CRB Optimization for Near-Field Covert ISAC Systems

Zhengyu Zhu, Yixuan Li, Junxu Meng, Zheng Chu, Xingwang Li

Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we study the beamforming design in near-field integrated sensing and covert communication systems, where the transmitter (Alice) covertly sends information to a legitimate user (Bob) and senses the target concurrently while hiding from illegal eavesdropper (Willie). Considering a perfect Willie-involved CSI scenario, we propose a beamforming optimization problem to minimize the Cramér-Rao bound for sensing parameters under the conditions of total transmit power, the minimum communication rate and covertness constraint. For this optimization problem, the global optimal solution is obtained by using the semidefinite relaxation (SDR). Compared with the near-field integrated sensing and communication (ISAC) systems without covert constraint, the numerical results verify the effectiveness and feasibility of the proposed scheme.

Original languageEnglish
Title of host publicationICC 2025 - IEEE International Conference on Communications
EditorsMatthew Valenti, David Reed, Melissa Torres
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages656-661
Number of pages6
ISBN (Electronic)9798331505219
DOIs
Publication statusPublished - 2025
Event2025 IEEE International Conference on Communications, ICC 2025 - Montreal, Canada
Duration: 8 Jun 202512 Jun 2025

Publication series

NameIEEE International Conference on Communications
ISSN (Print)1550-3607

Conference

Conference2025 IEEE International Conference on Communications, ICC 2025
Country/TerritoryCanada
CityMontreal
Period8/06/2512/06/25

Keywords

  • beamforming design
  • Cramér-Rao bound
  • Integrated sensing and covert communication
  • near-field

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'CRB Optimization for Near-Field Covert ISAC Systems'. Together they form a unique fingerprint.

Cite this