1. Introduction
With the continuous evolution of mobile communication technology, the world has entered a critical phase of 6G research. 6G is expected to usher humanity into a new era of deep integration between the physical and virtual worlds. Dual-Functional Radar–Communication (DFRC), recognized as a pivotal technology for achieving the 6G vision, leverages the design of wireless signal systems to facilitate the sharing of signal processing modules and environmental information. This integration delivers significant advantages, including improved spectrum efficiency, reduced processing costs, and enhanced system performance. In recent years, the development of radar and communication systems toward DFRC has become a focal point of research for scholars both domestically and internationally. Specifically, in [
1,
2], the author proposed a cooperative scheme for MIMO communication and radar, which achieves the sharing of sensing and communication systems by jointly designing the radar transmission coding matrix and the communication transmission covariance matrix. The research [
3,
4] addressed the design of MIMO sensing transmission beam patterns coexisting with wireless communication systems, enhancing the required sensing and communication performance across various scenarios through solving optimization problems. DFRC can also be applied to many other scenarios, including Internet of Things (IoT) networks [
5,
6], smart homes or vehicular networks [
7,
8], and autonomous driving technology networks [
9].
In addition, the proper integration of DFRC with other wireless technologies or devices can lead to many emerging applications, including orthogonal frequency division multiplexing (OFDM), intelligent reflecting surfaces (IRSs), and non-orthogonal multiple access (NOMA) technologies. For example, in [
10], the author proposes an OFDM-DFRC system, which effectively utilizes the spectrum while maintaining robust communication to prevent multipath fading and improving radar estimation accuracy. Similarly, in [
11], the author explores a RIS-aided DFRC system. By designing the transmit beamformer and IRS reflection, they achieve up to a 32 dB improvement in the radar SNR compared to passive RIS-aided DFRC systems.
As a key technology in 5G networks, NOMA can serve multiple users simultaneously, improving the utilization of shared spectrum. By combining NOMA with DFRC systems, spectrum sharing can be achieved. The research in [
12] proposed a NOMA-DFRC framework, utilizing NOMA to provide services to multiple communication users while performing target sensing, enhancing the system’s communication performance and target sensing ability. In [
13], the author investigated a NOMA-aided DFRC system, where NOMA serves multiple users while detecting a set of radar targets. A joint optimization framework is proposed to maximize sensing efficiency while simultaneously ensuring the communication performance of NOMA users and the sensing accuracy of designated targets. This approach effectively balances the trade-offs between communication and sensing requirements, achieving optimal system performance. The research in [
14] introduced an iterative channel estimation method for DFRC that maintains both sensing and communication performance while providing spectrum efficiency. This method achieves uplink transmission through estimating the channel of the received signals. In [
15], the author proposed a NOMA-assisted communication, sensing, and computing application. The proposed application maximizes computation offloading capabilities and suppresses inter-functional interference, achieving high-quality sensing and computing performance. By adopting NOMA technology, the degrees of freedom in DFRC systems are greatly increased, significantly enhancing both sensing and communication performance while also offering possibilities for other applications.
However, the transmitted signals in DFRC systems are designed to carry communication signals and data through specific waveforms. When eavesdropping devices are present during system operation, the communication security of users in DFRC systems cannot be guaranteed. Therefore, physical layer security is a critical consideration in DFRC system design. In [
16], the authors leveraged the inherent interference of strong radar signals to ensure the physical layer security of coexisting multi-user single-input single-output communication systems and collaborative MIMO radar. In [
17], a drone system integrated with DFRC technology was proposed, addressing a joint optimization problem involving user scheduling, transmission power, and source drone trajectories to maximize secure data transmission rates. The research in [
18,
19] both utilized intelligent reflecting surfaces (IRSs) to enhance the physical layer security of DFRC systems. The former formulated a joint optimization problem to maximize user capacity and secure rates through active and passive beamforming, while the latter investigated the joint design of communication and radar beamformer phase shifts on the IRS and base station to maximize the gain of the perceptual beam pattern towards targets, ensuring minimal information leakage to eavesdroppers. This demonstrated the significant potential of IRSs in enhancing the security of DFRC systems. The research in [
20] combined the Capon method and approximate maximum likelihood techniques to identify potential eavesdropper directions, achieving a mutually beneficial outcome for both sensing and security functions. In [
21,
22,
23], an artificial noise (AN)-assisted strategy was proposed to ensure the security of MIMO communication systems. The strategy entails transmitting AN in conjunction with information-bearing signals to effectively disrupt eavesdropping devices, ensuring secure communication.
Additionally, the wireless security challenges associated with NOMA systems merit significant attention. Due to the higher transmission power of the weak-channel user, the signals are more susceptible to interception. A secure transmission scheme for a MISO-NOMA framework is discussed in [
24], using artificial jamming generated at the BS to ensure security in the presence of an eavesdropping device. By maximizing the transmission power of the AN and using SIC to eliminate the jamming signal before it interferes with legitimate transmissions, eavesdropping can be effectively disrupted without affecting lawful communication. In [
25], the author explored the wireless security of NOMA-SISO systems. Each user has predefined QoS requirements, and the feasible transmission power region that satisfies all users’ QoS needs was identified. Additionally, the research in [
26] proposed a secure transmission scheme in dual-user NOMA channels using deep neural networks (DNNs). By applying linear precoding to each user’s signal using deep neural networks, the computation time is significantly reduced, and the secrecy capacity increases to approximately 98 precent. At the same time, spectrum efficiency is enhanced, with dynamic complexity several times lower than that of existing iterative methods.
Nevertheless, the research on the secure transmission of DFRC systems under the NOMA framework is still limited. Currently, only the research in [
27] has addressed the secure transmission problem in a NOMA-assisted DFRC system by introducing artificial interference. Based on the above analysis, we propose a secure transmission framework for NOMA-assisted DFRC systems in scenarios involving eavesdroppers. Sensing and communication are achieved by superimposing signals in the power domain, with SIC employed to remove inter-user interference. We fully leverage the high degrees of freedom that NOMA technology brings to DFRC systems and investigate the beamforming problem to maximize the system’s security performance, constrained by minimum communication rate requirements and specific radar performance limitations. Additionally, since the eavesdroppers are non-cooperative, we also consider the robust beamforming problem in scenarios where the exact CSI of the eavesdropper is unavailable. At present, there has been no prior research dedicated to addressing the robust secure transmission challenges in NOMA-assisted DFRC systems. This gap highlights the novelty and significance of the proposed work. In summary, our contributions are as follows:
A secure communication deployment scheme for NOMA-assisted DFRC systems is proposed, considering two scenarios where the eavesdropper’s CSI is precisely known and where the CSI of the eavesdropper is unavailable. The security design issues related to beamforming patterns, user signal-to-noise ratios, and power constraints are addressed for each scenario.
In the scenario where the eavesdropper’s CSI is known, a secure communication optimization model based on transmit beamforming is proposed. Subject to minimum communication rate constraints and radar beam threshold requirements, the model iteratively addresses the beamforming optimization challenge, aiming to enhance the aggregate secrecy rate for multiple users by integrating fractional programming (FP) with semidefinite relaxation (SDR) methods. The high degree of freedom NOMA technology provides is integrated into the secure communication of DFRC systems.
In the scenario where the CSI of the eavesdropping device is unavailable, a robust transmit beamforming optimization model for secure communication is proposed, representing the uncertain channel model as a bounded uncertainty set. Under the constraints of ensuring the minimum communication rate for system users and meeting radar beam threshold requirements, the model constructs a bounded beamforming optimization to maximize the sum secrecy rate for users. By jointly applying Taylor series expansion and the S-procedure, the original problem is transformed into a tractable problem characterized by linear matrix inequalities (LMIs), enabling efficient and tractable solutions using standard optimization techniques.
Notations: All scalars are in italicized letters, and vectors and matrices are in bold letters. denotes the dimensional complex matrix. denotes its Euclidean norm and denotes a diagonal matrix. For any general matrix , denote its conjugate transpose.
3. Secure Beamforming Design with Known Eavesdropper CSI
In this section, the eavesdropper’s CSI can be accurately estimated, and the eavesdropper lacks sufficient information to perform SIC on the signals of legitimate users. Assuming that all users require secure transmission, we aim to optimize the overall secrecy rate by designing secure beamforming vectors for the DFRC system, while ensuring the system’s sensing and communication capabilities. To begin, we define
. The DFRC secure beamforming problem can be given by
Constraint (
9b) ensures that the designed DFRC system’s transmit beam pattern closely approximates the ideal radar beam pattern, meeting the target detection requirements. Constraints (
9c) and (
9d) represent the minimum rate conditions for NOMA multicast transmission, ensuring reliable communication. Constraint (
9e) reflects the total power constraint for the DFRC system. Both the objective function and constraints (
9c) and (
9d) are non-convex, making the problem challenging to solve directly. By substituting (
4)–(
7) into (
9a), we obtain
The objective function contains a difference of logarithmic terms. To handle this, we first apply a basic transformation to simplify it. Equation (
11) can then be reformulated as
Due to the presence of logarithmic functions with fractional terms in Equation (
12), the problem remains non-convex. Fortunately, fractional programming (FP) methods can eliminate the fractional terms and make it easier to solve [
30]. First, we apply the Lagrangian dual transformation technique, utilizing the Closed-Form FP approach to address the first term in Equation (
12). We first consider the auxiliary variables
and
; the first term in Equation (
12) can be reformulated as follows:
When
is fixed, the optimal values for
and
can be obtained by taking the partial derivatives and setting them equal to zero, i.e.,
It can be observed that the fractional term in the first part of Equation (
12) has been successfully transformed into a convex form. Next, we apply the Direct FP approach to handle the second term in Equation (
12). Through the quadratic transformation, we can rewrite the second term as follows:
When
is fixed, the value of
can be obtained from the following formula:
At this point, problems (9a)–(9c) can be reformulated into the following form:
Where the variables
are updated in each iteration; when these variables are known, the objective function in Equation (
18) becomes a convex problem concerning
, as it combines both linear and logarithmic functions, and can be directly solved. Next, we address the non-convex constraint (17c). By defining
, constraint (17c) is reformulated as follows:
The non-convexity of Equation (
19) stems from the second term, which contains a negative sign. Regarding this problem, we use a first-order Taylor expansion to construct a locally approximated surrogate function for Equation (
19), transforming it into a convex problem. To begin, we review several key results from [
31], as demonstrated in Lemma 1.
Lemma 1. If a convex function is differentiable, we approximate it by the tangent function at a given point . The first-order expansion is Based on Lemma 1, we reformulate constraint (17c) into a convex form. For each iteration point
, the problem (
19) approximates the lower bound of the constraint function at the current local point
. Using the first-order Taylor expansion, the second term of Equation (
19) is reformulated as follows:
By substituting (
21) into (
19), constraint (17c) is given by
By substituting (22a)–(22c) into (
18), the resulting new optimization problem is as follows:
It is evident that Equation (
23) has been reformulated as a convex optimization problem. Subsequently, we can reconstruct the rank-one solution by eigenvalue decomposition or Gaussian randomization techniques. The overall algorithmic procedure is summarized as follows.
4. Robust Secure Beamforming Design for DFRC with Imperfect CSI of the Eavesdropper
In
Section 3, we assumed that the CSI between the DFRC system and the eavesdropper was fully available. However, in practical scenarios, the eavesdropper’s location is unknown due to its passive nature. Given the presence of estimation errors, obtaining perfect CSI for adversarial eavesdroppers becomes challenging [
32,
33]. Therefore, we adopt a norm-bounded channel uncertainty model, assuming that the base station has only obtained the uncertainty region of the eavesdropper’s channel [
34], which is described as follows:
where
represents the channel uncertainty sets of the eavesdropper,
is the channel estimation CSI of the eavesdropper,
represents estimation error, and
represents the maximum threshold of channel estimation error.
Considering the uncertainty of channel, the worst-case secrecy rate (WCSR) is introduced as the design objective to replace the objective function in (9a)–(9g); it can be described as follows:
where
represents the eavesdropper’s rate under the uncertain channel model, i.e.,
. Our goal is to maximize the WCSR for the legitimate users and the eavesdropper with imperfect CSI, while simultaneously satisfying the sensing beamforming constraint, communication rate constraint, and transmission power constraint. Specifically, the optimization problem can be formulated as follows:
It is evident that the uncertainty in the eavesdropper’s CSI results in a non-convex problem. To address this, we reformulate the objective function by employing auxiliary variables
and
. The aforementioned non-convex problem can be redefined as
where
. The non-convexity of (27a)–(27d) is primarily concentrated in constraints (
27b) and (
27c). To address this, we first apply the Taylor expansion method from Lemma 1. Similar to (
19), (27a)–(27d) can be reformulated as follows:
After processing, the original non-convex terms have been transformed into convex constraints. However, due to the channel uncertainty, the resulting infinite cone constraints remain unsolvable directly. By introducing auxiliary variables
and
, we rewrite constraint (27d) in the following form:
The uncertainty constraints in (
29a) and (
29b) can be equivalently expressed as
Next, we present Lemma 2, which transforms the constraints in (29a) and (29b) into linear matrix inequalities. We begin by introducing Lemma 2.
Lemma 2. (S-procedure) Define the functionwhere is a Hermitian matrix, , , and . The expression holds if and only if there exists such that From (
24), we derive that
. Based on Lemma 2, by introducing a relaxation variable
and
, we can reformulate (29a) and (29b) as follows:
where
denotes the identity matrix.
Finally, by employing the first-order Taylor expansion from Lemma 1, (28c) can be reformulated as follows:
By substituting the above transformations into (26a)–(26d), the resulting optimization problem becomes more tractable and can be denoted as
For any given
, the problem (
36) is a convex problem. We can reconstruct the rank-one solution by eigenvalue decomposition or Gaussian randomization techniques [
35], the algorithmic procedure for solving (26a)–(26d) is as follows.
5. Numerical Results
The numerical results are provided to assess the secure transmission performance of the MIMO-DFRC system under two distinct scenarios: one in which the eavesdropper’s CSI is available and one where it is not. The DFRC system is assumed to have a uniform linear array (ULA) comprising
or
antennas. The system serves
communication users while detecting radar targets at angles
and
. The noise power at the user receivers is set to
dBm. Path loss and fading channel models are taken from [
36]. The correlation between the users’ channels is set to
. The Rayleigh coefficient of the BS and user channels is 2, and the distance between the BS and the user is in the range of 50 m to 200 m. Numerical results are derived from 2000 Monte Carlo simulations to ensure statistical reliability.
5.1. Performance Analysis of Secure NOMA-ISAC
We begin by considering a secure transmission scenario within the DFRC system, assuming the CSI of the eavesdropper can be perfectly estimated. Algorithm 1 is employed to solve the proposed optimization problem.
Figure 2 presents the secrecy rate analysis curves for varying power budgets
, with
and
transmit antennas. The results show that the total secrecy rate of the system increases monotonically with the number of iterations. After five iterations, the values converge to a stable point.
Algorithm 1 Secure beamforming design of MIMO-DFRC system with known eavesdropper CSI. |
Input: , , , , , , , , Output: , , , - 1:
From the provided directional pattern template , the solution to problems (8a)–(8d) yields the covariance matrix and scale factor with an ideal directional pattern. - 2:
Initialize and algorithm iterations . - 3:
From the given , , , , calculate and through ( 14) and (17a)–(17b). - 4:
From the given values of , , , along with the calculated , compute the current values of using ( 15). - 5:
Substitute the values of , , into Equations ( 18) and (22a)–(22c), yielding ( 23). By solving ( 23) and applying eigenvalue decomposition or Gaussian randomization methods, the variable is obtained. - 6:
Calculate using the obtained values of through Equation ( 11). If converges, the iteration is completed. Otherwise, set and proceed to step 3.
|
Figure 3 depicts the influence of the number of transmit antennas
M and the power budget
on the system’s secrecy performance under varying minimum communication user rate thresholds
. Obviously, the system’s secrecy rate improves as both the power budget and the number of transmit antennas are increased. This improvement arises because higher power budgets provide the system with more energy resources, while a greater number of transmit antennas enhances array gain and increases the degrees of freedom available for optimization. These factors collectively enable the system to improve mutual information with legitimate users while reducing information leakage to eavesdroppers, thereby ensuring enhanced system secrecy performance.
Additionally, a smaller results in a higher achievable total secrecy rate, an expected outcome. A smaller imposes more relaxed constraints on system design, allowing for greater flexibility and enhanced secrecy performance. In practical scenarios, it is crucial to strike an appropriate balance between system secrecy and communication rates.
Similarly,
Figure 4 shows the effect of the number of transmit antennas and the power budget on the secrecy performance of the DFRC system under different beamforming thresholds
. The system’s secrecy rate improves with an increase in both the power budget and the number of transmit antennas. Additionally, a larger
imposes more relaxed constraints on the DFRC system design, leading to higher secrecy rates. It is noteworthy that as
increases, the difference in total secrecy rates across systems with varying numbers of transmit antennas becomes more pronounced. This is because looser constraints provide greater system flexibility and higher degrees of freedom.
In
Figure 5, we present the transmit beam patterns achieved by the proposed scheme under random channel conditions. The parameters are set as
,
bit/s/Hz,
dB,
dB, and
dB. The beam pattern for “Radar-only” is obtained by solving problems (8a)–(8d). Obviously, the beam pattern designed using the NOMA scheme closely approximates the ideal radar beam pattern, satisfying the sensing requirements for the target to be detected.
Moreover, as decreases, the beam pattern generated by the NOMA scheme becomes increasingly similar to that of the ideal radar system. However, this improvement comes at the cost of reduced secrecy rates.
To demonstrate the superiority of the proposed scheme, we compare the secrecy rate of the proposed method (“NOMA-DFRC”) with that of the conventional DFRC system (“Conventional DFRC”) and the artificial noise-aided DFRC system [
37] (“AN-aid DFRC”). The secrecy rate maximization mathematical model for the “Conventional DFRC” can be denoted as
As shown in
Figure 6, The proposed scheme has a significantly higher secrecy rate than other traditional schemes. Additionally, for the AN-aided DFRC system under the same power budget, the system provides higher degrees of freedom, leading to a more substantial improvement in secrecy performance.
5.2. Performance Analysis of Robust Secure NOMA-DFRC System
Now, let us consider the scenario where the eavesdropper’s CSI is unknown. First, we present the convergence analysis curves of Algorithm 2 for
and
transmit antennas, and various channel estimation errors
,
, and
. As shown in
Figure 7, it can be observed that, for different channel estimation errors and numbers of transmit antennas, the system’s WCSR increases monotonically with the number of iterations. After three iterations, the values converge to a fixed point, demonstrating the convergence and effectiveness of the algorithm.
Algorithm 2 Robust secure beamforming design for DFRC with imperfect CSI of the eavesdropper. |
Input: , , , , , , , , , Output: , , , - 1:
From the provided directional pattern template , the solution to problems (8a)–(8d) yields the transmit signal covariance matrix and scale factor with an ideal directional pattern. - 2:
Initialize and algorithm iterations . - 3:
From the given , , , , calculate , , , and through problem ( 36). - 4:
Based on the obtained values of , and , compute by using problem ( 36). If the value of converges, the iteration is complete. Otherwise, set and proceed to step 3. - 5:
Based on the rank of , determine whether to use eigenvalue decomposition or randomization to obtain the final solution.
|
Figure 8 shows the performance of the robust method under varying error coefficients
. As anticipated, the greater CSI uncertainty results in a lower WCSR for the system. This is because a certain level of secrecy performance must be sacrificed to mitigate the effects of channel uncertainty. Additionally, an increase in transmit antennas enhances the system’s available degrees of freedom, leading to a higher WCSR.
Figure 9 compares the system security performance of the robust secure transmission Algorithm 2 (“Robust Method”) with that of the conventional non-robust method (“Non-robust”). The conventional non-robust method directly uses outdated CSI, i.e., the estimated eavesdropper channel with errors, as the actual channel [
38]. “Perfect CSI” represents the system’s security performance obtained using Algorithm 1 in the absence of channel errors. Through comparison, we can draw the following conclusions:
(1) When channel errors are present, the proposed robust Algorithm 2 achieves a higher WCSR compared to the conventional method. (2) The smaller the channel error, the closer the WCSR of the system obtained by Algorithm 2 to that of the perfect CSI system, leading to better security performance and robustness. (3) As the transmit power increases, the corresponding system WCSR also increases.
Therefore, to achieve near-optimal secrecy performance, the eavesdropper’s CSI uncertainty should be strictly controlled within a narrow range.