Exercises
ex-ris-ch15-01
EasyState the definition of secrecy capacity in terms of Bob's and Eve's rates.
Non-negative difference.
Formula
where are Bob's and Eve's achievable rates under a common signaling scheme.
Interpretation
If Bob's rate exceeds Eve's, positive secrecy is achievable by transmitting bits with bits of confusion β Eve can't decode anything. If Bob's rate β€ Eve's, no positive secrecy.
ex-ris-ch15-02
EasyAt high SNR, show that .
at large .
Expand
, . Difference: .
RIS benefit
With RIS: , . Ratio = , bits secrecy.
ex-ris-ch15-03
MediumFor , compute the expected RIS secrecy gain over a no-RIS baseline at high SNR.
bits.
Compute
bits/s/Hz.
Caveat
This is the upper-bound scaling. Real gains depend on Eve's specific position; 10-14 bits/s/Hz is typical with optimal tuning. Still a dramatic boost over no-RIS.
ex-ris-ch15-04
MediumWhy does maximizing secrecy rate give a slightly lower than maximizing Bob's comm rate alone?
DoF spent on nulling Eve.
Tradeoff
Comm-optimal RIS: all elements focus coherently on Bob. Secrecy-optimal RIS: some elements focus on Bob; others null at Eve. Dividing elements between these two tasks reduces Bob's coherent combining slightly.
Quantitative
Comm-optimal Bob rate: . Secrecy-optimal Bob rate: (roughly half elements dedicated to Bob under optimal split). Difference: bits/s/Hz.
Worth it
Paying 2 bits/s/Hz of Bob's comm rate to buy bits/s/Hz of secrecy rate. Favorable tradeoff.
ex-ris-ch15-05
MediumDerive the closed-form active beamformer for secrecy rate maximization under perfect Eve CSI.
Generalized eigenvalue problem.
Objective
Maximize under .
Rayleigh-like
with , . Maximum via generalized eigenvalue: is the dominant generalized eigenvector of .
Regularize
Add a small to to avoid singularity; otherwise closed-form.
ex-ris-ch15-06
EasyDescribe how artificial noise (AN) enables secrecy without knowing Eve's channel.
Bob's null space.
AN placement
AN transmitted along directions orthogonal to Bob's effective channel ().
Selective jamming
Bob sees no AN (orthogonal). Eve (at random direction) sees AN with non-zero projection on her channel β jamming.
No Eve CSI needed
AN is computed from only. Eve's channel is irrelevant to the jamming design. The statistical assumption is just that Eve's channel is "generic" β not aligned with Bob's.
ex-ris-ch15-07
HardFor a RIS + AN hybrid system with AN fraction , compute Bob's rate degradation vs. pure-comm.
.
Power split
Data: . AN: .
Bob's rate
vs. pure-comm . At high SNR: difference bits/s/Hz.
Net secrecy
Eve's SNR reduced by via AN in her null space. Eve's rate drops by bits/s/Hz. Net secrecy change: + bits/s/Hz (over no-AN). Favorable tradeoff.
ex-ris-ch15-08
MediumContrast worst-case and stochastic secrecy designs.
Guarantee types.
Worst-case
Guarantees: deterministic; secrecy achieved for ANY Eve in . Conservative: lower nominal secrecy. Use case: high-stakes applications (military, gov).
Stochastic
Guarantees: expected value or high-probability; possibly poor on specific Eve realizations. Less conservative: higher nominal secrecy. Use case: commercial deployments with accepted small leakage probability.
Selection
Depends on adversary model and consequences of leakage. For 5G/6G commercial: stochastic is common. For classified: worst-case is standard.
ex-ris-ch15-09
MediumUnder perfect-Eve-CSI assumption, what is the RIS-aided secrecy rate scaling with ?
Look at .
High-SNR
. Linear (in log) growth in .
Compare to
Comm rate: also at high SNR. Interestingly, secrecy and comm have the same scaling in β but the additive constants differ.
Caveat
Realistic Eve CSI uncertainty reduces achievable secrecy; robust designs have slower scaling (logarithmic in inverse uncertainty radius).
ex-ris-ch15-10
HardShow that the robust secrecy problem can be expressed as an SDP via S-procedure.
S-procedure for quadratic constraints.
Outer problem
Fix : compute .
Inner problem
Quadratic in ; constraint is quadratic. By S-procedure, this has a dual SDP form.
Combined SDP
Outer max (over ) combines with inner max. Using S-procedure and Lagrangian duality, express the full problem as a convex SDP in lifted variables.
Practical
The full SDP has variables; solvable in reasonable time for . For larger , use manifold methods on the passive side with SDR on the active side.
ex-ris-ch15-11
EasyWhy is RIS PL security not a complete defense?
Attack model limitations.
Information-theoretic
Provides guarantees under specific attack model (passive, bounded Eve).
Upper layers
Authentication, replay, MITM attacks operate above PHY. PL security doesn't address them.
Combined defense
Use PL security + cryptography + physical security. PL security is one layer in defense-in-depth. Don't rely on it alone for mission-critical systems.
ex-ris-ch15-12
MediumDescribe a scenario where RIS-aided secrecy is strictly better than conventional AN-only security.
RIS provides geometric advantage; AN is direction-agnostic.
AN-only
AN is direction-agnostic: jams the null space uniformly (including where Eve isn't).
RIS
RIS can focus jamming in Eve's specific direction while leaving other directions clean.
Scenario
Multiple users are served simultaneously; Eve is in one specific direction. AN would jam all non-Bob directions (including other users); RIS jamming is directional. Other users are served without AN interference.
Quantitative
Up to - dB additional secrecy rate in multi-user scenarios via RIS-directional jamming.
ex-ris-ch15-13
MediumFor a smart-home WiFi with Eve somewhere within 10 m, , , estimate worst-case secrecy rate.
Robust SDP; typical deployment numbers.
No-RIS worst-case
Bob at 5 m, Eve could be at 1-10 m. Worst: Eve at 1 m, very close to router. Bob's SNR lower than Eve's. typically.
RIS
Robust optimization: SDP maximizes worst-case secrecy. Typical result: - bits/s/Hz positive. Guaranteed for any Eve in the uncertainty set.
Operational
Sufficient for small-payload secure messaging (control signals, key exchange). Bulk data still needs encryption.
ex-ris-ch15-14
HardHow does the RIS secrecy guarantee change when Eve moves?
CSI becomes outdated; robust coverage.
Stationary Eve
Perfect CSI: optimal nulling at Eve's position. Secrecy very high.
Moving Eve
CSI is delayed; Eve may move away from the null. Secrecy reduces based on how far she moves relative to the nulling beamwidth.
Robust design
Use worst-case over Eve's movement region (e.g., within mobility radius over coherence time). Secrecy guarantee degrades gracefully.
Mitigation
Update RIS phases at a rate faster than Eve's mobility. - updates/sec is sufficient for most mobility. Or use AN-based approach which doesn't track Eve.
ex-ris-ch15-15
ChallengeOpen-ended: Design a RIS secrecy solution for a confidential business meeting in a glass-walled conference room.
Specific security requirements; constraint on where Eve could be.
Geometry
Eve likely outside the glass wall (5-30 m away). Bob (legitimate meeting attendee) inside.
RIS deployment
Place RIS inside the conference room, concealed from outside. Focus on attendee direction; null toward glass walls.
Algorithm
Robust SDP over Eve's uncertainty set (outside walls). AN fraction . Per-attendee key establishment via RIS-secured channel.
Combined with crypto
RIS provides PHY-layer secrecy for key establishment. Subsequent bulk data encrypted with the established key.
Expected performance
Worst-case secrecy rate: bits/s/Hz for any Eve outside walls. Sufficient for key exchange and control signaling.