H. Hua, J. Xu, and T. X. Han, “Optimal transmit beamforming for integrated sensing and communication,” IEEE Trans. Veh. Technol., Mar. 2023.
- [2] F. Liu, Y.-F. Liu, A. Li, C. Masouros, and Y. C. Eldar, “Cramér-Rao bound optimization for joint radar-communication beamforming,” IEEE Trans. Signal Process., vol. 70, pp. 240–253, Dec. 2021.
- [3] D. Xu, X. Yu, D. W. K. Ng, A. Schmeink, and R. Schober, “Robust and secure resource allocation for ISAC systems: A novel optimization framework for variable-length snapshots,” IEEE Trans. Commun., vol. 70, no. 12, pp. 8196–8214, Dec. 2022.
- [4] N. Su, F. Liu, and C. Masouros, “Secure radar-communication systems with malicious targets: Integrating radar, communications and jamming functionalities,” IEEE Trans. Wireless Commun., vol. 20, no. 1, pp. 83–95, Jan. 2020.
- [5] Y. Yang and R. S. Blum, “MIMO radar waveform design based on mutual information and minimum mean-square error estimation,” IEEE Trans. Aerosp. Electron. Syst., vol. 43, no. 1, pp. 330–343, Jan. 2007.
- [6] M. R. Bell, “Inform