{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:04Z","timestamp":1740141784168,"version":"3.37.3"},"reference-count":23,"publisher":"SAGE Publications","issue":"7","license":[{"start":{"date-parts":[[2015,7,1]],"date-time":"2015-07-01T00:00:00Z","timestamp":1435708800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"National High-Tech Research and Development Program of China","award":["2014AA01A701","61271179","61101109"],"award-info":[{"award-number":["2014AA01A701","61271179","61101109"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2014AA01A701","61271179","61101109"],"award-info":[{"award-number":["2014AA01A701","61271179","61101109"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2014AA01A701","61271179","61101109"],"award-info":[{"award-number":["2014AA01A701","61271179","61101109"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,7,1]]},"abstract":"<jats:p> Information security has been received more and more attention for next-generation wireless sensor networks. In this paper, we consider the problem of resource management based on security satisfaction ratio with fairness-aware in two-way relay networks. Multiple source nodes exchange information with the help of relay node in the presence of an eavesdropper, and diverse security requirements are taken into account with coexistence of security users and normal users. The joint problem of power allocation, and subchannel pairing and allocation aims to maximize the security satisfaction ratio for legitimate users subject to limited power and subchannel constraints. We model the security resource management problem as a mixed integer programming problem, which is decomposed into three subproblems, distributed power allocation, distributed subchannel allocation, and distributed subchannel pairing, and then solved it in constraint particle swarm optimization (CPSO), binary CPSO (B_CPSO), and classic Hungarian algorithm (CHA) method, respectively. Moreover, a suboptimal subchannel pairing algorithm is proposed to reduce the computational complexity compared with the CHA. Simulations are conducted to evaluate the effectiveness of the proposed algorithms. <\/jats:p>","DOI":"10.1155\/2015\/819195","type":"journal-article","created":{"date-parts":[[2015,7,1]],"date-time":"2015-07-01T21:19:04Z","timestamp":1435785544000},"page":"819195","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":8,"title":["Resource Management Based on Security Satisfaction Ratio with Fairness-Aware in Two-Way Relay Networks"],"prefix":"10.1177","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4266-1734","authenticated-orcid":false,"given":"Jun","family":"Zhao","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of Network System Architecture and Convergence, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Zhaoming","family":"Lu","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Network System Architecture and Convergence, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Xiangming","family":"Wen","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Network System Architecture and Convergence, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Haijun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Network System Architecture and Convergence, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"},{"name":"Department of Electrical and Computer Engineering, The University of British Columbia, Vancouver, BC, Canada, V6T 1Z4"}]},{"given":"Shenghua","family":"He","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Network System Architecture and Convergence, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Wenpeng","family":"Jing","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Network System Architecture and Convergence, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]}],"member":"179","published-online":{"date-parts":[[2015,7,1]]},"reference":[{"journal-title":"IEEE Communications Magazine","year":"2014","author":"Zhang H.","key":"B1-2015-819195"},{"key":"B2-2015-819195","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2008.2009025"},{"key":"B3-2015-819195","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2009.2015951"},{"key":"B4-2015-819195","doi-asserted-by":"publisher","DOI":"10.1109\/beiac.2013.6560153"},{"key":"B5-2015-819195","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"B6-2015-819195","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2009.2027500"},{"key":"B7-2015-819195","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2013.2281711"},{"key":"B8-2015-819195","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2233473"},{"key":"B9-2015-819195","doi-asserted-by":"publisher","DOI":"10.1109\/acssc.2011.6190373"},{"key":"B10-2015-819195","doi-asserted-by":"publisher","DOI":"10.1109\/wcnc.2013.6555247"},{"key":"B11-2015-819195","doi-asserted-by":"publisher","DOI":"10.1109\/glocom.2011.6134383"},{"key":"B12-2015-819195","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2014.2328574"},{"key":"B13-2015-819195","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2005.35"},{"issue":"6","key":"B14-2015-819195","first-page":"605","volume":"15","author":"Abadi M.","year":"2008","journal-title":"Scientia Iranica"},{"key":"B15-2015-819195","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378899"},{"key":"B16-2015-819195","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.12.019"},{"first-page":"1942","volume-title":"Proceedings of the IEEE International Conference on Neural Networks (ICNN \u203295)","author":"Kennedy J.","key":"B17-2015-819195"},{"key":"B18-2015-819195","doi-asserted-by":"publisher","DOI":"10.1243\/09544062JMES1732"},{"key":"B19-2015-819195","doi-asserted-by":"publisher","DOI":"10.1109\/glocom.2012.6503683"},{"key":"B20-2015-819195","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2012.011712.110170"},{"key":"B21-2015-819195","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.071111.100199"},{"key":"B22-2015-819195","doi-asserted-by":"publisher","DOI":"10.1109\/wcnc.2013.6555098"},{"key":"B23-2015-819195","doi-asserted-by":"publisher","DOI":"10.1109\/vetecf.2008.80"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/819195","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/819195","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/819195","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,9]],"date-time":"2021-05-09T06:23:26Z","timestamp":1620541406000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/819195"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,1]]},"references-count":23,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2015,7,1]]}},"alternative-id":["10.1155\/2015\/819195"],"URL":"https:\/\/doi.org\/10.1155\/2015\/819195","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2015,7,1]]}}}