PrivISAC: Privacy-Preserving ISAC Paradigm
- PrivISAC is a privacy-preserving paradigm for ISAC systems that leverages RIS and cell-free MIMO to degrade eavesdropper signal clarity while maintaining legitimate sensing and communication.
- It employs randomized RIS configurations and physical-layer perturbations to reduce attacker gesture detection accuracy from about 93% to near 30%, showcasing effective privacy gains.
- Joint optimization using block coordinate descent and concave–convex procedures ensures robust communication (>80% success) and improved sensing accuracy with scalable performance.
PrivISAC is a privacy-preserving paradigm for integrated sensing and communication (ISAC) systems that addresses privacy leakage caused by the inherent environmental and target-related information embedded in wireless signals such as channel state information (CSI). Through joint design and dynamic control of physical-layer assets—including reconfigurable intelligent surfaces (RIS) and cell-free multiple-input multiple-output (MIMO) architectures—PrivISAC introduces artificial perturbations and resource allocation strategies that degrade eavesdropper signal interpretability. The approach guarantees robust legitimate communication and sensing functionalities while substantially reducing an attacker’s ability to infer sensitive user information or environmental behaviors (He et al., 8 Jan 2026, Åkesson et al., 2024).
1. Threat Models and System Architecture
In the RIS-enabled ISAC scenario, the actors comprise: a transmitter (Tx); a multi-antenna communication receiver (Rx) capable of CSI feedback; a multi-antenna sensing receiver (legitimate Rx); and a passive, flexible-location eavesdropper with up to three antennas and full access to public pilots and pretrained sensing models (He et al., 8 Jan 2026). Channels in the absence of RIS are modeled as:
- Communication link:
- Sensing link:
Privacy leakage arises via attacker inference from , extracting private gestures, keystrokes, or location features.
In cell-free MIMO ISAC systems, access points (APs) jointly transmit to users and sense targets via receiver APs. The adversary, assumed to be an internal user, reconstructs AP beampattern peak directions () and estimates the target position using gradient-descent minimization over geometric constraints. Detection probability quantifies privacy loss (Åkesson et al., 2024).
2. RIS Configuration Mechanism and Perturbation Modeling
PrivISAC leverages a RIS, where each row implements two distinct unit-modulus beamforming vectors and . Configurations are formed by selecting one vector per row, yielding total states. At every RIS-update interval (e.g., ), a random configuration is activated, triggered synchronously with the Tx to avoid mid-packet switching.
Random switching introduces perturbations into the eavesdropper’s observation:
These perturbations destroy the temporal structure exploited by eavesdroppers for advanced inference, while legitimate receivers recover clean CSI via time-domain demasking (He et al., 8 Jan 2026).
3. Joint Optimization of Privacy and Communication
The RIS beamforming vectors are optimized to maximize privacy-inducing perturbations in the sensing direction and maintain nearly identical responses for high-throughput communication in the direction . This is formalized as a single-stage weighted sum optimization:
subject to for all rows , vectors , and elements . Weights control the privacy–communication tradeoff.
The solution employs block coordinate descent (BCD), iteratively updating and global phase , guaranteeing convergence to a KKT point. For hardware-limited 1-bit RIS, constraints are relaxed with a penalty to support quantized phase operation (He et al., 8 Jan 2026).
In cell-free MIMO settings, optimization involves a CCP (concave–convex procedure) for precoder design under quadratic-over-quadratic forms, ensuring maximized sensing SINR and guaranteed communication SINR for users () (Åkesson et al., 2024). AP selection for sensing further minimizes mutual information leakage, implemented via greedy sorting.
4. Legitimate Sensing: Masking and Demasking Algorithms
To ensure authorized sensing under randomized RIS states, PrivISAC instantiates a time-domain masking and demasking approach. A shared secret key determines static “sync” configurations for coarse time alignment between RIS and legitimate Rx. Legitimate receivers compute subcarrier and antenna CSI ratios, then detect global minima in coefficient of variation to achieve alignment.
Demasking reconstructs valid CSI for downstream tasks:
- Zero-mean static paths for each configuration:
- Estimate relative configuration gains via minimization over mean ratios
- Demask:
- Sequence legitimate, demasked samples and apply filtering
This methodology allows the legitimate Rx to recover high-fidelity environmental/gesture signals, whereas configurations remain unpredictable to attackers (He et al., 8 Jan 2026).
5. Implementation and Complexity Considerations
PrivISAC prototypes utilize two 8×8 RIS panels (total 8×16), 1-bit PIN-diode phase shifters, and FPGA control for real-time configuration management at . The Tx and legitimate/sensing Rxs are ordinary mini-PCs with Intel 5300 NICs and up to three antennas each. Wired triggers (RJ45) ensure packet-aligned RIS switching.
Computation for RIS updates is distributed: configuration optimization on FPGA (Verilog), masking/demasking in MATLAB/Python. Complexity for RIS optimization is per BCD, and CCP-based cell-free MIMO optimization scales as per QCQP step (He et al., 8 Jan 2026, Åkesson et al., 2024).
Scalability is feasible for large AP or RIS configurations, with warm-starts and distributed solvers mitigating overhead. Sorting APs for cell-free selection is computationally light at .
6. Performance Evaluation and Privacy Gains
PrivISAC is evaluated via metrics including attacker gesture-classification accuracy, CSI estimation RMSE, mutual information reduction, packet success ratio, RSSI stability, and confusion matrices.
- RIS-enabled PrivISAC reduces attacker classification accuracy from baseline (93%) to 30%, invariant under eavesdropper location and antenna count; multi-view attacks yield similar protection.
- Legitimate sensing accuracy is preserved or slightly improved (from 93.3% to 94.2%) due to RIS gain, contingent on correct demasking.
- Communication integrity is maintained ( success ratio at MCS 7), with stabilized RSSI, outperforming standard configurations.
- Parameter sweeps reveal: increasing active RIS rows benefits legitimate sensing while degrading attacker accuracy; legitimate accuracy remains robust under angular estimation errors; higher antenna count increases attacker baseline accuracy, but PrivISAC holds attacker rate constant near 30%.
- Cell-free MIMO PrivISAC demonstrates 20–30 % privacy improvement in detection probability , particularly for moderate power or larger receiver AP sets (Åkesson et al., 2024). A privacy–sensing tradeoff is evident as degrees of freedom rise.
PrivISAC blocks adversarial retraining, with attackers unable to fit models even on self-collected data; test accuracy falls below 20% and loss remains high. Extended tasks—such as respiration monitoring—show legitimate Rx waveform recovery while blinding attackers to useful signal structure (He et al., 8 Jan 2026).
7. Significance and Limitations
PrivISAC advances privacy assurance in ISAC by using randomized spatial perturbations and coordinated resource selection, achieved via lightweight hardware and scalable optimization. The approach maintains communication quality and supports authorized sensing functionality, validated via extensive prototyping and experimentation (He et al., 8 Jan 2026, Åkesson et al., 2024).
Tradeoffs exist: higher power budgets can reduce privacy efficacy in cell-free MIMO; increasing receiver resources supports privacy without meaningful sensing degradation; dynamic resource (AP/RIS) reconfiguration may add coordination overhead but yields sustained privacy benefits across time-coherent intervals.
A plausible implication is that PrivISAC principles may extend to future ISAC systems with higher-dimensional RIS, 1-bit phase quantization, or even distributed MIMO architectures, provided core masking and optimization concepts are adapted for corresponding hardware constraints and adversarial models. Limitations remain under exceedingly high power or hardware-imposed phase granularity, where privacy-sensing separation is less tractable.
Researchers deploying ISAC architectures should consider PrivISAC-compatible strategies as robust countermeasures against passive and active privacy threats, with empirical and theoretical privacy guarantees under realistic deployment conditions.