Prerequisites & Notation

Before You Begin

Physical-layer security uses channel differences between legitimate users and eavesdroppers to deny secure information transfer to the eavesdropper — complementary to cryptographic security, which assumes computational hardness. Adding RIS gives the system designer active control over the channel geometry, dramatically expanding the secrecy-rate achievable region.

  • Wiretap channel, secrecy capacity(Review ch20)

    Self-check: State Csiszár-Körner's secrecy capacity formula for the degraded broadcast channel.

  • Artificial noise for secrecy(Review ch20)

    Self-check: How does artificial noise added in the null space of Alice-Bob channel degrade Eve?

  • RIS joint optimization framework (Ch. 5-7)(Review ch05)

    Self-check: Recall AO + WMMSE for joint active-passive beamforming.

  • Robust optimization under channel uncertainty

    Self-check: What does worst-case optimization guarantee vs. average-case?

  • Multi-user RIS (Ch. 7)(Review ch07)

    Self-check: Recall the SOCP bisection for max-min RIS.

Notation for This Chapter

Security-specific notation. Alice is the transmitter, Bob is the legitimate user, Eve is the eavesdropper.

SymbolMeaningIntroduced
hB\mathbf{h}_BAlice-to-Bob effective channel (through RIS)s01
hE\mathbf{h}_EAlice-to-Eve effective channel (through RIS)s01
RB,RER_B, R_EBob's and Eve's ratess01
Rs=[RBRE]+R_s = [R_B - R_E]^+Secrecy rate: Bob's rate minus Eve's rate (non-negative)s01
CsC_sSecrecy capacity: supremum of RsR_ss01
z\mathbf{z}Artificial noise signal added to jam Eves03
σE2\sigma^2_{E}Noise at Eves01
UE\mathcal{U}_EUncertainty set for Eve's channel / positions04