{"id":"https://openalex.org/W4415179015","doi":"https://doi.org/10.1109/twc.2025.3618121","title":"Sensing-Secure ISAC: Ambiguity Function Engineering for Impairing Unauthorized Sensing","display_name":"Sensing-Secure ISAC: Ambiguity Function Engineering for Impairing Unauthorized Sensing","publication_year":2025,"publication_date":"2025-10-14","ids":{"openalex":"https://openalex.org/W4415179015","doi":"https://doi.org/10.1109/twc.2025.3618121"},"language":"en","primary_location":{"id":"doi:10.1109/twc.2025.3618121","is_oa":false,"landing_page_url":"https://doi.org/10.1109/twc.2025.3618121","pdf_url":null,"source":{"id":"https://openalex.org/S63459445","display_name":"IEEE Transactions on Wireless Communications","issn_l":"1536-1276","issn":["1536-1276","1558-2248"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Wireless Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.manchester.ac.uk/ws/files/1695377353/2510.02103v2.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047685449","display_name":"Kawon Han","orcid":"https://orcid.org/0000-0002-7058-8562"},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Kawon Han","raw_affiliation_strings":["Department of Electronic and Electrical Engineering, University College London, London, U.K","Department of Electronic and Electrical Engineering, University College London, London, UK"],"affiliations":[{"raw_affiliation_string":"Department of Electronic and Electrical Engineering, University College London, London, U.K","institution_ids":["https://openalex.org/I45129253"]},{"raw_affiliation_string":"Department of Electronic and Electrical Engineering, University College London, London, UK","institution_ids":["https://openalex.org/I45129253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035450741","display_name":"Kaitao Meng","orcid":"https://orcid.org/0000-0001-7479-2280"},"institutions":[{"id":"https://openalex.org/I28407311","display_name":"University of Manchester","ror":"https://ror.org/027m9bs27","country_code":"GB","type":"education","lineage":["https://openalex.org/I28407311"]},{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Kaitao Meng","raw_affiliation_strings":["Department of Electrical and Electronic Engineering, The University of Manchester, Manchester, U.K","Department of Electronic and Electrical Engineering, University College London, London, UK"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering, The University of Manchester, Manchester, U.K","institution_ids":["https://openalex.org/I28407311"]},{"raw_affiliation_string":"Department of Electronic and Electrical Engineering, University College London, London, UK","institution_ids":["https://openalex.org/I45129253"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030334551","display_name":"Christos Masouros","orcid":"https://orcid.org/0000-0002-8259-6615"},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Christos Masouros","raw_affiliation_strings":["Department of Electronic and Electrical Engineering, University College London, London, U.K","Department of Electronic and Electrical Engineering, University College London, London, UK"],"affiliations":[{"raw_affiliation_string":"Department of Electronic and Electrical Engineering, University College London, London, U.K","institution_ids":["https://openalex.org/I45129253"]},{"raw_affiliation_string":"Department of Electronic and Electrical Engineering, University College London, London, UK","institution_ids":["https://openalex.org/I45129253"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5047685449"],"corresponding_institution_ids":["https://openalex.org/I45129253"],"apc_list":null,"apc_paid":null,"fwci":4.7317,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.95153201,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":100},"biblio":{"volume":"25","issue":null,"first_page":"5386","last_page":"5400"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12111","display_name":"Industrial Vision Systems and Defect Detection","score":0.845300018787384,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12111","display_name":"Industrial Vision Systems and Defect Detection","score":0.845300018787384,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.746399998664856,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12153","display_name":"Advanced Optical Sensing Technologies","score":0.7148000001907349,"subfield":{"id":"https://openalex.org/subfields/3105","display_name":"Instrumentation"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ambiguity-function","display_name":"Ambiguity function","score":0.6155999898910522},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.6025000214576721},{"id":"https://openalex.org/keywords/subcarrier","display_name":"Subcarrier","score":0.5814999938011169},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.5577999949455261},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5450999736785889},{"id":"https://openalex.org/keywords/ambiguity","display_name":"Ambiguity","score":0.5442000031471252},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.4779999852180481},{"id":"https://openalex.org/keywords/compressed-sensing","display_name":"Compressed sensing","score":0.47519999742507935},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.43220001459121704},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.414000004529953}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7930999994277954},{"id":"https://openalex.org/C50878840","wikidata":"https://www.wikidata.org/wiki/Q3206297","display_name":"Ambiguity function","level":4,"score":0.6155999898910522},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.6025000214576721},{"id":"https://openalex.org/C198329298","wikidata":"https://www.wikidata.org/wiki/Q586358","display_name":"Subcarrier","level":4,"score":0.5814999938011169},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.5577999949455261},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5450999736785889},{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.5442000031471252},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.4779999852180481},{"id":"https://openalex.org/C124851039","wikidata":"https://www.wikidata.org/wiki/Q2665459","display_name":"Compressed sensing","level":2,"score":0.47519999742507935},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4551999866962433},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.43220001459121704},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.414000004529953},{"id":"https://openalex.org/C40409654","wikidata":"https://www.wikidata.org/wiki/Q375889","display_name":"Orthogonal frequency-division multiplexing","level":3,"score":0.3824000060558319},{"id":"https://openalex.org/C13944312","wikidata":"https://www.wikidata.org/wiki/Q7512748","display_name":"Signal-to-noise ratio (imaging)","level":2,"score":0.37209999561309814},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.3716000020503998},{"id":"https://openalex.org/C2775977338","wikidata":"https://www.wikidata.org/wiki/Q2302880","display_name":"Unexploded ordnance","level":2,"score":0.37040001153945923},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3693000078201294},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.349700003862381},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3303000032901764},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.3237000107765198},{"id":"https://openalex.org/C65422117","wikidata":"https://www.wikidata.org/wiki/Q358527","display_name":"Transmitter power output","level":4,"score":0.32179999351501465},{"id":"https://openalex.org/C554190296","wikidata":"https://www.wikidata.org/wiki/Q47528","display_name":"Radar","level":2,"score":0.3093000054359436},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.304500013589859},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2994000017642975},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.2973000109195709},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.2761000096797943},{"id":"https://openalex.org/C104267543","wikidata":"https://www.wikidata.org/wiki/Q208163","display_name":"Signal processing","level":3,"score":0.27390000224113464},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.2727000117301941},{"id":"https://openalex.org/C5297727","wikidata":"https://www.wikidata.org/wiki/Q786970","display_name":"Autocorrelation","level":2,"score":0.2702000141143799},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.2639999985694885},{"id":"https://openalex.org/C63000827","wikidata":"https://www.wikidata.org/wiki/Q3080428","display_name":"Software portability","level":2,"score":0.25060001015663147}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/twc.2025.3618121","is_oa":false,"landing_page_url":"https://doi.org/10.1109/twc.2025.3618121","pdf_url":null,"source":{"id":"https://openalex.org/S63459445","display_name":"IEEE Transactions on Wireless Communications","issn_l":"1536-1276","issn":["1536-1276","1558-2248"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Wireless Communications","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/c4391a08-1269-402a-85ac-05b56cef1926","is_oa":true,"landing_page_url":"https://research.manchester.ac.uk/en/publications/c4391a08-1269-402a-85ac-05b56cef1926","pdf_url":"https://pure.manchester.ac.uk/ws/files/1695377353/2510.02103v2.pdf","source":{"id":"https://openalex.org/S4306400662","display_name":"Research Explorer (The University of Manchester)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I28407311","host_organization_name":"University of Manchester","host_organization_lineage":["https://openalex.org/I28407311"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Han, K, Meng, K & Masouros, C 2025, 'Sensing-Secure ISAC: Ambiguity Function Engineering for Impairing Unauthorized Sensing', IEEE Transactions on Wireless Communications. https://doi.org/10.1109/TWC.2025.3618121","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/c4391a08-1269-402a-85ac-05b56cef1926","is_oa":true,"landing_page_url":"https://research.manchester.ac.uk/en/publications/c4391a08-1269-402a-85ac-05b56cef1926","pdf_url":"https://pure.manchester.ac.uk/ws/files/1695377353/2510.02103v2.pdf","source":{"id":"https://openalex.org/S4306400662","display_name":"Research Explorer (The University of Manchester)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I28407311","host_organization_name":"University of Manchester","host_organization_lineage":["https://openalex.org/I28407311"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Han, K, Meng, K & Masouros, C 2025, 'Sensing-Secure ISAC: Ambiguity Function Engineering for Impairing Unauthorized Sensing', IEEE Transactions on Wireless Communications. https://doi.org/10.1109/TWC.2025.3618121","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1183278072","display_name":null,"funder_award_id":"101120544","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G1974542962","display_name":null,"funder_award_id":"Sk\u0142odowska","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G2689612763","display_name":null,"funder_award_id":"Marie","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G2742896750","display_name":"6G-Multiband\u00a0Wireless and\u00a0Optical\u00a0Signalling for\u00a0Integrated\u00a0Communications, Sensing and Localization","funder_award_id":"101139176","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G4183412153","display_name":null,"funder_award_id":"EP/Y035933/1","funder_id":"https://openalex.org/F4320314731","funder_display_name":"UK Research and Innovation"},{"id":"https://openalex.org/G4447653093","display_name":null,"funder_award_id":"Network","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G6100177302","display_name":null,"funder_award_id":"Sk\u0142odowska","funder_id":"https://openalex.org/F4320338337","funder_display_name":"H2020 Marie Sk\u0142odowska-Curie Actions"},{"id":"https://openalex.org/G6750571499","display_name":null,"funder_award_id":"101120544","funder_id":"https://openalex.org/F4320338337","funder_display_name":"H2020 Marie Sk\u0142odowska-Curie Actions"},{"id":"https://openalex.org/G7901872499","display_name":null,"funder_award_id":"Marie","funder_id":"https://openalex.org/F4320338337","funder_display_name":"H2020 Marie Sk\u0142odowska-Curie Actions"},{"id":"https://openalex.org/G8051717526","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8068566553","display_name":null,"funder_award_id":"EP/Y02785X/1","funder_id":"https://openalex.org/F4320314731","funder_display_name":"UK Research and Innovation"},{"id":"https://openalex.org/G8318064016","display_name":null,"funder_award_id":"Horizon","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320314731","display_name":"UK Research and Innovation","ror":"https://ror.org/001aqnf71"},{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320334322","display_name":"HORIZON EUROPE Framework Programme","ror":null},{"id":"https://openalex.org/F4320338337","display_name":"H2020 Marie Sk\u0142odowska-Curie Actions","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415179015.pdf","grobid_xml":"https://content.openalex.org/works/W4415179015.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"deployment":[1],"of":[2,22,76,111,123,160,235,267],"integrated":[3,211],"sensing":[4,24,39,49,62,105,145,201,230,259],"and":[5,96,193,210,229],"communication":[6],"(ISAC)":[7],"in":[8],"wireless":[9,28],"networks":[10],"brings":[11],"along":[12],"unprecedented":[13],"vulnerabilities":[14],"to":[15,44,58,178,188,251,276],"authorized":[16],"passive":[17,60],"sensing,":[18,228],"necessitating":[19],"the":[20,54,77,99,119,143,158,180,200,222,233,236,265,268],"development":[21],"secure":[23,93,181],"solutions.":[25],"Unlike":[26],"traditional":[27],"communication,":[29,226],"where":[30],"data":[31,37],"security":[32,40,202,260],"can":[33,68,148],"be":[34],"enhanced":[35],"through":[36],"encryption,":[38],"is":[41,47,176],"more":[42],"challenging":[43],"achieve.":[45],"This":[46],"because":[48],"parameters":[50],"are":[51],"embedded":[52],"within":[53],"target-reflected":[55],"signal":[56],"leaked":[57],"unauthorized":[59,104],"radar":[61],"eavesdroppers":[63],"(Eve),":[64],"implying":[65],"that":[66,91],"they":[67],"silently":[69],"extract":[70],"sensory":[71],"information":[72,78],"without":[73,106],"prior":[74,109],"knowledge":[75,110],"data.":[79],"To":[80,198],"overcome":[81],"this":[82],"limitation,":[83],"we":[84,126,204,220,245],"propose":[85],"a":[86,170,247,257],"novel":[87],"sensing-secure":[88,238,270],"ISAC":[89,124,239,253,271],"framework":[90],"ensures":[92],"target":[94,195,279],"detection":[95,196],"estimation":[97,139,192,280],"for":[98],"legitimate":[100,144,227],"system,":[101],"while":[102,255,281],"obfuscating":[103],"requiring":[107],"any":[108],"Eve.":[112],"Specifically,":[113,165],"by":[114],"introducing":[115],"artificial":[116,128],"imperfections":[117],"into":[118,131],"ambiguity":[120],"function":[121,183],"(AF)":[122],"signals,":[125],"introduce":[127,205],"ghost":[129],"targets":[130],"Eve\u2019s":[132,190,278],"range":[133,138,191],"profile":[134],"which":[135],"increase":[136],"its":[137,274],"ambiguity.":[140],"In":[141],"contrast,":[142],"receiver":[146],"(Alice)":[147],"suppress":[149],"these":[150],"AF":[151],"artifacts":[152],"using":[153],"mismatched":[154],"filtering,":[155],"albeit":[156],"at":[157],"expense":[159],"signal-to-noise":[161],"ratio":[162],"(SNR)":[163],"loss.":[164],"employing":[166],"an":[167],"OFDM":[168],"signal,":[169],"structured":[171],"subcarrier":[172],"power":[173],"allocation":[174],"scheme":[175],"designed":[177],"shape":[179],"autocorrelation":[182],"(ACF),":[184],"inserting":[185],"periodic":[186],"peaks":[187],"mislead":[189],"degrade":[194,277],"performance.":[197,243,284],"quantify":[199],"level,":[203],"peak":[206],"sidelobe":[207,212],"level":[208,213],"(PSL)":[209],"(ISL)":[214],"as":[215],"key":[216],"performance":[217,254],"metrics.":[218],"Additionally,":[219],"analyze":[221],"three-way":[223],"trade-offs":[224],"between":[225],"security,":[231],"highlighting":[232],"impact":[234],"proposed":[237,269],"signaling":[240],"on":[241],"system":[242],"Furthermore,":[244],"formulate":[246],"convex":[248],"optimization":[249],"problem":[250],"maximize":[252],"guaranteeing":[256],"certain":[258],"level.":[261],"Numerical":[262],"results":[263],"validate":[264],"effectiveness":[266],"signaling,":[272],"demonstrating":[273],"ability":[275],"preserving":[282],"Alice\u2019s":[283]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-15T00:00:00"}
