ISAC干扰检测:波束扫描与波束成形优化

IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS
Yang Cao;Lingjie Duan
{"title":"ISAC干扰检测:波束扫描与波束成形优化","authors":"Yang Cao;Lingjie Duan","doi":"10.1109/TIFS.2025.3583251","DOIUrl":null,"url":null,"abstract":"The development of wireless technology enables numerous applications of remote-controlled devices (e.g., uncrewed aerial vehicles), yet their intrusion poses significant threats to restricted areas, including military bases, airports, and private spaces belonging to individuals and organizations. To effectively counter the intruders, we propose a novel sensing assisted jamming (SAJA) scheme in two-stage transmission protocol, where we are the first to employ beam scanning to enhance the jamming gain to neutralize intruders. In the first stage, we determine the number of sensing beams L for detecting intruders. We show that a larger L leads to a more accurate angle range, thus enabling a higher jamming beam gain. In the second stage, robust jamming beamforming is designed to disable the intruders within the estimated angle range. The problem facing a single intruder is already non-convex, and we decouple it into two subproblems and develop algorithms for both single- and multi-intruder scenarios. In single-intruder scenarios, we first derive the closed-form expression for robust beamforming design with fixed L, and then apply the bisection search method to determine the minimum L. Facing multiple possible intruders, we further design a multi-round anti-intruder algorithm to address power insufficiency. In each round, we check the problem feasibility with <inline-formula> <tex-math>$L=L_{max}$ </tex-math></inline-formula> (<inline-formula> <tex-math>$L_{max}$ </tex-math></inline-formula> is the maximum number of sensing beams) and use a jamming-to-noise-ratio based method to selectively target intruders until the problem is feasible. Furthermore, we derive a semi-closed-form solution to the robust jamming beamforming vector using Lagrange duality theory. Finally, simulation results validate the effectiveness and robustness of the proposed SAJA scheme against existing schemes.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"6502-6514"},"PeriodicalIF":8.0000,"publicationDate":"2025-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Sensing for Jamming in ISAC: Beam Scanning and Beamforming Optimization\",\"authors\":\"Yang Cao;Lingjie Duan\",\"doi\":\"10.1109/TIFS.2025.3583251\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The development of wireless technology enables numerous applications of remote-controlled devices (e.g., uncrewed aerial vehicles), yet their intrusion poses significant threats to restricted areas, including military bases, airports, and private spaces belonging to individuals and organizations. To effectively counter the intruders, we propose a novel sensing assisted jamming (SAJA) scheme in two-stage transmission protocol, where we are the first to employ beam scanning to enhance the jamming gain to neutralize intruders. In the first stage, we determine the number of sensing beams L for detecting intruders. We show that a larger L leads to a more accurate angle range, thus enabling a higher jamming beam gain. In the second stage, robust jamming beamforming is designed to disable the intruders within the estimated angle range. The problem facing a single intruder is already non-convex, and we decouple it into two subproblems and develop algorithms for both single- and multi-intruder scenarios. In single-intruder scenarios, we first derive the closed-form expression for robust beamforming design with fixed L, and then apply the bisection search method to determine the minimum L. Facing multiple possible intruders, we further design a multi-round anti-intruder algorithm to address power insufficiency. In each round, we check the problem feasibility with <inline-formula> <tex-math>$L=L_{max}$ </tex-math></inline-formula> (<inline-formula> <tex-math>$L_{max}$ </tex-math></inline-formula> is the maximum number of sensing beams) and use a jamming-to-noise-ratio based method to selectively target intruders until the problem is feasible. Furthermore, we derive a semi-closed-form solution to the robust jamming beamforming vector using Lagrange duality theory. Finally, simulation results validate the effectiveness and robustness of the proposed SAJA scheme against existing schemes.\",\"PeriodicalId\":13492,\"journal\":{\"name\":\"IEEE Transactions on Information Forensics and Security\",\"volume\":\"20 \",\"pages\":\"6502-6514\"},\"PeriodicalIF\":8.0000,\"publicationDate\":\"2025-06-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Information Forensics and Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11050921/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11050921/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

摘要

无线技术的发展使远程控制设备(如无人驾驶飞行器)的应用成为可能,但它们的入侵对限制区域构成了重大威胁,包括军事基地、机场和属于个人和组织的私人空间。为了有效地对抗入侵者,我们在两阶段传输协议中提出了一种新的传感辅助干扰(SAJA)方案,其中我们首次采用波束扫描来提高干扰增益以抵消入侵者。在第一阶段,我们确定用于检测入侵者的感应波束数L。我们表明,更大的L导致更精确的角度范围,从而实现更高的干扰波束增益。在第二阶段,设计了鲁棒干扰波束形成,使入侵者在估计的角度范围内失效。面对单个入侵者的问题已经是非凸的,我们将其解耦为两个子问题,并开发了针对单个和多入侵者场景的算法。在单入侵者情况下,我们首先推导了固定L的鲁棒波束形成设计的封闭表达式,然后应用平分搜索法确定最小L。面对多个可能的入侵者,我们进一步设计了多轮反入侵者算法,以解决功率不足的问题。在每一轮中,我们用$L=L_{max}$ ($L_{max}$是感应波束的最大数量)来检查问题的可行性,并使用基于干扰噪声比的方法选择性地瞄准入侵者,直到问题可行为止。在此基础上,利用拉格朗日对偶理论推导了鲁棒干扰波束形成矢量的半封闭解。最后,仿真结果验证了该方案的有效性和鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Sensing for Jamming in ISAC: Beam Scanning and Beamforming Optimization
The development of wireless technology enables numerous applications of remote-controlled devices (e.g., uncrewed aerial vehicles), yet their intrusion poses significant threats to restricted areas, including military bases, airports, and private spaces belonging to individuals and organizations. To effectively counter the intruders, we propose a novel sensing assisted jamming (SAJA) scheme in two-stage transmission protocol, where we are the first to employ beam scanning to enhance the jamming gain to neutralize intruders. In the first stage, we determine the number of sensing beams L for detecting intruders. We show that a larger L leads to a more accurate angle range, thus enabling a higher jamming beam gain. In the second stage, robust jamming beamforming is designed to disable the intruders within the estimated angle range. The problem facing a single intruder is already non-convex, and we decouple it into two subproblems and develop algorithms for both single- and multi-intruder scenarios. In single-intruder scenarios, we first derive the closed-form expression for robust beamforming design with fixed L, and then apply the bisection search method to determine the minimum L. Facing multiple possible intruders, we further design a multi-round anti-intruder algorithm to address power insufficiency. In each round, we check the problem feasibility with $L=L_{max}$ ( $L_{max}$ is the maximum number of sensing beams) and use a jamming-to-noise-ratio based method to selectively target intruders until the problem is feasible. Furthermore, we derive a semi-closed-form solution to the robust jamming beamforming vector using Lagrange duality theory. Finally, simulation results validate the effectiveness and robustness of the proposed SAJA scheme against existing schemes.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security 工程技术-工程:电子与电气
CiteScore
14.40
自引率
7.40%
发文量
234
审稿时长
6.5 months
期刊介绍: The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信