Next Article in Journal
An Active Object-Detection Algorithm for Adaptive Attribute Adjustment of Remote-Sensing Images
Previous Article in Journal
A Multidimensional Analysis Approach Toward Sea Cliff Erosion Forecasting
Previous Article in Special Issue
Dual-Function Radar Communications: A Secure Optimization Approach Using Partial Group Successive Interference Cancellation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimization of Robust and Secure Transmit Beamforming for Dual-Functional MIMO Radar and Communication Systems

by
Zhuochen Chen
,
Ximin Li
* and
Shengqi Zhu
National Key Laboratory of Radar Signal Processing, Xidian University, Xi’an 710071, China
*
Author to whom correspondence should be addressed.
Remote Sens. 2025, 17(5), 816; https://doi.org/10.3390/rs17050816
Submission received: 7 January 2025 / Revised: 16 February 2025 / Accepted: 19 February 2025 / Published: 26 February 2025

Abstract

:
This paper investigates a multi-antenna, multi-input multi-output (MIMO) dual-functional radar and communication (DFRC) system platform. The system simultaneously detects radar targets and communicates with downlink cellular users. However, the modulated information within the transmitted waveforms may be susceptible to eavesdropping. To ensure the security of information transmission, we introduce non-orthogonal multiple access (NOMA) technology to enhance the security performance of the MIMO-DFRC platform. Initially, we consider a scenario where the channel state information (CSI) of the radar target (eavesdropper) is perfectly known. Using fractional programming (FP) and semidefinite relaxation (SDR) techniques, we maximize the system’s total secrecy rate under the requirements for radar detection performance, communication rate, and system energy, thereby ensuring the security of the system. In the case where the CSI of the radar target (eavesdropper) is unavailable, we propose a robust secure beamforming optimization model. The channel model is represented as a bounded uncertainty set, and by jointly applying first-order Taylor expansion and the S-procedure, we transform the original problem into a tractable one characterized by linear matrix inequalities (LMIs). Numerical results validate the effectiveness and robustness of the proposed approach.

1. Introduction

With the continuous evolution of mobile communication technology, the world has entered a critical phase of 6G research. 6G is expected to usher humanity into a new era of deep integration between the physical and virtual worlds. Dual-Functional Radar–Communication (DFRC), recognized as a pivotal technology for achieving the 6G vision, leverages the design of wireless signal systems to facilitate the sharing of signal processing modules and environmental information. This integration delivers significant advantages, including improved spectrum efficiency, reduced processing costs, and enhanced system performance. In recent years, the development of radar and communication systems toward DFRC has become a focal point of research for scholars both domestically and internationally. Specifically, in [1,2], the author proposed a cooperative scheme for MIMO communication and radar, which achieves the sharing of sensing and communication systems by jointly designing the radar transmission coding matrix and the communication transmission covariance matrix. The research [3,4] addressed the design of MIMO sensing transmission beam patterns coexisting with wireless communication systems, enhancing the required sensing and communication performance across various scenarios through solving optimization problems. DFRC can also be applied to many other scenarios, including Internet of Things (IoT) networks [5,6], smart homes or vehicular networks [7,8], and autonomous driving technology networks [9].
In addition, the proper integration of DFRC with other wireless technologies or devices can lead to many emerging applications, including orthogonal frequency division multiplexing (OFDM), intelligent reflecting surfaces (IRSs), and non-orthogonal multiple access (NOMA) technologies. For example, in [10], the author proposes an OFDM-DFRC system, which effectively utilizes the spectrum while maintaining robust communication to prevent multipath fading and improving radar estimation accuracy. Similarly, in [11], the author explores a RIS-aided DFRC system. By designing the transmit beamformer and IRS reflection, they achieve up to a 32 dB improvement in the radar SNR compared to passive RIS-aided DFRC systems.
As a key technology in 5G networks, NOMA can serve multiple users simultaneously, improving the utilization of shared spectrum. By combining NOMA with DFRC systems, spectrum sharing can be achieved. The research in [12] proposed a NOMA-DFRC framework, utilizing NOMA to provide services to multiple communication users while performing target sensing, enhancing the system’s communication performance and target sensing ability. In [13], the author investigated a NOMA-aided DFRC system, where NOMA serves multiple users while detecting a set of radar targets. A joint optimization framework is proposed to maximize sensing efficiency while simultaneously ensuring the communication performance of NOMA users and the sensing accuracy of designated targets. This approach effectively balances the trade-offs between communication and sensing requirements, achieving optimal system performance. The research in [14] introduced an iterative channel estimation method for DFRC that maintains both sensing and communication performance while providing spectrum efficiency. This method achieves uplink transmission through estimating the channel of the received signals. In [15], the author proposed a NOMA-assisted communication, sensing, and computing application. The proposed application maximizes computation offloading capabilities and suppresses inter-functional interference, achieving high-quality sensing and computing performance. By adopting NOMA technology, the degrees of freedom in DFRC systems are greatly increased, significantly enhancing both sensing and communication performance while also offering possibilities for other applications.
However, the transmitted signals in DFRC systems are designed to carry communication signals and data through specific waveforms. When eavesdropping devices are present during system operation, the communication security of users in DFRC systems cannot be guaranteed. Therefore, physical layer security is a critical consideration in DFRC system design. In [16], the authors leveraged the inherent interference of strong radar signals to ensure the physical layer security of coexisting multi-user single-input single-output communication systems and collaborative MIMO radar. In [17], a drone system integrated with DFRC technology was proposed, addressing a joint optimization problem involving user scheduling, transmission power, and source drone trajectories to maximize secure data transmission rates. The research in [18,19] both utilized intelligent reflecting surfaces (IRSs) to enhance the physical layer security of DFRC systems. The former formulated a joint optimization problem to maximize user capacity and secure rates through active and passive beamforming, while the latter investigated the joint design of communication and radar beamformer phase shifts on the IRS and base station to maximize the gain of the perceptual beam pattern towards targets, ensuring minimal information leakage to eavesdroppers. This demonstrated the significant potential of IRSs in enhancing the security of DFRC systems. The research in [20] combined the Capon method and approximate maximum likelihood techniques to identify potential eavesdropper directions, achieving a mutually beneficial outcome for both sensing and security functions. In [21,22,23], an artificial noise (AN)-assisted strategy was proposed to ensure the security of MIMO communication systems. The strategy entails transmitting AN in conjunction with information-bearing signals to effectively disrupt eavesdropping devices, ensuring secure communication.
Additionally, the wireless security challenges associated with NOMA systems merit significant attention. Due to the higher transmission power of the weak-channel user, the signals are more susceptible to interception. A secure transmission scheme for a MISO-NOMA framework is discussed in [24], using artificial jamming generated at the BS to ensure security in the presence of an eavesdropping device. By maximizing the transmission power of the AN and using SIC to eliminate the jamming signal before it interferes with legitimate transmissions, eavesdropping can be effectively disrupted without affecting lawful communication. In [25], the author explored the wireless security of NOMA-SISO systems. Each user has predefined QoS requirements, and the feasible transmission power region that satisfies all users’ QoS needs was identified. Additionally, the research in [26] proposed a secure transmission scheme in dual-user NOMA channels using deep neural networks (DNNs). By applying linear precoding to each user’s signal using deep neural networks, the computation time is significantly reduced, and the secrecy capacity increases to approximately 98 precent. At the same time, spectrum efficiency is enhanced, with dynamic complexity several times lower than that of existing iterative methods.
Nevertheless, the research on the secure transmission of DFRC systems under the NOMA framework is still limited. Currently, only the research in [27] has addressed the secure transmission problem in a NOMA-assisted DFRC system by introducing artificial interference. Based on the above analysis, we propose a secure transmission framework for NOMA-assisted DFRC systems in scenarios involving eavesdroppers. Sensing and communication are achieved by superimposing signals in the power domain, with SIC employed to remove inter-user interference. We fully leverage the high degrees of freedom that NOMA technology brings to DFRC systems and investigate the beamforming problem to maximize the system’s security performance, constrained by minimum communication rate requirements and specific radar performance limitations. Additionally, since the eavesdroppers are non-cooperative, we also consider the robust beamforming problem in scenarios where the exact CSI of the eavesdropper is unavailable. At present, there has been no prior research dedicated to addressing the robust secure transmission challenges in NOMA-assisted DFRC systems. This gap highlights the novelty and significance of the proposed work. In summary, our contributions are as follows:
  • A secure communication deployment scheme for NOMA-assisted DFRC systems is proposed, considering two scenarios where the eavesdropper’s CSI is precisely known and where the CSI of the eavesdropper is unavailable. The security design issues related to beamforming patterns, user signal-to-noise ratios, and power constraints are addressed for each scenario.
  • In the scenario where the eavesdropper’s CSI is known, a secure communication optimization model based on transmit beamforming is proposed. Subject to minimum communication rate constraints and radar beam threshold requirements, the model iteratively addresses the beamforming optimization challenge, aiming to enhance the aggregate secrecy rate for multiple users by integrating fractional programming (FP) with semidefinite relaxation (SDR) methods. The high degree of freedom NOMA technology provides is integrated into the secure communication of DFRC systems.
  • In the scenario where the CSI of the eavesdropping device is unavailable, a robust transmit beamforming optimization model for secure communication is proposed, representing the uncertain channel model as a bounded uncertainty set. Under the constraints of ensuring the minimum communication rate for system users and meeting radar beam threshold requirements, the model constructs a bounded beamforming optimization to maximize the sum secrecy rate for users. By jointly applying Taylor series expansion and the S-procedure, the original problem is transformed into a tractable problem characterized by linear matrix inequalities (LMIs), enabling efficient and tractable solutions using standard optimization techniques.
Notations: All scalars are in italicized letters, and vectors and matrices are in bold letters. C x × y denotes the x × y dimensional complex matrix. · denotes its Euclidean norm and d i a g · denotes a diagonal matrix. For any general matrix Z , Z denote its conjugate transpose.

2. System Model

As shown in Figure 1, we consider a dual-function MIMO-DFRC system equipped with a uniform linear array (ULA) of M antennas, where the sensing signals carrying communication information are used for both sensing and communication purposes simultaneously. The system detects information about the target of interest while serving K legitimate users via NOMA (since the users are generally cooperative, we can estimate their CSI through pilot signals). At the same time, there may be potential eavesdroppers near the users, and the transmitted communication symbols may be intercepted by adversarial malicious devices. We address two possible scenarios: one where the eavesdropper’s CSI is precisely known and another where the CSI of the eavesdropper is unavailable.

2.1. Communication Model of NOMA-DFRC System

By employing the transmit beamforming design, the transmit signal of the MIMO-DFRC system can be given by
y k = h k i = 1 K w i s i + n k = i = 1 K h k w i s i + n k
where s k C M × 1 denotes the information intended for transmission to user k and h k = ζ k h k ˜ denotes the channel of DFRC to user k. The Rayleigh distributed channel can be utilized between the DFRC system and the users. Typically, in NOMA transmission, we assume ζ 1 ζ 2 ζ K , where user 1 has the weakest channel gain, and user K has the strongest channel gain. Based on this, when the DFRC system transmits communication symbols to users using NOMA, the k-th user first applies SIC to detect and remove interference from all users with weaker channel gains than user k ( j < k ); at the same time, the signal of stronger users j > k is treated as noise. Therefore, the achievable rate at user k is
R k k = log 2 1 + h k w k 2 j = k + 1 K h k w j 2 + σ n 2
In addition, the information for user k, apart from the part it demodulates itself, can also be decoded by all users with stronger channel gains through SIC. Therefore, for users j > k , the following achievable rate is produced:
R k j = log 2 1 + h j w k 2 i = k + 1 K h j w i 2 + σ n 2
Therefore, the achievable rate of s k should take the lowest value of communication rates, which can be expressed as
R k = min R k k , R k k + 1 , , R k K
At user K, SIC can be used to remove interference signals from other users, and the transmission rate can be simplified to
R K = log 2 1 + h K w K 2 / σ n 2

2.2. Secure Transmission Problem of MIMO-DFRC

Regarding the security of user information transmission, users who are located farther away and have higher transmission power are more likely to face threats from eavesdropping devices. We assume the presence of a potential eavesdropper near such high-power users, aiming to intercept communication between the DFRC system and legitimate users. Since the eavesdropper lacks the necessary information to perform SIC, the SNR observed by the eavesdropper for the k-th user’s received signal can be represented as follows:
R e k = log 2 1 + g e w k 2 j = 1 , j k K g e w j 2 + σ k 2
where g e C M × 1 represents the CSI from the DFRC system to the eavesdropper. We propose the secrecy rate to evaluate the security performance of the system [28], which can be expressed as
R s k = R c k R e k + , k K

2.3. Design of the Beamforming for Radar Sensing

In order to better detect and estimate targets, it is often necessary to design beam patterns with excellent performance. Therefore, in this paper, we utilize beam pattern similarity metrics to assess sensing performance, using the minimum MSE between the designed beam pattern and the ideal beam pattern as the evaluation criterion, which can be expressed as follows [29]:
min ξ , S d Γ m s e 1 L l = 1 L ξ P d θ 0 α θ 0 S d α θ 0 2
s . t . Tr S d = P 0
S d 0 , S d = S d
ξ 0
In this context, θ 0 represents the azimuth of the target to be estimated, the normalized P d θ 0 represents the ideal beam pattern, α θ 0 denotes the signal steering vector, and  ξ is a proportionality factor. By minimizing the mean square error Γ m s e , we can derive the covariance matrix S d of the ideal beam pattern. We will aim to optimize S d to closely approximate the ideal beam pattern, thereby meeting the performance requirements for detection by the sensing device.

3. Secure Beamforming Design with Known Eavesdropper CSI

In this section, the eavesdropper’s CSI can be accurately estimated, and the eavesdropper lacks sufficient information to perform SIC on the signals of legitimate users. Assuming that all users require secure transmission, we aim to optimize the overall secrecy rate by designing secure beamforming vectors for the DFRC system, while ensuring the system’s sensing and communication capabilities. To begin, we define W k w k w k . The DFRC secure beamforming problem can be given by
max W k k = 1 K R s k
s . t . Γ m s e ξ , W k Γ m s e ξ , S d Γ m s e ξ , S d γ b p
min R k k , R k k + 1 , , R k K γ k , k = 1 , 2 , . . . K 1
R K γ K
k = 1 K t r W k P 0
W k = W k , W k ̲ 0 , k K
r a n k W k = 1
Constraint (9b) ensures that the designed DFRC system’s transmit beam pattern closely approximates the ideal radar beam pattern, meeting the target detection requirements. Constraints (9c) and (9d) represent the minimum rate conditions for NOMA multicast transmission, ensuring reliable communication. Constraint (9e) reflects the total power constraint for the DFRC system. Both the objective function and constraints (9c) and (9d) are non-convex, making the problem challenging to solve directly. By substituting (4)–(7) into (9a), we obtain
k = 1 K R s k = k = 1 K 1 log 2 1 + h k W k h k j = k + 1 K h k W j h k + σ n 2 k = 1 K log 2 1 + g e W k g e j = 1 , j k K g e W j g e + σ n 2 + log 2 1 + h K W K h K σ n 2
The objective function contains a difference of logarithmic terms. To handle this, we first apply a basic transformation to simplify it. Equation (11) can then be reformulated as
k = 1 K R s k = k = 1 K 1 log 2 1 + h k W k h k j = k + 1 K h k W j h k + σ n 2 + k = 1 K log 2 j = 1 , j k K g e W j g e + σ n 2 i = 1 K g e W i g e + σ n 2 + log 2 1 + h K W K h K σ n 2
Due to the presence of logarithmic functions with fractional terms in Equation (12), the problem remains non-convex. Fortunately, fractional programming (FP) methods can eliminate the fractional terms and make it easier to solve [30]. First, we apply the Lagrangian dual transformation technique, utilizing the Closed-Form FP approach to address the first term in Equation (12). We first consider the auxiliary variables λ u , k and ς u , k ; the first term in Equation (12) can be reformulated as follows:
k = 1 K 1 log 2 1 + h k W k h k j = k + 1 K h k W j h k + σ n 2 = k = 1 K 1 log 2 1 + λ u , k k = 1 K 1 λ u , k + 2 k = 1 K 1 ς u , k 1 + λ u , k h k W k h k k = 1 K 1 ς u , k 2 j = k + 1 K h k W j h k + σ n 2 C λ u , k , ς u , k + G ˜ λ u , k , ς u , k , W k
When w k is fixed, the optimal values for λ u , k * and ς u , k * can be obtained by taking the partial derivatives and setting them equal to zero, i.e.,
λ u , k * = h k W k h k j = k + 1 K h k W j h k + σ n 2
ς u , k * = 1 + λ u , k h k W k h k j = k + 1 K h k W j h k + σ n 2
It can be observed that the fractional term in the first part of Equation (12) has been successfully transformed into a convex form. Next, we apply the Direct FP approach to handle the second term in Equation (12). Through the quadratic transformation, we can rewrite the second term as follows:
k = 1 K log 2 j = 1 , j k K g e W j g e + σ n 2 i = 1 K g e W i g e + σ n 2 = log 2 2 q k j = 1 , j k K g e W j g e + σ n 2 q k 2 i = 1 K g e W i g e + σ n 2 log 2 2 y k A W k q k 2 B W k
When w k is fixed, the value of q k * can be obtained from the following formula:
q k * = j = 1 , j k K g e W j g e + σ n 2 i = 1 K g e W i g e + σ n 2
At this point, problems (9a)–(9c) can be reformulated into the following form:
m a x W k C λ u , k , ς u , k + G ˜ λ u , k , ς u , k , W k + R K + log 2 2 y k A W k q k 2 B W k
s . t . Γ m s e ξ , W k Γ m s e ξ , S d Γ m s e ξ , S d γ b p
min R k k , R k k + 1 , , R k K γ k , k = 1 , 2 , . . . K 1 s . t . 9 d , 9 e , 9 f , 9 g
Where the variables λ u , k , ς u , k , q k are updated in each iteration; when these variables are known, the objective function in Equation (18) becomes a convex problem concerning W k , as it combines both linear and logarithmic functions, and can be directly solved. Next, we address the non-convex constraint (17c). By defining H k h k h k , constraint (17c) is reformulated as follows:
l l R k = log 2 i = k K h j w i 2 + σ n 2 i = k + 1 K h j w i 2 + σ n 2 = log 2 i = k K t r H j W i + σ n 2 log 2 i = k + 1 K t r H j W i + σ n 2 γ k
The non-convexity of Equation (19) stems from the second term, which contains a negative sign. Regarding this problem, we use a first-order Taylor expansion to construct a locally approximated surrogate function for Equation (19), transforming it into a convex problem. To begin, we review several key results from [31], as demonstrated in Lemma 1.
Lemma 1.
If a convex function f x is differentiable, we approximate it by the tangent function g x x t at a given point x t . The first-order expansion is
f x g x x t = f x t + f x t x x t
Based on Lemma 1, we reformulate constraint (17c) into a convex form. For each iteration point W t , the problem (19) approximates the lower bound of the constraint function at the current local point W t . Using the first-order Taylor expansion, the second term of Equation (19) is reformulated as follows:
f W k W k t = log 2 i = k + 1 K t r H j W i t + σ n 2 i = k + 1 K t r H j W i W i t i = k + 1 K t r H j W i t + σ n 2 ln 2
By substituting (21) into (19), constraint (17c) is given by
R k ˜ = log 2 i = k K t r H j W i + σ n 2 + f W k W k t δ k
By substituting (22a)–(22c) into (18), the resulting new optimization problem is as follows:
m a x W k C λ u , k , ς u , k + G ˜ λ u , k , ς u , k , W k + R K + log 2 2 q k A W k q k 2 B W k
s . t . Γ m s e ξ , W k Γ m s e ξ , S d Γ m s e ξ , S d γ b p
R k ˜ δ k , k K , k K s . t . 9 d , 9 e , 9 f , 9 g
It is evident that Equation (23) has been reformulated as a convex optimization problem. Subsequently, we can reconstruct the rank-one solution by eigenvalue decomposition or Gaussian randomization techniques. The overall algorithmic procedure is summarized as follows.

4. Robust Secure Beamforming Design for DFRC with Imperfect CSI of the Eavesdropper

In Section 3, we assumed that the CSI between the DFRC system and the eavesdropper was fully available. However, in practical scenarios, the eavesdropper’s location is unknown due to its passive nature. Given the presence of estimation errors, obtaining perfect CSI for adversarial eavesdroppers becomes challenging [32,33]. Therefore, we adopt a norm-bounded channel uncertainty model, assuming that the base station has only obtained the uncertainty region of the eavesdropper’s channel [34], which is described as follows:
Ξ e = g e g e = g e ˜ + Δ g e , Δ g e ε 1 2
where Ξ e represents the channel uncertainty sets of the eavesdropper, g e ˜ is the channel estimation CSI of the eavesdropper, Δ g e represents estimation error, and  ε 1 represents the maximum threshold of channel estimation error.
Considering the uncertainty of channel, the worst-case secrecy rate (WCSR) is introduced as the design objective to replace the objective function in (9a)–(9g); it can be described as follows:
R wc k = 1 K min Δ g e ε 1 2 R c k R ˜ e k + = k = 1 K R c k max Δ g e ε 1 2 R ˜ e k + = k = 1 K R c k max Δ g e ε 1 2 R ˜ e k
where R ˜ e k represents the eavesdropper’s rate under the uncertain channel model, i.e., R ˜ e k = log 2 1 + g e ˜ + Δ g e w k 2 j = 1 , j k K g e ˜ + Δ g e w j 2 + σ k 2 , Δ g e ε 1 2 . Our goal is to maximize the WCSR for the legitimate users and the eavesdropper with imperfect CSI, while simultaneously satisfying the sensing beamforming constraint, communication rate constraint, and transmission power constraint. Specifically, the optimization problem can be formulated as follows:
max W k k = 1 K R c k max Δ g e ε 1 2 R ˜ e k
s . t . Γ m s e ξ , W k Γ m s e ξ , S d Γ m s e ξ , S d γ b p
min R k k , R k k + 1 , , R k K γ k , k = 1 , 2 , . . . K 1 s . t . 9 d , 9 e , 9 f , 9 g
It is evident that the uncertainty in the eavesdropper’s CSI results in a non-convex problem. To address this, we reformulate the objective function by employing auxiliary variables ϖ 1 k k = 1 K and ϖ 2 k k = 1 K . The aforementioned non-convex problem can be redefined as
max W k , ϖ 1 k , ϖ 2 k k = 1 K ϖ 1 k ϖ 2 k
s . t . log 2 1 + h k W k h k j = k + 1 K h k W j h k + σ n 2 ϖ 1 k , k K , k K
log 2 1 + h K W K h K σ n 2 ϖ 1 K ,
log 2 1 + t r G e W k j = 1 , j k K t r G e w j + σ k 2 ϖ 2 k , Δ g e ε 1 2 , k K 25 b , 25 c , 9 d , 9 e , 9 f , 9 g
where G e = g e ˜ + Δ g e g e ˜ + Δ g e . The non-convexity of (27a)–(27d) is primarily concentrated in constraints (27b) and (27c). To address this, we first apply the Taylor expansion method from Lemma 1. Similar to (19), (27a)–(27d) can be reformulated as follows:
m a x W k , ϖ 1 k , ϖ 2 k k = 1 K ϖ 1 k ϖ 2 k
s . t . log 2 i = k K t r h j W i + σ n 2 + f W k W k t ϖ 1 k , k K , k K
log 2 1 + h K W K h K σ n 2 ϖ 1 K , log 2 k = 1 K t r G e W k + σ k 2
log 2 j = 1 , j k K t r G e W j + σ k 2 ϖ 2 k , Δ g e ε 1 2 , k K 25 b , 25 c , 9 d , 9 e , 9 f , 9 g
After processing, the original non-convex terms have been transformed into convex constraints. However, due to the channel uncertainty, the resulting infinite cone constraints remain unsolvable directly. By introducing auxiliary variables ϖ 3 k k = 1 K and ϖ 4 k k = 1 K , we rewrite constraint (27d) in the following form:
k = 1 K t r G e W k + σ k 2 ϖ 3 k
j = 1 , j k K t r G e W j + σ k 2 ϖ 4 k
log 2 ϖ 3 k log 2 ϖ 4 k ϖ 2 k 0
The uncertainty constraints in (29a) and (29b) can be equivalently expressed as
Δ g e i = 1 k W i Δ g e + 2 Re g e ˜ i = 1 k W i Δ g e + g e ˜ i = 1 k W i g e ˜ + σ k 2 ϖ 3 k 0
Δ g e j = 1 , j k k W j Δ g e + 2 Re g e ˜ j = 1 , j k k W j Δ g e + g e ˜ i = 1 k W i g e ˜ + σ k 2 ϖ 4 k 0
Next, we present Lemma 2, which transforms the constraints in (29a) and (29b) into linear matrix inequalities. We begin by introducing Lemma 2.
Lemma 2.
(S-procedure) Define the function
ψ m ( x ) x H F m x + 2 Re Θ m H x + z m , m = 1 , 2
where F m C M × M is a Hermitian matrix, Θ m C M × 1 , x C M × 1 , and  z m R . The expression ψ 1 ( x ) 0 ψ 2 ( x ) 0 holds if and only if there exists μ 0 such that
μ F 1 Θ 1 Θ 1 H z 1 F 2 Θ 2 Θ 2 H z 2 0
From (24), we derive that Δ g e Δ g e ε 1 2 . Based on Lemma 2, by introducing a relaxation variable μ 1 k k = 1 K and μ 2 k k = 1 K , we can reformulate (29a) and (29b) as follows:
μ 1 k I M + i = 1 k W i i = 1 k W i g e ˜ g e ˜ i = 1 k W i C 1 0
μ 2 k I M j = 1 , j k k W j j = 1 , j k k W j g e ˜ g e ˜ j = 1 , j k k W j C 2 0
where
C 1 = g e ˜ i = 1 k W i g e ˜ + σ k 2 ϖ 3 k μ 1 k ε 1 2
C 2 = ϖ 4 k g e ˜ j = 1 , j k k W j g e ˜ σ k 2 μ 2 k ε 1 2
I M denotes the identity matrix.
Finally, by employing the first-order Taylor expansion from Lemma 1, (28c) can be reformulated as follows:
ϖ 2 k log 2 ϖ 3 k t ϖ 3 k ϖ 3 k t / ϖ 3 k t ln 2 + log 2 ϖ 4 k 0
By substituting the above transformations into (26a)–(26d), the resulting optimization problem becomes more tractable and can be denoted as
max W k , ϖ 1 k , ϖ 2 k ϖ 3 k , ϖ 4 k k = 1 K ϖ 1 k ϖ 2 k s . t . 27 b , 27 c , 32 , 33 , 34 , 25 b , 25 c , 9 d , 9 e , 9 f , 9 g
For any given W k , the problem (36) is a convex problem. We can reconstruct the rank-one solution by eigenvalue decomposition or Gaussian randomization techniques [35], the algorithmic procedure for solving (26a)–(26d) is as follows.

5. Numerical Results

The numerical results are provided to assess the secure transmission performance of the MIMO-DFRC system under two distinct scenarios: one in which the eavesdropper’s CSI is available and one where it is not. The DFRC system is assumed to have a uniform linear array (ULA) comprising M = 6 or M = 8 antennas. The system serves K = 4 communication users while detecting radar targets at angles θ = 30 ° and θ = 30 ° . The noise power at the user receivers is set to σ n = 110 dBm. Path loss and fading channel models are taken from [36]. The correlation between the users’ channels is set to t = 0.5 . The Rayleigh coefficient of the BS and user channels is 2, and the distance between the BS and the user is in the range of 50 m to 200 m. Numerical results are derived from 2000 Monte Carlo simulations to ensure statistical reliability.

5.1. Performance Analysis of Secure NOMA-ISAC

We begin by considering a secure transmission scenario within the DFRC system, assuming the CSI of the eavesdropper can be perfectly estimated. Algorithm 1 is employed to solve the proposed optimization problem. Figure 2 presents the secrecy rate analysis curves for varying power budgets P 0 , with  M = 6 and M = 8 transmit antennas. The results show that the total secrecy rate of the system increases monotonically with the number of iterations. After five iterations, the values converge to a stable point.
Algorithm 1 Secure beamforming design of MIMO-DFRC system with known eavesdropper CSI.
Input:  h k , γ k , k , g e , σ n 2 , P 0 , γ b p , P d θ 0 , α θ 0
Output:  w k , R s k , k , ξ
1:
From the provided directional pattern template P d θ 0 , the solution to problems (8a)–(8d) yields the covariance matrix R d and scale factor ξ with an ideal directional pattern.
2:
Initialize w k t 1 and algorithm iterations t = 1 .
3:
From the given w k t 1 , h k , g e , σ n 2 , calculate λ u , k t 1 and q k t 1 through (14) and (17a)–(17b).
4:
From the given values of w k t 1 , h k , σ n 2 , along with the calculated λ u , k t 1 , compute the current values of ς u , k t 1 using (15).
5:
Substitute the values of λ u , k t 1 , ς u , k t 1 , q k t 1 into Equations (18) and (22a)–(22c), yielding (23). By solving (23) and applying eigenvalue decomposition or Gaussian randomization methods, the variable w k t is obtained.
6:
Calculate R s k t using the obtained values of w k t through Equation (11). If  R s k t converges, the iteration is completed. Otherwise, set t = t + 1 and proceed to step 3.
Figure 3 depicts the influence of the number of transmit antennas M and the power budget P 0 on the system’s secrecy performance under varying minimum communication user rate thresholds R m i n . Obviously, the system’s secrecy rate improves as both the power budget and the number of transmit antennas are increased. This improvement arises because higher power budgets provide the system with more energy resources, while a greater number of transmit antennas enhances array gain and increases the degrees of freedom available for optimization. These factors collectively enable the system to improve mutual information with legitimate users while reducing information leakage to eavesdroppers, thereby ensuring enhanced system secrecy performance.
Additionally, a smaller R m i n results in a higher achievable total secrecy rate, an expected outcome. A smaller R m i n imposes more relaxed constraints on system design, allowing for greater flexibility and enhanced secrecy performance. In practical scenarios, it is crucial to strike an appropriate balance between system secrecy and communication rates.
Similarly, Figure 4 shows the effect of the number of transmit antennas and the power budget on the secrecy performance of the DFRC system under different beamforming thresholds γ b p . The system’s secrecy rate improves with an increase in both the power budget and the number of transmit antennas. Additionally, a larger γ b p imposes more relaxed constraints on the DFRC system design, leading to higher secrecy rates. It is noteworthy that as γ b p increases, the difference in total secrecy rates across systems with varying numbers of transmit antennas becomes more pronounced. This is because looser constraints provide greater system flexibility and higher degrees of freedom.
In Figure 5, we present the transmit beam patterns achieved by the proposed scheme under random channel conditions. The parameters are set as N = 6 , R m i n = 1 bit/s/Hz, γ b p = 20 dB, γ b p = 15 dB, and γ b p = 10 dB. The beam pattern for “Radar-only” is obtained by solving problems (8a)–(8d). Obviously, the beam pattern designed using the NOMA scheme closely approximates the ideal radar beam pattern, satisfying the sensing requirements for the target to be detected.
Moreover, as  γ b p decreases, the beam pattern generated by the NOMA scheme becomes increasingly similar to that of the ideal radar system. However, this improvement comes at the cost of reduced secrecy rates.
To demonstrate the superiority of the proposed scheme, we compare the secrecy rate of the proposed method (“NOMA-DFRC”) with that of the conventional DFRC system (“Conventional DFRC”) and the artificial noise-aided DFRC system [37] (“AN-aid DFRC”). The secrecy rate maximization mathematical model for the “Conventional DFRC” can be denoted as
l l l m a x W k k = 1 K log 2 1 + h k W k h k j = 1 , j k K h k W j h k + σ k 2 log 2 1 + g e W k g e j = 1 , j k K g e W j g e + σ e 2 s . t . h k W k h k j = 1 , j k K h k W j h k + σ k 2 γ b , k K 9 b 9 e 9 f 9 g
As shown in Figure 6, The proposed scheme has a significantly higher secrecy rate than other traditional schemes. Additionally, for the AN-aided DFRC system under the same power budget, the system provides higher degrees of freedom, leading to a more substantial improvement in secrecy performance.

5.2. Performance Analysis of Robust Secure NOMA-DFRC System

Now, let us consider the scenario where the eavesdropper’s CSI is unknown. First, we present the convergence analysis curves of Algorithm 2 for M = 6 and M = 8 transmit antennas, and various channel estimation errors ε 1 = 0.1 , ε 1 = 0.3 , and ε 1 = 0.5 . As shown in Figure 7, it can be observed that, for different channel estimation errors and numbers of transmit antennas, the system’s WCSR increases monotonically with the number of iterations. After three iterations, the values converge to a fixed point, demonstrating the convergence and effectiveness of the algorithm.
Algorithm 2 Robust secure beamforming design for DFRC with imperfect CSI of the eavesdropper.
Input:  h k , γ k , k , g e , σ n 2 , P 0 , γ b p , P d θ 0 , α θ 0 , ε 1
Output:  w k , R s k , k , ξ
1:
From the provided directional pattern template P d θ 0 , the solution to problems (8a)–(8d) yields the transmit signal covariance matrix R d and scale factor ξ with an ideal directional pattern.
2:
Initialize w k t 1 and algorithm iterations t = 1 .
3:
From the given w k t 1 , h k , g e , σ n 2 , calculate W k t , ϖ 1 k t , ϖ 2 k t , ϖ 3 k t and ϖ 4 k t through problem (36).
4:
Based on the obtained values of W k t , ϖ 1 k t and ϖ 2 k t , compute R w c t by using problem (36). If the value of R w c t converges, the iteration is complete. Otherwise, set t = t + 1 and proceed to step 3.
5:
Based on the rank of W k t , determine whether to use eigenvalue decomposition or randomization to obtain the final solution.
Figure 8 shows the performance of the robust method under varying error coefficients ε 1 . As anticipated, the greater CSI uncertainty results in a lower WCSR for the system. This is because a certain level of secrecy performance must be sacrificed to mitigate the effects of channel uncertainty. Additionally, an increase in transmit antennas enhances the system’s available degrees of freedom, leading to a higher WCSR.
Figure 9 compares the system security performance of the robust secure transmission Algorithm 2 (“Robust Method”) with that of the conventional non-robust method (“Non-robust”). The conventional non-robust method directly uses outdated CSI, i.e., the estimated eavesdropper channel with errors, as the actual channel [38]. “Perfect CSI” represents the system’s security performance obtained using Algorithm 1 in the absence of channel errors. Through comparison, we can draw the following conclusions:
(1) When channel errors are present, the proposed robust Algorithm 2 achieves a higher WCSR compared to the conventional method. (2) The smaller the channel error, the closer the WCSR of the system obtained by Algorithm 2 to that of the perfect CSI system, leading to better security performance and robustness. (3) As the transmit power increases, the corresponding system WCSR also increases.
Therefore, to achieve near-optimal secrecy performance, the eavesdropper’s CSI uncertainty should be strictly controlled within a narrow range.

6. Discussion

This entire article addresses the problem of secure transmit beamforming design in NOMA-assisted DFRC systems. The transmitted superimposed signals are utilized for communication and radar sensing, while SIC is employed to remove inter-user interference. Two potential scenarios are considered: one where the eavesdropper’s CSI is precisely known, and another where the eavesdropper’s CSI is unavailable. For the scenario with precise eavesdropper CSI, the optimization problem is converted into a tractable convex problem that can be efficiently addressed using fractional programming. The total secrecy rate of the system is then solved iteratively through optimization. For the scenario where the eavesdropper’s CSI is unavailable, a robust transmit beamforming optimization model is developed. By leveraging the S-procedure and Taylor series expansion, the original problem is reformulated into a convex optimization problem characterized by LMI, enabling efficient and tractable solutions using standard optimization techniques. Numerical results demonstrate that the proposed algorithms significantly enhance the system’s security performance in both scenarios. In practical applications, the relevant metrics should be adjusted in real time based on specific requirements to meet diverse demands.

Author Contributions

Conceptualization, Z.C. and S.Z.; methodology, Z.C. and X.L.; software, Z.C. and X.L.; validation, Z.C. and X.L.; formal analysis, Z.C. and X.L.; investigation, Z.C. and X.L.; resources, S.Z. and X.L.; data curation, Z.C. and S.Z.; writing—original draft preparation, Z.C.; writing—review and editing, X.L. and S.Z.; visualization, Z.C. and S.Z.; supervision, X.L. and S.Z.; project administration, S.Z. and X.L.; funding acquisition, S.Z. and X.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Nature Science Foundation of China (Nos. 62371377) and Science and Technology Innovation Team of Shaanxi Province (2022TD-38).

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Li, B.; Petropulu, A.P. Joint Transmit Designs for Coexistence of MIMO Wireless Communications and Sparse Sensing Radars in Clutter. IEEE Trans. Aerosp. Electron. Syst. 2017, 53, 2846–2864. [Google Scholar] [CrossRef]
  2. Li, B.; Petropulu, A.P.; Trappe, W. Optimum Co-Design for Spectrum Sharing between Matrix Completion Based MIMO Radars and a MIMO Communication System. IEEE Trans. Signal. Process. 2016, 64, 4562–4575. [Google Scholar] [CrossRef]
  3. Kang, B.; Aldayel, O.; Monga, V.; Rangaswamy, M. Spatio-Spectral Radar Beampattern Design for Coexistence with WirelessCommunication Systems. IEEE Trans. Aerosp. Electron. Syst. 2019, 55, 644–657. [Google Scholar] [CrossRef]
  4. Liu, X.; Huang, T.; Shlezinger, N.; Liu, Y.; Zhou, J.; Eldar, Y.C. Joint Transmit Beamforming for Multiuser MIMO Communications and MIMO Radar. IEEE Trans. Signal. Process. 2020, 68, 3929–3944. [Google Scholar] [CrossRef]
  5. Liu, M.; Yang, M.; Li, H.; Zeng, K.; Zhang, Z.; Nallanathan, A.; Wang, G.; Hanzo, L. Performance analysis and power allocation for cooperative ISAC networks. IEEE Internet Things J. 2023, 10, 6336–6351. [Google Scholar] [CrossRef]
  6. Ma, S.; Zhang, Y.; Li, H.; Shi, J.S.J.; Zhang, H. Covert beamforming design for intelligent-reflecting-surface assisted IoT networks. IEEE Internet Things J. 2022, 9, 5489–5501. [Google Scholar] [CrossRef]
  7. Jing, Z.; Mu, J.; Li, X.; Zhou, Q.; Tian, Q. Efficient fusion and reconstruction for communication and sensing signals in green IoT networks. IEEE Internet Things J. 2023, 10, 9319–9328. [Google Scholar] [CrossRef]
  8. Yuan, W.; Liu, F.; Masouros, C.; Yuan, J.; Ng, D.W.K.; González-Prelcic, N. Bayesian predictive beamforming for vehicular networks: A low-overhead joint radar-communication approach. IEEE Trans. Wirel. Commun. 2021, 20, 1442–1456. [Google Scholar] [CrossRef]
  9. Meng, K.; Wu, Q.; Ma, S.; Chen, W.; Quek, T.Q.S. UAV trajectory and beamforming optimization for integrated periodic sensing and communication. IEEE Wirel. Commun. Lett. 2022, 11, 1211–1215. [Google Scholar] [CrossRef]
  10. Cheng, Z.; He, Z.; Liao, B. Hybrid Beamforming Design for OFDM Dual-Function Radar-Communication System. IEEE J. Sel. Top. Signal Process. 2021, 15, 1455–1467. [Google Scholar] [CrossRef]
  11. Zhu, Q.; Li, M.; Liu, R.; Liu, Q. Joint Transceiver Beamforming and Reflecting Design for Active RIS-Aided ISAC Systems. IEEE Trans. Veh. Technol. 2023, 72, 9636–9640. [Google Scholar] [CrossRef]
  12. Wang, Z.; Liu, Y.; Mu, X.; Ding, Z.; Dobre, O.A. NOMA Empowered Integrated Sensing and Communication. IEEE Commun. Lett. 2022, 26, 677–681. [Google Scholar] [CrossRef]
  13. Dou, C.; Huang, N.; Wu, Y.; Qian, L.; Quek, T.Q.S. Sensing-Efficient NOMA-Aided Integrated Sensing and Communication: A Joint Sensing Scheduling and Beamforming Optimization. IEEE Trans. Veh. Technol. 2023, 72, 13591–13603. [Google Scholar] [CrossRef]
  14. Memisoglu, E.; Türkmen, H.; Ozbakis, B.A.; Arslan, H. CSI-Based NOMA for Integrated Sensing and Communication. IEEE Trans. Wirel. Commun. 2023, 12, 1086–1090. [Google Scholar] [CrossRef]
  15. Wang, Z.; Mu, X.; Liu, Y.; Xu, X.; Zhang, P. NOMA-Aided Joint Communication, Sensing, and Multi-Tier Computing Systems. IEEE J. Sel. Area. Commun. 2023, 41, 574–588. [Google Scholar] [CrossRef]
  16. Chu, J.; Liu, R.; Li, M.; Liu, Y.; Liu, Q. Joint Secure Transmit Beamforming Designs for Integrated Sensing and Communication Systems. IEEE Trans. Veh. Technol. 2023, 72, 4778–4791. [Google Scholar] [CrossRef]
  17. Liu, Y.; Liu, X.; Liu, Z.; Yu, Y.; Jia, M.; Na, Z.; Durrani, T.S. Secure Rate Maximization for ISAC-UAV Assisted Communication Amidst Multiple Eavesdroppers. IEEE Trans. Veh. Technol. 2024, 73, 15843–15847. [Google Scholar] [CrossRef]
  18. Jiang, C.; Zhang, C.; Huang, C.; Ge, J.; He, J.; Yuen, C. Secure Beamforming Design for RIS-Assisted Integrated Sensing and Communication Systems. IEEE Wireless Commun. Lett. 2024, 13, 520–524. [Google Scholar] [CrossRef]
  19. Hua, M.; Wu, Q.; Chen, W.; Dobre, O.A.; Swindlehurst, A.L. Secure Intelligent Reflecting Surface-Aided Integrated Sensing and Communication. IEEE Trans. Wireless Commun. 2024, 23, 575–591. [Google Scholar] [CrossRef]
  20. Su, N.; Liu, F.; Masouros, C. Sensing-Assisted Eavesdropper Estimation: An ISAC Breakthrough in Physical Layer Security. IEEE Trans. Wireless Commun. 2024, 23, 3162–3174. [Google Scholar] [CrossRef]
  21. Wang, B.; Mu, P. Artificial Noise-Aided Secure Multicasting Design Under Secrecy Outage Constraint. IEEE Trans. Commun. 2017, 65, 5401–5414. [Google Scholar] [CrossRef]
  22. Liao, W.-C.; Chang, T.-H.; Ma, W.-K.; Chi, C.-Y. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach. IEEE Trans. Signal. Process. 2011, 59, 1202–1216. [Google Scholar] [CrossRef]
  23. Li, Q.; Ma, W.-K. Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization. IEEE Trans. Signal. Process. 2013, 61, 2704–2717. [Google Scholar] [CrossRef]
  24. Zhao, N.; Wang, W.; Wang, J.; Chen, Y.; Lin, Y.; Ding, Z.; Beaulieu, N.C. Joint Beamforming and Jamming Optimization for Secure Transmission in MISO-NOMA Networks. IEEE Trans. Commun. 2019, 67, 2294–2305. [Google Scholar] [CrossRef]
  25. Zhang, Y.; Wang, H.-M.; Yang, Q.; Ding, Z. Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access. IEEE Commun. Lett. 2016, 20, 930–933. [Google Scholar] [CrossRef]
  26. Pauls, J.; Vaezi, M. Secure Precoding in MIMO-NOMA: A Deep Learning Approach. IEEE Wireless Commun. Lett. 2021, 11, 77–80. [Google Scholar] [CrossRef]
  27. Yang, Z.; Li, D.; Zhao, N.; Wu, Z.; Li, Y.; Niyato, D. Secure Precoding Optimization for NOMA-Aided Integrated Sensing and Communication. IEEE Trans. Commun. 2022, 70, 8370–8382. [Google Scholar] [CrossRef]
  28. Cumanan, K.; Ding, Z.; Sharif, B.; Tian, G.Y.; Leung, K.K. Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper. IEEE Trans. Veh. Technol. 2014, 63, 1678–1690. [Google Scholar] [CrossRef]
  29. Luo, D.; Ye, Z.; Si, B.; Zhu, J. Secure Transmit Beamforming for Radar-Communication System Without Eavesdropper CSI. IEEE Trans. Veh. Technol. 2022, 71, 9794–9804. [Google Scholar] [CrossRef]
  30. Shen, K.; Yu, W. Fractional Programming for Communication SystemsłPart II: Uplink Scheduling via Matching. IEEE Trans. Signal.Process. 2018, 66, 2631–2644. [Google Scholar] [CrossRef]
  31. Hunter, D.R.; Lange, K. A tutorial on MM algorithms. Amer.Statist. 2004, 58, 30–37. [Google Scholar] [CrossRef]
  32. Li, B.; Fei, Z.; Chu, Z.; Zhou, F.; Wong, K.-K.; Xiao, P. Robust chance-constrained secure transmission for cognitive satellite–terrestrial networks. IEEE Trans. Veh. Technol. 2018, 67, 4208–4219. [Google Scholar] [CrossRef]
  33. Li, B.; Fei, Z.; Xu, X.; Chu, Z. Resource allocations for secure cognitive satellite-terrestrial networks. IEEE Wireless Commun. Lett. 2018, 7, 78–81. [Google Scholar] [CrossRef]
  34. Wang, X.; Wang, K.; Zhang, X.-D. Secure relay beamforming with imperfect channel side information. IEEE Trans. Veh. Technol. 2013, 62, 2140–2155. [Google Scholar] [CrossRef]
  35. Luo, Z.-Q.; Ma, W.-K.; So, A.M.-C.; Ye, Y.; Zhang, S. Semidefinite relaxation of quadratic optimization problems. IEEE Signal Process. 2010, 27, 20–34. [Google Scholar] [CrossRef]
  36. Kermoal, J.P.; Schumacher, L.; Pedersen, K.I.; Mogensen, P.E.; Frederiksen, F. A stochastic MIMO radio channel model with experimental validation. IEEE J. Sel. Areas Commun. 2002, 20, 1211–1226. [Google Scholar] [CrossRef]
  37. Su, N.; Liu, F.; Masouros, C. Secure Radar-Communication Systems with Malicious Targets: Integrating Radar, Communications and Jamming Functionalities. IEEE Trans. Wireless Commun. 2021, 20, 83–95. [Google Scholar] [CrossRef]
  38. Gharanjik, A.; Shankar, M.R.B.; Arapoglou, P.-D.; Bengtsson, M.; Ottersten, B. Robust precoding design for multibeam downlink satellite channel with phase uncertainty. In Proceedings of the 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), South Brisbane, QLD, Australia, 19–24 April 2015; pp. 3083–3087. [Google Scholar]
Figure 1. Illustration of the NOMA-aided secure system.
Figure 1. Illustration of the NOMA-aided secure system.
Remotesensing 17 00816 g001
Figure 2. Convergence of the proposed Algorithm 1.
Figure 2. Convergence of the proposed Algorithm 1.
Remotesensing 17 00816 g002
Figure 3. Secrecy rate versus power budgets under different M and R m i n .
Figure 3. Secrecy rate versus power budgets under different M and R m i n .
Remotesensing 17 00816 g003
Figure 4. Secrecy rate versus power budgets under different M and γ b p .
Figure 4. Secrecy rate versus power budgets under different M and γ b p .
Remotesensing 17 00816 g004
Figure 5. Transmit beam pattern under different γ b p .
Figure 5. Transmit beam pattern under different γ b p .
Remotesensing 17 00816 g005
Figure 6. Secrecy rate versus power budgets under different schemes.
Figure 6. Secrecy rate versus power budgets under different schemes.
Remotesensing 17 00816 g006
Figure 7. Convergence of the proposed Algorithm 2.
Figure 7. Convergence of the proposed Algorithm 2.
Remotesensing 17 00816 g007
Figure 8. WCSR versus power budgets under different M and ε 1 .
Figure 8. WCSR versus power budgets under different M and ε 1 .
Remotesensing 17 00816 g008
Figure 9. Comparison between the proposed method and conventional approach in terms of the WCSR.
Figure 9. Comparison between the proposed method and conventional approach in terms of the WCSR.
Remotesensing 17 00816 g009
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chen, Z.; Li, X.; Zhu, S. Optimization of Robust and Secure Transmit Beamforming for Dual-Functional MIMO Radar and Communication Systems. Remote Sens. 2025, 17, 816. https://doi.org/10.3390/rs17050816

AMA Style

Chen Z, Li X, Zhu S. Optimization of Robust and Secure Transmit Beamforming for Dual-Functional MIMO Radar and Communication Systems. Remote Sensing. 2025; 17(5):816. https://doi.org/10.3390/rs17050816

Chicago/Turabian Style

Chen, Zhuochen, Ximin Li, and Shengqi Zhu. 2025. "Optimization of Robust and Secure Transmit Beamforming for Dual-Functional MIMO Radar and Communication Systems" Remote Sensing 17, no. 5: 816. https://doi.org/10.3390/rs17050816

APA Style

Chen, Z., Li, X., & Zhu, S. (2025). Optimization of Robust and Secure Transmit Beamforming for Dual-Functional MIMO Radar and Communication Systems. Remote Sensing, 17(5), 816. https://doi.org/10.3390/rs17050816

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop