Prerequisites & Notation
Before You Begin
Physical-layer security uses channel differences between legitimate users and eavesdroppers to deny secure information transfer to the eavesdropper — complementary to cryptographic security, which assumes computational hardness. Adding RIS gives the system designer active control over the channel geometry, dramatically expanding the secrecy-rate achievable region.
- Wiretap channel, secrecy capacity(Review ch20)
Self-check: State Csiszár-Körner's secrecy capacity formula for the degraded broadcast channel.
- Artificial noise for secrecy(Review ch20)
Self-check: How does artificial noise added in the null space of Alice-Bob channel degrade Eve?
- RIS joint optimization framework (Ch. 5-7)(Review ch05)
Self-check: Recall AO + WMMSE for joint active-passive beamforming.
- Robust optimization under channel uncertainty
Self-check: What does worst-case optimization guarantee vs. average-case?
Notation for This Chapter
Security-specific notation. Alice is the transmitter, Bob is the legitimate user, Eve is the eavesdropper.
| Symbol | Meaning | Introduced |
|---|---|---|
| Alice-to-Bob effective channel (through RIS) | s01 | |
| Alice-to-Eve effective channel (through RIS) | s01 | |
| Bob's and Eve's rates | s01 | |
| Secrecy rate: Bob's rate minus Eve's rate (non-negative) | s01 | |
| Secrecy capacity: supremum of | s01 | |
| Artificial noise signal added to jam Eve | s03 | |
| Noise at Eve | s01 | |
| Uncertainty set for Eve's channel / position | s04 |