Recognition: no theorem link
Secure Integrated Sensing and Communication: Information Theory Offers Insights
Pith reviewed 2026-05-12 02:14 UTC · model grok-4.3
The pith
Information theory organizes secure integrated sensing and communication by what must be protected and against whom.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
By first recalling the basic information-theoretic ISAC models and then classifying the secure literature according to protected functionality (communication security, sensing security, or joint) and adversary model (passive or active), the survey identifies the main tradeoffs and shows how these formulations connect to privacy and covert communication problems.
What carries the argument
The central mechanism is the classification of secure ISAC problems by protected functionality and adversary type, which structures the performance metrics and fundamental limits across the reviewed literature.
If this is right
- When communication must remain secret from a sensing user, the achievable rate region shrinks compared with unsecured ISAC.
- Protecting sensing information from a communication user imposes additional distortion or resolution constraints on the radar-like function.
- Active adversaries such as jammers create a three-way tradeoff among communication rate, sensing quality, and security level.
- Joint formulations in which both functions need protection lead to coupled secrecy and estimation regions rather than separate constraints.
Where Pith is reading between the lines
- The categorized limits suggest waveform designs could be optimized once for all three objectives rather than sequentially.
- Similar classification might apply to other dual-use systems such as radar-communication coexistence in shared spectrum.
- The privacy links imply that regulatory definitions of sensitive sensing data could draw directly from the information-theoretic metrics already developed.
Load-bearing premise
The reviewed information-theoretic models and existing literature together give a representative picture of the security challenges and tradeoffs that arise in integrated sensing and communication.
What would settle it
A new ISAC model or experimental result that produces security-performance tradeoffs outside the categorized families would show the survey's organization does not capture the essential limits.
Figures
read the original abstract
Integrated sensing and communication (ISAC) combines sensing and communication within a shared system framework by using the same transmitted signal for both objectives. ISAC can improve the efficiency of spectrum and hardware use but also gives rise to new security challenges, as users associated with one function may need to be prevented from inferring information related to the other. This paper surveys information-theoretic approaches to secure ISAC with emphasis on formulations, performance metrics, and fundamental limits. We first review the information-theoretic ISAC models that underlie secure formulations. We then organize the secure ISAC literature according to the protected functionality and the adversary model, covering secure communication, sensing security, and active-adversary settings such as jamming. We also discuss formulations in which communication security and sensing security interact more directly, as well as their connections to privacy and covert communication. Throughout, we highlight the main modeling assumptions and the insights they provide on the tradeoffs among communication reliability, sensing performance, and security.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. This survey paper reviews information-theoretic approaches to secure integrated sensing and communication (ISAC). It first reviews the underlying ISAC models that support secure formulations, then organizes the literature according to the protected functionality (communication security versus sensing security) and adversary model (including passive eavesdroppers and active adversaries such as jammers). It further examines settings where communication and sensing security interact directly, as well as connections to privacy and covert communication, while highlighting modeling assumptions and the resulting tradeoffs among communication reliability, sensing performance, and security.
Significance. If the survey's taxonomy and summaries are accurate, it offers a timely and useful synthesis of a rapidly growing area. By structuring the literature around protected functionality and adversary type rather than by specific techniques, the paper clarifies distinct security formulations and their fundamental limits. The explicit attention to modeling assumptions and tradeoffs provides a framework that can help researchers identify gaps and design new secure ISAC schemes. As a survey without new theorems, its primary contribution is organizational clarity and insight extraction from existing results.
major comments (2)
- The central organizational claim (abstract and §1) that the literature is partitioned by protected functionality and adversary type is load-bearing for the survey's value. However, the manuscript does not explicitly justify why certain works are placed in one category rather than another when they address both communication and sensing security simultaneously; a short decision tree or table in §2 would strengthen the taxonomy's reproducibility.
- §4 (active-adversary settings): the discussion of jamming models cites several works but does not compare the resulting secrecy-distortion regions or the conditions under which jamming can be mitigated by ISAC waveform design. Without such a comparative summary, the claimed insights on tradeoffs remain qualitative rather than quantitative.
minor comments (3)
- The notation for mutual information and equivocation rates is introduced in §2 but is not uniformly applied in later sections; adding a short notation table would improve readability.
- Several figure captions (e.g., those illustrating rate-distortion-security regions) omit the precise parameter settings or the source of the plotted curves, making it difficult to reproduce the depicted tradeoffs.
- The connections to covert communication in §5 are interesting but reference only a subset of the relevant literature; adding two or three key citations on covert ISAC would increase completeness without altering the survey's scope.
Simulated Author's Rebuttal
We thank the referee for the careful reading and constructive comments on our survey. We address each major comment below and indicate the revisions we will make.
read point-by-point responses
-
Referee: The central organizational claim (abstract and §1) that the literature is partitioned by protected functionality and adversary type is load-bearing for the survey's value. However, the manuscript does not explicitly justify why certain works are placed in one category rather than another when they address both communication and sensing security simultaneously; a short decision tree or table in §2 would strengthen the taxonomy's reproducibility.
Authors: We agree that an explicit justification for category placement, particularly for works addressing both communication and sensing security, would improve the taxonomy's reproducibility. In the revised manuscript we will add a short decision tree or table in §2 that states the classification criteria, with explicit handling of papers that span multiple protected functionalities. revision: yes
-
Referee: §4 (active-adversary settings): the discussion of jamming models cites several works but does not compare the resulting secrecy-distortion regions or the conditions under which jamming can be mitigated by ISAC waveform design. Without such a comparative summary, the claimed insights on tradeoffs remain qualitative rather than quantitative.
Authors: We acknowledge that the current discussion in §4 is primarily qualitative. While a fully exhaustive quantitative comparison of all secrecy-distortion regions lies beyond the scope of a survey, we will insert a concise comparative table that summarizes the key secrecy-distortion results and mitigation conditions reported in the cited works. This addition will make the tradeoff insights more quantitative without introducing new derivations. revision: partial
Circularity Check
Survey paper with no original derivations or load-bearing claims exhibits no circularity
full rationale
This paper is explicitly a survey that reviews and organizes existing information-theoretic literature on secure ISAC. It presents no new theorems, derivations, fitted parameters, or empirical predictions. The abstract and structure describe coverage of models, metrics, and limits from external works, organized by protected functionality and adversary type. No step in the presented content reduces by construction to its own inputs, self-citations, or ansatzes. All references are to prior independent literature. This matches the default expectation for non-derivational survey papers and satisfies the rule that self-contained descriptive organization against external benchmarks receives score 0.
Axiom & Free-Parameter Ledger
Reference graph
Works this paper leans on
-
[1]
Toward multi- functional 6G wireless networks: Integrating sensing, communication, and security,
Z. Wei, F. Liu, C. Masouros, N. Su, and A. P. Petropulu, “Toward multi- functional 6G wireless networks: Integrating sensing, communication, and security,”IEEE Communications Magazine, vol. 60, no. 4, pp. 65– 71, 2022
work page 2022
-
[2]
N. Su, F. Liu, and C. Masouros, “Secure radar-communication systems with malicious targets: Integrating radar, communications and jam- ming functionalities,”IEEE Transactions on Wireless Communications, vol. 20, no. 1, pp. 83–95, Jan. 2021
work page 2021
-
[3]
Secure inte- grated sensing and communication,
O. G ¨unl¨u, M. R. Bloch, R. F. Schaefer, and A. Yener, “Secure inte- grated sensing and communication,”IEEE Journal on Selected Areas in Information Theory, vol. 4, pp. 40–53, 2023
work page 2023
-
[4]
Wireless physical-layer security: Lessons learned from information theory,
A. Yener and S. Ulukus, “Wireless physical-layer security: Lessons learned from information theory,”Proc. IEEE, vol. 103, no. 10, pp. 1814–1825, 2015
work page 2015
-
[5]
Integrated sensing and communications over the years: An evolution perspective,
D. Zhang, Y . Cui, X. Cao, N. Su, Y . Gong, F. Liu, W. Yuan, X. Jing, J. Andrew Zhang, J. Xu, C. Masouros, D. Niyato, and M. Di Renzo, “Integrated sensing and communications over the years: An evolution perspective,”IEEE Communications Surveys & Tutorials, vol. 28, pp. 5014–5048, 2026
work page 2026
-
[6]
Delving into security and privacy of joint communication and sensing: A survey,
´O. G. Martins, H. ˚Akesson, M. Gomes, D. P. Osorio, P. Sen, and J. P. Vilela, “Delving into security and privacy of joint communication and sensing: A survey,”IEEE Open Journal of the Communications Society, 2025
work page 2025
-
[7]
Integrating sensing and communications in 6G? Not until it is secure to do so,
N. Su, F. Liu, J. Zou, C. Masouros, G. C. Alexandropoulos, A. Mourad, J. L. Hernando, Q. Zhang, and T.-T. Chan, “Integrating sensing and communications in 6G? Not until it is secure to do so,”arXiv preprint arXiv:2503.15243, 2025
-
[8]
RIS-based physical layer security for integrated sensing and communication: A comprehensive survey,
Y . Li, F. Khan, M. Ahmed, A. A. Soofi, W. U. Khan, C. K. Sheemar, M. Asif, and Z. Han, “RIS-based physical layer security for integrated sensing and communication: A comprehensive survey,”IEEE Internet of Things Journal, 2025
work page 2025
-
[9]
Transmitter actions for secure integrated sensing and communication,
T. Welling, O. G ¨unl¨u, and A. Yener, “Transmitter actions for secure integrated sensing and communication,” inProc. of IEEE International Symposium on Information Theory, 2024, pp. 2580–2585
work page 2024
-
[10]
On secrecy capacity of binary beampointing channels with block memory and feedback,
S. Li, M. Chen, S. Li, and G. Caire, “On secrecy capacity of binary beampointing channels with block memory and feedback,” inProc. Allerton Conference on Communication, Control, and Computing, 2025
work page 2025
-
[11]
A. A. Al-Habob, O. A. Dobre, and Y . Jing, “Predictive beamforming approach for secure integrated sensing and communication with multiple aerial eavesdroppers,”IEEE Transactions on Communications, vol. 73, no. 9, pp. 7887–7898, 2025
work page 2025
-
[12]
Secure Integrated Sensing and Communication against Communication and Sensing Eavesdropping
S. Guo and M. R. Bloch, “Secure integrated sensing and communication against communication and sensing eavesdropping,”arXiv preprint arXiv:2601.23216, 2026
work page internal anchor Pith review Pith/arXiv arXiv 2026
-
[13]
Distribution-preserving integrated sensing and communication,
Y . Chen, T. J. Oechtering, H. Boche, M. Skoglund, and Y . Luo, “Distribution-preserving integrated sensing and communication,”IEEE Transactions on Information Theory, vol. 71, no. 10, pp. 7518–7539, 2025
work page 2025
-
[14]
Sensing-Secure ISAC: Ambiguity function engineering for impairing unauthorized sensing,
K. Han, K. Meng, and C. Masouros, “Sensing-Secure ISAC: Ambiguity function engineering for impairing unauthorized sensing,”IEEE Trans- actions on Wireless Communications, vol. 25, pp. 5386–5400, 2026
work page 2026
-
[15]
Integrated communication and receiver sensing with security constraints on message and state,
M. Ahmadipour, M. Wigger, and S. Shamai, “Integrated communication and receiver sensing with security constraints on message and state,” in Proc. of IEEE International Symposium on Information Theory, 2023, pp. 2738–2743
work page 2023
-
[16]
Secure integrated sensing and communication for binary input additive white Gaussian noise channels,
O. G ¨unl¨u, M. Bloch, R. F. Schaefer, and A. Yener, “Secure integrated sensing and communication for binary input additive white Gaussian noise channels,” inIEEE International Symposium on Joint Communi- cations & Sensing, 2023, pp. 1–6
work page 2023
-
[17]
——, “Nonasymptotic performance limits of low-latency secure in- tegrated sensing and communication systems,” inIEEE International Conference on Acoustics, Speech and Signal Processing, 2024, pp. 12 971–12 975
work page 2024
-
[18]
Q. Gong, Y . Liu, M. Li, and L. Ong, “Secrecy rate-distortion tradeoff for integrated sensing and communication with an untrusted sensing node,” inProc. of International Conference on Wireless Communications and Signal Processing, 2024, pp. 109–114
work page 2024
-
[19]
Anti-jamming design for integrated sensing and communication via aerial IRS,
J. Xu, D. Li, Z. Zhu, Z. Yang, N. Zhao, and D. Niyato, “Anti-jamming design for integrated sensing and communication via aerial IRS,”IEEE Transactions on Communications, 2024
work page 2024
-
[20]
Y . Liu, B. Zhang, D. Guo, H. Wang, G. Ding, N. Yang, and J. Gu, “A game theoretical anti-jamming beamforming approach for integrated sensing and communications systems,”IEEE Transactions on Vehicular Technology, 2024
work page 2024
-
[21]
Covert joint commu- nication and sensing under variational distance constraint,
S.-Y . Wang, M.-C. Chang, and M. R. Bloch, “Covert joint commu- nication and sensing under variational distance constraint,” inAnnual Conference on Information Sciences and Systems, 2024, pp. 1–6
work page 2024
-
[22]
Joint transmission and state estimation: A constrained channel coding approach,
W. Zhang, S. Vedantam, and U. Mitra, “Joint transmission and state estimation: A constrained channel coding approach,”IEEE Transactions on Information Theory, vol. 57, no. 10, pp. 7084–7095, Oct. 2011
work page 2011
-
[23]
Integration of communication and sensing in 6G: A joint industrial and academic perspective,
H. Wymeerschet al., “Integration of communication and sensing in 6G: A joint industrial and academic perspective,” inProc. of IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications, Helsinki, Finland, Sep. 2021, pp. 1–7
work page 2021
-
[24]
Using Massive MIMO arrays for joint communication and sensing,
S. Buzzi, C. D’Andrea, and M. Lops, “Using Massive MIMO arrays for joint communication and sensing,” inProc. of Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, Nov. 2019, pp. 5–9
work page 2019
-
[25]
Joint state sensing and communication: Optimal tradeoff for a memoryless case,
M. Kobayashi, G. Caire, and G. Kramer, “Joint state sensing and communication: Optimal tradeoff for a memoryless case,” inProc. of 8 IEEE International Symposium on Information Theory, Vail, CO, USA, June 2018, pp. 111–115
work page 2018
-
[26]
Joint state sensing and communication over memoryless multiple access channels,
M. Kobayashi, H. Hamad, G. Kramer, and G. Caire, “Joint state sensing and communication over memoryless multiple access channels,” inProc. of IEEE International Symposium on Information Theory, Paris, France, July 2019, pp. 270–274
work page 2019
-
[27]
An information-theoretic approach to joint sensing and communication,
M. Ahmadipour, M. Kobayashi, M. Wigger, and G. Caire, “An information-theoretic approach to joint sensing and communication,” IEEE Transactions on Information Theory, vol. 70, no. 2, pp. 1124– 1146, 2024
work page 2024
-
[28]
R. Ahlswede and N. Cai, “Transmission, identification and common randomness capacities for wire-tape channels with secure feedback from the decoder,”Electronic Notes in Discrete Mathematics, vol. 21, pp. 155–159, Aug. 2005
work page 2005
-
[29]
Wiretap channel with causal state information and secure rate-limited feedback,
A. Cohen and A. Cohen, “Wiretap channel with causal state information and secure rate-limited feedback,”IEEE Transactions on Communica- tions, vol. 64, no. 3, pp. 1192–1203, Mar. 2016
work page 2016
-
[30]
Feedback lunch: Learned feedback codes for secure communications,
Y . Zhou, N. Devroye, and O. G¨unl¨u, “Feedback lunch: Learned feedback codes for secure communications,” inProc. ACM Workshop on Wireless Security and Machine Learning, Saarbr ¨ucken, Germany, July 2026, accepted. Truman Wellingreceived a B.S. in Electrical and Computer Engineering with a second major in Ap- plied and Computational Mathematics from Brigh...
work page 2026
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.