AN Assisted Secure ISAC Beamforming: Countering Covert Eavesdropper

Xi Nan, Rugui Yao, Wanying Su, Ye Fan, Xiaoya Zuo, Wenhua Li, Margulan Ibraimov

Research output: Contribution to journalArticlepeer-review

Abstract

The current physical layer security designs in integrated sensing and communication (ISAC) system commonly rely on the prior information about the eavesdropper, such as location and channel state information (CSI). However, for the covert eavesdropper, the absence of prior information significantly degrades security performance. To deal with this issue, an artificial noise (AN)-assisted ISAC secure beamforming scheme is proposed to counter the covert eavesdropper while considering the fairness of uses’ achievable secrecy rate. This scheme is more robust because it does not require any prior information of eavesdropper. We formulate an optimization framework to jointly design transmitted precoding matrix and AN vector. This complex non-convex multi-proportional fractional programming is solved by the proposed algorithm framework based on quadratic transformation-successive convex approximation (QT-SCA). Simulation results demonstrate the effectiveness and robustness of the proposed scheme for countering the covert eavesdropper.

Original languageEnglish
Pages (from-to)3159-3163
Number of pages5
JournalIEEE Wireless Communications Letters
Volume14
Issue number10
DOIs
StatePublished - 2025

Keywords

  • Integrated sensing and communication
  • artificial noise
  • physical layer security
  • secure beamforming

Fingerprint

Dive into the research topics of 'AN Assisted Secure ISAC Beamforming: Countering Covert Eavesdropper'. Together they form a unique fingerprint.

Cite this