skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Secure Intelligent Reflecting Surface-Aided Integrated Sensing and Communication
In this paper, an intelligent reflecting surface (IRS) is leveraged to enhance the physical layer security of an integrated sensing and communication (ISAC) system in which the IRS is deployed to not only assist the downlink communication for multiple users, but also create a virtual line-of-sight (LoS) link for target sensing. In particular, we consider a challenging scenario where the target may be a suspicious eavesdropper that potentially intercepts the communication-user information transmitted by the base station (BS). To ensure the sensing quality while preventing the eavesdropping, dedicated sensing signals are transmitted by the BS. We investigate the joint design of the phase shifts at the IRS and the communication as well as radar beamformers at the BS to maximize the sensing beampattern gain towards the target, subject to the maximum information leakage to the eavesdropping target and the minimum signal-to-interference-plus-noise ratio (SINR) required by users. Based on the availability of perfect channel state information (CSI) of all involved user links and the potential target location of interest at the BS, two scenarios are considered and two different optimization algorithms are proposed. For the ideal scenario where the CSI of the user links and the potential target location are perfectly known at the BS, a penalty-based algorithm is proposed to obtain a high-quality solution. In particular, the beamformers are obtained with a semi-closed-form solution using Lagrange duality and the IRS phase shifts are solved for in closed form by applying the majorization-minimization (MM) method. On the other hand, for the more practical scenario where the CSI is imperfect and the potential target location is uncertain in a region of interest, a robust algorithm based on the $$\cal S$$ -procedure and sign-definiteness approaches is proposed. Simulation results demonstrate the effectiveness of the proposed scheme in achieving a trade-off between the communication quality and the sensing quality, and also show the tremendous potential of IRS for use in sensing and improving the security of ISAC systems.  more » « less
Award ID(s):
2107182 2030029
PAR ID:
10517893
Author(s) / Creator(s):
; ; ; ;
Publisher / Repository:
IEEE
Date Published:
Journal Name:
IEEE Transactions on Wireless Communications
Volume:
23
Issue:
1
ISSN:
1536-1276
Page Range / eLocation ID:
575 to 591
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Compared with traditional half-duplex wireless systems, the application of emerging full-duplex (FD) technology can potentially double the system capacity theoretically. However, conventional techniques for suppressing self-interference (SI) adopted in FD systems require exceedingly high power consumption and expensive hardware. In this paper, we consider employing an intelligent reflecting surface (IRS) in the proximity of an FD base station (BS) to mitigate SI for simultaneously receiving data from uplink users and transmitting information to downlink users. The objective considered is to maximize the system weighted sum-rate by jointly optimizing the IRS phase shifts, the BS transmit beamformers, and the transmit power of the uplink users. To visualize the role of the IRS in SI cancellation, we first study a simple scenario with one downlink user and one uplink user. To address the formulated non-convex problem, a low-complexity algorithm based on successive convex approximation is proposed. For the more general case considering multiple downlink and uplink users, an efficient alternating optimization algorithm based on element-wise optimization is proposed. Numerical results demonstrate that the FD system with the proposed schemes can achieve a larger gain over the half-duplex system, and the IRS is able to achieve a balance between suppressing SI and providing beamforming gain. 
    more » « less
  2. In this paper, we investigate the potential of employing reconfigurable intelligent surface (RIS) in integrated sensing and communication (ISAC) systems. In particular, we consider an RIS-assisted ISAC system in which a multi-antenna base station (BS) simultaneously performs multi-user multi-input single-output (MU-MISO) communication and target detection. We aim to jointly design the transmit beamforming and receive filter of the BS, and the reflection coefficients of the RIS to maximize the sum-rate of the communication users, while satisfying a worst-case radar output signal-to-noise ratio (SNR), the transmit power constraint, and the unit modulus property of the reflecting coefficients. An efficient iterative algorithm based on fractional programming (FP), majorization-minimization (MM), and alternative direction method of multipliers (ADMM) is developed to solve the complicated non-convex problem. Simulation results verify the advantage of the proposed RIS-assisted ISAC scheme and the effectiveness of the developed algorithm. 
    more » « less
  3. In this paper, we investigate the integration of integrated sensing and communication (ISAC) and reconfigurable intelligent surfaces (RIS) for providing wide-coverage and ultrareliable communication and high-accuracy sensing functions. In particular, we consider an RIS-assisted ISAC system in which a multi-antenna base station (BS) simultaneously performs multiuser multi-input single-output (MU-MISO) communications and radar sensing with the assistance of an RIS. We focus on both target detection and parameter estimation performance in terms of the signal-to-noise ratio (SNR) and Cramér-Rao bound (CRB), respectively. Two optimization problems are formulated for maximizing the achievable sum-rate of the multi-user communications under an SNR constraint for target detection or a CRB constraint for parameter estimation, the transmit power budget, and the unit-modulus constraint of the RIS reflection coefficients. Efficient algorithms are developed to solve these two complicated non-convex problems. We then extend the proposed joint design algorithms to the scenario with imperfect self-interference cancellation. Extensive simulation results demonstrate the advantages of the proposed joint beamforming and reflection designs compared with other schemes. In addition, it is shown that more RIS reflection elements bring larger performance gains for directof- arrival (DoA) estimation than for target detection. 
    more » « less
  4. Integrated sensing and communication (ISAC) is expected to be offered as a fundamental service in the upcoming sixth-generation (6G) communications standard. However, due to the exposure of information-bearing signals to the sensing targets, ISAC poses unique security challenges. In recent years, intelligent reflecting surfaces (IRSs) have emerged as a novel hardware technology capable of enhancing the physical layer security of wireless communication systems. Therefore, in this paper, we consider the problem of transmit and reflective beamforming design in a secure IRS-enabled ISAC system to maximize the beampattern gain at the target. The formulated non-convex optimization problem is challenging to solve due to the intricate coupling between the design variables. Moreover, alternating optimization (AO) based methods are inefficient in finding a solution in such scenarios, and convergence to a stationary point is not theoretically guaranteed. Therefore, we propose a novel successive convex approximation (SCA)-based second-order cone programming (SOCP) scheme in which all of the design variables are updated simultaneously in each iteration. The proposed SCA-based method significantly outperforms a penalty-based benchmark scheme previously proposed in this context. Moreover, we also present a detailed complexity analysis of the proposed scheme, and show that despite having slightly higher per-iteration complexity than the benchmark approach the average problem-solving time of the proposed method is notably lower than that of the benchmark scheme. 
    more » « less
  5. Integrated sensing and communication (ISAC) is considered an emerging technology for 6th-generation (6G) wireless and mobile networks. It is expected to enable a wide variety of vertical applications, ranging from unmanned aerial vehicles (UAVs) detection for critical infrastructure protection to physiological sensing for mobile healthcare. Despite its significant socioeconomic benefits, ISAC technology also raises unique challenges in system security and user privacy. Being aware of the security and privacy challenges, understanding the trade-off between security and communication performance, and exploring potential countermeasures in practical systems are critical to a wide adoption of this technology in various application scenarios. This talk will discuss various security and privacy threats in emerging ISAC systems with a focus on communication-centric ISAC systems, that is, using the cellular or WiFi infrastructure for sensing. We will then examine potential mechanisms to secure ISAC systems and protect user privacy at the physical and data layers under different sensing modes. At the wireless physical (PHY) layer, an ISAC system is subject to both passive and active attacks, such as unauthorized passive sensing, unauthorized active sensing, signal spoofing, and jamming. Potential countermeasures include wireless channel/radio frequency (RF) environment obfuscation, waveform randomization, anti-jamming communication, and spectrum/RF monitoring. At the data layer, user privacy could be compromised during data collection, sharing, storage, and usage. For sensing systems powered by artificial intelligence (AI), user privacy could also be compromised during the model training and inference stages. An attacker could falsify the sensing data to achieve a malicious goal. Potential countermeasures include the application of privacy enhancing technologies (PETs), such as data anonymization, differential privacy, homomorphic encryption, trusted execution, and data synthesis. 
    more » « less