Abstract:We consider stacked intelligent metasurfaces (SIMs) as a tool to improve the performance of bistatic integrated sensing and communications (ISAC) schemes. To that end, we optimize the SIMs and design a radar parameter estimation (RPE) scheme aimed at enhancing radar sensing capabilities as well as communication performance under ISAC-enabling waveforms known to perform well in doubly-dispersive (DD) channels. The SIM optimization is done via a min-max problem formulation solved via steepest ascent with closed-form gradients, while the RPE is carried out via a compressed sensing-based probabilistic data association (PDA) algorithm. Our numerical results indicate that the design of waveforms suitable to mitigating the effects of DD channels is significantly impacted by the emerging SIM technology.
Abstract:We propose a novel low-complexity three-dimensional (3D) localization algorithm for wireless sensor networks, termed quaternion-domain super multidimensional scaling (QD-SMDS). This algorithm reformulates the conventional SMDS, which was originally developed in the real domain, into the quaternion domain. By representing 3D coordinates as quaternions, the method enables the construction of a rank-1 Gram edge kernel (GEK) matrix that integrates both relative distance and angular (phase) information between nodes, maximizing the noise reduction effect achieved through low-rank truncation via singular value decomposition (SVD). The simulation results indicate that the proposed method demonstrates a notable enhancement in localization accuracy relative to the conventional SMDS algorithm, particularly in scenarios characterized by substantial measurement errors.
Abstract:An undesirable consequence of the foreseeable proliferation of sophisticated integrated sensing and communications (ISAC) technologies is the enabling of spoofing, by malicious agents, of situational information (such as proximity, direction or location) of legitimate users of wireless systems. In order to mitigate this threat, we present a novel ISAC scheme that, aided by a reconfigurable intelligent surface (RIS), enables the occultation of the positions of user equipment (UE) from wiretappers, while maintaining both sensing and desired communication performance between the UEs and a legitimate base station (BS). To that end, we first formulate an RIS phase-shift optimization problem that jointly maximizes the sum-rate performance of the UEs (communication objective), while minimizing the projection of the wiretapper's effective channel onto the legitimate channel (hiding objective), thereby disrupting the attempts by a wiretapper of localizing the UEs. Then, in order to efficiently solve the resulting non-convex joint optimization problem, a novel manifold optimization algorithm is derived, whose effectiveness is validated by numerical results, which demonstrate that the proposed approach preserves legitimate ISAC performance while significantly degrading the wiretapper's sensing capability.
Abstract:We introduce a comprehensive approach to enhance the security, privacy, and sensing capabilities of integrated sensing and communications (ISAC) systems by leveraging random frequency agility (RFA) and random pulse repetition interval (PRI) agility (RPA) techniques. The combination of these techniques, which we refer to collectively as random frequency and PRI agility (RFPA), with channel reciprocity-based key generation (CRKG) obfuscates both Doppler frequency and PRIs, significantly hindering the chances that passive adversaries can successfully estimate radar parameters. In addition, a hybrid information embedding method integrating amplitude shift keying (ASK), phase shift keying (PSK), index modulation (IM), and spatial modulation (SM) is incorporated to increase the achievable bit rate of the system significantly. Next, a sparse-matched filter receiver design is proposed to efficiently decode the embedded information with a low bit error rate (BER). Finally, a novel RFPA-based secret generation scheme using CRKG ensures secure code creation without a coordinating authority. The improved range and velocity estimation and reduced clutter effects achieved with the method are demonstrated via the evaluation of the ambiguity function (AF) of the proposed waveforms.
Abstract:Inspired by recent developments in various areas of science relevant to quantum computing, we introduce quantum manifold optimization (QMO) as a promising framework for solving constrained optimization problems in next-generation wireless communication systems. We begin by showing how classical wireless design problems - such as pilot design in cell-free (CF)-massive MIMO (mMIMO), beamformer optimization in gigantic multiple input multiple output (MIMO), and reconfigurable intelligent surface (RIS) phase tuning - naturally reside on structured manifolds like the Stiefel, Grassmannian, and oblique manifolds, with the latter novelly formulated in this work. Then, we demonstrate how these problems can be reformulated as trace-based quantum expectation values over variationally-encoded quantum states. While theoretical in scope, the work lays a foundation for a new class of quantum optimization algorithms with broad application to the design of future beyond-sixth-generation (B6G) systems.
Abstract:We consider the problem of adapting a Post-Quantum cryptosystem to be used in resource-constrained devices, such as those typically used in Device-to-Device and Internet of Things systems. In particular, we propose leveraging the characteristics of wireless communications channels to minimize the complexity of implementation of a Post-Quantum public key encryption scheme, without diminishing its security. To that end, we focus on the adaptation of a well-known cryptosystem, namely CRYSTALS-Kyber, so as to enable its direct integration into the lowest layer of the communication stack, the physical layer, defining two new transport schemes for CRYSTALS-Kyber to be used in Device-to-Device communications, both of which are modeled under a wireless channel subject to Additive White Gaussian Noise, using a 4 Quadrature Amplitude Modulation constellation and a BCH-code to communicate CRYSTALSKyber's polynomial coefficients. Simulation results demonstrate the viability of the adapted Kyber algorithm due to its low key error probability, while maintaining the security reductions of the original Kyber by considering the error distribution imposed by the channel on the cipher.
Abstract:We consider a novel routing protocol suitable for ad-hoc networks with dynamically changing topologies, such as DECT 2020 NR (NR+) systems, which often lead to missing links between the nodes and thus, incomplete or inefficient routes. A key point of the proposed protocol is the combination of network discovery and matrix completion techniques, which allow the nodes to establish communication paths efficiently and reliably. Additionally, multihop localization is performed to estimate the location of the nodes without needing to broadcast each node's geographical position, thus preserving privacy during the routing process and enabling nodes in the network to independently find potentially missing paths in a decentralized manner instead of flooding the whole network. Simulation results illustrate the good performance of the proposed technique in terms of the average number of hops of the obtained routes in different scenarios, with different network densities and amounts of incompleteness.
Abstract:This article presents a novel physical-layer secure communications scheme based on the recently discovered chirp-permuted affine frequency division multiplexing (AFDM) waveform, which results in a completely different received signal to the eavesdropper with the incorrect chirp-permutation order, even under co-located eavesdropping with perfect channel information. The security of the proposed scheme is studied in terms of the complexity required to find the correct permutation via classical and quantum search algorithms, which are shown to be infeasible due the factorially-scaling search space, as well as theoretical and simulated analyses of a random-guess approach, indicating an infeasible probability of breach by chance.
Abstract:We consider a robust and self-reliant (or "egoistic") variation of the rigid body localization (RBL) problem, in which a primary rigid body seeks to estimate the pose (i.e., location and orientation) of another rigid body (or "target"), relative to its own, without the assistance of external infrastructure, without prior knowledge of the shape of the target, and taking into account the possibility that the available observations are incomplete. Three complementary contributions are then offered for such a scenario. The first is a method to estimate the translation vector between the center point of both rigid bodies, which unlike existing techniques does not require that both objects have the same shape or even the same number of landmark points. This technique is shown to significantly outperform the state-of-the-art (SotA) under complete information, but to be sensitive to data erasures, even when enhanced by matrix completion methods. The second contribution, designed to offer improved performance in the presence of incomplete information, offers a robust alternative to the latter, at the expense of a slight relative loss under complete information. Finally, the third contribution is a scheme for the estimation of the rotation matrix describing the relative orientation of the target rigid body with respect to the primary. Comparisons of the proposed schemes and SotA techniques demonstrate the advantage of the contributed methods in terms of root mean square error (RMSE) performance under fully complete information and incomplete conditions.
Abstract:Introduced with the advent of statistical wireless channel models for high mobility communications and having a profound role in communication-centric (CC) integrated sensing and communications (ISAC), the doubly-dispersive (DD) channel structure has long been heralded as a useful tool enabling the capture of the most important fading effects undergone by an arbitrary time-domain transmit signal propagating through some medium. However, the incorporation of this model into multiple-input multiple-output (MIMO) system setups, relying on the recent paradigm-shifting transceiver architecture based on stacked intelligent metasurfaces (SIM), in an environment with reconfigurable intelligent surfaces (RISs) remains an open problem due to the many intricate details that have to be accounted for. In this paper, we fill this gap by introducing a novel DD MIMO channel model that incorporates an arbitrary number of RISs in the ambient, as well as SIMs equipping both the transmitter and receiver. We then discuss how the proposed metasurfaces-parametrized DD (MPDD) channel model can be seamlessly applied to waveforms that are known to perform well in DD environments, namely, orthogonal frequency division multiplexing (OFDM), orthogonal time frequency space (OTFS), and affine frequency division multiplexing (AFDM), with each having their own inherent advantages and disadvantages. An illustrative application of the programmable functionality of the proposed model is finally presented to showcase its potential for boosting the performance of the aforementioned waveforms. Our numerical results indicate that the design of waveforms suitable to mitigating the effects of DD channels is significantly impacted by the emerging SIM technology.