Chapter Summary

Chapter Summary

Key Points

  • 1.

    RIS-ISAC enables simultaneous comm and sensing from one panel. A RIS reshapes both the communication path (BS→UE via RIS) and the sensing path (BS→target→BS via RIS). Single waveform, single hardware, two services — the 6G ISAC vision.

  • 2.

    Sensing SNR scales as N4N^4, twice the rate of comm's N2N^2. The round-trip radar path passes through the RIS twice; coherent combining on each hop gives N2N^2 amplitude (power = squared), total N4N^4 sensing SNR gain. RIS is disproportionately more valuable for sensing than for communication — at N=256N = 256, sensing gain is 96\sim 96 dB vs. communication gain of 48\sim 48 dB.

  • 3.

    The Pareto frontier trades comm vs. sensing via tradeoff parameter λ\lambda. Scalarized problem max(1λ)Rcomm+λRsens\max (1-\lambda) R_{\text{comm}} + \lambda R_{\text{sens}} over (W,Φ)(\mathbf{W}, \boldsymbol{\Phi}). λ\lambda sweeps from 0 (comm-only) to 1 (sensing-only). The RIS-aided frontier is a convex outward expansion of the no-RIS frontier.

  • 4.

    The CommIT RIS-ISAC framework (Caire, Liu, Atzeni 2023). SDR lift of both W\mathbf{W} and Φ\boldsymbol{\Phi} gives a tight convex relaxation. For rank-1 radar targets + KNtK \leq N_t users, SDR is exactly tight (no gap). For higher rank, Gaussian randomization extracts <1< 1 dB optimality gap. Warm-start AO refinement gives deployment-grade solutions in real time.

  • 5.

    Target deployments: automotive V2X, smart-city sensing, industrial safety. The RIS dual-function paradigm works best when (a) comm users and radar targets coexist in the coverage area, (b) moderate mobility, and (c) a single panel can geometrically see both. Emerging 6G deployments are natural fits.

Looking Ahead

Chapter 13 focused on RIS for ISAC — one-target sensing alongside comm. Chapter 14 specializes the sensing framework to localization: estimating UE positions with high accuracy via the RIS-aided Fisher Information Matrix. Multi-RIS fusion (combining position estimates from multiple panels) is the central new idea. Chapter 15 then addresses physical-layer security: using the RIS to degrade eavesdropper channels while boosting legitimate ones. Together, Chapters 13-15 complete Part IV — applications of the RIS framework beyond rate maximization.