pith. machine review for the scientific record. sign in

arxiv: 2605.08106 · v1 · submitted 2026-04-27 · 💻 cs.IT · cs.CR· cs.ET· cs.SY· eess.SY· math.IT

Recognition: no theorem link

Secure Integrated Sensing and Communication: Information Theory Offers Insights

Authors on Pith no claims yet

Pith reviewed 2026-05-12 02:14 UTC · model grok-4.3

classification 💻 cs.IT cs.CRcs.ETcs.SYeess.SYmath.IT
keywords secure integrated sensing and communicationinformation theorysecrecyISACjammingtradeoffsprivacy
0
0 comments X

The pith

Information theory organizes secure integrated sensing and communication by what must be protected and against whom.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper surveys information-theoretic models for systems that use one waveform for both sensing and data transmission, then groups the secure variants according to the protected function and the type of adversary. It covers cases that secure the communication against sensing-related parties, cases that secure the sensing against communication-related parties, and active-adversary settings such as jamming. Throughout the review the authors emphasize the modeling assumptions and the concrete performance limits that emerge when reliability, sensing accuracy, and security must be balanced simultaneously.

Core claim

By first recalling the basic information-theoretic ISAC models and then classifying the secure literature according to protected functionality (communication security, sensing security, or joint) and adversary model (passive or active), the survey identifies the main tradeoffs and shows how these formulations connect to privacy and covert communication problems.

What carries the argument

The central mechanism is the classification of secure ISAC problems by protected functionality and adversary type, which structures the performance metrics and fundamental limits across the reviewed literature.

If this is right

  • When communication must remain secret from a sensing user, the achievable rate region shrinks compared with unsecured ISAC.
  • Protecting sensing information from a communication user imposes additional distortion or resolution constraints on the radar-like function.
  • Active adversaries such as jammers create a three-way tradeoff among communication rate, sensing quality, and security level.
  • Joint formulations in which both functions need protection lead to coupled secrecy and estimation regions rather than separate constraints.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The categorized limits suggest waveform designs could be optimized once for all three objectives rather than sequentially.
  • Similar classification might apply to other dual-use systems such as radar-communication coexistence in shared spectrum.
  • The privacy links imply that regulatory definitions of sensitive sensing data could draw directly from the information-theoretic metrics already developed.

Load-bearing premise

The reviewed information-theoretic models and existing literature together give a representative picture of the security challenges and tradeoffs that arise in integrated sensing and communication.

What would settle it

A new ISAC model or experimental result that produces security-performance tradeoffs outside the categorized families would show the survey's organization does not capture the essential limits.

Figures

Figures reproduced from arXiv: 2605.08106 by Aylin Yener, Onur G\"unl\"u, Truman Welling.

Figure 1
Figure 1. Figure 1: Unified secure ISAC notation used throughout the paper. To commu [PITH_FULL_IMAGE:figures/full_fig_p001_1.png] view at source ↗
Figure 2
Figure 2. Figure 2: In the monostatic ISAC model the transmitter observes the reflected signal, while a separate receiver observes it in the bistatic case. The green arrows [PITH_FULL_IMAGE:figures/full_fig_p002_2.png] view at source ↗
Figure 3
Figure 3. Figure 3: ISAC model under partial secrecy from [3], where only [PITH_FULL_IMAGE:figures/full_fig_p004_3.png] view at source ↗
Figure 4
Figure 4. Figure 4: A representative sensing-security setting, where channel-output (sens [PITH_FULL_IMAGE:figures/full_fig_p005_4.png] view at source ↗
read the original abstract

Integrated sensing and communication (ISAC) combines sensing and communication within a shared system framework by using the same transmitted signal for both objectives. ISAC can improve the efficiency of spectrum and hardware use but also gives rise to new security challenges, as users associated with one function may need to be prevented from inferring information related to the other. This paper surveys information-theoretic approaches to secure ISAC with emphasis on formulations, performance metrics, and fundamental limits. We first review the information-theoretic ISAC models that underlie secure formulations. We then organize the secure ISAC literature according to the protected functionality and the adversary model, covering secure communication, sensing security, and active-adversary settings such as jamming. We also discuss formulations in which communication security and sensing security interact more directly, as well as their connections to privacy and covert communication. Throughout, we highlight the main modeling assumptions and the insights they provide on the tradeoffs among communication reliability, sensing performance, and security.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 3 minor

Summary. This survey paper reviews information-theoretic approaches to secure integrated sensing and communication (ISAC). It first reviews the underlying ISAC models that support secure formulations, then organizes the literature according to the protected functionality (communication security versus sensing security) and adversary model (including passive eavesdroppers and active adversaries such as jammers). It further examines settings where communication and sensing security interact directly, as well as connections to privacy and covert communication, while highlighting modeling assumptions and the resulting tradeoffs among communication reliability, sensing performance, and security.

Significance. If the survey's taxonomy and summaries are accurate, it offers a timely and useful synthesis of a rapidly growing area. By structuring the literature around protected functionality and adversary type rather than by specific techniques, the paper clarifies distinct security formulations and their fundamental limits. The explicit attention to modeling assumptions and tradeoffs provides a framework that can help researchers identify gaps and design new secure ISAC schemes. As a survey without new theorems, its primary contribution is organizational clarity and insight extraction from existing results.

major comments (2)
  1. The central organizational claim (abstract and §1) that the literature is partitioned by protected functionality and adversary type is load-bearing for the survey's value. However, the manuscript does not explicitly justify why certain works are placed in one category rather than another when they address both communication and sensing security simultaneously; a short decision tree or table in §2 would strengthen the taxonomy's reproducibility.
  2. §4 (active-adversary settings): the discussion of jamming models cites several works but does not compare the resulting secrecy-distortion regions or the conditions under which jamming can be mitigated by ISAC waveform design. Without such a comparative summary, the claimed insights on tradeoffs remain qualitative rather than quantitative.
minor comments (3)
  1. The notation for mutual information and equivocation rates is introduced in §2 but is not uniformly applied in later sections; adding a short notation table would improve readability.
  2. Several figure captions (e.g., those illustrating rate-distortion-security regions) omit the precise parameter settings or the source of the plotted curves, making it difficult to reproduce the depicted tradeoffs.
  3. The connections to covert communication in §5 are interesting but reference only a subset of the relevant literature; adding two or three key citations on covert ISAC would increase completeness without altering the survey's scope.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for the careful reading and constructive comments on our survey. We address each major comment below and indicate the revisions we will make.

read point-by-point responses
  1. Referee: The central organizational claim (abstract and §1) that the literature is partitioned by protected functionality and adversary type is load-bearing for the survey's value. However, the manuscript does not explicitly justify why certain works are placed in one category rather than another when they address both communication and sensing security simultaneously; a short decision tree or table in §2 would strengthen the taxonomy's reproducibility.

    Authors: We agree that an explicit justification for category placement, particularly for works addressing both communication and sensing security, would improve the taxonomy's reproducibility. In the revised manuscript we will add a short decision tree or table in §2 that states the classification criteria, with explicit handling of papers that span multiple protected functionalities. revision: yes

  2. Referee: §4 (active-adversary settings): the discussion of jamming models cites several works but does not compare the resulting secrecy-distortion regions or the conditions under which jamming can be mitigated by ISAC waveform design. Without such a comparative summary, the claimed insights on tradeoffs remain qualitative rather than quantitative.

    Authors: We acknowledge that the current discussion in §4 is primarily qualitative. While a fully exhaustive quantitative comparison of all secrecy-distortion regions lies beyond the scope of a survey, we will insert a concise comparative table that summarizes the key secrecy-distortion results and mitigation conditions reported in the cited works. This addition will make the tradeoff insights more quantitative without introducing new derivations. revision: partial

Circularity Check

0 steps flagged

Survey paper with no original derivations or load-bearing claims exhibits no circularity

full rationale

This paper is explicitly a survey that reviews and organizes existing information-theoretic literature on secure ISAC. It presents no new theorems, derivations, fitted parameters, or empirical predictions. The abstract and structure describe coverage of models, metrics, and limits from external works, organized by protected functionality and adversary type. No step in the presented content reduces by construction to its own inputs, self-citations, or ansatzes. All references are to prior independent literature. This matches the default expectation for non-derivational survey papers and satisfies the rule that self-contained descriptive organization against external benchmarks receives score 0.

Axiom & Free-Parameter Ledger

0 free parameters · 0 axioms · 0 invented entities

This survey paper does not introduce new mathematical models, parameters, or entities. It relies entirely on the body of existing literature in information theory for ISAC security.

pith-pipeline@v0.9.0 · 5482 in / 1196 out tokens · 63350 ms · 2026-05-12T02:14:52.153945+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

30 extracted references · 30 canonical work pages · 1 internal anchor

  1. [1]

    Toward multi- functional 6G wireless networks: Integrating sensing, communication, and security,

    Z. Wei, F. Liu, C. Masouros, N. Su, and A. P. Petropulu, “Toward multi- functional 6G wireless networks: Integrating sensing, communication, and security,”IEEE Communications Magazine, vol. 60, no. 4, pp. 65– 71, 2022

  2. [2]

    Secure radar-communication systems with malicious targets: Integrating radar, communications and jam- ming functionalities,

    N. Su, F. Liu, and C. Masouros, “Secure radar-communication systems with malicious targets: Integrating radar, communications and jam- ming functionalities,”IEEE Transactions on Wireless Communications, vol. 20, no. 1, pp. 83–95, Jan. 2021

  3. [3]

    Secure inte- grated sensing and communication,

    O. G ¨unl¨u, M. R. Bloch, R. F. Schaefer, and A. Yener, “Secure inte- grated sensing and communication,”IEEE Journal on Selected Areas in Information Theory, vol. 4, pp. 40–53, 2023

  4. [4]

    Wireless physical-layer security: Lessons learned from information theory,

    A. Yener and S. Ulukus, “Wireless physical-layer security: Lessons learned from information theory,”Proc. IEEE, vol. 103, no. 10, pp. 1814–1825, 2015

  5. [5]

    Integrated sensing and communications over the years: An evolution perspective,

    D. Zhang, Y . Cui, X. Cao, N. Su, Y . Gong, F. Liu, W. Yuan, X. Jing, J. Andrew Zhang, J. Xu, C. Masouros, D. Niyato, and M. Di Renzo, “Integrated sensing and communications over the years: An evolution perspective,”IEEE Communications Surveys & Tutorials, vol. 28, pp. 5014–5048, 2026

  6. [6]

    Delving into security and privacy of joint communication and sensing: A survey,

    ´O. G. Martins, H. ˚Akesson, M. Gomes, D. P. Osorio, P. Sen, and J. P. Vilela, “Delving into security and privacy of joint communication and sensing: A survey,”IEEE Open Journal of the Communications Society, 2025

  7. [7]

    Integrating sensing and communications in 6G? Not until it is secure to do so,

    N. Su, F. Liu, J. Zou, C. Masouros, G. C. Alexandropoulos, A. Mourad, J. L. Hernando, Q. Zhang, and T.-T. Chan, “Integrating sensing and communications in 6G? Not until it is secure to do so,”arXiv preprint arXiv:2503.15243, 2025

  8. [8]

    RIS-based physical layer security for integrated sensing and communication: A comprehensive survey,

    Y . Li, F. Khan, M. Ahmed, A. A. Soofi, W. U. Khan, C. K. Sheemar, M. Asif, and Z. Han, “RIS-based physical layer security for integrated sensing and communication: A comprehensive survey,”IEEE Internet of Things Journal, 2025

  9. [9]

    Transmitter actions for secure integrated sensing and communication,

    T. Welling, O. G ¨unl¨u, and A. Yener, “Transmitter actions for secure integrated sensing and communication,” inProc. of IEEE International Symposium on Information Theory, 2024, pp. 2580–2585

  10. [10]

    On secrecy capacity of binary beampointing channels with block memory and feedback,

    S. Li, M. Chen, S. Li, and G. Caire, “On secrecy capacity of binary beampointing channels with block memory and feedback,” inProc. Allerton Conference on Communication, Control, and Computing, 2025

  11. [11]

    Predictive beamforming approach for secure integrated sensing and communication with multiple aerial eavesdroppers,

    A. A. Al-Habob, O. A. Dobre, and Y . Jing, “Predictive beamforming approach for secure integrated sensing and communication with multiple aerial eavesdroppers,”IEEE Transactions on Communications, vol. 73, no. 9, pp. 7887–7898, 2025

  12. [12]

    Secure Integrated Sensing and Communication against Communication and Sensing Eavesdropping

    S. Guo and M. R. Bloch, “Secure integrated sensing and communication against communication and sensing eavesdropping,”arXiv preprint arXiv:2601.23216, 2026

  13. [13]

    Distribution-preserving integrated sensing and communication,

    Y . Chen, T. J. Oechtering, H. Boche, M. Skoglund, and Y . Luo, “Distribution-preserving integrated sensing and communication,”IEEE Transactions on Information Theory, vol. 71, no. 10, pp. 7518–7539, 2025

  14. [14]

    Sensing-Secure ISAC: Ambiguity function engineering for impairing unauthorized sensing,

    K. Han, K. Meng, and C. Masouros, “Sensing-Secure ISAC: Ambiguity function engineering for impairing unauthorized sensing,”IEEE Trans- actions on Wireless Communications, vol. 25, pp. 5386–5400, 2026

  15. [15]

    Integrated communication and receiver sensing with security constraints on message and state,

    M. Ahmadipour, M. Wigger, and S. Shamai, “Integrated communication and receiver sensing with security constraints on message and state,” in Proc. of IEEE International Symposium on Information Theory, 2023, pp. 2738–2743

  16. [16]

    Secure integrated sensing and communication for binary input additive white Gaussian noise channels,

    O. G ¨unl¨u, M. Bloch, R. F. Schaefer, and A. Yener, “Secure integrated sensing and communication for binary input additive white Gaussian noise channels,” inIEEE International Symposium on Joint Communi- cations & Sensing, 2023, pp. 1–6

  17. [17]

    Nonasymptotic performance limits of low-latency secure in- tegrated sensing and communication systems,

    ——, “Nonasymptotic performance limits of low-latency secure in- tegrated sensing and communication systems,” inIEEE International Conference on Acoustics, Speech and Signal Processing, 2024, pp. 12 971–12 975

  18. [18]

    Secrecy rate-distortion tradeoff for integrated sensing and communication with an untrusted sensing node,

    Q. Gong, Y . Liu, M. Li, and L. Ong, “Secrecy rate-distortion tradeoff for integrated sensing and communication with an untrusted sensing node,” inProc. of International Conference on Wireless Communications and Signal Processing, 2024, pp. 109–114

  19. [19]

    Anti-jamming design for integrated sensing and communication via aerial IRS,

    J. Xu, D. Li, Z. Zhu, Z. Yang, N. Zhao, and D. Niyato, “Anti-jamming design for integrated sensing and communication via aerial IRS,”IEEE Transactions on Communications, 2024

  20. [20]

    A game theoretical anti-jamming beamforming approach for integrated sensing and communications systems,

    Y . Liu, B. Zhang, D. Guo, H. Wang, G. Ding, N. Yang, and J. Gu, “A game theoretical anti-jamming beamforming approach for integrated sensing and communications systems,”IEEE Transactions on Vehicular Technology, 2024

  21. [21]

    Covert joint commu- nication and sensing under variational distance constraint,

    S.-Y . Wang, M.-C. Chang, and M. R. Bloch, “Covert joint commu- nication and sensing under variational distance constraint,” inAnnual Conference on Information Sciences and Systems, 2024, pp. 1–6

  22. [22]

    Joint transmission and state estimation: A constrained channel coding approach,

    W. Zhang, S. Vedantam, and U. Mitra, “Joint transmission and state estimation: A constrained channel coding approach,”IEEE Transactions on Information Theory, vol. 57, no. 10, pp. 7084–7095, Oct. 2011

  23. [23]

    Integration of communication and sensing in 6G: A joint industrial and academic perspective,

    H. Wymeerschet al., “Integration of communication and sensing in 6G: A joint industrial and academic perspective,” inProc. of IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications, Helsinki, Finland, Sep. 2021, pp. 1–7

  24. [24]

    Using Massive MIMO arrays for joint communication and sensing,

    S. Buzzi, C. D’Andrea, and M. Lops, “Using Massive MIMO arrays for joint communication and sensing,” inProc. of Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, Nov. 2019, pp. 5–9

  25. [25]

    Joint state sensing and communication: Optimal tradeoff for a memoryless case,

    M. Kobayashi, G. Caire, and G. Kramer, “Joint state sensing and communication: Optimal tradeoff for a memoryless case,” inProc. of 8 IEEE International Symposium on Information Theory, Vail, CO, USA, June 2018, pp. 111–115

  26. [26]

    Joint state sensing and communication over memoryless multiple access channels,

    M. Kobayashi, H. Hamad, G. Kramer, and G. Caire, “Joint state sensing and communication over memoryless multiple access channels,” inProc. of IEEE International Symposium on Information Theory, Paris, France, July 2019, pp. 270–274

  27. [27]

    An information-theoretic approach to joint sensing and communication,

    M. Ahmadipour, M. Kobayashi, M. Wigger, and G. Caire, “An information-theoretic approach to joint sensing and communication,” IEEE Transactions on Information Theory, vol. 70, no. 2, pp. 1124– 1146, 2024

  28. [28]

    Transmission, identification and common randomness capacities for wire-tape channels with secure feedback from the decoder,

    R. Ahlswede and N. Cai, “Transmission, identification and common randomness capacities for wire-tape channels with secure feedback from the decoder,”Electronic Notes in Discrete Mathematics, vol. 21, pp. 155–159, Aug. 2005

  29. [29]

    Wiretap channel with causal state information and secure rate-limited feedback,

    A. Cohen and A. Cohen, “Wiretap channel with causal state information and secure rate-limited feedback,”IEEE Transactions on Communica- tions, vol. 64, no. 3, pp. 1192–1203, Mar. 2016

  30. [30]

    Feedback lunch: Learned feedback codes for secure communications,

    Y . Zhou, N. Devroye, and O. G¨unl¨u, “Feedback lunch: Learned feedback codes for secure communications,” inProc. ACM Workshop on Wireless Security and Machine Learning, Saarbr ¨ucken, Germany, July 2026, accepted. Truman Wellingreceived a B.S. in Electrical and Computer Engineering with a second major in Ap- plied and Computational Mathematics from Brigh...