Integrating Communication, Sensing, and Security: Progress and Prospects of PLS in ISAC Systems
- URL: http://arxiv.org/abs/2505.05090v1
- Date: Thu, 08 May 2025 09:40:14 GMT
- Title: Integrating Communication, Sensing, and Security: Progress and Prospects of PLS in ISAC Systems
- Authors: Waqas Aman, El-Mehdi Illi, Marwa Qaraqe, Saif Al-Kuwari,
- Abstract summary: It is of paramount importance to consider a balanced trade-off between communication reliability, sensing, and security in future networks, such as the 5G and beyond, and the 6G.<n>We provide a comprehensive and system-wise review of designed secure ISAC systems from a PLS point of view.<n>The amalgamation of PLS and ISAC is analyzed in a broader impact by considering attacks targeting data confidentiality, communication covertness, and sensing spoofing.
- Score: 0.05999777817331316
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The sixth generation of wireless networks defined several key performance indicators (KPIs) for assessing its networks, mainly in terms of reliability, coverage, and sensing. In this regard, remarkable attention has been paid recently to the integrated sensing and communication (ISAC) paradigm as an enabler for efficiently and jointly performing communication and sensing using the same spectrum and hardware resources. On the other hand, ensuring communication and data security has been an imperative requirement for wireless networks throughout their evolution. The physical-layer security (PLS) concept paved the way to catering to the security needs in wireless networks in a sustainable way while guaranteeing theoretically secure transmissions, independently of the computational capacity of adversaries. Therefore, it is of paramount importance to consider a balanced trade-off between communication reliability, sensing, and security in future networks, such as the 5G and beyond, and the 6G. In this paper, we provide a comprehensive and system-wise review of designed secure ISAC systems from a PLS point of view. In particular, the impact of various physical-layer techniques, schemes, and wireless technologies to ensure the sensing-security trade-off is studied from the surveyed work. Furthermore, the amalgamation of PLS and ISAC is analyzed in a broader impact by considering attacks targeting data confidentiality, communication covertness, and sensing spoofing. The paper also serves as a tutorial by presenting several theoretical foundations on ISAC and PLS, which represent a practical guide for readers to develop novel secure ISAC network designs.
Related papers
- Generative AI-Empowered Secure Communications in Space-Air-Ground Integrated Networks: A Survey and Tutorial [107.26005706569498]
Space-air-ground integrated networks (SAGINs) face unprecedented security challenges due to their inherent characteristics.<n>Generative AI (GAI) is a transformative approach that can safeguard SAGIN security by synthesizing data, understanding semantics, and making autonomous decisions.
arXiv Detail & Related papers (2025-08-04T01:42:57Z) - Large AI Model-Enabled Secure Communications in Low-Altitude Wireless Networks: Concepts, Perspectives and Case Study [92.15255222408636]
Low-altitude wireless networks (LAWNs) have the potential to revolutionize communications by supporting a range of applications.<n>We investigate some large artificial intelligence model (LAM)-enabled solutions for secure communications in LAWNs.<n>To demonstrate the practical benefits of LAMs for secure communications in LAWNs, we propose a novel LAM-based optimization framework.
arXiv Detail & Related papers (2025-08-01T01:53:58Z) - Generative AI for Vulnerability Detection in 6G Wireless Networks: Advances, Case Study, and Future Directions [7.991374874432769]
Generative AI (GAI) emerges as a transformative solution, leveraging synthetic data generation, multimodal reasoning, and adaptive learning to enhance security frameworks.<n>This paper explores the integration of GAI-powered vulnerability detection in 6G wireless networks, focusing on code auditing, protocol security, cloud-edge defenses, and hardware protection.
arXiv Detail & Related papers (2025-06-25T14:36:31Z) - Zero-Trust Foundation Models: A New Paradigm for Secure and Collaborative Artificial Intelligence for Internet of Things [61.43014629640404]
Zero-Trust Foundation Models (ZTFMs) embed zero-trust security principles into the lifecycle of foundation models (FMs) for Internet of Things (IoT) systems.<n>ZTFMs can enable secure, privacy-preserving AI across distributed, heterogeneous, and potentially adversarial IoT environments.
arXiv Detail & Related papers (2025-05-26T06:44:31Z) - Secure Physical Layer Communications for Low-Altitude Economy Networking: A Survey [76.36166980302478]
The Low-Altitude Economy Networking (LAENet) is emerging as a transformative paradigm.<n>Physical layer communications in the LAENet face growing security threats due to inherent characteristics of aerial communication environments.<n>This survey comprehensively reviews existing secure countermeasures for physical layer communication in the LAENet.
arXiv Detail & Related papers (2025-04-12T09:36:53Z) - VENENA: A Deceptive Visual Encryption Framework for Wireless Semantic Secrecy [11.556652571936633]
Eavesdropping has been a long-standing threat to the security and privacy of wireless communications.<n>We propose a novel framework called Visual ENcryption for Eavesdropping NegAtion (VENENA)<n>It combines the techniques of PLD, visual encryption, and image poisoning, into a comprehensive mechanism for secure semantic transmission.
arXiv Detail & Related papers (2025-01-18T08:40:02Z) - ACRIC: Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
Recent security incidents in safety-critical industries exposed how the lack of proper message authentication enables attackers to inject malicious commands or alter system behavior.<n>These shortcomings have prompted new regulations that emphasize the pressing need to strengthen cybersecurity.<n>We introduce ACRIC, a message authentication solution to secure legacy industrial communications.
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - Security Implications and Mitigation Strategies in MPLS Networks [0.0]
Multiprotocol Switching (MPLS) is a technology that directs data from one network node to another based on short path labels rather than long network addresses.
This paper explores the security implications associated with networks, including risks such as label spoofing, traffic interception, and denial of service attacks.
arXiv Detail & Related papers (2024-09-04T09:21:47Z) - A Survey on Integrated Sensing, Communication, and Computation [57.6762830152638]
The forthcoming generation of wireless technology, 6G, aims to usher in an era of ubiquitous intelligent services.<n>The performance of these modules is interdependent, creating a resource competition for time, energy, and bandwidth.<n>Existing techniques like integrated communication and computation (ICC), integrated sensing and computation (ISC), and integrated sensing and communication (ISAC) have made partial strides in addressing this challenge.
arXiv Detail & Related papers (2024-08-15T11:01:35Z) - Physical Layer Deception with Non-Orthogonal Multiplexing [52.11755709248891]
We propose a novel framework of physical layer deception (PLD) to actively counteract wiretapping attempts.<n>PLD combines PLS with deception technologies to actively counteract wiretapping attempts.<n>We prove the validity of the PLD framework with in-depth analyses and demonstrate its superiority over conventional PLS approaches.
arXiv Detail & Related papers (2024-06-30T16:17:39Z) - Securing Hybrid Wireless Body Area Networks (HyWBAN): Advancements in Semantic Communications and Jamming Techniques [2.1676500745770544]
This paper explores novel strategies to strengthen the security of Hybrid Wireless Body Area Networks (HyWBANs)
Recognizing the vulnerability of HyWBAN to sophisticated cyber-attacks, we propose an innovative combination of semantic communications and jamming receivers.
Our approach addresses the primary security concerns and sets the baseline for future secure biomedical communication systems advancements.
arXiv Detail & Related papers (2024-04-24T18:21:08Z) - Security for Quantum Networks [0.0]
We aim to construct a comprehensive framework for developing and assessing secure quantum networks.
Our work will lead to the development of a hardware-independent framework for securing general quantum networks.
arXiv Detail & Related papers (2021-09-29T00:03:24Z) - Intelligent Zero Trust Architecture for 5G/6G Tactical Networks:
Principles, Challenges, and the Role of Machine Learning [4.314956204483074]
We highlight the challenges and introduce the concept of an intelligent zero trust architecture (i-ZTA) as a security framework in 5G/6G networks with untrusted components.
This paper presents the architectural design of an i-ZTA upon which modern artificial intelligence (AI) algorithms can be developed to provide information security in untrusted networks.
arXiv Detail & Related papers (2021-05-04T13:14:29Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.