The RIS-Aided Wiretap Channel

Reshape the Channel to Deny the Eavesdropper

Physical-layer security is the information-theoretic foundation: if Bob's channel is better than Eve's, we can achieve positive secrecy rate β€” information transfer that Eve cannot decode even with infinite computing power. The key resource is the channel difference between Bob and Eve.

Without the RIS, the channel difference is determined by geometry (Bob close, Eve far) and luck (fading diversity). With the RIS, we can engineer the channel difference: focus coherently on Bob, null coherently at Eve. The RIS is a physical-layer security knob that didn't exist in classical systems.

The golden thread: the RIS programs the channel β€” here, it programs the channel difference. Secrecy is the output of this programming.

,

Definition:

RIS-Aided Wiretap Channel

Consider Alice (BS) with NtN_t antennas transmitting a signal ss to Bob. Eve (eavesdropper) listens from a nearby position. Both Bob and Eve receive signal via the same BS transmission, propagating through:

  • Direct path (blocked or weak).
  • RIS reflected path (shaped by Ξ¦\boldsymbol{\Phi}).

The received signals are

yB=hBH(Ξ¦)v s+wB,yE=hEH(Ξ¦)v s+wE,y_B = \mathbf{h}_B^H(\boldsymbol{\Phi}) \mathbf{v}\,s + w_B, \qquad y_E = \mathbf{h}_E^H(\boldsymbol{\Phi}) \mathbf{v}\,s + w_E,

where wB,wEw_B, w_E are independent AWGN. The secrecy capacity of this degraded broadcast channel is

Cs(Ξ¦)=[log⁑2 ⁣(1+∣hBHv∣2Οƒ2)βˆ’log⁑2 ⁣(1+∣hEHv∣2ΟƒE2)]+,C_s(\boldsymbol{\Phi}) = \left[\log_2\!\left(1 + \frac{|\mathbf{h}_B^H \mathbf{v}|^2}{\sigma^2}\right) - \log_2\!\left(1 + \frac{|\mathbf{h}_E^H \mathbf{v}|^2}{\sigma^2_{E}}\right)\right]^+,

where [x]+=max⁑(0,x)[x]^+ = \max(0, x). The RIS phase matrix Ξ¦\boldsymbol{\Phi} appears in both hB\mathbf{h}_B and hE\mathbf{h}_E β€” tuning it affects both channels.

The secrecy capacity is always non-negative: if Bob's channel is worse than Eve's, no secrecy is possible and Cs=0C_s = 0. The critical observation: the RIS can reverse the default channel ordering β€” even if Bob is far and Eve is close, a well-tuned Ξ¦\boldsymbol{\Phi} can make Bob's effective channel stronger.

,

Theorem: RIS Secrecy Gain Over Direct Channel

Under optimal RIS phases focused on Bob and nulled at Eve (achievable when Bob and Eve are at different angles with adequate separation):

SNRBβ‰ˆN2Ξ±2Ξ²B2Pt/Οƒ2,\text{SNR}_{B} \approx N^2 \alpha^2 \beta_B^2 P_t/\sigma^2,

SNREβ‰ˆΞ±2Ξ²E2Pt/ΟƒE2\text{SNR}_{E} \approx \alpha^2 \beta_E^2 P_t/\sigma^2_{E}

(no coherent combining at Eve; only direct contribution).

Secrecy capacity:

Csβ‰₯log⁑2(1+N2Ξ±2Ξ²B2Pt/Οƒ2)βˆ’log⁑2(1+Ξ±2Ξ²E2Pt/ΟƒE2).C_s \geq \log_2(1 + N^2 \alpha^2 \beta_B^2 P_t/\sigma^2) - \log_2(1 + \alpha^2 \beta_E^2 P_t/\sigma^2_{E}).

At high SNR: Csβ‰ˆ2log⁑2N+O(1)C_s \approx 2\log_2 N + O(1) β€” the secrecy capacity grows logarithmically in NN (similar to comm rate but bounded by 2log⁑2N2\log_2 N, not log⁑2N\log_2 N). For N=256N = 256: secrecy capacity increases by ∼16\sim 16 bits/s/Hz over no-RIS.

The RIS can steer the reflected beam toward Bob and away from Eve. The reflected-path SNR at Bob is N2α2βB2N^2 \alpha^2 \beta_B^2; at Eve, under ideal nulling, the reflected-path SNR is ∼1\sim 1 (uncorrelated with the Bob-focused beam). The secrecy rate benefits from this double-sided manipulation.

Key Takeaway

RIS enables 2log⁑2N2\log_2 N-bit secrecy gain. By focusing on Bob and nulling at Eve, the RIS dramatically widens the channel difference. For N=256N = 256: secrecy rate grows by ∼16\sim 16 bits/s/Hz over a no-RIS baseline β€” enough to protect high-rate services even when Eve is physically closer than Bob.

RIS-Aided Wiretap Channel

RIS-Aided Wiretap Channel
Alice (BS) transmits through a RIS. The RIS focuses coherently toward Bob (legitimate) while nulling at Eve (eavesdropper). Even if Eve is physically closer to the BS, the RIS-shaped channel favors Bob, enabling positive secrecy capacity.

Example: Coffee-Shop Secrecy

Alice is a 5G BS. Bob is a legitimate user 50 m away. Eve is at the coffee shop 10 m away, between Alice and Bob. Direct-path secrecy is negative (Eve closer = better channel). A RIS panel is deployed to restore secrecy.

Secrecy Rate vs. Eavesdropper Position

Move the eavesdropper around the coverage area and observe the secrecy rate. With RIS, secrecy is achievable over a wider region than without. Change NN to see the secure area expand.

Parameters
128
8
50
28

The CSI-on-Eve Problem

Designing the optimal Ξ¦\boldsymbol{\Phi} requires knowing Eve's channel hE\mathbf{h}_E. Eve is uncooperative: she doesn't transmit pilots. Her channel must be estimated from side information (geography, traffic patterns) or modeled as uncertain (robust optimization, Section 15.4).

When Eve's channel is truly unknown:

  • Worst-case design: assume Eve has the best possible channel; optimize for secrecy against worst-case Eve.
  • Stochastic design: assume Eve's channel is drawn from a distribution; optimize expected secrecy.
  • Artificial noise (Section 15.3): inject noise in direction orthogonal to Bob β€” degrades all non-Bob channels uniformly. Doesn't require knowing Eve's channel.

Common Mistake: Don't Assume Perfect Eve CSI

Mistake:

"Measure Eve's channel like a legitimate user; apply standard RIS optimization."

Correction:

Eve is adversarial and silent. Her channel cannot be pilot- estimated. Assuming perfect Eve CSI is an unrealistic simplification that overestimates secrecy capacity. In practice: use worst-case or stochastic design (Section 15.4), or use artificial noise (Section 15.3) to sidestep the need for Eve CSI. Papers claiming perfect-Eve-CSI secrecy gains should be read as upper bounds, not deployable guarantees.

⚠️Engineering Note

Attack Models for RIS Secrecy

Understanding Eve's capabilities is foundational:

  1. Passive eavesdropper: listens without transmitting. Channel unknown to Alice. Most common attack model.
  2. Active attacker: transmits interference + listens. Can spoof pilot signals to confuse channel estimation.
  3. Co-located with Bob: very difficult; requires physical security. RIS cannot distinguish.
  4. Moving Eve: adversary follows Bob. Time-varying uncertainty; robust design needed.

Each attack model leads to different optimization problems. This chapter focuses on passive Eve with uncertain channel β€” the most common and tractable case.

Practical Constraints
  • β€’

    Typical Eve position uncertainty: ∼10\sim 10 m standard deviation (urban).

  • β€’

    Pilot-spoofing attacks are a known failure mode β€” use authentication + challenge-response.

  • β€’

    For high-security applications (government, military): combine RIS + crypto + physical security.