{"title":"Sensing for Jamming in ISAC: Beam Scanning and Beamforming Optimization","authors":"Yang Cao;Lingjie Duan","doi":"10.1109/TIFS.2025.3583251","DOIUrl":null,"url":null,"abstract":"The development of wireless technology enables numerous applications of remote-controlled devices (e.g., uncrewed aerial vehicles), yet their intrusion poses significant threats to restricted areas, including military bases, airports, and private spaces belonging to individuals and organizations. To effectively counter the intruders, we propose a novel sensing assisted jamming (SAJA) scheme in two-stage transmission protocol, where we are the first to employ beam scanning to enhance the jamming gain to neutralize intruders. In the first stage, we determine the number of sensing beams L for detecting intruders. We show that a larger L leads to a more accurate angle range, thus enabling a higher jamming beam gain. In the second stage, robust jamming beamforming is designed to disable the intruders within the estimated angle range. The problem facing a single intruder is already non-convex, and we decouple it into two subproblems and develop algorithms for both single- and multi-intruder scenarios. In single-intruder scenarios, we first derive the closed-form expression for robust beamforming design with fixed L, and then apply the bisection search method to determine the minimum L. Facing multiple possible intruders, we further design a multi-round anti-intruder algorithm to address power insufficiency. In each round, we check the problem feasibility with <inline-formula> <tex-math>$L=L_{max}$ </tex-math></inline-formula> (<inline-formula> <tex-math>$L_{max}$ </tex-math></inline-formula> is the maximum number of sensing beams) and use a jamming-to-noise-ratio based method to selectively target intruders until the problem is feasible. Furthermore, we derive a semi-closed-form solution to the robust jamming beamforming vector using Lagrange duality theory. Finally, simulation results validate the effectiveness and robustness of the proposed SAJA scheme against existing schemes.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"6502-6514"},"PeriodicalIF":8.0000,"publicationDate":"2025-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11050921/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
The development of wireless technology enables numerous applications of remote-controlled devices (e.g., uncrewed aerial vehicles), yet their intrusion poses significant threats to restricted areas, including military bases, airports, and private spaces belonging to individuals and organizations. To effectively counter the intruders, we propose a novel sensing assisted jamming (SAJA) scheme in two-stage transmission protocol, where we are the first to employ beam scanning to enhance the jamming gain to neutralize intruders. In the first stage, we determine the number of sensing beams L for detecting intruders. We show that a larger L leads to a more accurate angle range, thus enabling a higher jamming beam gain. In the second stage, robust jamming beamforming is designed to disable the intruders within the estimated angle range. The problem facing a single intruder is already non-convex, and we decouple it into two subproblems and develop algorithms for both single- and multi-intruder scenarios. In single-intruder scenarios, we first derive the closed-form expression for robust beamforming design with fixed L, and then apply the bisection search method to determine the minimum L. Facing multiple possible intruders, we further design a multi-round anti-intruder algorithm to address power insufficiency. In each round, we check the problem feasibility with $L=L_{max}$ ($L_{max}$ is the maximum number of sensing beams) and use a jamming-to-noise-ratio based method to selectively target intruders until the problem is feasible. Furthermore, we derive a semi-closed-form solution to the robust jamming beamforming vector using Lagrange duality theory. Finally, simulation results validate the effectiveness and robustness of the proposed SAJA scheme against existing schemes.
期刊介绍:
The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features