1. Introduction
With the continuous evolution of mobile communication technology, the world has entered a critical phase of 6G research. 6G is expected to usher humanity into a new era of deep integration between the physical and virtual worlds. Dual-Functional Radar–Communication (DFRC), recognized as a pivotal technology for achieving the 6G vision, leverages the design of wireless signal systems to facilitate the sharing of signal processing modules and environmental information. This integration delivers significant advantages, including improved spectrum efficiency, reduced processing costs, and enhanced system performance. In recent years, the development of radar and communication systems toward DFRC has become a focal point of research for scholars both domestically and internationally. Specifically, in [1,2], the author proposed a cooperative scheme for MIMO communication and radar, which achieves the sharing of sensing and communication systems by jointly designing the radar transmission coding matrix and the communication transmission covariance matrix. The research [3,4] addressed the design of MIMO sensing transmission beam patterns coexisting with wireless communication systems, enhancing the required sensing and communication performance across various scenarios through solving optimization problems. DFRC can also be applied to many other scenarios, including Internet of Things (IoT) networks [5,6], smart homes or vehicular networks [7,8], and autonomous driving technology networks [9].
In addition, the proper integration of DFRC with other wireless technologies or devices can lead to many emerging applications, including orthogonal frequency division multiplexing (OFDM), intelligent reflecting surfaces (IRSs), and non-orthogonal multiple access (NOMA) technologies. For example, in [10], the author proposes an OFDM-DFRC system, which effectively utilizes the spectrum while maintaining robust communication to prevent multipath fading and improving radar estimation accuracy. Similarly, in [11], the author explores a RIS-aided DFRC system. By designing the transmit beamformer and IRS reflection, they achieve up to a 32 dB improvement in the radar SNR compared to passive RIS-aided DFRC systems.
As a key technology in 5G networks, NOMA can serve multiple users simultaneously, improving the utilization of shared spectrum. By combining NOMA with DFRC systems, spectrum sharing can be achieved. The research in [12] proposed a NOMA-DFRC framework, utilizing NOMA to provide services to multiple communication users while performing target sensing, enhancing the system’s communication performance and target sensing ability. In [13], the author investigated a NOMA-aided DFRC system, where NOMA serves multiple users while detecting a set of radar targets. A joint optimization framework is proposed to maximize sensing efficiency while simultaneously ensuring the communication performance of NOMA users and the sensing accuracy of designated targets. This approach effectively balances the trade-offs between communication and sensing requirements, achieving optimal system performance. The research in [14] introduced an iterative channel estimation method for DFRC that maintains both sensing and communication performance while providing spectrum efficiency. This method achieves uplink transmission through estimating the channel of the received signals. In [15], the author proposed a NOMA-assisted communication, sensing, and computing application. The proposed application maximizes computation offloading capabilities and suppresses inter-functional interference, achieving high-quality sensing and computing performance. By adopting NOMA technology, the degrees of freedom in DFRC systems are greatly increased, significantly enhancing both sensing and communication performance while also offering possibilities for other applications.
However, the transmitted signals in DFRC systems are designed to carry communication signals and data through specific waveforms. When eavesdropping devices are present during system operation, the communication security of users in DFRC systems cannot be guaranteed. Therefore, physical layer security is a critical consideration in DFRC system design. In [16], the authors leveraged the inherent interference of strong radar signals to ensure the physical layer security of coexisting multi-user single-input single-output communication systems and collaborative MIMO radar. In [17], a drone system integrated with DFRC technology was proposed, addressing a joint optimization problem involving user scheduling, transmission power, and source drone trajectories to maximize secure data transmission rates. The research in [18,19] both utilized intelligent reflecting surfaces (IRSs) to enhance the physical layer security of DFRC systems. The former formulated a joint optimization problem to maximize user capacity and secure rates through active and passive beamforming, while the latter investigated the joint design of communication and radar beamformer phase shifts on the IRS and base station to maximize the gain of the perceptual beam pattern towards targets, ensuring minimal information leakage to eavesdroppers. This demonstrated the significant potential of IRSs in enhancing the security of DFRC systems. The research in [20] combined the Capon method and approximate maximum likelihood techniques to identify potential eavesdropper directions, achieving a mutually beneficial outcome for both sensing and security functions. In [21,22,23], an artificial noise (AN)-assisted strategy was proposed to ensure the security of MIMO communication systems. The strategy entails transmitting AN in conjunction with information-bearing signals to effectively disrupt eavesdropping devices, ensuring secure communication.
Additionally, the wireless security challenges associated with NOMA systems merit significant attention. Due to the higher transmission power of the weak-channel user, the signals are more susceptible to interception. A secure transmission scheme for a MISO-NOMA framework is discussed in [24], using artificial jamming generated at the BS to ensure security in the presence of an eavesdropping device. By maximizing the transmission power of the AN and using SIC to eliminate the jamming signal before it interferes with legitimate transmissions, eavesdropping can be effectively disrupted without affecting lawful communication. In [25], the author explored the wireless security of NOMA-SISO systems. Each user has predefined QoS requirements, and the feasible transmission power region that satisfies all users’ QoS needs was identified. Additionally, the research in [26] proposed a secure transmission scheme in dual-user NOMA channels using deep neural networks (DNNs). By applying linear precoding to each user’s signal using deep neural networks, the computation time is significantly reduced, and the secrecy capacity increases to approximately 98 precent. At the same time, spectrum efficiency is enhanced, with dynamic complexity several times lower than that of existing iterative methods.
Nevertheless, the research on the secure transmission of DFRC systems under the NOMA framework is still limited. Currently, only the research in [27] has addressed the secure transmission problem in a NOMA-assisted DFRC system by introducing artificial interference. Based on the above analysis, we propose a secure transmission framework for NOMA-assisted DFRC systems in scenarios involving eavesdroppers. Sensing and communication are achieved by superimposing signals in the power domain, with SIC employed to remove inter-user interference. We fully leverage the high degrees of freedom that NOMA technology brings to DFRC systems and investigate the beamforming problem to maximize the system’s security performance, constrained by minimum communication rate requirements and specific radar performance limitations. Additionally, since the eavesdroppers are non-cooperative, we also consider the robust beamforming problem in scenarios where the exact CSI of the eavesdropper is unavailable. At present, there has been no prior research dedicated to addressing the robust secure transmission challenges in NOMA-assisted DFRC systems. This gap highlights the novelty and significance of the proposed work. In summary, our contributions are as follows:
A secure communication deployment scheme for NOMA-assisted DFRC systems is proposed, considering two scenarios where the eavesdropper’s CSI is precisely known and where the CSI of the eavesdropper is unavailable. The security design issues related to beamforming patterns, user signal-to-noise ratios, and power constraints are addressed for each scenario.
In the scenario where the eavesdropper’s CSI is known, a secure communication optimization model based on transmit beamforming is proposed. Subject to minimum communication rate constraints and radar beam threshold requirements, the model iteratively addresses the beamforming optimization challenge, aiming to enhance the aggregate secrecy rate for multiple users by integrating fractional programming (FP) with semidefinite relaxation (SDR) methods. The high degree of freedom NOMA technology provides is integrated into the secure communication of DFRC systems.
In the scenario where the CSI of the eavesdropping device is unavailable, a robust transmit beamforming optimization model for secure communication is proposed, representing the uncertain channel model as a bounded uncertainty set. Under the constraints of ensuring the minimum communication rate for system users and meeting radar beam threshold requirements, the model constructs a bounded beamforming optimization to maximize the sum secrecy rate for users. By jointly applying Taylor series expansion and the S-procedure, the original problem is transformed into a tractable problem characterized by linear matrix inequalities (LMIs), enabling efficient and tractable solutions using standard optimization techniques.
Notations: All scalars are in italicized letters, and vectors and matrices are in bold letters. denotes the dimensional complex matrix. denotes its Euclidean norm and denotes a diagonal matrix. For any general matrix , denote its conjugate transpose.
2. System Model
As shown in Figure 1, we consider a dual-function MIMO-DFRC system equipped with a uniform linear array (ULA) of M antennas, where the sensing signals carrying communication information are used for both sensing and communication purposes simultaneously. The system detects information about the target of interest while serving K legitimate users via NOMA (since the users are generally cooperative, we can estimate their CSI through pilot signals). At the same time, there may be potential eavesdroppers near the users, and the transmitted communication symbols may be intercepted by adversarial malicious devices. We address two possible scenarios: one where the eavesdropper’s CSI is precisely known and another where the CSI of the eavesdropper is unavailable.
2.1. Communication Model of NOMA-DFRC System
By employing the transmit beamforming design, the transmit signal of the MIMO-DFRC system can be given by
(1)
where denotes the information intended for transmission to user k and denotes the channel of DFRC to user k. The Rayleigh distributed channel can be utilized between the DFRC system and the users. Typically, in NOMA transmission, we assume , where user 1 has the weakest channel gain, and user K has the strongest channel gain. Based on this, when the DFRC system transmits communication symbols to users using NOMA, the k-th user first applies SIC to detect and remove interference from all users with weaker channel gains than user k (); at the same time, the signal of stronger users is treated as noise. Therefore, the achievable rate at user k is(2)
In addition, the information for user k, apart from the part it demodulates itself, can also be decoded by all users with stronger channel gains through SIC. Therefore, for users , the following achievable rate is produced:
(3)
Therefore, the achievable rate of should take the lowest value of communication rates, which can be expressed as
(4)
At user K, SIC can be used to remove interference signals from other users, and the transmission rate can be simplified to
(5)
2.2. Secure Transmission Problem of MIMO-DFRC
Regarding the security of user information transmission, users who are located farther away and have higher transmission power are more likely to face threats from eavesdropping devices. We assume the presence of a potential eavesdropper near such high-power users, aiming to intercept communication between the DFRC system and legitimate users. Since the eavesdropper lacks the necessary information to perform SIC, the SNR observed by the eavesdropper for the k-th user’s received signal can be represented as follows:
(6)
where represents the CSI from the DFRC system to the eavesdropper. We propose the secrecy rate to evaluate the security performance of the system [28], which can be expressed as(7)
2.3. Design of the Beamforming for Radar Sensing
In order to better detect and estimate targets, it is often necessary to design beam patterns with excellent performance. Therefore, in this paper, we utilize beam pattern similarity metrics to assess sensing performance, using the minimum MSE between the designed beam pattern and the ideal beam pattern as the evaluation criterion, which can be expressed as follows [29]:
(8a)
(8b)
(8c)
(8d)
In this context, represents the azimuth of the target to be estimated, the normalized represents the ideal beam pattern, denotes the signal steering vector, and is a proportionality factor. By minimizing the mean square error , we can derive the covariance matrix of the ideal beam pattern. We will aim to optimize to closely approximate the ideal beam pattern, thereby meeting the performance requirements for detection by the sensing device.
3. Secure Beamforming Design with Known Eavesdropper CSI
In this section, the eavesdropper’s CSI can be accurately estimated, and the eavesdropper lacks sufficient information to perform SIC on the signals of legitimate users. Assuming that all users require secure transmission, we aim to optimize the overall secrecy rate by designing secure beamforming vectors for the DFRC system, while ensuring the system’s sensing and communication capabilities. To begin, we define . The DFRC secure beamforming problem can be given by
(9a)
(9b)
(9c)
(9d)
(9e)
(9f)
(9g)
Constraint (9b) ensures that the designed DFRC system’s transmit beam pattern closely approximates the ideal radar beam pattern, meeting the target detection requirements. Constraints (9c) and (9d) represent the minimum rate conditions for NOMA multicast transmission, ensuring reliable communication. Constraint (9e) reflects the total power constraint for the DFRC system. Both the objective function and constraints (9c) and (9d) are non-convex, making the problem challenging to solve directly. By substituting (4)–(7) into (9a), we obtain
(10)
The objective function contains a difference of logarithmic terms. To handle this, we first apply a basic transformation to simplify it. Equation (11) can then be reformulated as
(11)
Due to the presence of logarithmic functions with fractional terms in Equation (12), the problem remains non-convex. Fortunately, fractional programming (FP) methods can eliminate the fractional terms and make it easier to solve [30]. First, we apply the Lagrangian dual transformation technique, utilizing the Closed-Form FP approach to address the first term in Equation (12). We first consider the auxiliary variables and ; the first term in Equation (12) can be reformulated as follows:
(12)
When is fixed, the optimal values for and can be obtained by taking the partial derivatives and setting them equal to zero, i.e.,
(13)
(14)
It can be observed that the fractional term in the first part of Equation (12) has been successfully transformed into a convex form. Next, we apply the Direct FP approach to handle the second term in Equation (12). Through the quadratic transformation, we can rewrite the second term as follows:
(15)
When is fixed, the value of can be obtained from the following formula:
(16)
At this point, problems (9a)–(9c) can be reformulated into the following form:
(17a)
(17b)
(17c)
Where the variables are updated in each iteration; when these variables are known, the objective function in Equation (18) becomes a convex problem concerning , as it combines both linear and logarithmic functions, and can be directly solved. Next, we address the non-convex constraint (17c). By defining , constraint (17c) is reformulated as follows:
(18)
The non-convexity of Equation (19) stems from the second term, which contains a negative sign. Regarding this problem, we use a first-order Taylor expansion to construct a locally approximated surrogate function for Equation (19), transforming it into a convex problem. To begin, we review several key results from [31], as demonstrated in Lemma 1.
If a convex function is differentiable, we approximate it by the tangent function at a given point . The first-order expansion is
(19)
Based on Lemma 1, we reformulate constraint (17c) into a convex form. For each iteration point , the problem (19) approximates the lower bound of the constraint function at the current local point . Using the first-order Taylor expansion, the second term of Equation (19) is reformulated as follows:
(20)
By substituting (21) into (19), constraint (17c) is given by
(21)
By substituting (22a)–(22c) into (18), the resulting new optimization problem is as follows:
(22a)
(22b)
(22c)
It is evident that Equation (23) has been reformulated as a convex optimization problem. Subsequently, we can reconstruct the rank-one solution by eigenvalue decomposition or Gaussian randomization techniques. The overall algorithmic procedure is summarized as follows.
4. Robust Secure Beamforming Design for DFRC with Imperfect CSI of the Eavesdropper
In Section 3, we assumed that the CSI between the DFRC system and the eavesdropper was fully available. However, in practical scenarios, the eavesdropper’s location is unknown due to its passive nature. Given the presence of estimation errors, obtaining perfect CSI for adversarial eavesdroppers becomes challenging [32,33]. Therefore, we adopt a norm-bounded channel uncertainty model, assuming that the base station has only obtained the uncertainty region of the eavesdropper’s channel [34], which is described as follows:
(23)
where represents the channel uncertainty sets of the eavesdropper, is the channel estimation CSI of the eavesdropper, represents estimation error, and represents the maximum threshold of channel estimation error.Considering the uncertainty of channel, the worst-case secrecy rate (WCSR) is introduced as the design objective to replace the objective function in (9a)–(9g); it can be described as follows:
(24)
where represents the eavesdropper’s rate under the uncertain channel model, i.e., . Our goal is to maximize the WCSR for the legitimate users and the eavesdropper with imperfect CSI, while simultaneously satisfying the sensing beamforming constraint, communication rate constraint, and transmission power constraint. Specifically, the optimization problem can be formulated as follows:(25a)
(25b)
(25c)
It is evident that the uncertainty in the eavesdropper’s CSI results in a non-convex problem. To address this, we reformulate the objective function by employing auxiliary variables and . The aforementioned non-convex problem can be redefined as
(26a)
(26b)
(26c)
(26d)
where . The non-convexity of (27a)–(27d) is primarily concentrated in constraints (27b) and (27c). To address this, we first apply the Taylor expansion method from Lemma 1. Similar to (19), (27a)–(27d) can be reformulated as follows:(27a)
(27b)
(27c)
(27d)
After processing, the original non-convex terms have been transformed into convex constraints. However, due to the channel uncertainty, the resulting infinite cone constraints remain unsolvable directly. By introducing auxiliary variables and , we rewrite constraint (27d) in the following form:
(28a)
(28b)
(28c)
The uncertainty constraints in (29a) and (29b) can be equivalently expressed as
(29a)
(29b)
Next, we present Lemma 2, which transforms the constraints in (29a) and (29b) into linear matrix inequalities. We begin by introducing Lemma 2.(S-procedure) Define the function
(30)
where is a Hermitian matrix, , , and . The expression holds if and only if there exists such that(31)
From (24), we derive that . Based on Lemma 2, by introducing a relaxation variable and , we can reformulate (29a) and (29b) as follows:
(32)
(33)
where denotes the identity matrix.Finally, by employing the first-order Taylor expansion from Lemma 1, (28c) can be reformulated as follows:
(34)
By substituting the above transformations into (26a)–(26d), the resulting optimization problem becomes more tractable and can be denoted as
(35)
For any given , the problem (36) is a convex problem. We can reconstruct the rank-one solution by eigenvalue decomposition or Gaussian randomization techniques [35], the algorithmic procedure for solving (26a)–(26d) is as follows.
5. Numerical Results
The numerical results are provided to assess the secure transmission performance of the MIMO-DFRC system under two distinct scenarios: one in which the eavesdropper’s CSI is available and one where it is not. The DFRC system is assumed to have a uniform linear array (ULA) comprising or antennas. The system serves communication users while detecting radar targets at angles and . The noise power at the user receivers is set to dBm. Path loss and fading channel models are taken from [36]. The correlation between the users’ channels is set to . The Rayleigh coefficient of the BS and user channels is 2, and the distance between the BS and the user is in the range of 50 m to 200 m. Numerical results are derived from 2000 Monte Carlo simulations to ensure statistical reliability.
5.1. Performance Analysis of Secure NOMA-ISAC
We begin by considering a secure transmission scenario within the DFRC system, assuming the CSI of the eavesdropper can be perfectly estimated. Algorithm 1 is employed to solve the proposed optimization problem. Figure 2 presents the secrecy rate analysis curves for varying power budgets , with and transmit antennas. The results show that the total secrecy rate of the system increases monotonically with the number of iterations. After five iterations, the values converge to a stable point.
Algorithm 1 Secure beamforming design of MIMO-DFRC system with known eavesdropper CSI. |
Input: , , , , , , , ,
|
Figure 3 depicts the influence of the number of transmit antennas M and the power budget on the system’s secrecy performance under varying minimum communication user rate thresholds . Obviously, the system’s secrecy rate improves as both the power budget and the number of transmit antennas are increased. This improvement arises because higher power budgets provide the system with more energy resources, while a greater number of transmit antennas enhances array gain and increases the degrees of freedom available for optimization. These factors collectively enable the system to improve mutual information with legitimate users while reducing information leakage to eavesdroppers, thereby ensuring enhanced system secrecy performance.
Additionally, a smaller results in a higher achievable total secrecy rate, an expected outcome. A smaller imposes more relaxed constraints on system design, allowing for greater flexibility and enhanced secrecy performance. In practical scenarios, it is crucial to strike an appropriate balance between system secrecy and communication rates.
Similarly, Figure 4 shows the effect of the number of transmit antennas and the power budget on the secrecy performance of the DFRC system under different beamforming thresholds . The system’s secrecy rate improves with an increase in both the power budget and the number of transmit antennas. Additionally, a larger imposes more relaxed constraints on the DFRC system design, leading to higher secrecy rates. It is noteworthy that as increases, the difference in total secrecy rates across systems with varying numbers of transmit antennas becomes more pronounced. This is because looser constraints provide greater system flexibility and higher degrees of freedom.
In Figure 5, we present the transmit beam patterns achieved by the proposed scheme under random channel conditions. The parameters are set as , bit/s/Hz, dB, dB, and dB. The beam pattern for “Radar-only” is obtained by solving problems (8a)–(8d). Obviously, the beam pattern designed using the NOMA scheme closely approximates the ideal radar beam pattern, satisfying the sensing requirements for the target to be detected.
Moreover, as decreases, the beam pattern generated by the NOMA scheme becomes increasingly similar to that of the ideal radar system. However, this improvement comes at the cost of reduced secrecy rates.
To demonstrate the superiority of the proposed scheme, we compare the secrecy rate of the proposed method (“NOMA-DFRC”) with that of the conventional DFRC system (“Conventional DFRC”) and the artificial noise-aided DFRC system [37] (“AN-aid DFRC”). The secrecy rate maximization mathematical model for the “Conventional DFRC” can be denoted as
(36)
As shown in Figure 6, The proposed scheme has a significantly higher secrecy rate than other traditional schemes. Additionally, for the AN-aided DFRC system under the same power budget, the system provides higher degrees of freedom, leading to a more substantial improvement in secrecy performance.
5.2. Performance Analysis of Robust Secure NOMA-DFRC System
Now, let us consider the scenario where the eavesdropper’s CSI is unknown. First, we present the convergence analysis curves of Algorithm 2 for and transmit antennas, and various channel estimation errors , , and . As shown in Figure 7, it can be observed that, for different channel estimation errors and numbers of transmit antennas, the system’s WCSR increases monotonically with the number of iterations. After three iterations, the values converge to a fixed point, demonstrating the convergence and effectiveness of the algorithm.
Algorithm 2 Robust secure beamforming design for DFRC with imperfect CSI of the eavesdropper. |
Input: , , , , , , , , ,
|
Figure 8 shows the performance of the robust method under varying error coefficients . As anticipated, the greater CSI uncertainty results in a lower WCSR for the system. This is because a certain level of secrecy performance must be sacrificed to mitigate the effects of channel uncertainty. Additionally, an increase in transmit antennas enhances the system’s available degrees of freedom, leading to a higher WCSR.
Figure 9 compares the system security performance of the robust secure transmission Algorithm 2 (“Robust Method”) with that of the conventional non-robust method (“Non-robust”). The conventional non-robust method directly uses outdated CSI, i.e., the estimated eavesdropper channel with errors, as the actual channel [38]. “Perfect CSI” represents the system’s security performance obtained using Algorithm 1 in the absence of channel errors. Through comparison, we can draw the following conclusions:
(1) When channel errors are present, the proposed robust Algorithm 2 achieves a higher WCSR compared to the conventional method. (2) The smaller the channel error, the closer the WCSR of the system obtained by Algorithm 2 to that of the perfect CSI system, leading to better security performance and robustness. (3) As the transmit power increases, the corresponding system WCSR also increases.
Therefore, to achieve near-optimal secrecy performance, the eavesdropper’s CSI uncertainty should be strictly controlled within a narrow range.
6. Discussion
This entire article addresses the problem of secure transmit beamforming design in NOMA-assisted DFRC systems. The transmitted superimposed signals are utilized for communication and radar sensing, while SIC is employed to remove inter-user interference. Two potential scenarios are considered: one where the eavesdropper’s CSI is precisely known, and another where the eavesdropper’s CSI is unavailable. For the scenario with precise eavesdropper CSI, the optimization problem is converted into a tractable convex problem that can be efficiently addressed using fractional programming. The total secrecy rate of the system is then solved iteratively through optimization. For the scenario where the eavesdropper’s CSI is unavailable, a robust transmit beamforming optimization model is developed. By leveraging the S-procedure and Taylor series expansion, the original problem is reformulated into a convex optimization problem characterized by LMI, enabling efficient and tractable solutions using standard optimization techniques. Numerical results demonstrate that the proposed algorithms significantly enhance the system’s security performance in both scenarios. In practical applications, the relevant metrics should be adjusted in real time based on specific requirements to meet diverse demands.
Conceptualization, Z.C. and S.Z.; methodology, Z.C. and X.L.; software, Z.C. and X.L.; validation, Z.C. and X.L.; formal analysis, Z.C. and X.L.; investigation, Z.C. and X.L.; resources, S.Z. and X.L.; data curation, Z.C. and S.Z.; writing—original draft preparation, Z.C.; writing—review and editing, X.L. and S.Z.; visualization, Z.C. and S.Z.; supervision, X.L. and S.Z.; project administration, S.Z. and X.L.; funding acquisition, S.Z. and X.L. All authors have read and agreed to the published version of the manuscript.
The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.
The authors declare no conflicts of interest.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Figure 3. Secrecy rate versus power budgets under different M and [Forumla omitted. See PDF.].
Figure 4. Secrecy rate versus power budgets under different M and [Forumla omitted. See PDF.].
Figure 8. WCSR versus power budgets under different M and [Forumla omitted. See PDF.].
Figure 9. Comparison between the proposed method and conventional approach in terms of the WCSR.
References
1. Li, B.; Petropulu, A.P. Joint Transmit Designs for Coexistence of MIMO Wireless Communications and Sparse Sensing Radars in Clutter. IEEE Trans. Aerosp. Electron. Syst.; 2017; 53, pp. 2846-2864. [DOI: https://dx.doi.org/10.1109/TAES.2017.2717518]
2. Li, B.; Petropulu, A.P.; Trappe, W. Optimum Co-Design for Spectrum Sharing between Matrix Completion Based MIMO Radars and a MIMO Communication System. IEEE Trans. Signal. Process.; 2016; 64, pp. 4562-4575. [DOI: https://dx.doi.org/10.1109/TSP.2016.2569479]
3. Kang, B.; Aldayel, O.; Monga, V.; Rangaswamy, M. Spatio-Spectral Radar Beampattern Design for Coexistence with WirelessCommunication Systems. IEEE Trans. Aerosp. Electron. Syst.; 2019; 55, pp. 644-657. [DOI: https://dx.doi.org/10.1109/TAES.2018.2864408]
4. Liu, X.; Huang, T.; Shlezinger, N.; Liu, Y.; Zhou, J.; Eldar, Y.C. Joint Transmit Beamforming for Multiuser MIMO Communications and MIMO Radar. IEEE Trans. Signal. Process.; 2020; 68, pp. 3929-3944. [DOI: https://dx.doi.org/10.1109/TSP.2020.3004739]
5. Liu, M.; Yang, M.; Li, H.; Zeng, K.; Zhang, Z.; Nallanathan, A.; Wang, G.; Hanzo, L. Performance analysis and power allocation for cooperative ISAC networks. IEEE Internet Things J.; 2023; 10, pp. 6336-6351. [DOI: https://dx.doi.org/10.1109/JIOT.2022.3225281]
6. Ma, S.; Zhang, Y.; Li, H.; Shi, J.S.J.; Zhang, H. Covert beamforming design for intelligent-reflecting-surface assisted IoT networks. IEEE Internet Things J.; 2022; 9, pp. 5489-5501. [DOI: https://dx.doi.org/10.1109/JIOT.2021.3109746]
7. Jing, Z.; Mu, J.; Li, X.; Zhou, Q.; Tian, Q. Efficient fusion and reconstruction for communication and sensing signals in green IoT networks. IEEE Internet Things J.; 2023; 10, pp. 9319-9328. [DOI: https://dx.doi.org/10.1109/JIOT.2022.3222513]
8. Yuan, W.; Liu, F.; Masouros, C.; Yuan, J.; Ng, D.W.K.; González-Prelcic, N. Bayesian predictive beamforming for vehicular networks: A low-overhead joint radar-communication approach. IEEE Trans. Wirel. Commun.; 2021; 20, pp. 1442-1456. [DOI: https://dx.doi.org/10.1109/TWC.2020.3033776]
9. Meng, K.; Wu, Q.; Ma, S.; Chen, W.; Quek, T.Q.S. UAV trajectory and beamforming optimization for integrated periodic sensing and communication. IEEE Wirel. Commun. Lett.; 2022; 11, pp. 1211-1215. [DOI: https://dx.doi.org/10.1109/LWC.2022.3161338]
10. Cheng, Z.; He, Z.; Liao, B. Hybrid Beamforming Design for OFDM Dual-Function Radar-Communication System. IEEE J. Sel. Top. Signal Process.; 2021; 15, pp. 1455-1467. [DOI: https://dx.doi.org/10.1109/JSTSP.2021.3118276]
11. Zhu, Q.; Li, M.; Liu, R.; Liu, Q. Joint Transceiver Beamforming and Reflecting Design for Active RIS-Aided ISAC Systems. IEEE Trans. Veh. Technol.; 2023; 72, pp. 9636-9640. [DOI: https://dx.doi.org/10.1109/TVT.2023.3249752]
12. Wang, Z.; Liu, Y.; Mu, X.; Ding, Z.; Dobre, O.A. NOMA Empowered Integrated Sensing and Communication. IEEE Commun. Lett.; 2022; 26, pp. 677-681. [DOI: https://dx.doi.org/10.1109/LCOMM.2022.3140271]
13. Dou, C.; Huang, N.; Wu, Y.; Qian, L.; Quek, T.Q.S. Sensing-Efficient NOMA-Aided Integrated Sensing and Communication: A Joint Sensing Scheduling and Beamforming Optimization. IEEE Trans. Veh. Technol.; 2023; 72, pp. 13591-13603. [DOI: https://dx.doi.org/10.1109/TVT.2023.3277734]
14. Memisoglu, E.; Türkmen, H.; Ozbakis, B.A.; Arslan, H. CSI-Based NOMA for Integrated Sensing and Communication. IEEE Trans. Wirel. Commun.; 2023; 12, pp. 1086-1090. [DOI: https://dx.doi.org/10.1109/LWC.2023.3262280]
15. Wang, Z.; Mu, X.; Liu, Y.; Xu, X.; Zhang, P. NOMA-Aided Joint Communication, Sensing, and Multi-Tier Computing Systems. IEEE J. Sel. Area. Commun.; 2023; 41, pp. 574-588. [DOI: https://dx.doi.org/10.1109/JSAC.2022.3229447]
16. Chu, J.; Liu, R.; Li, M.; Liu, Y.; Liu, Q. Joint Secure Transmit Beamforming Designs for Integrated Sensing and Communication Systems. IEEE Trans. Veh. Technol.; 2023; 72, pp. 4778-4791. [DOI: https://dx.doi.org/10.1109/TVT.2022.3225952]
17. Liu, Y.; Liu, X.; Liu, Z.; Yu, Y.; Jia, M.; Na, Z.; Durrani, T.S. Secure Rate Maximization for ISAC-UAV Assisted Communication Amidst Multiple Eavesdroppers. IEEE Trans. Veh. Technol.; 2024; 73, pp. 15843-15847. [DOI: https://dx.doi.org/10.1109/TVT.2024.3412805]
18. Jiang, C.; Zhang, C.; Huang, C.; Ge, J.; He, J.; Yuen, C. Secure Beamforming Design for RIS-Assisted Integrated Sensing and Communication Systems. IEEE Wireless Commun. Lett.; 2024; 13, pp. 520-524. [DOI: https://dx.doi.org/10.1109/LWC.2023.3334275]
19. Hua, M.; Wu, Q.; Chen, W.; Dobre, O.A.; Swindlehurst, A.L. Secure Intelligent Reflecting Surface-Aided Integrated Sensing and Communication. IEEE Trans. Wireless Commun.; 2024; 23, pp. 575-591. [DOI: https://dx.doi.org/10.1109/TWC.2023.3280179]
20. Su, N.; Liu, F.; Masouros, C. Sensing-Assisted Eavesdropper Estimation: An ISAC Breakthrough in Physical Layer Security. IEEE Trans. Wireless Commun.; 2024; 23, pp. 3162-3174. [DOI: https://dx.doi.org/10.1109/TWC.2023.3306029]
21. Wang, B.; Mu, P. Artificial Noise-Aided Secure Multicasting Design Under Secrecy Outage Constraint. IEEE Trans. Commun.; 2017; 65, pp. 5401-5414. [DOI: https://dx.doi.org/10.1109/TCOMM.2017.2748118]
22. Liao, W.-C.; Chang, T.-H.; Ma, W.-K.; Chi, C.-Y. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach. IEEE Trans. Signal. Process.; 2011; 59, pp. 1202-1216. [DOI: https://dx.doi.org/10.1109/TSP.2010.2094610]
23. Li, Q.; Ma, W.-K. Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization. IEEE Trans. Signal. Process.; 2013; 61, pp. 2704-2717. [DOI: https://dx.doi.org/10.1109/TSP.2013.2253771]
24. Zhao, N.; Wang, W.; Wang, J.; Chen, Y.; Lin, Y.; Ding, Z.; Beaulieu, N.C. Joint Beamforming and Jamming Optimization for Secure Transmission in MISO-NOMA Networks. IEEE Trans. Commun.; 2019; 67, pp. 2294-2305. [DOI: https://dx.doi.org/10.1109/TCOMM.2018.2883079]
25. Zhang, Y.; Wang, H.-M.; Yang, Q.; Ding, Z. Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access. IEEE Commun. Lett.; 2016; 20, pp. 930-933. [DOI: https://dx.doi.org/10.1109/LCOMM.2016.2539162]
26. Pauls, J.; Vaezi, M. Secure Precoding in MIMO-NOMA: A Deep Learning Approach. IEEE Wireless Commun. Lett.; 2021; 11, pp. 77-80. [DOI: https://dx.doi.org/10.1109/LWC.2021.3120594]
27. Yang, Z.; Li, D.; Zhao, N.; Wu, Z.; Li, Y.; Niyato, D. Secure Precoding Optimization for NOMA-Aided Integrated Sensing and Communication. IEEE Trans. Commun.; 2022; 70, pp. 8370-8382. [DOI: https://dx.doi.org/10.1109/TCOMM.2022.3216636]
28. Cumanan, K.; Ding, Z.; Sharif, B.; Tian, G.Y.; Leung, K.K. Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper. IEEE Trans. Veh. Technol.; 2014; 63, pp. 1678-1690. [DOI: https://dx.doi.org/10.1109/TVT.2013.2285244]
29. Luo, D.; Ye, Z.; Si, B.; Zhu, J. Secure Transmit Beamforming for Radar-Communication System Without Eavesdropper CSI. IEEE Trans. Veh. Technol.; 2022; 71, pp. 9794-9804. [DOI: https://dx.doi.org/10.1109/TVT.2022.3182874]
30. Shen, K.; Yu, W. Fractional Programming for Communication SystemsłPart II: Uplink Scheduling via Matching. IEEE Trans. Signal.Process.; 2018; 66, pp. 2631-2644. [DOI: https://dx.doi.org/10.1109/TSP.2018.2812748]
31. Hunter, D.R.; Lange, K. A tutorial on MM algorithms. Amer.Statist.; 2004; 58, pp. 30-37. [DOI: https://dx.doi.org/10.1198/0003130042836]
32. Li, B.; Fei, Z.; Chu, Z.; Zhou, F.; Wong, K.-K.; Xiao, P. Robust chance-constrained secure transmission for cognitive satellite–terrestrial networks. IEEE Trans. Veh. Technol.; 2018; 67, pp. 4208-4219. [DOI: https://dx.doi.org/10.1109/TVT.2018.2791859]
33. Li, B.; Fei, Z.; Xu, X.; Chu, Z. Resource allocations for secure cognitive satellite-terrestrial networks. IEEE Wireless Commun. Lett.; 2018; 7, pp. 78-81. [DOI: https://dx.doi.org/10.1109/LWC.2017.2755014]
34. Wang, X.; Wang, K.; Zhang, X.-D. Secure relay beamforming with imperfect channel side information. IEEE Trans. Veh. Technol.; 2013; 62, pp. 2140-2155. [DOI: https://dx.doi.org/10.1109/TVT.2012.2230657]
35. Luo, Z.-Q.; Ma, W.-K.; So, A.M.-C.; Ye, Y.; Zhang, S. Semidefinite relaxation of quadratic optimization problems. IEEE Signal Process.; 2010; 27, pp. 20-34. [DOI: https://dx.doi.org/10.1109/MSP.2010.936019]
36. Kermoal, J.P.; Schumacher, L.; Pedersen, K.I.; Mogensen, P.E.; Frederiksen, F. A stochastic MIMO radio channel model with experimental validation. IEEE J. Sel. Areas Commun.; 2002; 20, pp. 1211-1226. [DOI: https://dx.doi.org/10.1109/JSAC.2002.801223]
37. Su, N.; Liu, F.; Masouros, C. Secure Radar-Communication Systems with Malicious Targets: Integrating Radar, Communications and Jamming Functionalities. IEEE Trans. Wireless Commun.; 2021; 20, pp. 83-95. [DOI: https://dx.doi.org/10.1109/TWC.2020.3023164]
38. Gharanjik, A.; Shankar, M.R.B.; Arapoglou, P.-D.; Bengtsson, M.; Ottersten, B. Robust precoding design for multibeam downlink satellite channel with phase uncertainty. Proceedings of the 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP); South Brisbane, QLD, Australia, 19–24 April 2015; pp. 3083-3087.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
This paper investigates a multi-antenna, multi-input multi-output (MIMO) dual-functional radar and communication (DFRC) system platform. The system simultaneously detects radar targets and communicates with downlink cellular users. However, the modulated information within the transmitted waveforms may be susceptible to eavesdropping. To ensure the security of information transmission, we introduce non-orthogonal multiple access (NOMA) technology to enhance the security performance of the MIMO-DFRC platform. Initially, we consider a scenario where the channel state information (CSI) of the radar target (eavesdropper) is perfectly known. Using fractional programming (FP) and semidefinite relaxation (SDR) techniques, we maximize the system’s total secrecy rate under the requirements for radar detection performance, communication rate, and system energy, thereby ensuring the security of the system. In the case where the CSI of the radar target (eavesdropper) is unavailable, we propose a robust secure beamforming optimization model. The channel model is represented as a bounded uncertainty set, and by jointly applying first-order Taylor expansion and the S-procedure, we transform the original problem into a tractable one characterized by linear matrix inequalities (LMIs). Numerical results validate the effectiveness and robustness of the proposed approach.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer