Next Article in Journal
Embedding a Real-Time Strawberry Detection Model into a Pesticide-Spraying Mobile Robot for Greenhouse Operation
Previous Article in Journal
A Novel Technique for High-Efficiency Characterization of Complex Cracks with Visual Artifacts
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Beamforming Design for UAV-Empowered Integrated Sensing and Communication

1
Jiangsu Key Laboratory of Wireless Communications, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
2
Engineering Research Center of Health Service System Based on Ubiquitous Wireless Networks, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(16), 7196; https://doi.org/10.3390/app14167196
Submission received: 27 June 2024 / Revised: 11 August 2024 / Accepted: 13 August 2024 / Published: 15 August 2024
(This article belongs to the Section Electrical, Electronics and Communications Engineering)

Abstract

:
Integrated sensing and communication (ISAC) systems assisted by unmanned aerial vehicles (UAVs) are susceptible to eavesdropping, making secure information transmission a critical area of research. We propose a joint optimization algorithm to improve the security of UAV-assisted ISAC systems through coordinated adjustments of transmit beamforming and UAV position. The optimization problem aims to minimize the maximum eavesdropping signal-to-interference-plus-noise ratio (SINR) across multiple legitimate users while adhering to three distinct constraints: service quality for legitimate users, sensing requirements for detecting eavesdroppers, and limitations on system transmit power. To address the non-convex optimization challenge effectively, the problem is decomposed into sub-problems focusing on the optimization of transmit beamforming and UAV position. These sub-problems are solved using semidefinite relaxation (SDR), the Dinkelbach method, and successive convex approximation (SCA), with iterative alternation achieving optimal values for the transmit beamforming and UAV position while also proving the convergence of the algorithm. Lastly, simulation results illustrate that the proposed algorithm markedly improves the system’s security performance while preserving its communication and sensing capabilities.

1. Introduction

Amid the rapid advancement of wireless networks, the need for efficient information transmission within the communications sector is consistently intensifying [1,2]. However, with the booming development of the Internet of Things (IoT), communication systems, such as autonomous driving and telemedicine, are required not only to meet traditional needs but also to possess advanced sensing capabilities. This dual demand has made spectrum resources increasingly scarce [3,4]. To address the combined needs of communication and sensing in future wireless systems, researchers have begun to explore the possibility of jointly designing sensing and communication systems to enhance spectral efficiency and reduce hardware costs [5].
At the same time, advancements in multi-antenna and beamforming technologies have brought significant attention to their applications in both sensing and communication [6,7,8,9]. The integration of these technologies has unveiled new opportunities for advancing ISAC systems. In [6], an optimization algorithm was proposed to maximize the mutual information of radar systems. This study also analyzed how the distance to radar targets affects communications and the perceptual performance impact on communication users. Utilizing reconfigurable intelligent surfaces (RIS) can further enhance the performance of ISAC systems [9,10]. In [9], optimizations for two types of RIS were explored: one dedicated to communication and another supporting both communication and sensing. The research entailed adjustments to the transmitting beamforming of the multi-antenna base station and the phase shifts of the RIS.
Due to the significant strides made in UAV technology, they have become a highly promising aerial platform within ISAC systems, offering new solutions to overcome the limitations of traditional ground networks. The introduction of highly mobile and flexible UAVs enables ISAC systems to exhibit superior performance in specific scenarios. Optimization challenges for UAVs in both hovering and flying states were explored, with a focus on the joint design of UAV trajectories and beamforming weights to enhance the ISAC system’s performance [11]. Considering the potential impact of sensed signal reception on the communication signal-to-noise ratio, a time-division sensing mechanism was proposed [12]. This mechanism allows the flexible allocation of UAV sensing times, enabling sensing and communication to occur non-simultaneously. By jointly optimizing UAV flight trajectories, beamforming weights, and user reception weights, the communication performance of the system has been further enhanced. In the aforementioned system, UAVs act as base stations. In [13], UAVs were utilized as relays, with the information age serving as a performance metric. The research minimized this metric by alternately optimizing UAV trajectories, transmit power, and service times, thereby enhancing communication and sensing coverage, as well as overall ISAC system performance. A multi-UAV-assisted ISAC system, where UAVs transmit information to moving ground users while simultaneously sensing them [14]. In [15], the deployment of multiple UAVs to transmit dual-function signals for both communication and location tracking of ground users was discussed. In contrast to [14], this study utilized an extended Kalman filter to accurately estimate and predict the time delays and Doppler shifts in the reflected signals from targets, which ensures precise target tracking.
As ISAC systems rapidly evolve, although their communication and sensing capabilities are increasingly robust, the openness of wireless communication media has raised security concerns, particularly regarding the physical layer security (PLS) of ISAC systems [16]. Artificial noise (AN) is utilized to disrupt eavesdroppers, aiming to maximize the power of AN given that the base station is unaware of the eavesdropper’s channel state, which hinders eavesdropping while maintaining robust communication and sensing performance [17,18]. RIS is employed to optimize transmission beamforming weights and phase shifts, aiming to maximize the perceptual beam pattern gain irrespective of the eavesdropper’s channel state knowledge [19].
Research on the security of UAV-assisted ISAC systems has just begun. In [20], the Stackelberg game model was utilized to analyze the power strategy game between UAVs and eavesdroppers, considering scenarios where the eavesdropper’s channel state is both known and unknown. A distance-based UAV positioning optimization strategy aimed at maximizing the number of users receiving secure communication services was conducted in [21]. However, ref. [20] focused solely on a single-antenna model, whereas [21] implemented maximum ratio combining for transmit beamforming. Addressing the scenario in which multiple eavesdropping targets and communication users coexist, this paper proposes a joint optimization algorithm for UAV transmit beamforming and position. The algorithm employs the SDR and SCA methods for iterative optimization. We seek to minimize the maximum eavesdropping SINR while maintaining communication performance for users and sensing accuracy for targets, thereby bolstering the system’s security. The principal contributions of this paper are outlined as follows:
(1)
Given the security concerns of the UAV-assisted ISAC system, we tackle the challenge of detecting eavesdroppers while facilitating communication with legitimate users. Under the constraints of transmit power, legitimate communication quality of service, and sensing beam pattern gain, the problem is formulated as a joint optimization of UAV positioning and communication and sensing beamforming, aiming to minimize the maximum eavesdropping SINR.
(2)
Owing to the coupling between UAV communication and sensing beamforming, coupled with the intricate relationship between UAV positioning and steering vectors, the problem is inherently non-convex. To address this, the problem is decomposed into two sub-problems: beamforming optimization and UAV positioning optimization. For the UAV positioning sub-problem, a SCA algorithm, leveraging the first-order Taylor expansion, is employed to transform the non-convex problem into a convex one. This problem is subsequently resolved using the CVX toolbox.
(3)
For the beamforming optimization sub-problem, the max-min problem is addressed by introducing slack variables, and the fractional optimization problem is solved using the Dinkelbach method. The optimal beamforming is then determined using the semidefinite relaxation algorithm by ignoring the rank-one constraint and solving through eigenvalue decomposition. Simulation results indicate that the proposed algorithm substantially improves the security performance of the ISAC system, concurrently maintaining robust communication and sensing capabilities.
This paper is structured as follows: Section 2 outlines the system model and the problem formulation; Section 3 details the joint optimization algorithm; Section 4 provides an analysis of the simulation results and performance; and Section 5 offers the conclusions. For ease of reference, essential notations employed in this paper are compiled in Table 1.

2. System Model and Problem Formulation

As illustrated in Figure 1, we explore a UAV-assisted ISAC system comprising a UAV that serves as a dual-function base station, legitimate users, and potential eavesdropping targets. The UAV is equipped with an  N -antenna uniform linear array (ULA), enabling simultaneous communication with  K 1 single-antenna users on the ground while detecting  J single-antenna eavesdroppers also located on the ground.

2.1. Communication Model

We consider a scenario in which the UAV transmits information signals to legitimate users while simultaneously sending sensing signals to detect eavesdroppers. We employ two different signals for communication and sensing. Let  s k c denote the desired communication signal sent by the UAV to the legitimate user  k ω k c N × 1 denote the corresponding communication beamforming vector,  s n r denote the dedicated radar sensing signal sent by the UAV,  ω n r N × 1 and denote the corresponding sensing beamforming vector. The transmitted signal of the UAV is then given by [12,19]:
x = k = 1 K ω k c s k c + n = 1 N ω n r s n r
Assuming, without loss of generality, that both the communication signal  s k c , k and the sensing signal  s n r , n are independent and identically distributed complex Gaussian random variables with zero mean and unit variance, i.e.,  s k c C N 0 , 1 [18]. Therefore, the average transmit power of the UAV is  E x 2 = k = 1 K ω k c 2 + n = 1 N ω n r 2 . Assuming the maximum transmit power of the UAV is  P max , the UAV transmit power constraint can be expressed as:
k = 1 K ω k c 2 + n = 1 N ω n r 2 P max
We consider a three-dimensional (3D) Cartesian coordinate system, assuming the UAV flight altitude is  H meters. The position of the UAV is denoted as  x , y , H q = x , y representing its horizontal position. The position of the legitimate user  k is fixed at  x k , y k , 0 u k = x k , y k representing its horizontal position, and the position of the  j -th eavesdropper is fixed at  x e , j , y e , j , 0 e j = x e , j , y e , j representing its horizontal position. Due to the relatively high deployment altitude of the UAV, there exists a strong Line of Sight (LOS) link between the UAV and each user. Therefore, we model the channel as an LOS channel.
The LOS communication channel from the UAV to the user  k is given by:
h k q , u k = β d 2 q , u k a q , u k = β H 2 + q u k 2 a q , u k
where  h k q , u k N × 1 β represents the signal power attenuation gain at the reference distance  d 0 = 1   m d q , u k = H 2 + q u k 2 represents the distance between the UAV and the user  k , and  a q , u k N × 1 represents the beamforming steering vector of the UAV toward the user  k , which can be expressed as:
a q , u k = 1 ,   exp j 2 π d a r r λ cos θ q , u k ,   ,   exp j 2 π d a r r λ N 1 cos θ q , u k T
where  d a r r represents the distance between two adjacent antennas in the linear array,  λ represents the wavelength of the carrier signal, typically  d a r r = λ / 2 cos θ q , u k denotes the cosine of the Angle of Departure (AoD) for the user  k , given by:
cos θ q , u k = H H 2 + q u k 2
The signal received by the legitimate user  k can be expressed as:
y k = h k H q , u k x + n k = h k H q , u k ω k c s k c desired   k - th   user   signal + i = 1 , i k K h k H q , u k ω i c s i c interference   signals   from   other   users + n = 1 N h k H q , u k ω n r s n r sensing   interference   signal + n k AWGN
where  n k C N 0 , σ k 2 represents the additive white Gaussian noise (AWGN) received by the user  k . From (6), it can be observed that the user  k receives not only its desired communication signal but also the communication signals from other users, the sensing signals, and the additive noise. Therefore, the SINR for the user  k can be expressed as:
SIN R k = h k H q , u k ω k c 2 i = 1 , i k K h k H q , u k ω i c 2 + n = 1 N h k H q , u k ω n r 2 + σ k 2
Analogous to the signal received by legitimate users, the expression for the signal intercepted by the  j -th eavesdroppers is as follows:
y e , j = i = 1 K g j H q , e j ω i c s i c + n = 1 N g j H q , e j ω n r s n r + z e = g j H q , e j ω k c s i c eavesdropped   signal + i = 1 , i k K g j H q , e j ω i c s i c interference   signals   from   other   users + n = 1 N g j H q , e j ω n r s n r sensing   interference   signal + z e AWGN
where  g j q , e j = β d 2 q , e j a q , e j N × 1 represents the eavesdropping channel,  d q , e j represents the distance between the UAV and the eavesdropper  j , and  a q , e j represents the beamforming steering vector of the UAV toward the eavesdropper  j , with an expression similar to (4).  z e C N 0 , σ e 2 represents the AWGN received by the eavesdropper. Therefore, SINR for the eavesdropper  j listening to the user  k can be expressed as:
SIN R j , k e = g j H q , e j ω k c 2 i = 1 , i k K g j H q , e j ω i c 2 + n = 1 N g j H q , e j ω n r 2 + σ e 2
To safeguard the communication security of the ISAC system, it is essential to minimize the maximum eavesdropping SINR while maintaining effective communication between the UAV and legitimate users.

2.2. Sensing Model

The entire sensing process of the UAV is divided into two stages. In the first stage, the UAV emits an omnidirectional scanning signal that can detect multiple users, including both legitimate and illegitimate ones. The UAV distinguishes between legitimate users and eavesdroppers through three scenarios:
(1)
Several legitimate users will actively transmit signals to the UAV, providing their identity and location information. The UAV authenticates this information, and if it passes, the users are confirmed as legitimate. Otherwise, they are considered eavesdroppers.
(2)
The UAV then sends an authentication request to the remaining users. Some users will respond to the authentication request, and the UAV will authenticate this information; if it passes, they are identified as legitimate users. Otherwise, they are considered eavesdroppers.
(3)
If a user neither actively transmits identity information nor responds to the UAV authentication request, the UAV considers them an eavesdropper.
In the second stage, to ensure secure communication and further sense the eavesdroppers, the UAV employs beamforming technology. We formulate an optimization problem aimed at minimizing the maximum eavesdropping SINR while satisfying the communication threshold for legitimate users, the sensing threshold for the target, and the power budget. This approach is designed to maximize the system’s security performance.
However, with the method described above, we cannot distinguish between actual eavesdroppers and non-responding users, such as regular people who are neither system users nor eavesdroppers, as they do not interact with the system. This limitation can result in false alarms.
In the second stage, the composite signals transmitted by the UAV are reflected by the sensing target. Analyzing these reflected signals enables the estimation of relevant target information. The power of the reflected signals can be determined by calculating the beam pattern gain from the UAV directed toward the target, combined with the path loss. Given the requirement for the UAV to sense the presence of the eavesdropper, we employ the beam pattern gain in the eavesdropper’s direction as the metric for sensing performance [22]. In this paper, the communication and sensing signals transmitted by the UAV are jointly utilized for the sensing function. Therefore, for any sensing angle  θ q , e j π 2 , π 2 , the beam pattern gain  ς θ q , e j can be expressed as:
ς θ q , e j = E a H q , e j x 2 = a H q , e j k = 1 K ω k c ω k c H + n = 1 N ω n r ω n r H a q , e j
The power of the signals reflected from the sensing target to the UAV, incorporating path loss, is described by  ( 10 ) and the distance between the two. Detailed computational constraints are provided in constraint  C 2 .

2.3. Problem Formulation

From Equations (7), (9) and (10), it can be observed that the UAV communication and sensing beamforming ( ω k c , k   and   ω n r , n ) and its position ( q ) collectively influence the system’s communication and sensing functionalities. Furthermore, the presence of an eavesdropper means these variables also significantly impact the system’s security.
Therefore, we propose a joint optimization of the UAV communication and sensing beamforming ( ω k c , k   and   ω n r , n ) and the UAV position ( q ), aiming to minimize the maximum eavesdropper SINR while adhering to the QoS requirements of legitimate users, meeting the sensing metric constraints for the eavesdropper, and complying with the UAV transmit power limitations. Consequently, the optimization problem is formulated as follows:
P 1 : min ω k c , ω n r , q max j , k ( SIN R j , k e = g j H q , e j ω k c 2 i = 1 , i k K g j H q , e j ω i c 2 + n = 1 N g j H q , e j ω n r 2 + σ e 2 )   s . t .     C 1 :   SIN R k = h k H q , u k ω k c 2 i = 1 , i k K h k H q , u k ω i c 2 + n = 1 N h k H q , u k ω n r 2 + σ k 2 Γ k com , k                 C 2 : ς θ q , e j =   a H q , e j k = 1 K ω k c ω k c H + n = 1 N ω n r ω n r H a q , e j d 2 q , e j Γ e sen , j                   C 3 : k = 1 K ω k c 2 + n = 1 N ω n r 2 P max
where  Γ k com represents the minimum SINR threshold required for the legitimate user  k to satisfy the communication quality of service, and  Γ e sen represents the sensing threshold. The constraint  C 1 stipulates the QoS requirement of UAV and legitimate user  k communication, constraint  C 2 indicates that the beam pattern gain of the UAV toward the eavesdropper  j must be greater than the product of the sensing threshold  Γ e sen and the square of the distance between the UAV and the eavesdropper  j , and constraint  C 3 ensures that the power of the signal transmitted by the UAV must not exceed the maximum transmit power  P max .
The objective function and constraint  C 1 in problem  P 1 are quadratic fractional form, and the steering vector  a q , e j in constraint  C 2 is highly coupled with the variable  q . Additionally,  ω k c , k   and   ω n r , n are also highly coupled, rendering problem  P 1 a highly non-convex problem which is challenging to solve directly. To solve  P 1 , we decompose it into two subproblems: beamforming optimization and UAV positioning optimization. These subproblems are solved iteratively to obtain a suboptimal solution.

3. Joint Optimization Algorithm

In this section, we use an alternating iterative method to solve problem  P 1 . First, we fix the UAV position and introduce slack variables to solve for the optimal transmitting beamforming  ω k c , k and  ω n r , n using the Dinkelbach method. Then, with the transmitting beamforming fixed, we use the SCA algorithm to find the optimal position  q . This process is iteratively repeated until convergence is achieved.

3.1. Transmit Beamforming Optimization

Given the UAV position  q , the optimization subproblem for the beamforming  ω k c , k and  ω n r , n can be formulated as:
P 2 : min ω k c , ω n r max j , k SIN R j , k e   s . t .   C 1 , C 2 , C 3
Notice that problem  P 2 is an MM (minorize maximization) problem. To simplify the solution, we introduce an auxiliary variable  A , transforming the MM problem into a minimization problem. The reformulated problem  P 2 is expressed as:
P 3 : min ω k c , ω n r , A   A s . t .   C 4 : SIN R j , k e = g j H q , e j ω k c 2 i = 1 , i k K g j H q , e j ω i c 2 + n = 1 N g j H q , e j ω n r 2 + σ e 2 A , j , k             C 1 , C 2 , C 3
This is a minimization problem, but due to the single fractional constraint  C 4 and non-convex constraints  C 1 and  C 2 , problem  P 3 remains difficult to solve. Noticing that problem  P 3 has a similar fractional programming form to those in [10,17], we can apply the Dinkelbach transformation to convert it into a solvable form, i.e., transforming the fractional constraint into a polynomial expression. By introducing an auxiliary variable  c j , k , constraint  C 4 is rewritten as:
g j H q , e j ω k c 2 c j , k i = 1 , i k K g j H q , e j ω i c 2 + n = 1 N g j H q , e j ω n r 2 + σ e 2 A , j , k
The auxiliary variable  c j , k essentially represents the eavesdropping SINR of the eavesdropper  j for the user  k [17], and it can be updated using the transmit beamforming  ω k c , k and  ω n r , n . When the transmit beamforming is given, the optimal  c j , k * can be expressed as:
c j , k = g j H q , e j ω k c 2 i = 1 , i k K g j H q , e j ω i c 2 + n = 1 N g j H q , e j ω n r 2 + σ e 2 , j , k
It can be seen that constraints  C 1 C 2 , and  C 3 contain quadratic variables  ω k c , k and  ω n r , n , making the problem difficult to handle. Therefore, we adopt the SDR method. We define  W k c ω k c ω k c H , k and  W n r ω n r ω n r H , n , with the rank-one constraint expressed as:
Rank W k c = 1 , k Rank W n r = 1 , n
Problem  P 3 can be transformed into:
P 4 : min W k c , W n r , A   A s . t . C 5 : tr g j q , e j g j H q , e j W k c c j , k i = 1 , i k K tr g j q , e j g j H q , e j W i c + n = 1 N tr g j q , e j g j H q , e j W n r + σ e 2 A , j , k   C 6 : tr h k q , u k h k H q , u k W k c i = 1 , i k K tr h k q , u k h k H q , u k W i c + n = 1 N tr h k q , u k h k H q , u k W n r + σ k 2 Γ k com , k     C 7 : a H q , e j k = 1 K W k c + n = 1 N W n r a q , e j d 2 q , e j Γ e sen , j   C 8 : k = 1 K tr W k c + n = 1 N tr W n r P max   C 9 : rank W k c 1 , k   C 10 : rank W n r 1 , n
Ignoring the rank-one constraint, problem  P 4 becomes a SDR problem, which we solve using the CVX toolbox. Since the rank-one constraint is ignored, we perform eigenvalue decomposition to obtain  ω k c , k and  ω n r , n , and check if their ranks are one. If not, Gaussian randomization is applied to convert the high-rank solution of problem  P 4 into a feasible rank-one solution. The details are shown in Algorithm 1.
Algorithm 1: UAV transmit beamforming optimization
Input:  u k e j q P max Γ k com Γ e sen
Output:  ω k c , k and  ω n r , n
1. Given the initial value  c j , k , j , k , set the minimum increment  ε min .
2. Repeat:
3.   Solve the optimization problem  P 4 to obtain  W k c , k W n r , n .
4.   Perform EVD decomposition on  W k c , k and  W n r , n to obtain  ω k c , k and  ω n r , n .
5.    Update  c j , k , j , k according to Equation (15).
6. Until: The objective function increment is less than  ε min .

3.2. UAV Position Optimization

After determining the transmitting beamforming  ω k c , k and  ω n r , n , the optimization subproblem for the UAV position  q can be formulated as:
P 5 : min q max j , k SIN R j , k e s . t . C 1 , C 2
where, from Equations  4 and  5 , it is observed that the beamforming steering vector  a q , u k is non-linearly related and highly coupled with the optimization variable  q , making problem  P 5 challenging to solve. Therefore, we adopt the SCA algorithm based on the trust region method [11].
Similarly, to address the MM problem, an auxiliary variable  B is introduced, reformulating problem  P 5 as:
P 6 : min q , B   B s . t . C 11 : SIN R j , k e = a H q , e j ω k c 2 i = 1 , i k K a H ( q , e j ) ω i c 2 + n = 1 N a H ( q , e j ) ω n r 2 + σ e 2 β d 2 ( q , e j ) B , j , k   C 12 : SIN R k = a H q , u k ω k c 2 i = 1 , i k K a H ( q , u k ) ω i c 2 + n = 1 N a H ( q , u k ) ω n r 2 + σ k 2 β d 2 ( q , u k ) Γ k com , k   C 13 : a H q , e j k = 1 K ω k c ω k c H + n = 1 N ω n r ω n r H a q , e j d 2 q , e j Γ e sen , j
For convenience, let  W i c = ω i c ω i c H W i r = ω i r ω i r H G = k = 1 K ω k c ω k c H + n = 1 N ω n r ω n r H . Thus, we represent the  a row and  b column of  W i c W i r and  G as  W i c a , b W i r a , b and  G a , b , respectively, with their magnitudes denoted as  W i c a , b W i r a , b and  G a , b , and their phases as  θ a , b W i c θ a , b W i r and  θ a , b G . Constraints  C 11 and  C 12 are in fractional form and are transformed into polynomial forms. The following procedures are applied to constraints  C 11 C 12 , and  C 13 :
  • The left and right sides of  C 11 are taken as the base-2 logarithm, reformulated as:
    log 2 η W k c , d q , e j log 2 i = 1 , i k K η W i c , d ( q , e j ) + n = 1 N μ W n r , d ( q , e j ) + σ e 2 β d 2 ( q , e j ) log 2 ( B )
    where
    η W k c , d q , e j = a H ( q , e j ) ω k c 2 = α = 1 N [ W k c ] α , α + 2 a = 1 N b = a + 1 N [ W k c ] a , b cos θ a , b W k c + π ( b a ) H d ( q , e j )
    μ W n r , d ( q , e j ) = a H ( q , e j ) ω n r 2 = α = 1 N [ W n r ] α , α + 2 a = 1 N b = a + 1 N [ W n r ] a , b cos θ a , b W n r + π ( b a ) H d ( q , e j )
The proofs for  21 and  22 can be referred to in reference [11]. At this point, the left-hand side of the inequality constraint  ( 20 ) exhibits non-convexity with respect to the optimization variable  q . We implement the SCA algorithm. In the  l -th iteration, the left-hand side of the inequality is linearized through a first-order Taylor expansion at the local point  q l , and the inequality constraint is subsequently approximated as follows:
C j , k l + D j , k l H q q l log 2 B
where  C j , k l is obtained from (20) during the  l -th iteration, while  D j , k l is derived from the  l -th iteration of the derivative of (20) with respect to the variable  q ( l ) ϕ W k c , d q l , e j and  δ W n r , d q ( l ) , e j respectively denote the derivatives of  η W k c , d ( q ( l ) , e j ) and  μ W n r , d ( q ( l ) , e j ) with respect to the variable  q l .
C j , k ( l ) = log 2 η W k c , d ( q ( l ) , e j ) log 2 i = 1 , i k K η W i c , d ( q ( l ) , e j ) + n = 1 N μ W n r , d ( q ( l ) , e j ) + σ e 2 β d 2 ( q ( l ) , e j )
D j , k ( l ) = log 2 ( e ) f j , k ϕ W k c , d q l , e j log 2 ( e ) g j , k i = 1 . i k K ϕ W i c , d q l , e j + n = 1 N δ W n r , d q ( l ) , e j + 2 σ e 2 β q ( l ) e j
ϕ W k c , d q l , e j = a = 1 N b = a + 1 N 2 π W k c a , b sin θ a , b W k c + π b a H d q l , e j H b a d 3 q ( l ) , e j × q ( l ) e j
δ W n r , d q ( l ) , e j = a = 1 N b = a + 1 N 2 π W n r a , b sin θ a , b W n r + π b a H d q ( l ) , e j H ( b a ) d 3 q ( l ) , e j × q ( l ) e j
Within the derivative calculation of the logarithmic function,  f j , k and  g j , k are introduced as the denominators, respectively represented as:
f j , k = η W k c , d ( q ( l ) , e j )
g j , k = i = 1 , i k K η W i c , d ( q ( l ) , e j ) + n = 1 N μ W n r , d ( q ( l ) , e j ) + σ e 2 β d 2 ( q ( l ) , e j )
At this point, the inequality constraint  23 becomes convex regarding the optimization variable  q and auxiliary variable  B ;
2.
Convert the inequality constraint  C 12 into a polynomial form:
a H ( q , u k ) ω k c 2 Γ k com i = 1 , i k K a H ( q , u k ) ω i c 2 + n = 1 N a H ( q , u k ) ω n r 2 + σ k 2 β d 2 ( q , u k ) 0
For simplicity of expression,  30 can be rewritten as:
η W k c , d ( q , u k ) Γ k com i = 1 , i k K η W i c , d ( q , u k ) + n = 1 N μ W n r , d ( q , u k ) + σ k 2 β d 2 ( q , u k ) 0
Similarly, given the non-convex nature of the inequality with respect to the optimization variable  q , the left-hand side is linearized via a first-order Taylor expansion at the local point  q l . The constraint  31 can be approximated as follows:
I k ( l ) + J k ( l ) H q q l 0 , k
where
I k l = η W k c , d ( q l , u k ) Γ k com i = 1 , i k K η W i c , d ( q l , u k ) + n = 1 N μ W n r , d ( q l , u k ) + σ k 2 β d 2 ( q l , u k )
J k ( l ) = ϕ W k c , d q l , u k Γ k com i = 1 . i k K ϕ W i c , d q l , u k + n = 1 N δ W n r , d q ( l ) , u k + 2 σ k 2 β q ( l ) u k
3.
The inequality constraint  C 13 can be reformulated as:
α = 1 N [ G ] α , α + 2 a = 1 N b = a + 1 N [ G ] a , b cos θ a , b G + π ( b a ) H d ( q , e j ) Γ e sen d 2 ( q , e j )
Similarly, by conducting a first-order Taylor expansion at the local point  q l , the inequality constraint is approximated as follows:
U j ( l ) + V j ( l ) H q q ( l ) Γ e sen H 2 + q e j 2
where
U j l = η G , d q l , e j
V j ( l ) = ϕ G , d q l , e j
Based on the transformation of the above three constraints, the three inequality constraints  C 11 C 12 , and  C 13 of problem  P 6 are approximated as  23 32 , and  36 , respectively. To ensure the accuracy of the SCA algorithm, we consider that the change in position between two consecutive iterations is less than  R l , i.e.,  q ( l ) q ( l 1 ) R ( l ) .
Building on the aforementioned approach, problem  P 6 in the  l -th iteration can be transformed into an approximate convex problem  P 7 . l :
P 7 . l : min q , B   B s . t . C 14 : C j , k ( l ) + D j , k ( l ) H q q ( l ) log 2 ( B ) , j , k             C 15 : I k ( l ) + J k ( l ) H q q ( l ) 0 , k             C 16 : U j ( l ) + V j ( l ) H q q ( l ) Γ e sen H 2 + q e j 2 , j             C 17 :   q q ( l 1 ) R ( l )
Theoretically, setting the trust region radius  R l sufficiently small can always ensure the convergence of the iterative process [11]. In practice terms, if the solution of problem  P 7 . l after a certain iteration does not reduce the objective value of problem  P 5 compared to the previous iteration, the trust region radius is halved, i.e.,  R l = R l / 2 , and then problem  P 7 . l is solved again. If the trust region radius  R l decreases below a predetermined threshold  R min , the iterative process stops. The detailed procedure is outlined in Algorithm 2.
Algorithm 2: UAV position optimization
Input:  ω k c , k ω n r , n σ k 2 σ e 2 P max u k e j Γ k com Γ e sen
Output:  q
1. Initialize iteration count  l = 1 and  q 0 , setting the minimum trust region radius  R min .
2. Repeat:
3.   Solve the optimization problem  P 7 . l to obtain  q l .
4.   If the objective function value decreases, then
5.       q l = q l l = l + 1 .
6.   else
7.     R l = R l / 2 .
8.   end if
9. Until  R l < R min

3.3. Joint Beamforming and UAV Positioning Optimization

As detailed in Algorithm 3, the proposed alternating iterative algorithm for the UAV-assisted ISAC system repeatedly optimizes the joint beamforming and UAV positioning until the objective function converges or the prescribed maximum number of iterations is reached.
Algorithm 3: Joint beamforming and UAV positioning optimization
Input:  σ k 2 σ e 2 P max u k e j Γ k com Γ e sen o max
Output:  ω k c , k ω n r , n and  q
1. Initialize iteration count  o = 1 q 0 .
2. Repeat:
3.   Given the initial UAV position  q o 1 , update  ω k c o , k and  ω n r o , n using Algorithm 1.
4.   Given the transmitting beamforming  ω k c o , k and  ω n r o , n , update  q o using Algorithm 2.
5.    o = o + 1 .
6. Until: the objective function value of  P 1 converges or  o > o max .
Subsequently, we examine the convergence and computational complexity of the iterative optimization algorithm for beamforming and UAV positioning.
  • Convergence: Define  ω k c l , k ω n r l , n , and  q l as the  l -th iteration solutions of Algorithm 3, and let the objective function of problem  P 1 be denoted as  f ω k c l , ω n r l , q l . In Step 3 of Algorithm 3, by fixing  q l , we obtain  ω k c l + 1 , k and  ω n r l + 1 , n , thus:
    f ω k c l + 1 , ω n r l + 1 , q l f ω k c l , ω n r l , q l
Similarly, in Step 4 of Algorithm 3, we obtain:
f ω k c l + 1 , ω n r l + 1 , q l + 1 f ω k c l + 1 , ω n r l + 1 , q l
In summary, we can deduce:
f ω k c l + 1 , ω n r l + 1 , q l + 1 f ω k c l , ω n r l , q l
This demonstrates that the value of the objective function remains non-increasing throughout the iterative process, thereby guaranteeing the convergence of the alternating iterative optimization algorithm.
2.
Complexity: In Algorithm 3, we solve all subproblems using CVX. The first subproblem is a SDR problem, and the second subproblem is a SCA problem. The algorithmic complexities of the two subproblems are  O L log 1 / ϵ 2 K + N 3.5 and  O L 2 K + 2 3 , respectively [12], where  L denotes the number of iterations required for the algorithm to achieve convergence, and  ϵ represents the convergence accuracy of the algorithm. Consequently, the worst-case computational complexity of Algorithm 3 is  O L log 1 / ϵ 2 K + N 3.5 + L 2 K + 2 3 .

4. Simulation Results and Performance Analysis

To validate the efficacy of the proposed algorithm, MATLAB simulations were conducted. In the simulation, we consider a 1 km × 1 km area, with  K = 2 legitimate ground communication users. We first conduct simulations for the  J = 1 single eavesdropper scenario and then extend our analysis to the case of multiple eavesdroppers. We begin by examining the single eavesdropper scenario. The legitimate users are located at  700 , 400 , 0 and  800 , 600 , 0 , and the single eavesdropper is located at  150 , 500 , 0 . Unless otherwise specified, the UAV flight altitude is  H = 100   m , the maximum transmit power is  P max = 0.3   W , and it has four antennas. The communication threshold for all legitimate users is  Γ k com = 7   dB , and the beam pattern gain threshold is  Γ e sen = 18   dBm . The received noise power for each legitimate user and the eavesdropper is set to  σ k 2 = σ e 2 = 110   dbm , and the channel power gain at the reference distance  d 0 = 1   m is  β = 60   dB .
To assess the performance of the proposed algorithm, it is benchmarked against the following three algorithms:
  • Comparison Algorithm 1: Only optimize the UAV transmit beamforming without optimizing the UAV position.
  • Comparison Algorithm 2: In this algorithm, the UAV transmitted signal contains only communication signals without dedicated sensing signals. Similar to Algorithm 1, it optimizes both the UAV transmit beamforming and the UAV position.
  • Comparison Algorithm 3: The UAV transmitted signal contains only communication signals without dedicated sensing signals. It optimizes the UAV transmit beamforming but not the UAV position.
Figure 2 illustrates the convergence behavior of the proposed algorithm. It is evident that the maximum eavesdropping SINR decreases rapidly with the number of iterations, achieving convergence by the fourth iteration.
Figure 3 shows the variation of the maximum eavesdropping SINR with increasing communication thresholds for legitimate users, where the sensing threshold is  18   dBm . The figure clearly demonstrates that the maximum eavesdropping SINR increases monotonically with the communication threshold. This is because the increase in the communication threshold leads to a higher demand for communication resources, which, under the condition of an unchanged sensing threshold, inevitably reduces the system’s security. Furthermore, in Figure 3, the data clearly indicate that the proposed algorithm surpasses the other three algorithms in terms of security performance. By comparing the proposed algorithm with Algorithm 1, it can be seen that optimizing the UAV position reduces the maximum eavesdropping SINR and improves the system’s security performance. By comparing the proposed algorithm with Algorithm 2, it can be seen that although the dedicated sensing signal transmitted by the UAV affects the communication SINR of legitimate users, it can more effectively improve the system’s security under the premise of ensuring sensing performance. This is because dedicated sensing signals more easily meet the system’s sensing requirements, thereby allocating resources to ensure system security. As the communication threshold increases, the performance differential between the proposed algorithm and the comparison algorithms narrows over time. This occurs as the elevated communication threshold restricts the UAV positional freedom, consequently reducing the performance disparity between the proposed algorithm and Algorithm 1. Algorithm 3 exhibits the highest eavesdropping SINR because it solely optimizes beamforming for communication signals without incorporating specialized sensing signals or optimizing UAV positions. Consequently, its eavesdropping SINR is higher compared to other algorithms.
Figure 4 shows the variation of the maximum eavesdropping SINR with increasing sensing thresholds, where the communication threshold is  7   dB . The figure clearly demonstrates that with an increasing sensing threshold, the maximum eavesdropping SINR rises monotonically while the performance disparity between the proposed algorithm and Algorithm 1 diminishes. Using dedicated sensing signals and optimizing the UAV position can significantly improve the system’s security performance.
Figure 5 illustrates the relationship between the maximum eavesdropping SINR and the UAV transmit power, where the communication threshold is  5   dB and the sensing threshold is  20   dBm . The figure clearly indicates that the maximum eavesdropping SINR decreases monotonically as the UAV transmit power increases. As the UAV transmit power increases, the system, while ensuring communication and sensing performance, allocates more resources to improve the system’s security performance. This causes the maximum eavesdropping SINR to decrease monotonically with increasing transmit power.
Figure 6 illustrates the correlation between the maximum eavesdropping SINR and the number of antennas, where the communication threshold is  8   dB , the sensing threshold is  18   dBm , and the UAV transmit power is  0.3   W . The figure clearly demonstrates that once the number of antennas surpasses 16, the rate at which the maximum eavesdropping SINR decreases begins to diminish. This is because a radar system with 16 antennas has sufficient spatial degrees of freedom to provide adequate signal processing capability; therefore, more antennas do not significantly lower the maximum eavesdropping SINR. Furthermore, the performance gap in terms of the maximum eavesdropping SINR between the proposed algorithm and the comparison algorithms increases with the number of antennas. This is because the additional antennas provide more spatial degrees of freedom, increasing the UAV positional freedom and making the UAV position more impactful on the system’s security performance.
Next, we simulate the multiple eavesdroppers scenario, with  J = 2 eavesdroppers and  K = 2 legitimate users. Building on the single eavesdropper scenario, the second eavesdropper is located at  300 , 650 , 0 . The UAV is equipped with  N = 8 antennas, and its maximum transmit power is set to  P max = 0.25   W . Figure 7 shows the variation of the maximum eavesdropping SINR with increasing communication thresholds for legitimate users, where the sensing threshold is  13   dBm . It can be observed that the maximum eavesdropping SINR for multiple eavesdroppers is always greater than that for a single eavesdropper. This is because multiple eavesdroppers require the UAV to sense multiple targets, consuming more system resources. Additionally, multiple eavesdroppers generally exhibit better eavesdropping performance than a single eavesdropper, leading to a higher maximum eavesdropping SINR.
Figure 8 shows the relationship between the maximum eavesdropping SINR and the sensing threshold, with the communication threshold set to  9   dB . As the sensing threshold increases, the maximum eavesdropping SINR increases monotonically for both single and multiple eavesdroppers. However, in both cases, the maximum eavesdropping SINR is always significantly lower than the communication SINR of the legitimate user.

5. Conclusions

In this paper, we propose a method for using UAVs to perform beamforming for secure communication and target sensing in the presence of multiple eavesdroppers and multiple communication users. Through the joint optimization of the UAV transmit beamforming and position, this approach minimizes the maximum eavesdropping SINR while simultaneously ensuring the required minimum SINR for user communication and the necessary beam pattern gain for target sensing. In a multi-user scenario, a SDR-based algorithm is employed to address the non-convex optimization challenge associated with transmit beamforming. The method involves using slack variables to solve the MM problem and employing the Dinkelbach algorithm to address the fractional problem in the communication SINR. For the UAV positioning problem, a SCA algorithm that utilizes a first-order Taylor expansion is employed to convert the non-convex problem into a convex one. Simulation results confirm that the proposed algorithm facilitates a versatile trade-off among communication quality, target sensing quality, and system security performance. These results also demonstrate that UAV multi-antenna beamforming significantly enhances the PLS of ISAC systems. How to extend the results to other scenarios (e.g., 1. increasing the number of users; 2. incorporating mobile users and eavesdroppers; 3. multiple UAV collaboration; and 4. complex channel models) is interesting and worth pursuing in future work.

Author Contributions

Conceptualization: C.C. and Q.Z.; methodology: C.C.; software: C.C.; validation: C.C. and Q.Z.; formal analysis: C.C.; investigation: C.C.; resources: Q.Z.; data curation: C.C.; writing: C.C.; visualization: C.C.; supervision: Q.Z.; project administration: Q.Z.; funding acquisition: Q.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by Jiangsu Provincial Key Research and Development Program (BE2022068-2), the National Natural Science Foundation of China (92367302).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Fu, Y.; Shan, Y.; Zhu, Q.; Hung, K.; Wu, Y.; Quek, T.Q.S. A distributed microservice-aware paradigm for 6g: Challenges, principles, and research opportunities. IEEE Netw. 2023, 38, 163–170. [Google Scholar] [CrossRef]
  2. Wei, Z.; Qu, H.; Wang, Y.; Yuan, X.; Wu, H.; Du, Y.; Han, K.; Zhang, N.; Feng, Z. Integrated sensing and communication signals toward 5g-a and 6g: A survey. IEEE Internet Things J. 2023, 10, 11068–11092. [Google Scholar] [CrossRef]
  3. Liu, C.; Yuan, W.; Li, S.; Liu, X.; Li, H.; Ng, D.W.K.; Li, Y. Learning-based predictive beamforming for integrated sensing and communication in vehicular networks. IEEE J. Sel. Areas Commun. 2022, 40, 2317–2334. [Google Scholar] [CrossRef]
  4. Cheng, X.; Duan, D.; Gao, S.; Yang, L. Integrated sensing and communications (ISAC) for vehicular communication networks (VCN). IEEE Internet Things J. 2022, 9, 23441–23451. [Google Scholar] [CrossRef]
  5. Wu, Q.; Xu, J.; Zeng, Y.; Ng, D.W.K.; Al-Dhahir, N.; Schober, R.; Swindlehurst, A.L. A comprehensive overview on 5G-and-beyond networks with UAVs: From communications to sensing and intelligence. IEEE J. Sel. Areas Commun. 2021, 39, 2912–2945. [Google Scholar] [CrossRef]
  6. Li, J.; Liu, N. Integrated sensing and communication beamforming design based on mutual information. In Proceedings of the 2022 IEEE/CIC International Conference on Communications in China (ICCC Workshops), Foshan, China, 11–13 August 2022; pp. 383–388. [Google Scholar]
  7. Hua, H.; Xu, J.; Han, T.X. Optimal transmit beamforming for integrated sensing and communication. IEEE Trans. Veh. Technol. 2023, 72, 10588–10603. [Google Scholar] [CrossRef]
  8. Hua, H.; Han, T.X.; Xu, J. MIMO integrated sensing and communication: CRB-rate tradeoff. IEEE Trans. Wirel. Commun. 2023, 23, 2839–2854. [Google Scholar] [CrossRef]
  9. Sankar, R.S.P.; Chepuri, S.P.; Eldar, Y.C. Beamforming in integrated sensing and communication systems with reconfigurable intelligent surfaces. IEEE Trans. Wirel. Commun. 2023, 23, 4017–4031. [Google Scholar] [CrossRef]
  10. Luo, H.; Liu, R.; Li, M.; Liu, Y.; Liu, Q. Joint beamforming design for RIS-assisted integrated sensing and communication systems. IEEE Trans. Veh. Technol. 2022, 71, 13393–13397. [Google Scholar] [CrossRef]
  11. Lyu, Z.; Zhu, G.; Xu, J. Joint maneuver and beamforming design for UAV-enabled integrated sensing and communication. IEEE Trans. Wirel. Commun. 2022, 22, 2424–2440. [Google Scholar] [CrossRef]
  12. Deng, C.; Fang, X.; Wang, X. Beamforming design and trajectory optimization for UAV-empowered adaptable integrated sensing and communication. IEEE Trans. Wirel. Commun. 2023, 22, 8512–8526. [Google Scholar] [CrossRef]
  13. Jiang, W.; Shen, C.; Ai, B. UAV-assisted sensing and communication design for average peak age-of-information minimization. In Proceedings of the 2022 IEEE/CIC International Conference on Communications in China (ICCC Workshops), Foshan, China, 11–13 August 2022; pp. 1005–1010. [Google Scholar]
  14. Wu, J.; Yuan, W.; Bai, L. On the interplay between sensing and communications for UAV trajectory design. IEEE Internet Things J. 2023, 10, 20383–20395. [Google Scholar] [CrossRef]
  15. Wu, J.; Yuan, W.; Liu, F.; Cui, Y.; Meng, X.; Huang, H. UAV-based target tracking: Integrating sensing into communication signals. In Proceedings of the 2022 IEEE/CIC International Conference on Communications in China (ICCC Workshops), Foshan, China, 11–13 August 2022; pp. 309–313. [Google Scholar]
  16. Su, N. Physical Layer Security in Integrated Sensing and Communication Systems. Ph.D. Thesis, University College London, London, UK, 2023. [Google Scholar]
  17. Chu, J.; Liu, R.; Li, M.; Liu, Y.; Liu, Q. Joint secure transmit beamforming designs for integrated sensing and communication systems. IEEE Trans. Veh. Technol. 2022, 72, 4778–4791. [Google Scholar] [CrossRef]
  18. Su, N.; Liu, F.; Masouros, C. Sensing-assisted eavesdropper estimation: An ISAC breakthrough in physical layer security. IEEE Trans. Wirel. Commun. 2023, 23, 3162–3174. [Google Scholar] [CrossRef]
  19. Hua, M.; Wu, Q.; Chen, W.; Dobre, O.A.; Swindlehurst, A.L. Secure intelligent reflecting surface-aided integrated sensing and communication. IEEE Trans. Wirel. Commun. 2023, 23, 575–591. [Google Scholar] [CrossRef]
  20. Li, B.; Liao, J.; Gong, X.; Xiang, H.; Yang, Z.; Zhao, W. UAV-assisted ISAC network physical layer security based on Stackelberg game. Ad Hoc Netw. 2024, 152, 103304. [Google Scholar] [CrossRef]
  21. Wei, Z.; Liu, F.; Liu, C.; Yang, Z.; Ng, D.W.K.; Schober, R. Integrated sensing, navigation, and communication for secure UAV networks with a mobile eavesdropper. arXiv 2023, arXiv:2305.12842. [Google Scholar] [CrossRef]
  22. Meng, K.; Wu, Q.; Ma, S.; Chen, W.; Wang, K.; Li, J. Throughput maximization for UAV-enabled integrated periodic sensing and communication. IEEE Trans. Wirel. Commun. 2023, 22, 671–687. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Applsci 14 07196 g001
Figure 2. Convergence of the proposed algorithm.
Figure 2. Convergence of the proposed algorithm.
Applsci 14 07196 g002
Figure 3. Maximum eavesdropping SINR vs. communication threshold.
Figure 3. Maximum eavesdropping SINR vs. communication threshold.
Applsci 14 07196 g003
Figure 4. Maximum eavesdropping SINR vs. sensing threshold.
Figure 4. Maximum eavesdropping SINR vs. sensing threshold.
Applsci 14 07196 g004
Figure 5. Maximum eavesdropping SINR vs. transmission power.
Figure 5. Maximum eavesdropping SINR vs. transmission power.
Applsci 14 07196 g005
Figure 6. Maximum eavesdropping SINR vs. number of antennas.
Figure 6. Maximum eavesdropping SINR vs. number of antennas.
Applsci 14 07196 g006
Figure 7. Comparison of single and multiple eavesdroppers: maximum eavesdropping SINR vs. communication threshold.
Figure 7. Comparison of single and multiple eavesdroppers: maximum eavesdropping SINR vs. communication threshold.
Applsci 14 07196 g007
Figure 8. Comparison of single and multiple eavesdroppers: maximum eavesdropping SINR vs. sensing threshold.
Figure 8. Comparison of single and multiple eavesdroppers: maximum eavesdropping SINR vs. sensing threshold.
Applsci 14 07196 g008
Table 1. Key notations.
Table 1. Key notations.
SymbolDefinitionsSymbolDefinitions
N Number of antennas x Transmitted signal of the UAV
K , J Number of users and
eavesdroppers
  P max Maximum transmit power
s k c s n r Communication signal
and sensing signal
q u k e j Location of UAV, user k
and eavesdropper  j
ω k c ω n r Beamforming vector   h k q , u k Communication channel
from the UAV to the user  k
  a q , u k Beamforming steering vector   g j q , e j Eavesdropping channel
n k z e Additive white Gaussian noise σ k 2 σ e 2 Noise power spectral density
  ς θ q , e j Beam pattern gain Γ k com Γ e sen Threshold of communication and sensing
A B c j , k Slack variables   R Trust region radius
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chen, C.; Zhu, Q. Secure Beamforming Design for UAV-Empowered Integrated Sensing and Communication. Appl. Sci. 2024, 14, 7196. https://doi.org/10.3390/app14167196

AMA Style

Chen C, Zhu Q. Secure Beamforming Design for UAV-Empowered Integrated Sensing and Communication. Applied Sciences. 2024; 14(16):7196. https://doi.org/10.3390/app14167196

Chicago/Turabian Style

Chen, Chuang, and Qi Zhu. 2024. "Secure Beamforming Design for UAV-Empowered Integrated Sensing and Communication" Applied Sciences 14, no. 16: 7196. https://doi.org/10.3390/app14167196

APA Style

Chen, C., & Zhu, Q. (2024). Secure Beamforming Design for UAV-Empowered Integrated Sensing and Communication. Applied Sciences, 14(16), 7196. https://doi.org/10.3390/app14167196

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop