2023
DOI: 10.48550/arxiv.2303.08505
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

RIS-Enabled Smart Wireless Environments: Deployment Scenarios, Network Architecture, Bandwidth and Area of Influence

Abstract: Reconfigurable Intelligent Surfaces (RISs) constitute the key enabler for programmable electromagnetic propagation environments, and are lately being considered as a candidate physical-layer technology for the demanding connectivity, reliability, localization, and sustainability requirements of next generation wireless networks. In this paper, we first present the deployment scenarios for RISenabled smart wireless environments that have been recently designed within the ongoing European Union Horizon 2020 RISE… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 53 publications
1
1
0
Order By: Relevance
“…To investigate the worst-case RIS-enabled eavesdropping scenario for the legitimate system, we assume that the malicious RIS is located close to Eve and in the line-of-sight (LOS) from the legitimate BS. The former assumption facilitates the control of the malicious RIS by Eve, while being consistent with the latest RIS placement guidelines for its maximum expected performance [26], [27]. The latter assumption eases Eve's eavesdropping capability, since the channel between the malicious RIS and the legitimate BS can be easier estimated by Eve (e.g., by knowing the positions of the involved nodes).…”
Section: A Proposed Threat Model and Pls Operationsupporting
confidence: 53%
See 1 more Smart Citation
“…To investigate the worst-case RIS-enabled eavesdropping scenario for the legitimate system, we assume that the malicious RIS is located close to Eve and in the line-of-sight (LOS) from the legitimate BS. The former assumption facilitates the control of the malicious RIS by Eve, while being consistent with the latest RIS placement guidelines for its maximum expected performance [26], [27]. The latter assumption eases Eve's eavesdropping capability, since the channel between the malicious RIS and the legitimate BS can be easier estimated by Eve (e.g., by knowing the positions of the involved nodes).…”
Section: A Proposed Threat Model and Pls Operationsupporting
confidence: 53%
“…Finally, (60) is deduced from the fact that Tr(Q N d ) = N d and the replacement of vec(U κ ). By applying the eigenvalue decomposition F T ⊗ E = Q QH (as in the Corollary's statement) in the Kronecker product inside the expression for vec(U κ ), it can be readily verified after some algebraic manipulations that κ is derived as described in (27); the proof is, thus, complete.…”
Section: Appendix B Proof Of Corollarymentioning
confidence: 91%