{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:11:05Z","timestamp":1753884665109,"version":"3.41.2"},"reference-count":37,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,7,11]],"date-time":"2018-07-11T00:00:00Z","timestamp":1531267200000},"content-version":"vor","delay-in-days":191,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012326","name":"International Science and Technology Cooperation Programme","doi-asserted-by":"publisher","award":["2015DFG12580"],"award-info":[{"award-number":["2015DFG12580"]}],"id":[{"id":"10.13039\/501100012326","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771291","61571272"],"award-info":[{"award-number":["61771291","61571272"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009108","name":"Shandong University","doi-asserted-by":"publisher","award":["2016JC010"],"award-info":[{"award-number":["2016JC010"]}],"id":[{"id":"10.13039\/100009108","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>We investigate a secure multiuser time division multiple access (TDMA) system with statistical delay quality of service (QoS) guarantee in terms of secure effective capacity. An optimal resource allocation policy is proposed to minimize the<jats:italic>\u03b2<\/jats:italic>\u2010fair cost function of the average user power under the individual QoS constraint, which also balances the energy efficiency and fairness among the users. First, convex optimization problems associated with the resource allocation policy are formulated. Then, a subgradient iteration algorithm based on the Lagrangian duality theory and the dual decomposition theory is employed to approach the global optimal solutions. Furthermore, considering the practical channel conditions, we develop a stochastic subgradient iteration algorithm which is capable of dynamically learning the intended wireless channels and acquiring the global optimal solution. It is shown that the proposed optimal resource allocation policy depends on the delay QoS requirement and the channel conditions. The optimal policy can save more power and achieve the balance of the energy efficiency and the fairness compared with the other resource allocation policies.<\/jats:p>","DOI":"10.1155\/2018\/1489659","type":"journal-article","created":{"date-parts":[[2018,7,11]],"date-time":"2018-07-11T23:31:16Z","timestamp":1531351876000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fair Resource Allocation with QoS Guarantee in Secure Multiuser TDMA Networks"],"prefix":"10.1155","volume":"2018","author":[{"given":"Zhiquan","family":"Bai","sequence":"first","affiliation":[]},{"given":"Tongtong","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7250-6145","authenticated-orcid":false,"given":"Piming","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yanbo","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9559-4352","authenticated-orcid":false,"given":"Kyungsup","family":"Kwak","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,7,11]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2048445"},{"key":"e_1_2_10_6_2","doi-asserted-by":"crossref","unstructured":"GuanX. CaiY. WangY. andYangW. Increasing secrecy capacity via joint design of cooperative beamforming and jamming Proceedings of the IEEE 22nd International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC \u203211) September 2011 Toronto Canada 1279\u20131283 https:\/\/doi.org\/10.1109\/PIMRC.2011.6139705.","DOI":"10.1109\/PIMRC.2011.6139705"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2285244"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2336092"},{"key":"e_1_2_10_9_2","doi-asserted-by":"crossref","unstructured":"JorswieckE. A.andWolfA. Resource allocation for the wire-tap multi-carrier broadcast channel Proceedings of the International Conference on Telecommunications June 2008 1\u20136 https:\/\/doi.org\/10.1109\/ICTEL.2008.4652697.","DOI":"10.1109\/ICTEL.2008.4652697"},{"key":"e_1_2_10_10_2","unstructured":"LiZ. YatesR. andTrappeW. Secrecy capacity of independent parallel channels Proceedings of the 44th Annual Allerton Conference on Communication Control and Computing September 2006 841\u2013848."},{"key":"e_1_2_10_11_2","doi-asserted-by":"crossref","unstructured":"WangX. TaoM. MoJ. andXuY. Power and subcarrier allocation for physical-layer security in ofdma networks Proceedings of the IEEE International Conference on Communications (ICC \u203211) June 2011 Kyoto Japan 1\u20135 https:\/\/doi.org\/10.1109\/icc.2011.5963493.","DOI":"10.1109\/icc.2011.5963493"},{"key":"e_1_2_10_12_2","doi-asserted-by":"crossref","unstructured":"QinH. ChenX. ZhongX. HeF. ZhaoM. andWangJ. Joint power allocation and artificial noise design for multiuser wiretap OFDM channels Proceedings of the IEEE International Conference on Communications (ICC \u203213) June 2013 Budapest Hungary 786\u2013791.","DOI":"10.1109\/ICC.2013.6654853"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2379652"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2161295"},{"key":"e_1_2_10_15_2","doi-asserted-by":"crossref","unstructured":"ChenJ. ChenX. LiuT. andLeiL. Energy-efficient power allocation for secure communications in large-scale MIMO relaying systems Proceedings of the IEEE\/CIC International Conference on Communications in China (ICCC \u203214) October 2014 385\u2013390 2-s2.0-84922569391.","DOI":"10.1109\/ICCChina.2014.7008307"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2015.2407355"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.010214.130929"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2370949"},{"key":"e_1_2_10_19_2","doi-asserted-by":"crossref","unstructured":"WangT. SongL. HanZ. ChengX. andJiaoB. Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks Proceedings of the IEEE International Conference on Communications (ICC \u203212) June 2012 1683\u20131687 https:\/\/doi.org\/10.1109\/ICC.2012.6364491 2-s2.0-84871978301.","DOI":"10.1109\/ICC.2012.6364491"},{"key":"e_1_2_10_20_2","doi-asserted-by":"crossref","unstructured":"ZhangH. WangT. SongL. andHanZ. Radio resource allocation for physical-layer security in D2D underlay communications Proceedings of the 1st IEEE International Conference on Communications (ICC \u203214) June 2014 2319\u20132324 2-s2.0-84907003865.","DOI":"10.1109\/ICC.2014.6883669"},{"key":"e_1_2_10_21_2","doi-asserted-by":"crossref","unstructured":"ChitiF. GiacomoD. D. FantacciR. andPierucciL. Interference aware approach for D2D communications Proceedings of the IEEE International Conference on Communications (ICC \u203216) June 2016 1\u20136.","DOI":"10.1109\/ICC.2016.7511461"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.002"},{"key":"e_1_2_10_23_2","unstructured":"WuD. Providing quality-of-service guarantees in wireless networks [Ph.D. dissertation] 2003 Carnegie Mellon University."},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2003.814353"},{"key":"e_1_2_10_25_2","doi-asserted-by":"crossref","unstructured":"WangT. MaP. andMaY. Adaptive power allocation with quality-of-service guarantees in secure wireless communications Proceedings of the 9th International Conference on Communications and Networking in China (CHINACOM \u203214) August 2014 Maoming China 508\u2013512 https:\/\/doi.org\/10.1109\/CHINACOM.2014.7054348.","DOI":"10.1109\/CHINACOM.2014.7054348"},{"key":"e_1_2_10_26_2","first-page":"144","article-title":"Security in cognitive radio networks","author":"Pei Q.","year":"2013","journal-title":"Journal of Communication"},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100911"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"volume-title":"Nonlinear Programming","year":"1999","author":"Bertsekas D. P.","key":"e_1_2_10_29_2"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.879350"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2006.887322"},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928990"},{"volume-title":"Stochastic Programming","year":"1994","author":"Kall P.","key":"e_1_2_10_34_2"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.2140\/pjm.1976.62.173"},{"volume-title":"Adaptive Signal Processing Algorithms: Stability and Performance","year":"1995","author":"Solo V.","key":"e_1_2_10_36_2"},{"key":"e_1_2_10_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2145770"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/1489659.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/1489659.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/1489659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T18:53:44Z","timestamp":1751741624000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/1489659"}},"subtitle":[],"editor":[{"given":"Giuseppe","family":"Piro","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/1489659"],"URL":"https:\/\/doi.org\/10.1155\/2018\/1489659","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-01-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-06-11","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-07-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"1489659"}}