Sensing-assisted Physical Layer Security (Invited Paper)
Integrated Sensing and Communication (ISAC) is intuitively expected to enhance energy and spectrum efficiencies, while it is further promoted to get a deeper integration where the two functionalities are co-designed for mutual benefits. Concerning the communication data security risks resulting from the unification of these two operations, we address the sensingaided physical layer security (PLS) for ISAC systems in this paper. In our design, the ISAC base station (BS) sends information to communication users and detects targets simultaneously, where targets are reckoned as potential eavesdroppers (Eves). The BS firstly emits an omnidirectional waveform to search for potential Eves' angles adopting the combined Capon and approximate maximum likelihood (CAML) technique. We then formulate a weighted optimization problem for both the secrecy maximization and the Cramér-Rao bound (CRB) minimization, with the wide main beam design covering all possible directions of Eves. With the estimation accuracy improving iteratively, the secrecy rate benefits from the sensing functionality, that is, accordingly gets higher. Finally, the simulation results validate the effectiveness of the proposed method.
National Natural Science Foundation of China;National Natural Science Foundation of China[U20B2039];
|Document Type||Conference paper|
|Department||Department of Electrical and Electronic Engineering|
1.Department of Electronic and Electrical Engineering,University College London,London,United Kingdom
2.Department of Electrical and Electronic Engineering,Southern University of Science and Technology,Shenzhen,China
Su，Nanchi,Liu，Fan,Masouros，Christos. Sensing-assisted Physical Layer Security (Invited Paper)[C],2023:386-391.
|Files in This Item:||There are no files associated with this item.|
|Recommend this item|
|Export to Endnote|
|Export to Excel|
|Export to Csv|
|Similar articles in Google Scholar|
|Similar articles in Baidu Scholar|
|Similar articles in Bing Scholar|
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.