Next Article in Journal
Blockchain-Enabled Decentralized End Hopping for Proactive Network Defense
Next Article in Special Issue
Comprehensive Survey on Autonomous Disaster Reconnaissance: A Comparative Analysis of UAVs and UGVs
Previous Article in Journal
Optimization of Sum-Rate for Downlink Transmission in Hybrid RIS-Assisted MISO Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Security Improvement for UAV-Assisted Integrated Sensing, Communication, and Jamming Networks

1
The Information Engineering School and the Jiangxi Provincial Key Laboratory of Advanced Signal Processing and Intelligent Communications, Nanchang University, Nanchang 330031, China
2
China Mobile (Jiangxi) Virtual Reality Technology Co., Ltd., Nanchang 330031, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Telecom 2026, 7(2), 27; https://doi.org/10.3390/telecom7020027
Submission received: 15 January 2026 / Revised: 6 February 2026 / Accepted: 13 February 2026 / Published: 3 March 2026

Abstract

We propose a unmanned aerial vehicle (UAV)-assisted integrated sensing, communication, and jamming (U-ISJC) framework, in which a multifunctional UAV first detects the sensing target to obtain sensing information, and subsequently transmits the information to communication users via a unified beam in the presence of multiple eavesdroppers. To avoid functional conflicts, a time slot frame structure is designed for the UAV’s multifunctional capabilities, enabling communication, sensing, and jamming tasks within each timeslot. The time slot allocation factor dynamically adjusts based on the UAV’s flight trajectory for efficient UAV resource utilization. Additionally, to prevent security rate leakage caused by eavesdroppers, a jamming beam is added to serve both jamming and sensing functions. Our objective is to maximize the the worst-case total secure data transmission rate by jointly optimizing sub-time slot allocation, beamforming, and UAV trajectory. To address this problem, we propose a joint optimization algorithm that adopts the concave–convex procedure (CCCP) technique and semi-definite relaxation (SDR), under the block coordinate descent (BCD) framework. The simulation results show that compared with the baseline scheme, the proposed algorithm substantially improves the communication security rate while ensuring the quality of communication and sensing.

1. Introduction

Under the 6G (sixth generation) communication standard, sensing and communication functions [1,2,3] will coexist and be integrated within the same system. Compared to traditional solutions that separate sensing and communication [4], integrated sensing and communication (ISAC) technology enables the sharing of the same time domain, frequency domain, and other wireless communication resources, thereby achieving mutual benefits [5]. ISAC offers two primary advantages: integration gain enables the efficient utilization of congested wireless/hardware resources, while coordination gain balances dual-function performance and achieves synergistic complementarity [6]. In the 6G era, sensing and communication functions will coexist and be deeply integrated within a single system [7], sharing temporal, and frequency and spatial domain resources alongside critical elements such as waveforms, signal processing, and hardware. The integration of sensing and communication functions can be achieved at various levels, ranging from loose coupling to full integration. This encompasses spectrum sharing, hardware sharing, and even shared signal processing and protocol stacks, extending to cross-module and cross-layer information sharing to achieve mutual benefits.
Meanwhile, unmanned aerial vehicles (UAVs) are increasingly deployed within ISAC networks due to their high cost-effectiveness and operational flexibility [8]. Serving as economical aerial platforms [9], UAVs leverage their high cruising altitudes and three-dimensional maneuverability to deliver enhanced coverage and improved sensing and communication services. Traditional UAV-enabled wireless network research primarily focuses on designs separating sensing and communication functions, neglecting integrated waveform design for co-located sensing and communication. However, integrating UAV and ISAC technologies not only leverages UAVs’ high mobility and airspace resource advantages but also conserves spectrum resources, enabling synchronous communication and sensing with users.
However, due to the inherent line of sight (LoS) channel characteristics of UAVs, they are more susceptible to eavesdropping and jamming attacks [10]. Therefore, protecting legitimate users from malicious attacks has emerged as a novel and challenging problem. Similarly, while ISAC networks enhance spectrum utilization, they also introduce new security vulnerabilities [11], posing numerous challenges to physical layer security. First, due to the deep integration of communication signals and perception, malicious attackers exploit the characteristics of spectrum resource sharing to target both perception and communication bands, disrupting normal system operation [12]. Second, ISAC networks integrate multiple functions and technologies, resulting in more complex network architectures. This complexity increases the number of potential security vulnerabilities within the network. This implies that as functionality diversifies and technologies converge, ISAC networks face heightened security risks alongside enhanced capabilities. Consequently, drone-supported ISAC secure communications have become a focal point of intense research debate [13].
Unlike research on physical layer security for traditional drone ISACs, integrated sensing, jamming, and communication (ISJC) networks not only provide synchronized sensing and communication services but also establish secure communication environments by integrating jamming capabilities [14,15]. Existing ISJC network studies primarily focus on deploying artificial noise (AN) or jamming beams to enhance secure communication rates. The primary methods include generating spoofed signals mimicking legitimate signals to interfere with malicious nodes’ signal demodulation and decoding, and transmitting high-power noise or frequency-sweeping signals to degrade malicious nodes’ signal-to-noise ratio below communication thresholds. Introducing artificial noise within communication ranges effectively thwarts eavesdropping attempts and prevents information leakage. Consequently, drone research incorporating ISJC technology has emerged as a hot topic in drone physical layer security.

1.1. Related Work

Numerous studies in the literature have explored UAV-assisted ISAC. Xu et al. [16] proposed a novel UAV-ISAC framework that involves a fundamental trade-off between computational power and perception beam gain. In [17], the authors investigated resource allocation for multi-UAV-assisted ISAC systems, aiming to maximize the weighted sum bit rate for all ground users. Leveraging the convergence of UAV and multi-antenna technologies, numerous studies have focused on key aspects of UAV-ISAC on beamforming techniques [18]. In [19], the authors propose a multi-antenna UAV ISAC system that jointly optimizes target scheduling, transmit beamforming, and UAV trajectories to maximize the average beam gain of the radar receiver while satisfying specific communication performance constraints. In [20], Zhenyu Xiao et al. explored the potential of millimeter–wave–UAV communications, proposing two multi-beamforming schemes to increase the number of served users. Some works also combine the high mobility advantages of UAVs with beamforming techniques. Xian Zhang et al. proposed a novel RF signal sensing-assisted beamforming and trajectory design method for UAV networks in [21]. In [22], K. Meng et al. achieve overall reachable rate maximization by jointly optimizing beamforming, user association, sensing time selection, and UAV trajectories. Notably, most of these studies focus on resource allocation, beamforming, and trajectory optimization to enhance overall system efficiency or achieve reachable rate maximization.
Regarding drone safety, Heng Zhang et al. designed a novel optimal three-dimensional coordinate and power search method for mobile UAV base station scenarios [23], which includes enhancing UAV communication network performance by employing friendly jamming drones. Wei Wang et al. investigated robust joint design for secure drone communication systems under energy constraints with incomplete eavesdropper location information [24], incorporating the cooperative transmission of artificial noise signals to confuse malicious eavesdroppers. In [25], Gaurav K. Pandey et al. introduced a dual-UAV-assisted communication scheme enabling secure information transmission between IoT devices and base stations under multiple eavesdroppers. Xiangyun Meng et al. leveraged inter-user interference in uplink non-orthogonal multiple access [26] to enhance IoT node security. In [27], Runze Dong et al. investigated secure relay systems for secure transmission within drone swarms by optimizing beamforming vectors and bandwidth allocation coefficients to maximize achievable confidential rates. Thus, secure communication for UAVs remains a prominent research topic. Consequently, UAV-enabled ISAC secure communication has become a hotly debated subject among researchers [28,29,30,31]. Specifically, Ref. [28] proposes an extended Kalman filter-based approach to design secure ISAC systems by optimizing real-time UAV trajectories. Ref. [29] investigates a UAV-supported secure ISAC system where the UAV functions as an aerial base station simultaneously handling user communications and ground target detection, while a dual-function eavesdropper attempts to intercept sensing and communication signals. Zeyu Yang in [30] studies secure transmission in UAV-assisted ISAC systems under eavesdropper presence, where the UAV serves as an aerial dual-function access point. In [31], Chen Dai formulates a privacy-oriented joint optimization problem integrating UAV trajectory design, RIS phase shift configuration, beamforming, and decoupled uplink–downlink user association. Notably, most traditional UAV-ISAC security research focuses on filtering algorithms, beamforming design, trajectory planning, and resource allocation to maximize secure rates.
Many researchers have enhanced the security of UAV-ISAC communication systems by introducing AN. For instance, Ref. [32] proposed two intelligent reflecting surface (IRS)-UAV security schemes enabling ISAC to counter jamming and eavesdropping attacks. Additionally, aerial IRS can coordinate artificial noise to ensure target detection accuracy while suppressing eavesdropping. In addition, the paper [33] proposes a secure rate-partitioned multiple-access enhanced ISAC framework that simultaneously addresses both active and passive eavesdroppers, enhancing system security while maintaining perception performance. The paper [34] proposes a drone-assisted secure communication system for ISAC in multi-eavesdropper scenarios, guaranteeing the security of communication links between source drones and users despite multiple eavesdroppers. Furthermore, Ref. [35] proposes a novel ISJC framework and online resource allocation design to secure drone-supported downlink communications, advocating the use of artificial noise for the simultaneous detection and jamming of eavesdropping drones. Building upon this architecture, Ref. [36] proposed an integrated sensing, navigation, and communication framework to protect UAV-enabled wireless networks against mobile eavesdropping UAVs, estimating the eavesdropping UAV’s state and predicting eavesdropping channel characteristics. However, the aforementioned studies [32,33,34,35,36] all treat the perception target and jamming target as the same entity. They also neglect the gains in improving the system communication security rate achieved through dynamic resource allocation between perception and communication functions. Additionally, most of the aforementioned studies employ a single-antenna UAV design, disregarding the impact of deploying multi-antenna UAVs with beamforming techniques on enhancing the system’s secure communication rate. Traditional ISAC-AN schemes involve significant trade-offs between communication and jamming targets. Most adopt passive jamming to counter eavesdropping, failing to fully leverage directional advantages. Their limited jamming methods prove ineffective in complex scenarios with energy constraints and large numbers of users. For convenience, the comparisons of our work with the state of the art schemes are summarized in Table 1.

1.2. Motivations and Contributions

Existing research rarely addresses the gains in secure rate improvement from dynamic sub-time slot allocation and beamforming optimization. Furthermore, due to the diversity of UAV secure communication scenarios, the issue of separating sensing targets from jamming targets warrants in-depth investigation. The innovative significance of distinguishing between sensing and jamming targets lies in revealing the spatial, temporal, and power mismatches between sensing and jamming behaviors. This enables the independent optimization of these two functions, which significantly enhances the precision of jamming and improves system communication security. However, existing UAV-ISAC security research has not addressed this aspect. To address these gaps, this paper proposes a UAV-assisted integrated sensing, jamming, and communication (U-ISJC) architecture. A multifunctional UAV first acquires echo information by sensing ground sensing targets (STs). Subsequently, it communicates with communication users (CUs) via a unified beam in an environment containing eavesdroppers (Eves). Simultaneously, to mitigate information leakage risks, the UAV synchronously transmits jamming signals through this unified beam.
The main contributions of this paper are summarized as follows:
  • We propose a novel U-ISJC framework that aims maximize the secure rate by jointly optimizing the sub-time slot allocation, beamforming, and UAV trajectory, while satisfying communication and sensing thresholds, fairness requirements, and UAV mobility constraints.
  • To solve this challenging non-convex problem, we first use an equivalence method to transform it into a tractable form. Then, we apply the block coordinate descent (BCD) structure, and invoke the concave–convex procedure (CCCP) and the semi-definite relaxation (SDR) to develop an iterative algorithm.
  • Numerical results demonstrate the convergence performance of the proposed algorithm, and further show that it significantly improves the secure communication rate of the U-ISJC network compared to the benchmark schemes.

1.3. Organization and Notations

The paper is organized as follows: Section 2 briefly introduces the frame structure design, system model, channel model, and problem description of the U-ISCJ secure communication system. Section 3 elaborates on the joint optimization algorithm proposed in this paper, which primarily consists of three optimization subproblems: sub-time slot allocation optimization, beamforming optimization, and UAV trajectory optimization. Section 4 presents simulation analyses of the proposed method, covering algorithm convergence, UAV trajectory optimization results, UAV velocity optimization results, sub-time slot allocation factor optimization results, and the impact of antenna power, UAV flight altitude, and eavesdropper count on the worst-case security rate. Section 5 summarizes the conclusions of this study.
Notations: | | · | | , | | · | | 2 , and | | · | | * are used to denote Euclidean norm, spectral norm, and nuclear norm, respectively. | · | denotes the modulus, x denotes the transpose of vector x , and X H denotes Hermitian transpose of matrix X . C M × N denotes the complex matrix with space of M × N , and use ⊗ to denote Kronecker product; x CN ( μ , σ 2 ) means that x obeys μ -mean and σ 2 -variance circularly symmetric complex Gaussian (CSCG) distribution. The main notations used in this paper are listed in Table 2.

2. System Model and Problem Formulation

2.1. System Model

As shown in Figure 1, we consider a U-ISJC framework, where the UAV performs downlink communication to K CUs while simultaneously sensing E ground STs. There are J Eves attempting to intercept the communication between the UAV and CUs. The UAV is equipped with an M = M x × M y uniform planar array (UPA). Assuming the total flight time T is divided into N time slots, each with a duration of δ t = T / N , we deliberately adopt a quasi-static (or slowly time-varying) channel assumption within each time slot, disregarding Doppler effects induced by high mobility. In a three-dimensional Cartesian coordinate system, the horizontal positions of the UAV in time slot n is denoted by q [ n ] = [ q x [ n ] , q y [ n ] ] . The position of CU k, Eve j, and ST e are presented by u k , u j , and u e , respectively. Furthermore, it is assumed that the UAV flies at a fixed altitude q z .
Assuming that the UAV ground channels are dominated by LoS links and following the free space channel model, let h k H [ n ] C M × 1 and h j H [ n ] C M × 1 represent the channels from the UAV to the CU, and the UAV to the Eve, i.e., we have
h ϵ H [ n ] = β 0 d ϵ 1 [ n ] a H ( q [ n ] , u ϵ ) ,
where ϵ = { k , j , e } denotes the channels between each element and the UAV and β 0 denotes the reference channel gain; where β 0 denotes the reference channel gain at 1 m, the response vector of the drone antenna array is as follows [13]:
a H ( q [ n ] , u k ) = [ 1 , e j 2 π λ d x Φ k [ n ] , , e j 2 π λ ( M x 1 ) d x Φ k [ n ] ] [ 1 , e j 2 π λ d y Ω k [ n ] , , e j 2 π λ ( M y 1 ) d y Ω k [ n ] ] ,
where Φ k [ n ] = q x [ n ] u k x d k [ n ] and Ω k [ n ] = q y [ n ] u k y d k [ n ] are dependent on the zenith angle of departure (AoD) of the signal from the UAV to CU k and the corresponding azimuth angle of AoD. Moreover, d ϵ [ n ] = | | q [ n ] u ϵ | | 2 + q z 2 refers to the Euclidean distance; λ represents the wavelength; and d x and d y are the antenna spacing along x-axis and y-axis, respectively.
(1) U-ISJC Frame Structure: To coordinate the communication and sensing, we propose a U-ISJC time frame structure, as illustrated in Figure 2. Specifically, to coordinate the radar sensing and communication, each time slot is divided into two segments, i.e.,  α [ n ] δ t for radar sensing and ( 1 α [ n ] ) δ t for communication, with α [ n ] [ 0 ,   1 ] . Within each time slot, the UAV first senses the STs, and then transmits the sensed signals to CUs with the unified beam. This factor α [ n ] directly governs the time allocation between perception and communication. Increasing the perception sub-time slot enhances the perception quality but compresses the communication time, thereby limiting the achievable communication rates; the reverse holds true. This trade-off is particularly critical in UAV-ISJC systems, as perception quality in turn influences the upper bound of communication rates through information causality constraints.
(2) Communication Model: Let s k [ n ] denote the transmit information signal to CU k, and s j [ n ] denote the jamming signal to Eve j. s k [ n ] and s j [ n ] serve as indicators, marking the sections responsible for signal transmission. They are transmitted simultaneously with their corresponding beamformers w k [ n ] C M × 1 and v j [ n ] C M × 1 . Thus, the transmitted signal in time slot n is given by w [ n ] = w k [ n ] s k [ n ] + v j [ n ] s j [ n ] . In unified beam design, power is dynamically allocated among sensing, communication, and jamming functions. Increasing the jamming power helps suppress eavesdroppers but may degrade the sensing quality or communication–SNR ratio, necessitating fine-tuned optimization adjustments. Although sensing and jamming share the same unified beam in hardware implementation, their optimization targets are independent in the mathematical model. The beamforming vector is optimized to balance these two independent objectives, rather than coupling them into a single target.
We assume that the interference signals in the paper are pre-designed using artificial noise similar to that in [14]. This interference signal can generate specific interference signals based on channel characteristics, thereby enhancing confidentiality capacity by reducing eavesdropping channel capacity without affecting legitimate channel capacity. Accordingly, the communication rate between the UAV and CU k in time slot n (in bit/s/Hz) is expressed as
R k c o m [ n ] = ( 1 α [ n ] ) log 2 ( 1 + h k H [ n ] w k [ n ] 2 i k h k H [ n ] w i [ n ] 2 + σ k 2 ) .
Similarly, the intercepted rate at Eve j for CU k’s signal can be denoted as
R j , k c o m [ n ] = ( 1 α [ n ] ) × log 2 1 + h j H [ n ] w k [ n ] 2 i k h j H [ n ] w i [ n ] 2 + s = 1 J h j H [ n ] v s [ n ] 2 + σ j 2 .
The jamming performance is measured by the suppression of the Eve’s intercept rate in (4). Since multiple Eves exist in the scenario, and multiple Eves simultaneously eavesdrop on legitimate CUs, we select the Eve causing the most severe leakage of legitimate information as the worst-case eavesdropping scenario. Therefore, for any CU k in time slot n, we can define its worst-case security rate as
R k s e c [ n ] = R k c o m [ n ] max j R j , k c o m [ n ] .
(3) Sensing Model: Based on [22], the beam gain of the UAV in the direction of ST e in time slot n is given by
P e [ n ] = a H ( q [ n ] , u e ) × k = 1 K w k [ n ] w k H [ n ] + j = 1 J v j [ n ] v j H [ n ] a ( q [ n ] , u e ) .
The sensing performance is quantified by the beam gain (6). The UAV’s radar estimation rate for ST e (in bit/s/Hz) in time slot n is expressed as [35]
R e r a d [ n ] = α [ n ] log 2 1 + ρ r a d P e [ n ] d e 2 [ n ] ,
where ρ r a d = ϑ e β 0 16 π 2 σ e 2 , ϑ e is the radar cross-section of target e. Since the UAV channel changes slowly and the ground targets are stationary, we neglected Doppler interference. For high-speed ground targets, the Doppler frequency shift can be compensated by the existing signal processing methods. OTFS waveforms [37] have excellent performance in terms of suppressing Doppler effects by transforming the time frequency selective channel into a flat channel in the Doppler delay domain.
Interference can be suppressed through established radar signal processing techniques such as pulse compression and constant false alarm detection. It assumes that the UAV receives interference-free echoes, containing only signals reflected from the target [38]. Adopting the sensing-free communication approach from [39], the portion of the sensing signal can be removed at the receiver by employing the successive interference cancellation (SIC) technique.
(4) Information causality constraint: In practical systems, sensing precedes communication, and communication must depend on the information acquired during the sensing phase. To maintain information consistency, we set an upper bound that ensures the communication rate does not exceed the sensing capabilities of the system. The constraints on information causality are as follows:
R k c o m e = 1 E R e r a d [ n ] , k .
The core logic of this constraint (8) is based on the information source dependency in the U-ISJC framework. In our system, the communication data of the UAV is derived entirely from the sensing results of ground targets. The communication process is essentially the transmission of sensing information, so the communication rate cannot exceed the information generation rate of the sensing module.
This constraint ensures that, under worst-case conditions, the communication rate for each CU is limited by the actual sensing capability, thus securing the communication. This design is a central feature of the ISJC framework and prevents eavesdroppers from exploiting higher communication rates to access more illicit information.

2.2. Problem Formulation

In this paper, we aim to maximize the total worst-case secure rate of the network by jointly optimizing the communication beamforming, jamming beamforming, sub-time slot allocation, and UAV trajectory. The optimization problem is formulated as follows:
( P 1 ) : max w k [ n ] , v j [ n ] , α [ n ] , q [ n ] n = 1 N k = 1 K R k s e c [ n ]
s . t . 0 α [ n ] 1 , n ,
1 N n = 1 N R k c o m [ n ] R min k , k ,
R k c o m e = 1 E R e r a d [ n ] , k ,
k = 1 K w k [ n ] 2 + j = 1 J v j [ n ] 2 P m a x , n ,
P e [ n ] d e 2 [ n ] Γ e , n ,
| | q [ n + 1 ] q [ n ] | | V max δ t , n ,
q [ 1 ] = q I , q [ N ] = q F ,
where (9b) denotes the sub-time slot allocation factor; (9c) guarantees minimum communication quality R min k for CUs; (9d) represents the information causality constraint, which ensures that the communication bits do not exceed the radar estimation bits; (9e) limits the UAV transmit power, where P m a x is the maximum transmit power; (9f) ensures that the sensing signal-to-noise ratio (SNR) for target e must exceed the threshold Γ e ; and (9g) and (9h) indicate the UAV mobility constraints, where V m a x is the maximum speed, and q I and q F denote the UAV’s initial and final location, respectively. Due to the non-convexity introduced by (9c), (9d), and the objective function, solving problem (P1) is extremely challenging.

3. Proposed Solution

In this section, we propose a joint optimization algorithm to solve problem (9). For notational convenience, let H k [ n ] = h k [ n ] h k H [ n ] , H j [ n ] = h j [ n ] h j H [ n ] , W k [ n ] = w k [ n ] w k H [ n ] , V j [ n ] = v j [ n ] v j H [ n ] , H ˜ k [ n ] = a k [ n ] a k H [ n ] , H ˜ j [ n ] = a j [ n ] a j H [ n ] , and H ˜ s [ n ] = a s [ n ] a s H [ n ] , with W k [ n ] 0 and rank ( W k [ n ] ) = 1 , k , n . As a result, we obtain Q [ n ] = k = 1 K W k [ n ] + j = 1 J V j [ n ] , and P [ n ] = Tr ( Q [ n ] H ˜ s [ n ] ) .
Theorem 1.
Problems (P1) and (P2) are equivalent.
Proof of Theorem 1.
To prove the equivalence of problems (P1) and (P2), we just need to prove the equation r k [ n ] = R k [ n ] at the optimal solution. For discussion purposes, let R ^ k [ n ] denote the right-hand side of the inequality in (10b). If R ^ k [ n ] e = 1 E R e r a d [ n ] , this indicates that r k [ n ] is dominated by (10b). In this case, both the inequations in (10b) and (10h) have to hold with equations at the optimal solution of problem (10). Otherwise, the objective value can be further enlarged by increasing the value of r k [ n ] and/or decreasing the value of s k [ n ] . If R ^ k [ n ] > e = 1 E R e r a d [ n ] , this indicates that r k [ n ] is dominated by (10h). Thus, there is r k [ n ] = R k [ n ] at the optimal solution. The proof is completed.    □
By defining γ 0 = β 0 / σ 2 and introducing slack variables r k [ n ] , s k [ n ] and β k [ n ] , and also defining the optimization variables as Ξ A = { w k [ n ] , v j [ n ] } , problem (P1) is converted into the following tractable form [16]:
( P 2 ) : max Ξ A n = 1 N k = 1 K ( r k c o m [ n ] β k [ n ] )
s . t . ( 9 b ) , ( 9 f ) , ( 9 g ) , ( 9 h ) ,
r k [ n ] ( 1 α [ n ] ) × log 2 1 + γ 0 Tr ( H ˜ k [ n ] W k [ n ] ) γ 0 j k Tr ( H ˜ k [ n ] W j [ n ] ) + s k [ n ] ,
1 N n = 1 N r k c o m [ n ] R min k , k ,
k = 1 K Tr ( W k [ n ] ) + j = 1 J Tr ( V j [ n ] ) P max , n ,
s k [ n ] q [ n ] u k 2 + q z 2 , k , n ,
W k [ n ] 0 , k , n ,
rank ( W k [ n ] ) = 1 , k , n ,
r k c o m [ n ] e = 1 E R e r a d [ n ] , k , n ,
β k [ n ] R j , k c o m [ n ] , k , j , n .
However, problem (P2) remains a non-convex semi-definite programming (SDP) problem due to the non-convex constraints (10b), (10c), (10h), and (10i) and the rank-one constraint. To overcome the complex coupling of optimization variables, we decompose the original optimization problem into three independent subproblems.

3.1. Sub-Time Slot Allocation Optimization

For given UAV trajectory q [ n ] and beamforming vectors w k [ n ] and v j [ n ] , we can rewrite the sub-time slot allocation optimization as follows:
( SP 1 ) : max α [ n ] n = 1 N k = 1 K ( R k c o m [ n ] β k [ n ] ) s . t . ( 9 b ) , ( 9 f ) , ( 9 g ) , ( 9 h ) ,
which is a standard linear problem (LP) that can be solved using CVX toolbox [40].

3.2. Beamforming Optimization

For given UAV trajectory q [ n ] and allocation factor α [ n ] , we rewrite the beamforming optimization problem as follows:
( SP 2 ) : max r k [ n ] , w k [ n ] , v j [ n ] n = 1 N k = 1 K ( r k c o m [ n ] β k [ n ] ) s . t . ( 10 b ) ( 10 d ) , ( 10 f ) ( 10 i ) .
Due to the non-convexity of (10b), (10c), (10h) and (10i), solving problem (SP2) is quite intractable. By introducing ξ k [ n ] = γ 0 j k Tr ( H ˜ k [ n ] W j [ n ] ) and 𝓁 k [ n ] = γ 0 Tr ( H ˜ k [ n ] W k [ n ] ) , constraint (10b) is turned into the difference-of-convex (DC) form,
r k [ n ] ( 1 α [ n ] ) ( R ^ 1 k [ n ] R ^ 2 k [ n ] ) ,
where R ^ 1 k [ n ] = log 2 ( 𝓁 k [ n ] + ξ k [ n ] + s k [ n ] ) and R ^ 2 k [ n ] = log 2 ( ξ k [ n ] + s k [ n ] ) . Since R ^ 2 k [ n ] is convex, we adopt the first-order Taylor expansion (FOTE) to obtain its upper-bound function at the given point ξ k ( l ) [ n ] , expressed by
R ^ 2 k u b [ n ] = R ^ 2 k ( l ) [ n ] + ( ξ k [ n ] ξ k ( l ) [ n ] ) ln 2 ( ξ k ( l ) [ n ] + s k [ n ] ) ,
where R ^ 2 k ( l ) [ n ] = log 2 ( ξ k ( l ) [ n ] + s k [ n ] ) . (13) can be converted into
r k [ n ] ( 1 α [ n ] ) ( R ^ 1 k [ n ] R ^ 2 k u b [ n ] ) r ˜ k B [ n ] .
Let ξ j [ n ] = γ 0 ( i k Tr ( H ˜ j [ n ] W i [ n ] ) + s S Tr ( H ˜ j [ n ] V s [ n ] ) + Tr ( H ˜ j [ n ] W k [ n ] ) ) , 𝓁 j [ n ] = γ 0 Tr ( H ˜ j [ n ] W k [ n ] ) , ξ e [ n ] = ρ r a d P [ n ] , and R j , k c o m [ n ] and R e r a d [ n ] can be transformed as follows:
R j , k c o m [ n ] = ( 1 α [ n ] ) ( R 1 j [ n ] R 2 j [ n ] ) ,
R e r a d [ n ] = α [ n ] ( log 2 ( ξ e [ n ] + d e [ n ] ) R 2 e [ n ] ) ,
where R 1 j [ n ] = log 2 ( ξ j [ n ] + d j [ n ] ) , R 2 j [ n ] = log 2 ( ξ j [ n ] 𝓁 j [ n ] + d j [ n ] ) , R 1 e [ n ] = log 2 ( ξ e [ n ] + d e [ n ] 2 ) and R 2 e [ n ] = log 2 ( d e [ n ] 2 ) . Since the first part of the right-hand side in (16) and (17) is convex, we adopt the FOTE to obtain its lower-bound function at the given point ξ j ( l ) [ n ] , ξ e ( l ) [ n ] , expressed by
R 1 j l b [ n ] = R 1 j ( l ) [ n ] + ( ξ j [ n ] ξ j ( l ) [ n ] ) ln 2 ( ξ j ( l ) [ n ] + d j [ n ] ) ,
R 1 e l b [ n ] = R 1 e ( l ) [ n ] + ( ξ e [ n ] ξ e ( l ) [ n ] ) ln 2 ( ξ e ( l ) [ n ] + d e [ n ] ) ,
where R 1 j ( l ) [ n ] = log 2 ( ξ j ( l ) [ n ] + d j [ n ] ) and R 1 e ( l ) [ n ] = log 2 ( ξ e ( l ) [ n ] + d e [ n ] ) . Thus, R ˜ j , k c o m [ n ] and R ˜ s r a d [ n ] can be obtained to replace R j , k c o m [ n ] and R e r a d [ n ] in problem (12) as follows:
R ˜ j , k c o m [ n ] = ( 1 α [ n ] ) ( R 1 j l b [ n ] R 2 j [ n ] ) ,
R ˜ e r a d [ n ] = α [ n ] ( R 1 e l b [ n ] R 2 e [ n ] ) .
Thus, by defining the optimization variables set Ξ B = { r ˜ k B [ n ] , R ˜ j , k c o m [ n ] , R ˜ s r a d [ n ] , w k [ n ] , v j [ n ] , ξ k [ n ] , ξ j [ n ] , ξ e [ n ] , 𝓁 j [ n ] } , problem (SP2) is reformulated as
( SP2-1 ) : max Ξ B n = 1 N k = 1 K ( r ˜ k B [ n ] β k [ n ] )
s . t . ( 10 d ) , ( 10 f ) , ( 15 ) ,
1 N n = 1 N r ˜ k B [ n ] R min k , k ,
r ˜ k B [ n ] e = 1 E R ˜ e r a d [ n ] , k , n ,
β k [ n ] R ˜ j , k c o m [ n ] , k , j , n .
Considering the rank-one constraint is intractable to handle in practice, we neglect the rank-one constraint of the problem. Then, the CVX solver can be employed to effectively solve this semi-definite relaxation (SDR) problem. In order to ensure that the obtained results satisfy the rank-one constraint, we employ a beam pre-inspection method similar to that in [16] prior to performing Gaussian randomization to resolve the rank-one problem and reduce the algorithmic complexity.

3.3. UAV Trajectory Optimization

For given allocation factor α [ n ] and beamforming vectors w k [ n ] and v j [ n ] , we can rewrite the UAV trajectory optimization problem as follows:
( SP 3 ) : max r k [ n ] , β k [ n ] , q [ n ] ( r k c o m [ n ] β k [ n ] ) s . t . ( 9 f ) ( 9 h ) , ( 10 b ) , ( 10 c ) , ( 10 e ) , ( 10 h ) , ( 10 i ) .
Due to the non-convexity of (10b), (10c), (10h) and (10i), solving problem (SP3) owing DC form (13). We regain the upper bound on the second part of the right-hand side of of the inequality in (13).
log 2 ( ξ k [ n ] + s k [ n ] ) R ^ 2 k ( l ) [ n ] + s k [ n ] s k ( l ) [ n ] ln 2 ( ξ k [ n ] + s k ( l ) [ n ] ) ,
where R ^ 2 k ( l ) [ n ] = log 2 ( ξ k [ n ] + s k ( l ) [ n ] ) .
Then, we obtain
r k [ n ] ( 1 α [ n ] ) R ^ 1 k [ n ] R ^ 2 k ( l ) [ n ] s k [ n ] s k ( l ) [ n ] ln 2 ( ξ k [ n ] + s k ( l ) [ n ] ) r ˜ k C [ n ] .
We perform SCA on R ^ k [ n ] to address its non-convexity. To this end, we introduce slack variable s k [ n ] , satisfying
s ¯ k [ n ] q [ n ] u k 2 + q z 2 .
By applying the Taylor formula, we can obtain the lower bound of q [ n ] u k 2 in (26) as
q [ n ] u k 2 q ( l ) [ n ] u k 2 + 2 ( q ( l ) [ n ] u k ) ( q [ n ] u k ) q [ n ] u k l b 2 .
Hence, we define R ¯ k [ n ] as the lower bound of R ^ k [ n ] , i.e.,
R ¯ k [ n ] ( 1 α [ n ] ) ( R ¯ 1 k u b [ n ] R ¯ 2 k [ n ] ) r ¯ k [ n ] ,
where R ¯ 1 k u b [ n ] is the upper-bound function for the first term in R ¯ k [ n ] , obtained by performing FOTE at the lth iteration for a given point s ¯ k ( l ) [ n ] . Specifically, R ¯ 1 k u b [ n ] is defined as
R ¯ 1 k u b [ n ] = R ¯ 1 k ( l ) [ n ] + s ¯ k [ n ] s ¯ k ( l ) [ n ] ln 2 ( 𝓁 k [ n ] + ξ k [ n ] + s ¯ k ( l ) [ n ] ) ,
where R ¯ 1 k ( l ) [ n ] = log 2 ( 𝓁 k [ n ] + ξ k [ n ] + s ¯ k ( l ) [ n ] ) .
Similarly, we can obtain the lower-bound function for the first term in (16) R 1 j l b [ n ] for a given point d j ( l ) [ n ] , defined as
R 1 j l b [ n ] = log 2 ( ξ j [ n ] + d j ( l ) [ n ] ) + d j [ n ] d j ( l ) [ n ] ln 2 ( ξ j [ n ] + d j ( l ) [ n ] ) .
Thus, R ¯ j , k c o m can be obtained to replace R j , k c o m in the original problem, i.e.,  R ¯ j , k c o m [ n ] = ( 1 α [ n ] ) ( R 1 j l b [ n ] R 2 j [ n ] ) . We also can obtain the upper bound of R 2 e [ n ] in (17), for a given point d e ( l ) [ n ] , which is defined as
R 2 e u b [ n ] = 2 log 2 ( d e ( l ) [ n ] ) + d e [ n ] 2 d e ( l ) [ n ] 2 2 ln 2 ( d e ( l ) [ n ] ) .
Define R ¯ e r a d [ n ] = α [ n ] ( R 1 e [ n ] R 2 e u b [ n ] ) . Thus, let set Ξ C = { r ˜ k C [ n ] , r ¯ k [ n ] , R ¯ j , k c o m [ n ] , R ¯ e r a d [ n ] , q [ n ] , s k [ n ] , s ¯ k [ n ] } , so that problem (SP3) is reformulated as
( SP3-1 ) : max Ξ C ( r ˜ k C [ n ] β k [ n ] )
s . t . ( 9 f ) ( 9 h ) , ( 10 e ) ,
1 N n = 1 N r ˜ k C [ n ] R min k , k ,
r ¯ k [ n ] e = 1 E R ¯ e r a d [ n ] , k , n ,
β k [ n ] R ¯ j , k c o m [ n ] , k , j , n ,
s ¯ k [ n ] q [ n ] u k l b 2 , k , n .
The CVX can be employed to effectively solve this subproblem. The alternating optimization algorithm to solve the primal problem (P1) is summarized in Algorithm 1.
Algorithm 1 Alternating optimization algorithm.
1:
Initialize α ( l ) [ n ] ,   w k ( l ) [ n ] ,   v j ( l ) [ n ] and q ( l ) [ n ] ; set the iteration index l = 0 and the maximum number of iterations I m a x ; set accuracy ε ;
2:
repeat
3:
    Solve (SP1) with α ( l ) [ n ] and q ( l ) [ n ] , and obtain w k ( l + 1 ) [ n ] ,   v j ( l + 1 ) [ n ] ;
4:
    Solve (SP2-1) with α ( l ) [ n ] , w k ( l + 1 ) [ n ] and v j ( l + 1 ) [ n ] , and obtain q ( l + 1 ) [ n ] ;
5:
    Solve (SP3-1) with w k ( l + 1 ) [ n ] , v j ( l + 1 ) [ n ] and q ( l + 1 ) [ n ] , and obtain α ( l + 1 ) [ n ] ;
6:
     l = l + 1 ;
7:
until the objective value converges within a specified threshold ε or the maximum number of iterations reaches.

3.4. Overall Algorithm and Analysis

The proposed algorithm is developed within the BCD framework, where the original optimization problem is decomposed into three independent subproblems corresponding to sub-time slot allocation, beamforming design, and UAV trajectory optimization. As a result, the overall computational complexity is determined by the cumulative complexity of these subproblems. Specifically, the sub-time slot allocation subproblem is formulated as a standard LP problem with variable dimension N, whose objective function depends on the number of communication users K, and sensing targets E; thus, when solved via an interior point method, its computational complexity is on the order of O ( N ( K + E ) ) . The beamforming optimization subproblem is addressed using SDR, leading to a semi-definite programming (SDP) formulation in which the variable dimension scales with the square of the number of antennas, i.e., M 2 . Taking into account the number of users K and eavesdroppers J, and following classical SDP complexity analysis, the computational complexity of this subproblem is given by O ( M 3.5 ( K + J ) 2 ) [22]. In addition, the UAV trajectory optimization subproblem is a convex optimization problem involving the UAV position variables over N time slots, whose complexity using interior point methods scales as O ( N 2 ) . The overall algorithm adopts an alternating iterative procedure and converges within L iterations; therefore, the total computational complexity of the proposed algorithm can be expressed as O L ( N ( K + E ) + M 3.5 ( K + J ) 2 + N 2 ) .

4. Numerical Results

In this section, we present simulation results to demonstrate the performance of the proposed algorithm. The specific notation meanings and parameter values are shown in Table 2. In this chapter, we analyze the simulation results, specifically discussing the impact of sub-time slot allocation factors, beamforming, and UAV trajectories on the worst-case secure communication rate. Additionally, we analyze the effects of real-time changes in UAV flight speed, variations in the number of Eves, and alterations in UAV altitude on the system’s security performance.
Figure 3 compares the algorithmic iterative convergence performance and the converged secure rates of four different schemes. Both the static and straight flight (SF) schemes perform sub-time slot allocation factor and beamforming optimization, with the UAV trajectories in the stationary and straight flight states, respectively. Traveler scheme (TSP) refers to the UAV maintaining straight-line flight from the starting point q I to the destination q F , with each CU fixed as an intermediate flight node. Consistent with the static scheme and SF scheme, it simultaneously performs sub-time slot allocation factor and beamforming optimization. The waveform and trajectory only (OnlyW&T) scheme fixes the sub-time slot allocation factor as α [ n ] = 0.5 , optimizing only the beamforming and trajectory. Based on the proposed algorithm, all four schemes converge around four iterations, demonstrating the excellent convergence performance of the proposed algorithm. In terms of the secure rate after final convergence, the proposed scheme achieves a higher secure rate than the SF, static, and OnlyW&T schemes.
Notably, although all schemes adopt beamforming optimization, the SF scheme outperforms the scheme without sub-time slot allocation factor optimization (i.e., OnlyW&T), indicating that optimizing the allocation factor can effectively improve system performance. When simultaneously optimizing sub-slot allocation factors, incorporating UAV trajectory optimization (i.e., the proposed scheme) significantly enhances the security rate compared to the SF scheme and partially improves it relative to the TSP scheme. Since the TSP scheme prioritizes CU proximity as its sole objective while disregarding eavesdropping links, it not only compromises perception quality but also partially reduces the security rate compared to the proposed scheme. The simulation results show that optimizing both the allocation factor and UAV trajectory under the premise of beamforming optimization can significantly enhance system performance. The proposed scheme achieves the maximum worst-case secure rate compared with other baseline schemes, verifying the superiority of the proposed scheme.
Figure 4 presents the trajectory optimization results and transmit beampatterns achieved by the proposed algorithm at different time slots. It should be noted that the UAV moves from the upper right corner to the lower left corner of the map, where N = 6 and N = 42 represent the positions of the UAV at the 6th and 42nd time slots in the optimized trajectory, respectively. Notably, compared with the initial SF trajectory, the optimized trajectory of the UAV tends to approach the CUs and STs while moving away from the Eves to maximize the worst-case communication secure rate. For instance, under the premise of satisfying the minimum communication and sensing threshold constraints, the UAV maintains a relatively safe distance from Eve 1 to avoid interference, while approaching CU 2 as closely as possible for secure communication, and consistently moves toward the CUs and STs during flight.
Regarding the beam focusing results, when the UAV starts to move (i.e., N = 6 ), the beampattern exhibits a wide-range focusing trend to meet the sensing threshold constraint of ST 2 and avoid interference from Eve 2 on the basis of focusing on the CUs. When the UAV moves to the middle position (i.e., N = 42 ), all communication and sensing constraints are satisfied, enabling the beam to focus more effectively on each CU. The discussion of simulation results reveals that the trajectory changes of the UAV generally follow this trend: while ensuring basic communication quality, it strives to approach ST to enhance perception quality and moves away from Eve to reduce eavesdropping link gain, aiming to maximize secure communication rate. The beam direction generally remains focused on CU and ST to maintain the fundamental power allocation for the ISAC primary task. Naturally, when the beam coverage includes the eavesdropper, information leakage is significantly reduced due to the presence of the interference beam. This is illustrated by the OnlyW&T scheme in Figure 3. Combining the two optimization results, it can be observed that the beam is dynamically adjusted as the UAV position changes continuously, which verifies the effectiveness of the proposed algorithm in trajectory optimization and beam design.
Figure 5 investigates the impact of different UAV antenna transmit powers on the total worst-case secure rates under various optimized schemes. It can be observed that as the antenna transmit power increases, the total worst-case secure rates of all schemes improve, indicating a positive correlation between the secure rate and antenna transmit power.
In addition, with the increase in antenna transmit power, the gap in secure rates between the static scheme and other flight schemes gradually narrows. This demonstrates that under the sub-time slot design conditions proposed in this paper, a good secure communication rate can be guaranteed even when the UAV is stationary, provided that sufficient power is supplied. Meanwhile, the proposed scheme consistently achieves a higher secure rate compared with the other four schemes, which further verifies that the proposed scheme maintains superior performance across different antenna transmit powers.
Figure 6 illustrates the real-time velocity variations of the UAV in the optimization results of the proposed scheme. It can be observed that the UAV’s velocity is consistently constrained within the maximum speed limit of 30 m/s. Specifically, when the UAV initially departs, it is far from the CUs and close to the Eves, thus requiring full-speed operation to rapidly establish secure communication. The same velocity logic applies when approaching the destination. During the process of approaching the CUs and STs, the velocity continuously decreases. Meanwhile, due to the presence of multiple Eves in the scenario, there are instances where the velocity increases to move away from the Eves. Once a sufficient safe distance from the Eves is achieved, the UAV reduces its velocity again to communicate with the CUs and sense the STs. Evidently, the optimized UAV velocity decreases when approaching the CUs and STs or moving away from the Eves, and increases when departing from the CUs and STs or approaching the Eves. This not only increases the time allocated to serving CUs and sensing STs but also reduces the time spent within the proximity of Eves. Consequently, the proposed flight plan can effectively improve the total worst-case secure rate between the UAV and the CUs.
Figure 7 presents the optimization results of the sub-time slot allocation factor in the proposed scheme. In conjunction with the trajectory optimization shown in Figure 4, it can be observed that, during the initial flight phase of the UAV, the sensing allocation factor maintains a relatively high value due to the prioritized requirement for sensing the STs. After satisfying the sensing threshold constraints, the proportion of resources allocated to sensing is gradually reduced to increase the communication–resource allocation ratio, aiming to establish reliable communication with the CUs. Once the UAV enters a stable flight region, the allocation ratio between sensing and communication remains basically stable with only slight fluctuations. Notably, the dynamic variation of the sub-time slot allocation factor exhibits strong correlation with the UAV’s trajectory and target presence in the scene.
Specifically, as the UAV gradually approaches the vicinity of ST 2 and CU 3 (i.e., N = 52 ), its distance to ST 2 decreases while simultaneously reducing its distance to Eve 2. Consequently, the communication allocation factor gradually increases while the perception allocation factor gradually decreases, ensuring a higher secure communication rate. As the UAV moves away from this area, the demand for sensing gradually increases, leading to a slow upward trend in the sensing allocation factor. Thus, it can be concluded that the dynamic variation of the sub-time slot allocation factor exhibits a tendency to converge toward enhancing the overall worst-case safety rate.
Figure 8 compares the total worst-case secure rates under different numbers of Eves and UAV altitudes. It should be noted that “No jammer, q z = 100 m” denotes the scenario where the proposed algorithm only removes the jamming beam, with two Eves present and the UAV operating at an altitude of 100 m. “Three Eves, q z = 100 m” represents the scenario where the proposed algorithm includes the jamming beam, with three Eves present and the UAV flying at an altitude of 100 m, and other cases follow this analogy. It can be observed that both the increase in the number of Eves and the UAV altitude lead to decreases in the secure rate, but the impact of altitude variation is not significant. When the number of Eves exceeds two, due to the small scenario area, the increase in the number of Eves leads to a corresponding increase in eavesdropping density. Thus, constrained by the scenario, the magnitude of the secure rate decrease slightly intensifies. In addition, compared with the no jammer scenario, the proposed algorithm significantly improves the secure rate in the presence of Eves by adding the jamming beam, which verifies the effectiveness of the jamming beam in enhancing the worst-case secure rate.

5. Conclusions

This paper investigated a novel U-ISJC framework that incorporates sub-time slot frame structure design and optimization, aiming to ensure both a secure communication environment and efficient resource utilization. The framework provides a fundamental approach for beamformers and UAV trajectory in U-ISJC framework. In order to maximize the secure rate, we proposed a joint optimization problem for sub-time slot allocation, beamforming and UAV trajectory. The numerical results validated the stable convergence of the proposed algorithm. The simulation results showed that the proposed scheme significantly improved the secure communication performance. This paper’s simulation assumptions are conducted under ideal conditions. Future work may extend this approach to complex scenarios involving multipath interference, noise, and self-interference. Additionally, designing an energy-efficient ISJC that incorporates energy efficiency as an optimization objective presents a challenging research direction, particularly due to the introduction of new fractional non-convex structures.

Author Contributions

Conceptualization, L.S. and C.Y.; methodology, L.S. and Y.X.; validation, D.Y. and F.W.; investigation, C.Y. and H.L.; writing—original draft, L.S. and D.Y.; writing—review and editing, L.S. and C.Y.; and visualization, L.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China under Grant 62401241, Grant 62461040, and Grant 62261035, and partly by the Joint Funds of the Jiangxi Provincial Natural Science Foundation of China under Grant No 20244BAB28002, and partly by the Key Research and Development Project of Jiangxi Province under Grant No 20252BCE310050.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Conflicts of Interest

Author Chuansheng Yan was employed by the company China Mobile (Jiangxi) Virtual Reality Technology Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
UAVUnmanned aerial vehicle
6GSix generation
ISJCIntegrated sensing, communication, and jamming
ISACIntegrated sensing and communication
IRSIntelligent reflecting surface
CCCPConcave–convex procedure
SDRSemi-definite relaxation
UPAUniform planar array
BCDBlock coordinate descent
LOSLine of sight
CUCommunication user
EveEavesdropper
STSensing target
LPLinear problem
DCDifference-of-convex
FOTEFirst-order Taylor expansion
SFStraight Flight
OnlyW&TWaveform and trajectory only

References

  1. Liu, F.; Cui, Y.; Masouros, C.; Xu, J.; Han, T.X.; Eldar, Y.C.; Buzzi, S. Integrated sensing and communications: Toward dual functional wireless networks for 6G and beyond. IEEE J. Sel. Areas Commun. 2022, 40, 1728–1767. [Google Scholar] [CrossRef]
  2. Zhang, J.A.; Dong, M.; Zhou, X.; Guo, H.; Zhang, J.; Ottersten, B.; Poor, H.V. An overview of signal processing techniques for joint communication and radar sensing. IEEE J. Sel. Top. Signal Process. 2021, 15, 1295–1315. [Google Scholar] [CrossRef]
  3. Wu, Q.; Ding, G.; Wang, J.; Yao, Y.-D. Spatial-temporal opportunity detection for spectrum-heterogeneous cognitive radio networks: Two-dimensional sensing. IEEE Trans. Wirel. Commun. 2013, 12, 516–526. [Google Scholar] [CrossRef]
  4. Li, B.; Petropulu, A.P.; Trappe, W. Optimum co-design for spectrum sharing between matrix completion based MIMO radars and a MIMO communication system. IEEE Trans. Signal Process. 2016, 64, 4562–4575. [Google Scholar] [CrossRef]
  5. Hassanien, A.; Amin, M.G.; Zhang, Y.D.; Ahmad, F. Dual-function radar communication systems: A solution to the spectrum congestion problem. IEEE Signal Process. Mag. 2019, 36, 115–126. [Google Scholar] [CrossRef]
  6. Kaushik, A.; Markakis, E.; Neokosmidis, I.; Chrysikos, T.; Anastasopoulou, M.P.; Trakadas, P.; Fernández-Caramés, T.M.; Monteiro, P.P. Integrated Sensing and Communications for IoT: Synergies with Key 6G Technology Enablers. IEEE Internet Things Mag. 2024, 7, 136–143. [Google Scholar] [CrossRef]
  7. Demirhan, U.; Alkhateeb, A. Integrated Sensing and Communication for 6G: Ten Key Machine Learning Roles. IEEE Commun. Mag. 2023, 61, 113–119. [Google Scholar] [CrossRef]
  8. Meng, K.; Wu, Q.; Chen, W.; Li, D.; Li, J.; Al-Dhahir, N.; Hanzo, L. UAV-Enabled Integrated Sensing and Communication: Opportunities and Challenges. IEEE Wirel. Commun. 2024, 31, 97–104. [Google Scholar] [CrossRef]
  9. Gupta, L.; Jain, R.; Vaszkun, G. Survey of important issues in UAV communication networks. IEEE Commun. Surv. Tutor. 2015, 18, 1123–1152. [Google Scholar] [CrossRef]
  10. Sun, X.; Ng, D.W.K.; Ding, Z.; Xu, Y.; Zhong, Z. Physical Layer Security in UAV Systems: Challenges and Opportunities. IEEE Wirel. Commun. 2019, 26, 40–47. [Google Scholar] [CrossRef]
  11. Yang, Z.; Li, D.; Zhao, N.; Wu, Z.; Li, Y.; Niyato, D. Secure Precoding Optimization for NOMA-Aided Integrated Sensing and Communication. IEEE Trans. Commun. 2022, 70, 8370–8382. [Google Scholar] [CrossRef]
  12. Chu, J.; Lu, Z.; Liu, R.; Li, M.; Liu, Q. Joint Beamforming and Reflection Design for Secure RIS-ISAC Systems. lEEE Trans. Veh. Technol. 2024, 73, 4471–4475. [Google Scholar] [CrossRef]
  13. Yang, W.; Liu, X.; Liu, Z. Joint Trajectory and Resource Allocation Optimization for Mobile Vehicles in UAV Assisted Secure ISAC System. In Proceedings of the 2024 IEEE 24th International Conference on Communication Technology (ICCT); IEEE: New York, NJ, USA, 2024; pp. 321–325. [Google Scholar]
  14. Niu, H.; Xiao, Y.; Lei, X.; Chen, J.; Xiao, Z.; Li, M.; Yuen, C. A survey on artificial noise for physical layer security: Opportunities, technologies, guidelines, advances, and trends. IEEE Commun. Surv. Tutor. 2025, 28, 341–381. [Google Scholar] [CrossRef]
  15. Shu, Y.; Qi, C.; Mao, S. Joint Transmit Waveform and Receive Filter Design for ISAC System With Jamming. IEEE Trans. Veh. Technol. 2025, 74, 13278–13283. [Google Scholar] [CrossRef]
  16. Xu, Y.; Zhu, Y.; Han, K.; Zhu, Y.; Xiao, Z.; Xia, X.G. UAV-enabled integrated sensing, computing, and communication: A fundamental trade-off. IEEE Wirel. Commun. 2023, 12, 843–847. [Google Scholar] [CrossRef]
  17. Zhang, R.; Zhang, Y.; Tang, R.; Zhao, H.; Xiao, Q.; Wang, C. A Joint UAV Trajectory, User Association, and Beamforming Design Strategy for Multi-UAV-Assisted ISAC Systems. IEEE Internet Things 2024, 11, 29360–29374. [Google Scholar] [CrossRef]
  18. Van Veen, B.D.; Buckley, K.M. Beamforming: A versatile approach to spatial filtering. IEEE ASSP Mag. 1988, 5, 4–24. [Google Scholar] [CrossRef] [PubMed]
  19. Wang, W.; Liu, X.; Liu, Z. Joint Beamforming and Trajectory Design for Multi-Antenna UAV-Enabled ISAC. lEEE Trans. Veh. Technol. 2025, 75, 3283–3287. [Google Scholar] [CrossRef]
  20. Xiao, Z.; Zhu, L.; Xia, X.-G. UAV communications with millimeter-wave beamforming: Potentials, scenarios, and challenges. China Commun. 2020, 17, 147–166. [Google Scholar] [CrossRef]
  21. Zhang, X.; Peng, M.; Liu, C. Sensing-Assisted Beamforming and Trajectory Design for UAV-Enabled Networks. lEEE Trans. Veh. Technol. 2024, 73, 3804–3819. [Google Scholar] [CrossRef]
  22. Meng, K.; Liu, F.; Masouros, C.; Eldar, Y.C.; Nallanathan, A.; Hanzo, L. Throughput maximization for UAV-enabled integrated periodic sensing and communication. IEEE Trans. Wirel. Commun. 2023, 22, 671–687. [Google Scholar] [CrossRef]
  23. Zhang, H.; Sun, J.; Wang, X.; Gong, C. Achieving Physical Layer Security Against Location Unknown Eavesdroppers via Friendly Jammer. IEEE/CAA J. Autom. Sin. 2023, 10, 2038–2040. [Google Scholar] [CrossRef]
  24. Wang, W.; Zhao, N.; Gao, H.; Gui, G.; Wang, G.; Niyato, D.; Adachi, F. Energy-Constrained UAV-Assisted Secure Communications With Position Optimization and Cooperative Jamming. IEEE Trans. Commun. 2020, 68, 4476–4489. [Google Scholar] [CrossRef]
  25. Pandey, G.K.; Gurjar, D.S.; Yadav, S.; Prasad, G.; Gazda, J. Resource Allocation and Robust Trajectory Design for Dual UAV-Assisted Secure Communications. lEEE Trans. Veh. Technol. 2025. [Google Scholar] [CrossRef]
  26. Meng, X.; Wu, X.; Xie, Z.; Zhang, T.; Xu, T. Secure Resource Allocation and Trajectory Design for UAV-Assisted IoT With Double Cluster Head. IEEE Trans. Green Commun. Netw. 2024, 8, 1661–1675. [Google Scholar] [CrossRef]
  27. Dong, R.; Wang, B.; Cao, K. Security enhancement of UAV swarm enabled relaying systems with joint beamforming and resource allocation. China Commun. 2021, 18, 71–87. [Google Scholar] [CrossRef]
  28. Wu, J.; Yuan, W.; Hanzo, L. When UAVs meet ISAC: Real-time trajectory design for secure communications. lEEE Trans. Veh. Technol. 2023, 72, 16766–16771. [Google Scholar] [CrossRef]
  29. Yao, J.; Yang, Z.; Yang, Z.; Xu, J.; Quek, T.Q.S. UAV-Enabled Secure ISAC Against Dual Eavesdropping Threats: Joint Beamforming and Trajectory Design. IEEE Wirel. Commun. 2025, 14, 3199–3203. [Google Scholar] [CrossRef]
  30. Yang, Z. Enhanced Security-Aware Beamforming and Trajectory Design for UAV-Assisted Integrated Sensing and Communication. In Proceedings of the 2025 5th International Conference on Sensors and Information Technology, Nanjing, China, 21–23 March 2025; IEEE: New York, NJ, USA, 2025; pp. 710–714. [Google Scholar]
  31. Dai, C.; Wang, Y.; Wu, T.; Gu, X.; Cao, H.; Sun, G. Robust Multi-Agent Reinforcement Learning for Physical Layer Security Communication in RIS-Assisted UAV-Enabled ISAC Networks. IEEE Trans. Netw. Sci. Eng. 2025, 13, 4969–4984. [Google Scholar] [CrossRef]
  32. Xu, J.; Zhu, Y.; Ng, D.W.K.; Al-Dhahir, N.; Schober, R. IRS-UAV Assisted Secure Integrated Sensing and Communication. IEEE Wirel. Commun. 2024, 31, 61–67. [Google Scholar] [CrossRef]
  33. Zhao, B.; Qiu, T.; Ge, Y. RSMA-Enhanced Secure Precoding for ISAC Systems with Both Active and Passive Eavesdroppers. Comput. Netw. 2025, 275, 111952. [Google Scholar] [CrossRef]
  34. Liu, Y.; Xu, J.; Xiong, Z.; Kang, J.; Niyato, D.; Huang, C. Secure rate maximization for ISAC-UAV assisted communication amidst multiple eavesdroppers. IEEE Trans. Veh. Technol. 2024, 73, 15843–15847. [Google Scholar] [CrossRef]
  35. Wei, Z.; Liu, F.; Ng, D.W.K.; Schober, R. Safeguarding UAV networks through integrated sensing, jamming, and communications. In Proceedings of the ICASSP 2022—2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Singapore, 22–27 May 2022; IEEE: New York, NJ, USA, 2022; pp. 8737–8741. [Google Scholar]
  36. Wei, Z.; Liu, F.; Liu, C.; Yang, Z.; Ng, D.W.K.; Schober, R. Integrated sensing, navigation, and communication for secure UAV networks with a mobile eavesdropper. IEEE Trans. Wirel. Commun. 2024, 23, 7060–7078. [Google Scholar] [CrossRef]
  37. Kumar, A.S.; Shekhar, S.; Muthukrishnan, G.; Srinivasan, M.; Kalyani, S. Integrating OTFS in Airplane-Aided Next-Generation Networking. arXiv 2026, arXiv:2601.15166. [Google Scholar]
  38. Khalili, A.; Rezaei, A.; Xu, D.; Schober, R. Energy-Aware Resource Allocation and Trajectory Design for UAV-Enabled ISAC. In Proceedings of the IEEE Global Communications Conference, Kuala Lumpur, Malaysia, 4–8 December 2023; IEEE: New York, NJ, USA, 2023; pp. 4193–4198. [Google Scholar]
  39. An, J.; Li, H.; Ng, D.W.K.; Yuen, C. Fundamental Detection Probability vs. Achievable Rate Tradeoff in Integrated Sensing and Communication Systems. IEEE Wirel. Commun. 2023, 22, 9835–9853. [Google Scholar] [CrossRef]
  40. CVX Research, Inc. CVX: Matlab Software for Disciplined Convex Programming. Available online: https://cvxr.com/cvx (accessed on 15 April 2025).
Figure 1. U-ISJC secure communication system.
Figure 1. U-ISJC secure communication system.
Telecom 07 00027 g001
Figure 2. ISJC-UAV frame structure design.
Figure 2. ISJC-UAV frame structure design.
Telecom 07 00027 g002
Figure 3. Convergence of the proposed algorithm.
Figure 3. Convergence of the proposed algorithm.
Telecom 07 00027 g003
Figure 4. Beampattern at N = 6 and N = 42 .
Figure 4. Beampattern at N = 6 and N = 42 .
Telecom 07 00027 g004
Figure 5. Comparison of secure rates with different transmit power.
Figure 5. Comparison of secure rates with different transmit power.
Telecom 07 00027 g005
Figure 6. Speed of UAV.
Figure 6. Speed of UAV.
Telecom 07 00027 g006
Figure 7. Allocation factor of UAV.
Figure 7. Allocation factor of UAV.
Telecom 07 00027 g007
Figure 8. Comparison of total worst-case secure rate under different scenarios.
Figure 8. Comparison of total worst-case secure rate under different scenarios.
Telecom 07 00027 g008
Table 1. Comparison between state-of-the-art schemes and our work.
Table 1. Comparison between state-of-the-art schemes and our work.
ReferenceISACUAV TrajectoryResource AllocationBeamformingMultiple TargetsTarget SeparationArtificial NoiseSecure Rate Maximization
[3]
[8]
[10]
[11]
[13]
[15]
[16]
[24]
[27]
[28]
[31]
[32]
[33]
[34]
[35]
Our Work
✓ indicates that the relevant literature review covers this technology, while a blank space indicates that it does not.
Table 2. List of notations.
Table 2. List of notations.
NotationDefinitionParameter Value
KNumber of legitimate communication users3
JNumber of illegal communication eavesdroppers2
SNumber of ground sensing targets2
MNumber of UAV antennas 4 × 4
q I UAV flight starting point [ 200 , 200 ]  m
q F UAV flight endpoint [ 200 , 200 ]  m
q z UAV flight altitude100 m
TTotal service time30 s
V m a x Maximum flight speed30 m/s
δ t Duration of the sub-time slot 0.5  s
β 0 Average channel power gain at a distance of 1m 30  dB
σ k 2 Noise power received by authorized users 80  dBm
σ j 2 Illegal user receiver noise power 80  dBm
σ e 2 Perceived noise power at the target receiver 150  dBm
P m a x Maximum antenna output power1 W
R min k Communication quality threshold 0.25  bit/s/Hz
Γ e Sensing intensity threshold 10 12
ε Algorithm convergence accuracy 10 2
I m a x Maximum iteration count for the algorithm50
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Shi, L.; Yan, C.; Yang, D.; Xu, Y.; Wu, F.; Lu, H. Security Improvement for UAV-Assisted Integrated Sensing, Communication, and Jamming Networks. Telecom 2026, 7, 27. https://doi.org/10.3390/telecom7020027

AMA Style

Shi L, Yan C, Yang D, Xu Y, Wu F, Lu H. Security Improvement for UAV-Assisted Integrated Sensing, Communication, and Jamming Networks. Telecom. 2026; 7(2):27. https://doi.org/10.3390/telecom7020027

Chicago/Turabian Style

Shi, Lin, Chuansheng Yan, Dingcheng Yang, Yu Xu, Fahui Wu, and Huabing Lu. 2026. "Security Improvement for UAV-Assisted Integrated Sensing, Communication, and Jamming Networks" Telecom 7, no. 2: 27. https://doi.org/10.3390/telecom7020027

APA Style

Shi, L., Yan, C., Yang, D., Xu, Y., Wu, F., & Lu, H. (2026). Security Improvement for UAV-Assisted Integrated Sensing, Communication, and Jamming Networks. Telecom, 7(2), 27. https://doi.org/10.3390/telecom7020027

Article Metrics

Back to TopTop