Advanced Search
Turn off MathJax
Article Contents
DENG Zhixiang, ZHANG Zhiwei. Secure Beamforming Design for Multi-User Near-Field ISAC Systems[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT250462
Citation: DENG Zhixiang, ZHANG Zhiwei. Secure Beamforming Design for Multi-User Near-Field ISAC Systems[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT250462

Secure Beamforming Design for Multi-User Near-Field ISAC Systems

doi: 10.11999/JEIT250462 cstr: 32379.14.JEIT250462
Funds:  Key Research and Development Special Project of Henan Province (251111220700)
  • Received Date: 2025-05-27
  • Rev Recd Date: 2025-09-18
  • Available Online: 2025-09-24
  •   Objective  Integrated Sensing and Communication (ISAC) systems, a key enabling technology for 6G, achieve the joint realization of communication and sensing by sharing spectrum and hardware. However, radar targets may threaten the confidentiality of user communications, necessitating secure transmission against potential eavesdropping. At the same time, large-scale antenna arrays and high-frequency bands are expected to be widely deployed to meet future performance requirements, making near-field wireless transmission increasingly common. This trend creates a mismatch between existing ISAC designs that rely on the far-field assumption and the characteristics of real propagation environments. In this study, we design optimal secrecy beamforming for a multi-user near-field ISAC system to improve the confidentiality of user communications while ensuring radar sensing performance. The results show that distance degrees of freedom inherent in the near-field model, together with radar sensing signals serving as Artificial Noise (AN), provide significant gains in communication secrecy.  Methods  A near-field ISAC system model is established, in which multiple communication users and a single target, regarded as a potential eavesdropper, are located within the near-field region of a transmitter equipped with a Uniform Linear Array (ULA). Based on near-field channel theory, channel models are derived for all links, including the communication channels from the transmitter to the users, the transmitter to the target, and the radar echo-based sensing channel.The secrecy performance of each user is quantified as the difference between the achievable communication rate and the eavesdropping rate at the target, and the sum secrecy rate across all users is adopted as the metric for system-wide confidentiality. The sensing performance of the ISAC system is evaluated using the Cramér–Rao bound (CRB), obtained from the Fisher Information Matrix (FIM) for parameter estimation. To enhance secrecy, a joint optimization problem is formulated for the beamforming vectors of communication and radar sensing signals, with the objective of maximizing the sum secrecy rate under base station transmit power and sensing performance constraints.As the joint optimization problem is inherently non-convex, an algorithm combining Semi-Definite Relaxation (SDR) and Weighted Minimum Mean Square Error (WMMSE) is developed. The equivalence between the MMSE-transformed problem and the original secrecy rate maximization problem is first established to handle non-convexity. The CRB constraint is then expressed in convex form using the Schur complement. Finally, SDR is applied to recast the problem into a convex optimization framework, which allows a globally optimal solution to be derived.  Results and Discussions  Numerical evaluations show that the proposed near-field ISAC secrecy beamforming design achieves clear advantages in communication confidentiality compared with far-field and non-AN schemes. Under the near-field channel model, the designed beams effectively concentrate energy on legitimate users while suppressing information leakage through radar sensing signals (Fig. 3b). Even when communication users and radar targets are angularly aligned, the secure beamforming scheme attains spatial isolation through distance-domain degrees of freedom, thereby maintaining positive secrecy rates (Fig. 3a).Joint optimization of communication beams and radar sensing signals significantly improves multi-user secrecy rates while satisfying the CRB constraint. Compared with conventional AN-assisted methods, the proposed solution exhibits superior trade-off performance between sensing and communication (Fig. 4).The number of antennas is directly correlated with beam focusing performance: increasing the antenna count produces more concentrated beam patterns. In the near-field model, however, the incorporation of the distance dimension amplifies this effect, yielding larger performance gains than those observed in conventional far-field systems (Fig. 5).Raising the transmit power further improves the received signal quality at the users, which proportionally enhances system secrecy. The near-field scheme achieves more substantial gains than far-field baselines under higher transmit power conditions (Fig. 6).This paper also examines the effect of user population on secrecy performance. A larger number of users increases inter-user interference, which degrades overall secrecy (Fig. 7). Nevertheless, owing to the intrinsic interference suppression capability of the near-field scheme and the ability of AN to impair eavesdroppers’ decoding, the proposed method maintains stronger robustness against multi-user interference compared with conventional approaches.  Conclusions  This study investigates multi-user secure communication design in near-field ISAC systems and proposes a beamforming optimization scheme that jointly enhances sensing accuracy and communication secrecy. A non-convex optimization model is established to maximize the multi-user secrecy sum rate under base station transmit power and CRB constraints, where radar sensing signals are exploited as AN to impair potential eavesdroppers. To address the complexity of the problem, a joint optimization algorithm combining SDR and WMMSE is developed, which reformulates the original non-convex problem into a convex form solvable with standard optimization tools.
  • loading
  • [1]
    LU Shihang, LIU Fan, LI Yunxin, et al. Integrated sensing and communications: Recent advances and ten open challenges[J]. IEEE Internet of Things Journal, 2024, 11(11): 19094–19120. doi: 10.1109/JIOT.2024.3361173.
    [2]
    CONG Jiayi, YOU Changsheng, LI Jiapeng, et al. Near-field integrated sensing and communication: Opportunities and challenges[J]. IEEE Wireless Communications, 2024, 31(6): 162–169. doi: 10.1109/MWC.002.2400033.
    [3]
    WEI Zhongxiang, LIU Fan, MASOUROS C, et al. Toward multi-functional 6G wireless networks: Integrating sensing, communication, and security[J]. IEEE Communications Magazine, 2022, 60(4): 65–71. doi: 10.1109/MCOM.002.2100972.
    [4]
    LIAO Weicheng, CHANG T H, MA W K, et al. QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach[J]. IEEE Transactions on Signal Processing, 2011, 59(3): 1202–1216. doi: 10.1109/TSP.2010.2094610.
    [5]
    DELIGIANNIS A, DANIYAN A, LAMBOTHARAN S, et al. Secrecy rate optimizations for MIMO communication radar[J]. IEEE Transactions on Aerospace and Electronic Systems, 2018, 54(5): 2481–2492. doi: 10.1109/TAES.2018.2820370.
    [6]
    LIU Liang, ZHANG Rui, and CHUA K C. Secrecy wireless information and power transfer with MISO beamforming[J]. IEEE Transactions on Signal Processing, 2014, 62(7): 1850–1863. doi: 10.1109/TSP.2014.2303422.
    [7]
    YU Xianghao, XU Dongfang, SUN Ying, et al. Robust and secure wireless communications via intelligent reflecting surfaces[J]. IEEE Journal on Selected Areas in Communications, 2020, 38(11): 2637–2652. doi: 10.1109/JSAC.2020.3007043.
    [8]
    NEGI R and GOEL S. Secret communication using artificial noise[C]. 2005 IEEE 62nd Vehicular Technology Conference, Dallas, USA, 2005: 1906–1910. doi: 10.1109/vetecf.2005.1558439.
    [9]
    GOEL S and NEGI R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008, 7(6): 2180–2189. doi: 10.1109/twc.2008.060848.
    [10]
    MA Hui, CHENG Julian, WANG Xianfu, et al. Robust MISO beamforming with cooperative jamming for secure transmission from perspectives of QoS and secrecy rate[J]. IEEE Transactions on Communications, 2018, 66(2): 767–780. doi: 10.1109/TCOMM.2017.2765637.
    [11]
    LIN Zhi, LIN Min, OUYANG Jian, et al. Robust secure beamforming for multibeam satellite communication systems[J]. IEEE Transactions on Vehicular Technology, 2019, 68(6): 6202–6206. doi: 10.1109/tvt.2019.2913793.
    [12]
    DE LIMA C, BELOT D, BERKVENS R, et al. Convergent communication, sensing and localization in 6G systems: An overview of technologies, opportunities and challenges[J]. IEEE Access, 2021, 9: 26902–26925. doi: 10.1109/access.2021.3053486.
    [13]
    REN Zixiang, QIU Ling, and XU Jie. Optimal transmit beamforming for secrecy integrated sensing and communication[C]. ICC 2022-IEEE International Conference on Communications, Seoul, Korea, Republic of, 2022: 5555–5560. doi: 10.1109/ICC45855.2022.9838753.
    [14]
    WANG Xin, FEI Zuo, and HUANG Jing. Near-field ISAC for multi-target detection and communication[J]. IEEE Journal on Selected Areas in Communications, 2023, 41(6): 1723–1735. doi: 10.1109/JSAC.2023.3267890.(查阅网上资料,未找到本条文献信息,请确认).
    [15]
    WANG Yiqiu, TAO Meixia, and SUN Shu. Cramér-Rao bound analysis and beamforming design for integrated sensing and communication with extended targets[J]. IEEE Transactions on Wireless Communications, 2024, 23(11): 15987–16000. doi: 10.1109/twc.2024.3435864.
    [16]
    WANG Zhaolin, MU Xidong, and LIU Yuanwei. Near-field integrated sensing and communications[J]. IEEE Communications Letters, 2023, 27(8): 2048–2052. doi: 10.1109/lcomm.2023.3280132.
    [17]
    SELVAN K T and JANASWAMY R. Fraunhofer and Fresnel distances: Unified derivation for aperture antennas[J]. IEEE Antennas and Propagation Magazine, 2017, 59(4): 12–15. doi: 10.1109/map.2017.2706648.
    [18]
    BJÖRNSON E, DEMIR Ö T, and SANGUINETTI L. A primer on near-field beamforming for arrays and reconfigurable intelligent surfaces[C]. 2021 55th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, USA, 2021: 105–112. doi: 10.1109/IEEECONF53345.2021.9723331.
    [19]
    SUN Ping, DAI Haibo, and WANG Baoyun. Integrated sensing and secure communication with XL-MIMO[J]. Sensors, 2024, 24(1): 295. doi: 10.3390/s24010295.
    [20]
    YANG Ruiwei and DU Huiqin. Joint precoding and artificial noise design for secure transmission in ISAC system[C]. 2023 IEEE 24th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Shanghai, China, 2023: 16–20. doi: 10.1109/SPAWC53906.2023.10304462.
    [21]
    SHI Qingjiang, RAZAVIYAYN M, LUO Zhiquan, et al. An iteratively weighted MMSE approach to distributed sum-utility maximization for a MIMO interfering broadcast channel[J]. IEEE Transactions on Signal Processing, 2011, 59(9): 4331–4340. doi: 10.1109/TSP.2011.2147784.
    [22]
    CHRISTENSEN S S, AGARWAL R, DE CARVALHO E, et al. Weighted sum-rate maximization using weighted MMSE for MIMO-BC beamforming design[J]. IEEE Transactions on Wireless Communications, 2008, 7(12): 4792–4799. doi: 10.1109/t-wc.2008.070851.
    [23]
    LUO Zhiquan, MA W K, SO A M C, et al. Semidefinite relaxation of quadratic optimization problems[J]. IEEE Signal Processing Magazine, 2010, 27(3): 20–34. doi: 10.1109/msp.2010.936019.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(7)  / Tables(1)

    Article Metrics

    Article views (25) PDF downloads(3) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return