{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T20:25:10Z","timestamp":1773001510732,"version":"3.50.1"},"reference-count":44,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T00:00:00Z","timestamp":1741824000000},"content-version":"vor","delay-in-days":71,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62471181"],"award-info":[{"award-number":["62471181"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971190"],"award-info":[{"award-number":["61971190"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003787","name":"Natural Science Foundation of Hebei Province","doi-asserted-by":"publisher","award":["F2022502020"],"award-info":[{"award-number":["F2022502020"]}],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Intelligent Systems"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>Aiming to address the security and timeliness challenges in reconfigurable intelligent surface (RIS)\u2010assisted integrated sensing and communication (ISAC) system with finite blocklength (FBL), this paper jointly investigates the communication security, sensing security, and information freshness performance of the system in the presence of communicating eavesdropper and sensing eavesdropper. Specifically, based on statistical channel state information (CSI), approximate closed\u2010form expressions for secrecy throughput, average age of information (AoI), and channel parameter estimation errors are derived and analyzed to characterize the performance of communication security, information freshness, and sensing security. The asymptotic analyses between secrecy throughput and blocklength, number of antennas, and number of RIS reflecting elements are established. Furthermore, an optimization problem for maximizing sum secrecy throughput is established under the timeliness, sensing security, transmit power, and RIS unit modulus constraints. To handle the intractable stochastic nonconvex problem, a joint alternating optimization method based on noncooperative game and stochastic successive convex approximation (NCG\u2010SSCA) is proposed by jointly designing RIS phase shift, transmit beamforming vector, sensing signal covariance, and blocklength. Simulation results validate our theoretical derivations and conclusions in the performance analysis. It is also shown that compared with SSCA and stochastic gradient descent (SGD) methods, the NCG\u2010SSCA method proposed in this paper achieves an increase in sum secrecy throughput by 10.4% and 16.3% with faster convergence speed.<\/jats:p>","DOI":"10.1155\/int\/4075274","type":"journal-article","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T05:35:46Z","timestamp":1741844146000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Joint Physical Layer Security and Information Freshness Analysis and Optimization for RIS\u2010Assisted ISAC With Finite Blocklength"],"prefix":"10.1155","volume":"2025","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2407-7312","authenticated-orcid":false,"given":"Wei","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4981-1994","authenticated-orcid":false,"given":"Jianxin","family":"Ni","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5165-4037","authenticated-orcid":false,"given":"Baogang","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9478-9210","authenticated-orcid":false,"given":"Shuai","family":"Hao","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"key":"e_1_2_12_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900287"},{"key":"e_1_2_12_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3156632"},{"key":"e_1_2_12_3_2","first-page":"1","article-title":"Integrated Sensing and Communication in 6G: Motivations, Use Cases, Requirements, Challenges and Future Directions","author":"Pin Tan D. K.","year":"2021","journal-title":"2021 1st IEEE International Online Symposium on Joint Communications and Sensing (JC&S)"},{"key":"e_1_2_12_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3122519"},{"key":"e_1_2_12_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2043769"},{"key":"e_1_2_12_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2023.3284449"},{"key":"e_1_2_12_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10278627"},{"key":"e_1_2_12_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT57864.2024.10619685"},{"key":"e_1_2_12_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2023.3275048"},{"key":"e_1_2_12_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10448166"},{"key":"e_1_2_12_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3088898"},{"key":"e_1_2_12_12_2","first-page":"7790","article-title":"On Radar Privacy in Shared Spectrum Scenarios","author":"Dimas A.","year":"2019","journal-title":"ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing"},{"key":"e_1_2_12_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps58843.2023.10465106"},{"key":"e_1_2_12_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2021.3105304"},{"key":"e_1_2_12_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3065072"},{"key":"e_1_2_12_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3004162"},{"key":"e_1_2_12_17_2","first-page":"1","article-title":"Optimal Sensing Time Design in ISAC-Enabled Vehicular Networks","author":"Bai Z.","year":"2023","journal-title":"2023 IEEE\/CIC International Conference on Communications in China (ICCC), Dalian, China"},{"key":"e_1_2_12_18_2","doi-asserted-by":"crossref","unstructured":"ZhangY. YaoM. YangQ.et al. Statistical AoI Guarantee Optimization for Supporting xURLLC in ISAC-Enabled V2I Networks 2024 https:\/\/arxiv.org\/abs\/2408.00381.","DOI":"10.1109\/TVT.2025.3626960"},{"key":"e_1_2_12_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3205245"},{"key":"e_1_2_12_20_2","first-page":"461","article-title":"Secure Status Updates for Internet of Drones: A Deep Q-Learning-Based Antenna Selection Approach","author":"Xiao Y.","year":"2024","journal-title":"International Wireless Communications and Mobile Computing (IWCMC), Ayia Napa, Cyprus"},{"key":"e_1_2_12_21_2","first-page":"1","article-title":"Secure and Timely Status Updates in the IoT Using Short-Packet Permutation-Based Transmissions","author":"Yang Y.","year":"2023","journal-title":"2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall), Hong Kong, Hong Kong"},{"key":"e_1_2_12_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2024.3394214"},{"key":"e_1_2_12_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2022.3155711"},{"key":"e_1_2_12_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2023.3334275"},{"key":"e_1_2_12_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2023.3312089"},{"key":"e_1_2_12_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3331707"},{"key":"e_1_2_12_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2904968"},{"key":"e_1_2_12_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2598968"},{"key":"e_1_2_12_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2024.3397817"},{"key":"e_1_2_12_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001119"},{"key":"e_1_2_12_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3297602"},{"key":"e_1_2_12_32_2","unstructured":"RenZ. XuJ. QiuL. andNgD. W. Secure Cell-Free Integrated Sensing and Communication in the Presence of Information and Sensing Eavesdroppers 2023 https:\/\/arxiv.org\/abs\/2312.04355."},{"key":"e_1_2_12_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3280179"},{"key":"e_1_2_12_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2023.3262485"},{"key":"e_1_2_12_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2021.3066321"},{"key":"e_1_2_12_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3020109"},{"key":"e_1_2_12_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3128544"},{"key":"e_1_2_12_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2022.3197614"},{"key":"e_1_2_12_39_2","first-page":"1","article-title":"Can AoI and Delay Be Minimized Simultaneously With Short-Packet Transmission?","author":"Cao J.","year":"2021","journal-title":"IEEE INFOCOM 2021\u2013IEEE Conference on Computer Communications Workshops"},{"key":"e_1_2_12_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2023.3345309"},{"key":"e_1_2_12_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2024.3351755"},{"key":"e_1_2_12_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2023.3313967"},{"key":"e_1_2_12_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2023.3255241"},{"key":"e_1_2_12_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3103920"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/int\/4075274","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/int\/4075274","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/int\/4075274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T18:01:16Z","timestamp":1772992876000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/int\/4075274"}},"subtitle":[],"editor":[{"given":"Qinghe","family":"Zheng","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1155\/int\/4075274"],"URL":"https:\/\/doi.org\/10.1155\/int\/4075274","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2024-04-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-19","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"4075274"}}