Artificial Noise via RIS

Jamming Eve Without Knowing Her Channel

The secrecy rate formulation of Section 15.2 assumes Eve's channel is known. In reality, it's usually not. Artificial noise (AN) is a classical remedy: transmit additional signal components orthogonal to Bob's channel, which jam Eve without harming Bob. Adding a RIS multiplies the power of AN: the RIS can shape the noise to reach Eve-specific directions.

Definition:

Artificial Noise Signal Model

In addition to Bob's data signal v s\mathbf{v}\,s, Alice transmits artificial noise z\mathbf{z} along directions orthogonal to Bob's effective channel:

x(t)=v s(t)+A z(t),\mathbf{x}(t) = \mathbf{v}\,s(t) + \mathbf{A}\,\mathbf{z}(t),

where A\mathbf{A} is a matrix projecting onto the null space of hB\mathbf{h}_B (i.e., hBHA=0\mathbf{h}_B^H \mathbf{A} = \mathbf{0}).

Bob's received signal: yB=hBHv s+wBy_B = \mathbf{h}_B^H \mathbf{v}\,s + w_B β€” no AN contribution. Eve's received signal: yE=hEHv s+hEHA z+wEy_E = \mathbf{h}_E^H \mathbf{v}\,s + \mathbf{h}_E^H \mathbf{A}\,\mathbf{z} + w_E β€” AN adds to Eve's noise.

With z∼CN\mathbf{z} \sim \mathcal{CN} of power PzP_z: Eve's effective noise is hEHA z\mathbf{h}_E^H \mathbf{A}\,\mathbf{z} plus local noise.

The crucial property: AN leaks to Eve but not to Bob, because it lies in Bob's null space. Eve's SINR is reduced without affecting Bob's SINR. This enables secrecy even without knowing Eve's channel β€” the AN is a "blanket jammer" in the non-Bob directions.

,

Theorem: Artificial Noise Enables Secrecy Without Eve CSI

Under random Eve channel and an AN design with A\mathbf{A} in Bob's null space:

RsAN=log⁑2 ⁣(1+∣hBHv∣2Οƒ2)βˆ’EhE ⁣[log⁑2 ⁣(1+∣hEHv∣2βˆ₯hEHAβˆ₯2Pz+ΟƒE2)].R_s^{\text{AN}} = \log_2\!\left(1 + \frac{|\mathbf{h}_B^H \mathbf{v}|^2}{\sigma^2}\right) - \mathbb{E}_{\mathbf{h}_E}\!\left[\log_2\!\left(1 + \frac{|\mathbf{h}_E^H \mathbf{v}|^2}{\|\mathbf{h}_E^H \mathbf{A}\|^2 P_z + \sigma^2_{E}}\right)\right].

By choosing PzP_z appropriately, positive RsANR_s^{\text{AN}} is achievable on average over Eve's channel realization. This does not require knowing Eve's specific channel β€” only assuming she's a "generic eavesdropper."

With AN, Eve's effective noise is βˆ₯hEHAβˆ₯2Pz\|\mathbf{h}_E^H \mathbf{A}\|^2 P_z (a quadratic in Eve's channel through AN). For a random Eve direction, this is on average a large fraction of the AN power. Bob sees no AN. Hence Eve's SINR is degraded while Bob's is not.

RIS Amplifies AN Power Where It's Needed

Without a RIS, AN propagates as an ordinary wave β€” it fills space broadly. With a RIS, the AN can be focused away from Bob and amplified coherently in non-Bob directions:

  1. AN focusing: Ξ¦\boldsymbol{\Phi} configures a secondary beam for AN, orthogonal to Bob's beam. The coherent gain N2N^2 boosts AN power where Eve might be.
  2. Bob's null preserved: simultaneously, the primary beam (Bob's) retains its coherent N2N^2 gain. Two beams from one panel β€” achievable because the RIS has NN DoF.
  3. Effective jamming: Eve sees AN with N2N^2 power boost; Bob sees none. Secrecy rate grows accordingly.

The RIS-AN combination is a powerful physical-layer security primitive: it achieves secrecy without Eve CSI, resilient to her mobility, and scales favorably with NN.

RIS + Artificial Noise Joint Optimization

Complexity: Similar to AO for secrecy; ∼20\sim 20-4040 ms per update for N=128N = 128
Input: Bob's channel hB\mathbf{h}_B, power budget PtP_t, AN fraction Ξ±\alpha.
Output: (v,Ξ¦,A)(\mathbf{v}, \boldsymbol{\Phi}, \mathbf{A}).
1. Signal power split: Ps=(1βˆ’Ξ±)PtP_s = (1-\alpha) P_t for data, Pz=Ξ±PtP_z = \alpha P_t for AN.
2. Initialize Ξ¦(0)\boldsymbol{\Phi}^{(0)} matched to Bob.
3. Repeat t=0,1,…t = 0, 1, \ldots:
4. \quad Update Bob's effective channel hB(t)\mathbf{h}_B^{(t)}.
5. \quad Active update: v(t+1)=PshB/βˆ₯hBβˆ₯\mathbf{v}^{(t+1)} = \sqrt{P_s} \mathbf{h}_B / \|\mathbf{h}_B\| (matched filter).
6. \quad Compute A\mathbf{A}: orthonormal basis of null space of hB\mathbf{h}_B, scaled to Pz\sqrt{P_z}.
7. \quad Passive update: maximize E[secrecyΒ rate]\mathbb{E}[\text{secrecy rate}] over βˆ£Ο•n∣=1|\phi_n|=1. Use Ch. 6 methods.
8. \quad Check convergence.
9. return (v,Ξ¦,A)(\mathbf{v}, \boldsymbol{\Phi}, \mathbf{A}).

The algorithm does not require knowing Eve's channel. It optimizes for an average over Eve's uncertainty. Practical Ξ±\alpha (power allocation to AN): 0.30.3-0.50.5 is typical.

AN Power Tradeoff: Secrecy vs. Data Rate

Sweep the fraction Ξ±\alpha of power allocated to AN. Low Ξ±\alpha: high Bob rate, low jamming. High Ξ±\alpha: low Bob rate, high jamming. Optimal in the middle. RIS + AN gives a strictly better tradeoff than no-RIS AN.

Parameters
64
8
15

Example: RIS + AN Hybrid Secrecy Strategy

A RIS-aided secrecy system with N=128,Nt=4N = 128, N_t = 4. Eve's location is unknown (anywhere within 100 m). Power budget Pt=30P_t = 30 dBm. How to divide between data and AN?

Common Mistake: Don't Overlook the AN Rate Penalty

Mistake:

"AN is free β€” add it to all transmissions for security."

Correction:

AN uses transmit power that would otherwise serve the data signal. Bob's rate is reduced by ∼log⁑2(1βˆ’Ξ±)\sim \log_2(1 - \alpha) for AN fraction Ξ±\alpha (small at low Ξ±\alpha, substantial at high Ξ±\alpha). Use AN selectively: for security-critical transmissions, not for best-effort data. The AN vs. data tradeoff is an operational policy choice, not a one-size-fits-all.