Advanced Search
Turn off MathJax
Article Contents
ZHU Zhengyu, YANG Chenyi, LI Zheng, HAO Wanming, YANG Jing, SUN Gangcan. Resource Allocation Algorithm for Intelligent Reflecting Surface-assisted Secure Integrated Sensing And Communications System[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT240083
Citation: ZHU Zhengyu, YANG Chenyi, LI Zheng, HAO Wanming, YANG Jing, SUN Gangcan. Resource Allocation Algorithm for Intelligent Reflecting Surface-assisted Secure Integrated Sensing And Communications System[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT240083

Resource Allocation Algorithm for Intelligent Reflecting Surface-assisted Secure Integrated Sensing And Communications System

doi: 10.11999/JEIT240083
Funds:  The National Key R&D Program of China (2022YFD2001200), The National Natural Science Foundation of China (61922072), China Postdoctoral Science Foundation (2023T160596), The Natural Science Foundation of Henan Province (232300421097), The Program for Science & Technology Innovation Talents in Universities of Henan Province (23HASTIT019), Henan Postdoctoral Foundation (202001015), The Open Research Fund of National Mobile Communications Research Laboratory, Southeast University (2023D11)
  • Received Date: 2024-02-04
  • Rev Recd Date: 2024-05-04
  • Available Online: 2024-05-17
  •   Objective   In the 6G era, the rapid increase in wireless devices coupled with a scarcity of spectrum resources necessitates the enhancement of system capacity, data rates, and latency. To meet these demands, Integrated Sensing And Communications (ISAC) technology has been proposed. Unlike traditional methods where communication and radar functionalities operate separately, ISAC merges wireless communication with radar sensing, utilizing a shared infrastructure and spectrum. This innovative approach maximizes the efficiency of compact wireless hardware and improves spectral efficiency. However, the integration of communication and radar signals into transmitted beams introduces vulnerabilities, as these signals can be intercepted by potential eavesdroppers, increasing the risk of data leakage. As a result, Physical Layer Security (PLS) becomes essential for ISAC systems. PLS capitalizes on the randomness and diversity inherent in wireless channels to create transmission schemes that mitigate eavesdropping risks and bolster system security. Nevertheless, PLS's effectiveness is contingent on the quality of wireless channels, and the inherently fluctuating nature of these channels leads to inconsistent security performance, posing significant challenges for system adaptability and optimization. Moreover, Intelligent Reflecting Surfaces (IRS) emerge as a pivotal technology in 6G networks, offering the capability to control wireless propagation and the environment by adjusting reflection phase shifts. This advancement facilitates the establishment of reliable communication and sensing links, thereby enhancing the ISAC system's sensing coverage, accuracy, wireless communication performance, and overall security. Consequently, IRS presents a vital solution for addressing PLS challenges in ISAC systems. In light of this, the paper proposes a design study focused on IRS-assisted ISAC systems incorporating cooperative jamming to effectively tackle security concerns.  Methods   This paper examines the impact of eavesdroppers on the security performance of ISAC systems and proposes the secure IRS-ISAC system model. The proposed model features a dual-functional base station equipped with antennas, an IRS with reflective elements, single-antenna legitimate users, and an eavesdropping device. To enhance system security, a jammer equipped with antennas is integrated into the system, transmitting interference signals to mitigate the effects of eavesdroppers. Given the constraints on maximum transmit power for both the base station and the jammer, as well as the IRS reflection phase shifts and radar Signal-to-Interference-plus-Noise Ratio (SINR), a joint optimization problem is formulated to maximize the system's secrecy rate. This optimization involves adjusting base station transmission beamforming, jammer precoding, and IRS phase shifts. The problem, characterized by multiple coupled variables, exhibits non-convexity, complicating direct solutions. To address this non-convex challenge, Alternating Optimization (AO) methods are first employed to decompose the original problem into two sub-problems. Semi-Definite Relaxation (SDR) algorithms, along with auxiliary variable introductions, are then applied to transform the non-convex optimization issue into a convex form, enabling a definitive solution. Finally, a resource allocation algorithm based on alternating iterations is proposed to ensure secure operational efficiency.  Results and Discussions   The simulation results substantiate the security and efficacy of the proposed algorithm, as well as the superiority of the IRS-ISAC system. Specifically, the system secrecy rate in relation to the number of iterations is illustrated, demonstrating the convergence of the proposed algorithm across varying numbers of base station transmit antennas. The findings indicate that the algorithm reaches the maximum system secrecy rate and stabilizes at the fifth iteration, which shows its excellent convergence characteristics. Furthermore, an increase in the number of transmit antennas correlates with a notable enhancement in the system secrecy rate. This improvement can be attributed to the additional spatial degrees of freedom afforded by the base station's antennas, which enable the projection of legitimate information into the null space of all eavesdropper channels—effectively reducing the information received by eavesdroppers and boosting the overall system secrecy rate. The system secrecy rate is presented as a function of the transmit power of the base station. The results indicate that an increase in the base station's maximum transmit power corresponds with an increase in the system secrecy rate. This enhancement occurs because higher transmit power effectively mitigates path loss, thereby improving the quality of the signal. The IRS-assisted ISAC system significantly outperforms scenarios without IRS, thanks to the introduction of additional non-line-of-sight links. Additionally, the proposed scheme demonstrates superior performance compared to the random scheme in the joint design of transmit beamforming and reflection coefficients, validating the effectiveness of the algorithm. The system secrecy rate is illustrated in relation to the number of IRS reflection elements. The results reveal that the system secrecy rates for both the proposed and random methods increase as the number of IRS elements rises. This can be attributed to the incorporation of additional reflective elements, which facilitate enhanced passive beamforming gain and expand the spatial freedom available for optimizing the propagation environment, thereby strengthening anti-eavesdropping capabilities. In contrast, the system secrecy rate for the scheme without IRS remains constant. Notably, as the number of IRS elements increases, the gap in secrecy rates between the proposed scheme and the random scheme expands, highlighting the significant advantage of optimizing the IRS phase shift in improving system performance. The radar SINR is depicted concerning the transmit power of the base station. The results indicate that as the maximum transmit power of the base station increases, the SINR of the radar likewise improves. The proposed scheme outperforms the two benchmark schemes in this respect, attributable to the optimization of the IRS phase shift matrix, which not only enhances system security but also effectively conserves energy resources within the communication system. This enables a more efficient allocation of resources to improve sensing performance. By incorporating IRS into the ISAC system, performance in the sensing direction is markedly enhanced while simultaneously bolstering system security.   Conclusions   This paper addresses the potential for eavesdropping by proposing a secure resource allocation algorithm for ISAC systems with the support of IRS. A secrecy rate maximization problem is formulated, subject to constraints on the transmit power of the base station and jammer, the IRS reflection phase shifts, and the radar SINR. This formulation involves the joint design of transmit beamforming, jammer precoding, and IRS reflection beamforming. The interdependencies among these variables create significant challenges for direct solution methods. To overcome these complexities, the AO algorithm is employed to decompose the non-convex problem into two sub-problems. SDR techniques are then applied to transform these sub-problems into convex forms, enabling their resolution with convex optimization tools. Our simulation results indicate that the proposed method considerably outperforms two benchmark schemes, confirming the algorithm’s effectiveness. These findings highlight the considerable potential of IRS in bolstering the security performance of ISAC systems.
  • loading
  • [1]
    CHOWDHURY M Z, SHAHJALAL M, AHMED S, et al. 6G wireless communication systems: Applications, requirements, technologies, challenges, and research directions[J]. IEEE Open Journal of the Communications Society, 2020, 1: 957–975. doi: 10.1109/OJCOMS.2020.3010270.
    [2]
    LIU Fan, CUI Yuanhao, MASOUROS C, et al. Integrated sensing and communications: Toward dual-functional wireless networks for 6G and beyond[J]. IEEE Journal on Selected Areas in Communications, 2022, 40(6): 1728–1767. doi: 10.1109/JSAC.2022.3156632.
    [3]
    LI Xingwang, GAO Xuesong, LIU Yingting, et al. Overlay CR-NOMA assisted intelligent transportation system networks with imperfect SIC and CEEs[J]. Chinese Journal of Electronics, 2023, 32(6): 1258–1270. doi: 10.23919/cje.2022.00.071.
    [4]
    HONG Haohui, ZHAO Jingcheng, HONG Tao, et al. Radar–communication integration for 6G massive IoT services[J]. IEEE Internet of Things Journal, 2022, 9(16): 14511–14520. doi: 10.1109/JIOT.2021.3064072.
    [5]
    CUI Zhichao, HU Jing, CHENG Jian, et al. Multi-domain NOMA for ISAC: Utilizing the DOF in the delay-Doppler domain[J]. IEEE Communications Letters, 2023, 27(2): 726–730. doi: 10.1109/LCOMM.2022.3228873.
    [6]
    ZHANG Haobo, ZHANG Hongliang, DI Boya, et al. Holographic integrated sensing and communication[J]. IEEE Journal on Selected Areas in Communications, 2022, 40(7): 2114–2130. doi: 10.1109/JSAC.2022.3155548.
    [7]
    XU Jinlei, ZHU Zhengyu, CHU Zheng, et al. Sum secrecy rate maximization for IRS-aided multi-cluster MIMO-NOMA terahertz systems[J]. IEEE Transactions on Information Forensics and Security, 2023, 18: 4463–4474. doi: 10.1109/TIFS.2023.3293957.
    [8]
    PEI Yingjie, YUE Xinwei, YI Wenqiang, et al. Secrecy outage probability analysis for downlink RIS-NOMA networks with on-off control[J]. IEEE Transactions on Vehicular Technology, 2023, 72(9): 11772–11786. doi: 10.1109/TVT.2023.3267531.
    [9]
    LIN Zhi, LIN Min, CHAMPAGNE B, et al. Secrecy-energy efficient hybrid beamforming for satellite-terrestrial integrated networks[J]. IEEE Transactions on Communications, 2021, 69(9): 6345–6360. doi: 10.1109/TCOMM.2021.3088898.
    [10]
    LIU Peng, FEI Zesong, WANG Xinyi, et al. Outage constrained robust secure beamforming in integrated sensing and communication systems[J]. IEEE Wireless Communications Letters, 2022, 11(11): 2260–2264. doi: 10.1109/LWC.2022.3198683.
    [11]
    SU Nanchi, LIU Fan, WEI Zhongxiang, et al. Secure dual-functional radar-communication transmission: Exploiting interference for resilience against target eavesdropping[J]. IEEE Transactions on Wireless Communications, 2022, 21(9): 7238–7252. doi: 10.1109/TWC.2022.3156893.
    [12]
    XU Dongfang, YU Xianghao, NG D W K, et al. Robust and secure resource allocation for ISAC systems: A novel optimization framework for variable-length snapshots[J]. IEEE Transactions on Communications, 2022, 70(12): 8196–8214. doi: 10.1109/TCOMM.2022.3218629.
    [13]
    SU Nanchi, LIU Fan, and MASOUROS C. Secure radar-communication systems with malicious targets: Integrating radar, communications and jamming functionalities[J]. IEEE Transactions on Wireless Communications, 2021, 20(1): 83–95. doi: 10.1109/TWC.2020.3023164.
    [14]
    CHU Jinjin, LIU Rang, LI Ming, et al. Joint secure transmit beamforming designs for integrated sensing and communication systems[J]. IEEE Transactions on Vehicular Technology, 2023, 72(4): 4778–4791. doi: 10.1109/TVT.2022.3225952.
    [15]
    李兴旺, 田志发, 张建华, 等. IRS辅助NOMA网络下隐蔽通信性能研究[J]. 中国科学: 信息科学, 2023. doi: 10.1360/SSI-20230174.

    LI Xingwang, TIAN Zhifa, ZHANG Jianhua, et al. Performance analysis of covert communication in IRS-assisted NOMA networks[J]. Scientia Sinica Informationis, 2023. doi: 10.1360/SSI-20230174.
    [16]
    ZHOU Chunyu, XU Yongjun, LI Dong, et al. Energy-efficient maximization for RIS-aided MISO symbiotic radio systems[J]. IEEE Transactions on Vehicular Technology, 2023, 72(10): 13689–13694. doi: 10.1109/TVT.2023.3274796.
    [17]
    YAN Wencai, HAO Wanming, HUANG Chongwen, et al. Beamforming analysis and design for wideband THz reconfigurable intelligent surface communications[J]. IEEE Journal on Selected Areas in Communications, 2023, 41(8): 2306–2320. doi: 10.1109/JSAC.2023.3288235.
    [18]
    PAN Cunhua, REN Hong, WANG Kezhi, et al. Multicell MIMO communications relying on intelligent reflecting surfaces[J]. IEEE Transactions on Wireless Communications, 2020, 19(8): 5218–5233. doi: 10.1109/TWC.2020.2990766.
    [19]
    LIU Huiling, LI Geng, LI Xingwang, et al. Effective capacity analysis of STAR-RIS-assisted NOMA networks[J]. IEEE Wireless Communications Letters, 2022, 11(9): 1930–1934. doi: 10.1109/LWC.2022.3188443.
    [20]
    ZHU Zhengyu, LI Zheng, CHU Zheng, et al. Resource allocation for IRS assisted mmWave integrated sensing and communication systems[C]. ICC 2022 - IEEE International Conference on Communications, Seoul, Republic of, 2022: 2333–2338. doi: 10.1109/ICC45855.2022.9838546.
    [21]
    HUA Meng, WU Qingqing, CHEN Wen, et al. Secure intelligent reflecting surface-aided integrated sensing and communication[J]. IEEE Transactions on Wireless Communications, 2024, 23(1): 575–591. doi: 10.1109/TWC.2023.3280179.
    [22]
    ZHANG Huiying and ZHENG Jianping. IRS-assisted secure radar communication systems with malicious target[J]. IEEE Transactions on Vehicular Technology, 2024, 73(1): 591–604. doi: 10.1109/TVT.2023.3302429.
    [23]
    GUAN Xinrong, WU Qingqing, and ZHANG Rui. Intelligent reflecting surface assisted secrecy communication: Is artificial noise helpful or not?[J]. IEEE Wireless Communications Letters, 2020, 9(6): 778–782. doi: 10.1109/LWC.2020.2969629.
    [24]
    LI Qiang, HONG Mingyi, WAI H T, et al. Transmit solutions for MIMO wiretap channels using alternating optimization[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1714–1727. doi: 10.1109/JSAC.2013.130906.
    [25]
    LE Xinyi and WANG Jun. A two-time-scale neurodynamic approach to constrained minimax optimization[J]. IEEE Transactions on Neural Networks and Learning Systems, 2017, 28(3): 620–629. doi: 10.1109/TNNLS.2016.2538288.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(5)  / Tables(1)

    Article Metrics

    Article views (571) PDF downloads(89) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return