Secrecy-Constrained UAV-Mounted RIS-Assisted ISAC Networks: Position Optimization and Power Beamforming

This paper investigates secrecy solutions for integrated sensing and communication (ISAC) systems, leveraging the combination of a reflecting intelligent surface (RIS) and an unmanned aerial vehicle (UAV) to introduce new degrees of freedom for enhanced system performance. Specifically, we propose a...

Full description

Saved in:
Bibliographic Details
Main Authors: Weichao Yang, Yajing Wang, Dawei Wang, Yixin He, Li Li
Format: Article
Language:English
Published: MDPI AG 2025-01-01
Series:Drones
Subjects:
Online Access:https://www.mdpi.com/2504-446X/9/1/51
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832588663576330240
author Weichao Yang
Yajing Wang
Dawei Wang
Yixin He
Li Li
author_facet Weichao Yang
Yajing Wang
Dawei Wang
Yixin He
Li Li
author_sort Weichao Yang
collection DOAJ
description This paper investigates secrecy solutions for integrated sensing and communication (ISAC) systems, leveraging the combination of a reflecting intelligent surface (RIS) and an unmanned aerial vehicle (UAV) to introduce new degrees of freedom for enhanced system performance. Specifically, we propose a secure ISAC system supported by a UAV-mounted RIS, where an ISAC base station (BS) facilitates secure multi-user communication while simultaneously detecting potentially malicious radar targets. Our goal is to improve parameter estimation performance, measured by the Cramér–Rao bound (CRB), by jointly optimizing the UAV position, transmit beamforming, and RIS beamforming, subject to constraints including the UAV flight area, communication users’ quality of service (QoS) requirements, secure transmission demands, power budget, and RIS reflecting coefficient limits. To address this non-convex, multivariate, and coupled problem, we decompose it into three subproblems, which are solved iteratively using particle swarm optimization (PSO), semi-definite relaxation (SDR), majorization–minimization (MM), and alternating direction method of multipliers (ADMM) algorithms. Our numerical results validate the effectiveness of the proposed scheme and demonstrate the potential of employing UAV-mounted RIS in ISAC systems to enhance radar sensing capabilities.
format Article
id doaj-art-f0d084e9c95b4e99b119cf49177d9867
institution Kabale University
issn 2504-446X
language English
publishDate 2025-01-01
publisher MDPI AG
record_format Article
series Drones
spelling doaj-art-f0d084e9c95b4e99b119cf49177d98672025-01-24T13:29:47ZengMDPI AGDrones2504-446X2025-01-01915110.3390/drones9010051Secrecy-Constrained UAV-Mounted RIS-Assisted ISAC Networks: Position Optimization and Power BeamformingWeichao Yang0Yajing Wang1Dawei Wang2Yixin He3Li Li4School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, ChinaSchool of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, ChinaSchool of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, ChinaCollege of Information Science and Engineering, Jiaxing University, Jiaxing 314001, ChinaSchool of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, ChinaThis paper investigates secrecy solutions for integrated sensing and communication (ISAC) systems, leveraging the combination of a reflecting intelligent surface (RIS) and an unmanned aerial vehicle (UAV) to introduce new degrees of freedom for enhanced system performance. Specifically, we propose a secure ISAC system supported by a UAV-mounted RIS, where an ISAC base station (BS) facilitates secure multi-user communication while simultaneously detecting potentially malicious radar targets. Our goal is to improve parameter estimation performance, measured by the Cramér–Rao bound (CRB), by jointly optimizing the UAV position, transmit beamforming, and RIS beamforming, subject to constraints including the UAV flight area, communication users’ quality of service (QoS) requirements, secure transmission demands, power budget, and RIS reflecting coefficient limits. To address this non-convex, multivariate, and coupled problem, we decompose it into three subproblems, which are solved iteratively using particle swarm optimization (PSO), semi-definite relaxation (SDR), majorization–minimization (MM), and alternating direction method of multipliers (ADMM) algorithms. Our numerical results validate the effectiveness of the proposed scheme and demonstrate the potential of employing UAV-mounted RIS in ISAC systems to enhance radar sensing capabilities.https://www.mdpi.com/2504-446X/9/1/51integrated sensing and communication (ISAC)physical layer securityreconfigurable intelligent surface (RIS)Cramér–Rao bound (CRB)
spellingShingle Weichao Yang
Yajing Wang
Dawei Wang
Yixin He
Li Li
Secrecy-Constrained UAV-Mounted RIS-Assisted ISAC Networks: Position Optimization and Power Beamforming
Drones
integrated sensing and communication (ISAC)
physical layer security
reconfigurable intelligent surface (RIS)
Cramér–Rao bound (CRB)
title Secrecy-Constrained UAV-Mounted RIS-Assisted ISAC Networks: Position Optimization and Power Beamforming
title_full Secrecy-Constrained UAV-Mounted RIS-Assisted ISAC Networks: Position Optimization and Power Beamforming
title_fullStr Secrecy-Constrained UAV-Mounted RIS-Assisted ISAC Networks: Position Optimization and Power Beamforming
title_full_unstemmed Secrecy-Constrained UAV-Mounted RIS-Assisted ISAC Networks: Position Optimization and Power Beamforming
title_short Secrecy-Constrained UAV-Mounted RIS-Assisted ISAC Networks: Position Optimization and Power Beamforming
title_sort secrecy constrained uav mounted ris assisted isac networks position optimization and power beamforming
topic integrated sensing and communication (ISAC)
physical layer security
reconfigurable intelligent surface (RIS)
Cramér–Rao bound (CRB)
url https://www.mdpi.com/2504-446X/9/1/51
work_keys_str_mv AT weichaoyang secrecyconstraineduavmountedrisassistedisacnetworkspositionoptimizationandpowerbeamforming
AT yajingwang secrecyconstraineduavmountedrisassistedisacnetworkspositionoptimizationandpowerbeamforming
AT daweiwang secrecyconstraineduavmountedrisassistedisacnetworkspositionoptimizationandpowerbeamforming
AT yixinhe secrecyconstraineduavmountedrisassistedisacnetworkspositionoptimizationandpowerbeamforming
AT lili secrecyconstraineduavmountedrisassistedisacnetworkspositionoptimizationandpowerbeamforming