2021
DOI: 10.1109/twc.2020.3023164
|View full text |Cite
|
Sign up to set email alerts
|

Secure Radar-Communication Systems With Malicious Targets: Integrating Radar, Communications and Jamming Functionalities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
119
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 156 publications
(119 citation statements)
references
References 46 publications
0
119
0
Order By: Relevance
“…In addition to those general advantages, one may also leverage the sensing results to facilitate communication, where significant performance gain can be obtained over that of the conventional communicationonly schemes. Examples are sensing-assisted BF [45]- [48] and sensing-assisted secure communications [49]. Below we briefly review the recent state-of-the-art on sensing-assisted BF.…”
Section: E Sensing Assisted Communicationsmentioning
confidence: 99%
“…In addition to those general advantages, one may also leverage the sensing results to facilitate communication, where significant performance gain can be obtained over that of the conventional communicationonly schemes. Examples are sensing-assisted BF [45]- [48] and sensing-assisted secure communications [49]. Below we briefly review the recent state-of-the-art on sensing-assisted BF.…”
Section: E Sensing Assisted Communicationsmentioning
confidence: 99%
“…In particular, we assume that the DFRC BS employs a uniform linear array (ULA) with half-wavelength spacing between adjacent antennas. The channel between the BS and the R-user is assumed to have pure line-of-sight (LoS) associated with the path loss of L R = L 0 + 20log 10 d R , while between the BS and C-user it is assumed to obey the Rayleigh channel model with the path loss of [17,24], where L 0 is the path loss at the reference distance d = 1 meter (m), and d R and d C represents the distance from the BS to the R-user and to the C-user, respectively. The parameters adopted in simulations are set as follows: L 0 = 40 dB, d R = 1000 m, and d C = 100 m. The noise power in the receiver of users is assumed to be the same, which is set to σ 2 = −100 dBm.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…Moreover, Huang et al [22] and Ma et al [23] employed index modulation and spatial modulation techniques for DFRC, respectively. Su et al [24] studied the secure transmission for DFRC, where the radar target was treated as an eavesdropper and artificial noise was employed for degrading its received SINR, while satisfying the communication requirements of the legitimate users. To reveal the fundamental performance limits of DFRC, Chen et al [25] proposed a Pareto optimization framework, where a performance region was defined relying on the difference between the peak and sidelobe (DPSL) of the radar and the SINR achieved by the communication user.…”
Section: ) Studies On Dfrcmentioning
confidence: 99%
“…Sun et al [24] consider IRS-assisted base station when both jammer and ED are present and develop an interesting JTRB design without the knowledge of jammer's transmit beamformer and ED's CSI. Some recent works [15,[25][26][27] also consider IRS-aided secrecy for dual-function sensing-communications [28].…”
Section: Introductionmentioning
confidence: 99%