Abstract:In integrated sensing and communication (ISAC) systems, the target of interest may \textit{intentionally disguise itself as an eavesdropper}, enabling it to intercept and tap into the communication data embedded in the ISAC waveform. The following paper considers a full duplex (FD)-ISAC system, which involves multiple malicious targets attempting to intercept both uplink (UL) and downlink (DL) communications between the dual-functional radar and communication (DFRC) base station (BS) and legitimate UL/DL communication users (CUs). For this, we formulate an optimization framework that allows maximization of both UL and DL sum secrecy rates, under various power budget constraints for sensing and communications. As the proposed optimization problem is non-convex, we develop a method called Iterative Joint Taylor-Block cyclic coordinate descent (IJTB) by proving essential lemmas that transform the original problem into a more manageable form. In essence, IJTB alternates between two sub-problems: one yields UL beamformers in closed-form, while the other approximates the solution for UL power allocation, artificial noise covariance, and DL beamforming vectors. This is achieved through a series of Taylor approximations that effectively \textit{"convexify"} the problem, enabling efficient optimization. Simulation results demonstrate the effectiveness of the proposed solver when compared with benchmarking ones. Our findings reveal that the IJTB algorithm shows fast convergence, reaching stability within approximately $10$ iterations. In addition, all benchmarks reveal a substantial decline in the sum secrecy rate, approaching zero as the eavesdropper distance reaches $17$ meters, underscoring their vulnerability in comparison to IJTB.
What problem does this paper attempt to address?
The problem that this paper attempts to solve is how to maximize the sum secrecy rate of the uplink and downlink in the integrated sensing and communication (ISAC) system in full - duplex (FD) mode while ensuring the effectiveness of the radar sensing function. Specifically, in view of the problem that multiple malicious targets (such as eavesdroppers) may intercept the uplink and downlink communications, the paper proposes an optimization framework aiming to maximize the communication security between legitimate users while limiting the ability of eavesdroppers to obtain useful information.
### Problem Background
In the ISAC system, the communication and sensing functions share the same frequency band and hardware resources to improve the spectrum efficiency and reduce the cost. However, this integration also brings security challenges, especially when malicious targets disguise themselves as eavesdroppers, they may intercept the communication data embedded in the ISAC waveform. Therefore, how to protect the security of communication data in this situation has become an important issue.
### Core Problems of the Paper
The core problem of the paper is to design an optimization method to simultaneously maximize the sum secrecy rate of the uplink and downlink in the FD - ISAC system and ensure the effectiveness of the sensing function under different power budget constraints. Specifically, the paper focuses on the following points:
1. **Maximizing the Secrecy Rate of the Uplink and Downlink**: In the presence of multiple malicious targets, how to maximize the communication secrecy rate between legitimate users by optimizing beamforming, artificial noise (AN), and power allocation, etc.
2. **Effectiveness of the Sensing Function**: While optimizing communication security, how to ensure the effectiveness of the radar sensing function, especially by controlling the beampattern to achieve high - precision detection of targets.
3. **Solving Non - Convex Optimization Problems**: Since the proposed optimization problem is non - convex, the paper develops an Iterative Joint Taylor - Block cyclic coordinate descent (IJTB) algorithm, which transforms the original problem into a more tractable form through a series of Taylor approximations, thereby achieving efficient optimization.
### Solutions
To solve the above problems, the paper proposes the following solutions:
- **Optimization Framework**: Constructs an optimization framework aiming to maximize the sum secrecy rate of the uplink and downlink while considering the power budget constraints of sensing and communication.
- **IJTB Algorithm**: Develops the IJTB algorithm, which effectively solves the non - convex optimization problem by alternately solving two sub - problems (one for generating the uplink beamformer, and the other for approximately solving the uplink power allocation, artificial noise covariance, and downlink beamforming vector).
- **Simulation Verification**: Through extensive simulation experiments, verifies the superior performance of the proposed method in different scenarios, especially showing better adaptability and higher secrecy rate when facing eavesdroppers at different distances.
### Conclusion
By introducing the IJTB algorithm, the paper successfully maximizes the sum secrecy rate of the uplink and downlink in the FD - ISAC system and significantly improves the security and robustness of the system on the premise of ensuring the effectiveness of the sensing function. The simulation results show that the IJTB algorithm is superior to the existing benchmark methods in terms of convergence speed and performance, especially when dealing with close - range eavesdroppers.