A minorization-maximization algorithm for an-based mimome secrecy rate maximization

Mudassir Masood, Ali Ghrayeb, Prabhu Babu, Issa Khalil, Mazen Hasna

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

We consider the problem of secrecy rate maximization in a multi-input multi-output multi-eavesdropper (MIMOME) wiretap channel and present an exact solution. A general system model with a multi-antenna eavesdropper and a multi-antenna full-duplex receiver is considered. In particular, we perform joint beamforming and artificial noise optimization in an effort to maximize the achievable secrecy rate. The optimization is performed in the presence of artificial noise generated by both transmitter and legitimate receiver. The resulting optimization problem is non-convex and difficult to solve. We develop a minorization-maximization algorithm to solve the problem. It is iterative in nature and guaranteed to converge to a locally optimal solution. The results can therefore be used to benchmark existing methods. Numerical results are presented to demonstrate the efficacy of the proposed approach.

Original languageEnglish
Title of host publication2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages975-980
Number of pages6
ISBN (Electronic)9781509045457
DOIs
Publication statusPublished - 19 Apr 2017
Event2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016 - Washington, United States
Duration: 7 Dec 20169 Dec 2016

Publication series

Name2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016 - Proceedings

Conference

Conference2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016
Country/TerritoryUnited States
CityWashington
Period7/12/169/12/16

Fingerprint

Dive into the research topics of 'A minorization-maximization algorithm for an-based mimome secrecy rate maximization'. Together they form a unique fingerprint.

Cite this