Multi-Static ISAC in Cell-Free Massive MIMO: Precoder Design and Privacy Assessment

Isabella W. G. da Silva,Diana P. M. Osorio,Markku Juntti
2023-10-03
Abstract:A multi-static sensing-centric integrated sensing and communication (ISAC) network can take advantage of the cell-free massive multiple-input multiple-output infrastructure to achieve remarkable diversity gains and reduced power consumption. While the conciliation of sensing and communication requirements is still a challenge, the privacy of the sensing information is a growing concern that should be seriously taken on the design of these systems to prevent other attacks. This paper tackles this issue by assessing the probability of an internal adversary to infer the target location information from the received signal by considering the design of transmit precoders that jointly optimizes the sensing and communication requirements in a multi-static-based cell-free ISAC network. Our results show that the multi-static setting facilitates a more precise estimation of the location of the target than the mono-static implementation.
Signal Processing
What problem does this paper attempt to address?
The problem that this paper attempts to solve is how to design a transmission precoder to optimize sensing and communication performance in a multi - static perception - centered integrated sensing and communication (ISAC) system, while evaluating the probability that an internal adversary infers the target location information from the received signals. Specifically, the research aims to: 1. **Design a transmission precoder**: Propose a design method for a transmission precoder to maximize the sensing signal - to - interference - plus - noise ratio (SINR) under the premise of meeting the user communication quality of service (QoS) requirements and the transmit power limit. This includes: - Maximizing the sensing SINR while ensuring that the communication SINR of each user is not lower than a certain threshold. - Ensuring that the total transmit power does not exceed the set upper limit. 2. **Evaluate privacy risks**: Evaluate whether a malicious user (i.e., an internal adversary) can infer the target location information from the received signals. The research focuses on: - Whether the internal adversary can estimate the target location by reconstructing the transmission beam pattern. - Evaluating the detection probability under different conditions (such as the number of antennas, the number of access points (APs), etc.) to quantify the risk of privacy leakage. ### Formula Summary - **Transmission Signal Model**: \[ x_k[n] = \sum_{i = 1}^{N_{\text{UE}}} w_{i,k} s_i[n]+w_{t,k} s_t[n]=W_k s[n] \] where \(s[n]=[s_1[n],\ldots, s_{N_{\text{UE}}}[n], s_t[n]]^T\) is a vector containing \(N_{\text{UE}}\) communication symbols and one sensing signal. - **User - Received Signal Model**: \[ y_i[n]=u_i^H\sum_{k = 1}^{N_{\text{Tx}}} H_{i,k} W_k s[n]+n_i[n] \] - **Sensing SINR**: \[ \gamma_t=\zeta\sum_{n = 1}^{N - 1} s^H[n]\left(\sum_{r = 1}^{N_{\text{Rx}}} \sum_{k = 1}^{N_{\text{Tx}}} \sum_{j = 1}^{N_{\text{Tx}}} \phi_{r,k,j} W_k^H A_{k,j} W_j\right)s[n] \] where \(\phi_{r,k,j}=\sqrt{\beta_{r,k}\beta_{r,j}}a^H(\phi_r)\text{cov}(\alpha_{r,j},\alpha_{r,k})a(\phi_r)\), \(A_{k,j}=a^*(\phi_k)a^T(\phi_j)\), \(\zeta=\frac{1}{(N - 1)M_{\text{AP}}N_{\text{Rx}}\sigma_n^2}\) - **Optimization Problem**: \[ \begin{aligned} &\max_{W, u}\gamma_t\\ &\text{s.t.}\quad\gamma_{i,k}\geq\Gamma,\quad i = 1,\ldots, N_{\text{UE}},\quad k = 1,\ldots, N_{\text{Tx}}\\ &\quad\sum_{i = 1}^{N_{\text{UE}}}\|w_{i,k}\|^2+\|w_{t,k}\|^2\leq P_T,\quad k = 1,\ldots, N_{\text{Tx}} \end{aligned} \] Through these formulas and models, the paper explores how to ensure communication quality in a multi - static perception - centered ISAC system.