Fig. 5From: RIS-enabled smart wireless environments: deployment scenarios, network architecture, bandwidth and area of influenceThe three core scenarios for RIS-empowered sustainability and secrecy discussed in Sect. 2.3. In all scenarios, thanks to the RIS(s), UE\(_2\) eavesdrops less (or is less exposed by) UE\(_1\) downlink data because UE\(_2\) is now on a location where propagation has been weakened artificiallyBack to article page