ICC 2020 - 2020 IEEE International Conference on Communications (ICC) 2020
DOI: 10.1109/icc40277.2020.9149178
|View full text |Cite
|
Sign up to set email alerts
|

A Low-Complexity Algorithm for Achieving Secrecy Capacity in MIMO Wiretap Channels

Abstract: We consider a secure transmission including a transmitter, a receiver and an eavesdropper, each being equipped with multiple antennas. The aim is to develop a low-complexity and scalable method to find a globally optimal solution to the problem of secrecy rate maximization under a total power constraint at the transmitter. In principle, the original formulation of the problem is nonconvex. However, it can be equivalently translated into finding a saddle point of a minimax convex-concave program. An existing ap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 12 publications
(25 reference statements)
0
10
0
Order By: Relevance
“…For Algorithm 2 we plot the objective f (Q n , X n ) in ( 4). We also plot the convergence of the outer loop of [11,Algorithm 2] for comparison. It is clearly seen that the proposed algorithms converge very fast and all algorithms converge to the same objective.…”
Section: Numerical Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…For Algorithm 2 we plot the objective f (Q n , X n ) in ( 4). We also plot the convergence of the outer loop of [11,Algorithm 2] for comparison. It is clearly seen that the proposed algorithms converge very fast and all algorithms converge to the same objective.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…Update Q n+1 according to (14) 5: end for 6: Output: X n We remark that the iterative method presented in [11] also aims to find the saddle-point of (4). However, it is a doubleloop algorithm where a lower bound of f (Q n , X) is used for the X-update.…”
Section: B Partial Best Response Methods For Solving (4)mentioning
confidence: 99%
See 2 more Smart Citations
“…where the step from ( 15) to ( 16) is done using Jensen's inequality. Solving for Q, based on [19], in (16) will result in a more "pessimistic" ergodic secrecy rate.…”
Section: Ergodic Secrecy Ratementioning
confidence: 99%