Mittelbach Martin, Schaefer Rafael F, Bloch Matthieu, Yener Aylin, Günlü Onur
Chair of Information Theory and Machine Learning, Technische Universität Dresden, 01062 Dresden, Germany.
School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA.
Entropy (Basel). 2025 Feb 21;27(3):225. doi: 10.3390/e27030225.
We consider a secure integrated sensing and communication (ISAC) scenario, where a signal is transmitted through a state-dependent wiretap channel with one legitimate receiver with which the transmitter communicates and one honest-but-curious target that the transmitter wants to sense. The secure ISAC channel is modeled as two state-dependent fast-fading channels with correlated Rayleigh fading coefficients and independent additive Gaussian noise components. Delayed channel outputs are fed back to the transmitter to improve the communication performance and to estimate the channel state sequence. We establish and illustrate an achievable secrecy-distortion region for degraded secure ISAC channels under correlated Rayleigh fading, for which we show that the signal-to-interference-plus-noise is not a sufficient statistic. We also evaluate the inner bound for a large set of parameters to derive practical design insights. The presented results include parameter ranges for which the secrecy capacity of a classical wiretap channel setup is surpassed and for which the channel capacity is approached. Thus, we illustrate for correlated Rayleigh fading cases that our secure ISAC methods can (i) eliminate the need for the legitimate receiver to have a statistical advantage over the eavesdropper and (ii) provide communication security with minimal rate penalty.
我们考虑一种安全的集成传感与通信(ISAC)场景,其中信号通过一个状态依赖的窃听信道进行传输,该信道有一个与发射机进行通信的合法接收机,以及一个发射机想要感知的诚实但好奇的目标。安全的ISAC信道被建模为两个状态依赖的快衰落信道,具有相关的瑞利衰落系数和独立的加性高斯噪声分量。延迟的信道输出被反馈到发射机,以提高通信性能并估计信道状态序列。我们建立并说明了相关瑞利衰落条件下退化安全ISAC信道的一个可实现的保密 - 失真区域,对于该区域我们表明信号与干扰加噪声之比不是一个充分统计量。我们还评估了一大组参数的内界,以得出实际的设计见解。给出的结果包括超过经典窃听信道设置的保密容量以及接近信道容量的参数范围。因此,对于相关瑞利衰落情况,我们说明了我们的安全ISAC方法可以(i)消除合法接收机相对于窃听者具有统计优势的需求,以及(ii)以最小的速率代价提供通信安全。