References & Further Reading

References

  1. G. Caire, I. Atzeni, and F. Liu, Robust Secure Beamforming for RIS-Aided Downlink Under Eavesdropper Channel Uncertainty, 2023

    CommIT contribution. Worst-case robust joint beamforming and RIS reflection design against imperfect Eve CSI via S-procedure SDR. Section III adopted in Section 15.4.

  2. C. E. Shannon, Communication Theory of Secrecy Systems, 1949

    Foundation of information-theoretic secrecy. Prerequisite for any physical-layer security result.

  3. A. D. Wyner, The Wire-Tap Channel, 1975

    The foundational wiretap channel model. Secrecy capacity as $[R_B-R_E]^+$ originates here; essential for Section 15.1.

  4. X. Yu, D. Xu, Y. Sun, D. W. K. Ng, and R. Schober, Robust and Secure Wireless Communications via Intelligent Reflecting Surfaces, 2020

    Manifold-optimization-based secrecy maximization with RIS. Generalized eigenvalue formulation of Section 15.2 comes from here.

  5. H. Shen, W. Xu, S. Gong, Z. He, and C. Zhao, Secrecy Rate Maximization for Intelligent Reflecting Surface Assisted Multi-Antenna Communications, 2019

    Foundational RIS-secrecy paper. Shows $2\log_2 N$ secrecy-rate gain used in Section 15.1.

  6. S. Goel and R. Negi, Guaranteeing Secrecy Using Artificial Noise, 2008

    Foundational artificial-noise framework. Null-space AN transmission adopted in Section 15.3.

  7. W. Zhang, J. Chen, Y. Kuo, and Y. Zhou, Artificial-Noise-Aided Secure Multicast Beamforming with Reconfigurable Intelligent Surface, 2022

    Combines RIS with AN for secure multicast. Directly supports Section 15.3's RIS+AN design.

  8. G. Zhou, C. Pan, H. Ren, K. Wang, and A. Nallanathan, A Framework of Robust Transmission Design for IRS-Aided MISO Communications with Imperfect Cascaded Channels, 2020

    Worst-case robust RIS design via S-procedure. Methodological foundation of Section 15.4.

  9. Y. Liu, H.-H. Chen, and L. Wang, Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges, 2017

    Comprehensive physical-layer security survey. Useful context beyond RIS.

  10. X. Liu, Y. Liu, Y. Chen, and H. V. Poor, Enhancing Secrecy of UAV-Aided Communications with Intelligent Reflecting Surfaces, 2020

    RIS-aided UAV secrecy. Relevant for the mobile-Eve scenario in Section 15.4.

  11. J. Chen, Y.-C. Liang, Y. Pei, and H. Guo, Intelligent Reflecting Surface: A Programmable Wireless Environment for Physical Layer Security, 2019

    Early survey of RIS for PLS. Complements Section 15.1 introduction.

  12. S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004

    S-procedure (Appendix B.2) and SDR relaxation theory. Foundation for Section 15.4's optimization machinery.

  13. Y. Liu, L. Wang, S. A. R. Zaidi, M. Elkashlan, and T. Q. Duong, Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model, 2016

    Optimization techniques for secure communication. Useful background on secrecy-maximization methods.

Further Reading

Resources for deeper study of RIS-aided physical-layer security.

  • CommIT flagship RIS-security paper

    Caire, Atzeni, Liu (2023), 'Robust Secure Beamforming for RIS-Aided Downlink' (ch15 ref)

    The definitive reference for Section 15.4's worst-case robust framework. Essential for research on RIS under imperfect Eve CSI.

  • Wiretap channel foundation

    Wyner (1975), 'The Wire-Tap Channel' (ch15 ref)

    The founding paper of information-theoretic secrecy. Required reading for anyone entering physical-layer security.

  • Manifold optimization for RIS secrecy

    Yu et al. (2020), 'Robust and Secure Wireless Communications via IRS' (ch15 ref)

    The generalized-eigenvalue/manifold-optimization method of Section 15.2 comes directly from this paper.

  • Artificial noise fundamentals

    Goel and Negi (2008), 'Guaranteeing Secrecy Using Artificial Noise' (ch15 ref)

    The foundational AN framework. Section 15.3 builds on this for the RIS+AN combination.

  • Robust RIS design under CSI uncertainty

    Zhou et al. (2020), 'A Framework of Robust Transmission Design for IRS-Aided MISO Communications' (ch15 ref)

    The S-procedure-based worst-case methodology underlying Section 15.4.

  • Physical-layer security survey

    Liu, Chen, Wang (2017), 'Physical Layer Security for Next Generation Wireless Networks' (ch15 ref)

    Broad non-RIS PLS context. Useful to understand where RIS fits among other PLS techniques.