Anti-malicious ISAC using proactive monitoring

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we investigate proactive monitoring to mitigate malicious activities in integrated sensing and communication (ISAC) systems. Our focus is on a scenario where a cell-free massive multiple-input multiple-output (CF-mMIMO) architecture is exploited by malicious actors. Malicious actors use multiple access points (APs) to illegally sense a legitimate target while communicating with users (UEs), one of which is suspected of illegal activities.
In our approach, a proactive monitor overhears the suspicious UE and simultaneously sends a jamming signal to degrade the communication links between the APs and suspicious UE. Simultaneously, the monitor sends a precoded jamming signal toward the legitimate target to hinder the malicious sensing attempts. We derive closed-form expressions for the sensing signal-to-interference-noise ratio (SINR), as well as the received SINR at the UEs and overheard SINR at the monitor. The simulation results show that our anti-malicious CF-mMIMO ISAC strategy can significantly reduce the sensing performance while offering excellent monitoring performance.
Original languageEnglish
Title of host publication2024 IEEE Global Communications Conference (GLOBECOM): Proceedings
PublisherIEEE Xplore
Publication statusAccepted - 08 Sept 2024
Event2024
IEEE Global Communications Conference (GLOBECOM)
- Cape Town, South Africa
Duration: 08 Dec 202412 Dec 2024

Publication series

NameIEEE Global Communications Conference (GLOBECOM): Proceedings
ISSN (Print)1930-529X
ISSN (Electronic)2576-6813

Conference

Conference2024
IEEE Global Communications Conference (GLOBECOM)
Country/TerritorySouth Africa
CityCape Town
Period08/12/202412/12/2024

Keywords

  • Anti-Malicious ISAC
  • Proactive Monitoring
  • integrated sensing
  • CF-mMIMO

Fingerprint

Dive into the research topics of 'Anti-malicious ISAC using proactive monitoring'. Together they form a unique fingerprint.

Cite this