{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T19:32:13Z","timestamp":1773775933819,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,7,18]],"date-time":"2013-07-18T00:00:00Z","timestamp":1374105600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2013,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>In this paper, a joint subcarrier and power allocation algorithm is proposed to improve the physical layer security in cooperative orthogonal frequency division multiple access (OFDMA) networks, where several source-destination pairs and one untrusted relay are involved. The relay is friendly and intends to help these pairs to enhance their communications. However, it may be overheard by a malicious eavesdropper at the same time. To optimize the joint subcarrier and power allocation with low complexity, we divide the optimization problem into two simpler subproblems. Firstly, the subcarriers are assigned to the source-destination pairs by employing the dual approach under the assumption that the relay power is equally allocated to all the subcarriers. Then, the relay power is allocated to the subcarriers based on the alternative ascending clock auction mechanism. In addition, we prove that the two subproblems can converge after a finite number of iterations. We also find that the proposed auction is cheat-proof and, thus, can avoid the cheating behaviors in the auction process. Numerical results demonstrate that our proposed algorithm can effectively improve the system sum secrecy rate, and the convergence performance is also desirable.<\/jats:p>","DOI":"10.1186\/1687-1499-2013-193","type":"journal-article","created":{"date-parts":[[2013,7,18]],"date-time":"2013-07-18T06:14:31Z","timestamp":1374128071000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Joint subcarrier and power allocation for physical layer security in cooperative OFDMA networks"],"prefix":"10.1186","volume":"2013","author":[{"given":"An","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yueming","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Chunxiao","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Wendong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yunpeng","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,18]]},"reference":[{"issue":"8","key":"761_CR1","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"Wyner AD: The wire-tap channel. Bell Syst. Tech. J 1975, 54(8):1355-1387. 10.1002\/j.1538-7305.1975.tb02040.x","journal-title":"Bell Syst. Tech. J"},{"key":"761_CR2","doi-asserted-by":"crossref","unstructured":"Dong L, Yousefi\u2019 zadeh H, Jafarkhani H: Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper. Paper presented at the IEEE ICC,. Kyoto, Japan, 5\u20139 June 2011","DOI":"10.1109\/icc.2011.5963094"},{"issue":"2","key":"761_CR3","first-page":"71","volume":"19","author":"N R-Zurita","year":"2012","unstructured":"R-Zurita N, Ghogho M, McLernon D: Outage probability based power distribution between data artificial noise for physical layer security. IEEE Signal Process. Lett 2012, 19(2):71-74.","journal-title":"Lett"},{"issue":"11","key":"761_CR4","first-page":"445","volume":"2009","author":"Z Han","year":"2009","unstructured":"Han Z, Marina N, Debbah M, Hjotrungnes A: Physical layer security game: interaction between source, eavesdropper, and friendly jammer. EURASIP J. Wireless Commun. and Netw.-Special Issue on Wireless Phys. Layer Security 2009, 2009(11):445-453.","journal-title":"EURASIP J. Wireless Commun. and Netw.-Special Issue on Wireless Phys. Layer Security"},{"issue":"8","key":"761_CR5","doi-asserted-by":"publisher","first-page":"3693","DOI":"10.1109\/TVT.2012.2209692","volume":"61","author":"R Zhang","year":"2012","unstructured":"Zhang R, Song L, Han Z, Jiao B: Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Trans. Veh. Technol 2012, 61(8):3693-3704.","journal-title":"IEEE Trans. Veh. Technol"},{"key":"761_CR6","doi-asserted-by":"crossref","unstructured":"Saad W, Han Z, Basar T, Hjorungnes A: Physical layer security: coalitional games for distributed cooperation. Paper presented at the seventh international symposium on modeling and optimization in mobile, ad hoc, and wireless networks,. Seoul, South Korea, 23\u201327 June 2009","DOI":"10.1109\/WIOPT.2009.5291619"},{"key":"761_CR7","unstructured":"Zhang R, Song L, Han Z, Jiao B: Improve physical layer security in cooperative wireless network using distributed auction games. Paper presented at the IEEE INFOCOM WKSHPS, Shanghai,. China, 15 April 2011"},{"issue":"3","key":"761_CR8","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1109\/TIFS.2011.2159206","volume":"6","author":"X Wang","year":"2011","unstructured":"Wang X, Tao M, Mo J, Xu Y: Power and subcarrier allocation for physical-layer security in of DMA-based broadband wireless networks. IEEE T. Inf. Foren. Sec 2011, 6(3):693-702.","journal-title":"IEEE T. Inf. Foren. Sec"},{"key":"761_CR9","volume-title":"Game Theory, 3rd edition","author":"G Owen","year":"2001","unstructured":"Owen G: Game Theory, 3rd edition. Salt Lake City: Academic; 2001."},{"issue":"7","key":"761_CR10","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1109\/JSAC.2008.080919","volume":"26","author":"J Huang","year":"2008","unstructured":"Huang J, Han Z, Chiang HV: Poor, Auction-based resource allocation for cooperative communications. IEEE J. Select. Areas Commun 2008, 26(7):1226-1237.","journal-title":"IEEE J. Select. Areas Commun"},{"issue":"3","key":"761_CR11","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1002\/app.22486","volume":"11","author":"J Huang","year":"2006","unstructured":"Huang J, Berry RA, Honig ML: Auction-based spectrum sharing. ACM Mobile Netw. Appl. J 2006, 11(3):405-418.","journal-title":"Appl. J"},{"key":"761_CR12","volume-title":"Auction Theory, 2nd edition","author":"V Krishna","year":"2009","unstructured":"Krishna V: Auction Theory, 2nd edition. Salt Lake City: Academic Press; 2009."},{"issue":"8","key":"761_CR13","doi-asserted-by":"publisher","first-page":"3807","DOI":"10.1109\/TIT.2010.2050958","volume":"56","author":"X He","year":"2010","unstructured":"He X, Yener A: Cooperation with an untrusted relay: A secrecy perspective. IEEE Trans. Inf. Theory 2010, 56(8):3807-3827.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"761_CR14","unstructured":"Yener A, He X: Two-hop secure communication using an untrusted relay: A case for cooperative jamming. Paper presented at the IEEE GLOBECOM, New Orleans, LO,. 30 November\u20134 December 2008"},{"key":"761_CR15","doi-asserted-by":"crossref","unstructured":"Zhang R, Song L, Han Z, Jiao B, Debbah M: Physical layer security for two way relay communications with friendly jammers. Paper presented at IEEE GLOBECOM, Miami,. FL, 6\u201310 December 2010","DOI":"10.1109\/GLOCOM.2010.5683465"},{"issue":"7","key":"761_CR16","doi-asserted-by":"publisher","first-page":"2625","DOI":"10.1109\/TIT.2005.850045","volume":"51","author":"CW Sung","year":"2005","unstructured":"Sung CW, Leung KK: A generalized framework for distributed power control in wireless networks. IEEE Trans. Inf. Theory 2005, 51(7):2625-2635. 10.1109\/TIT.2005.850045","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"761_CR17","doi-asserted-by":"publisher","first-page":"1310","DOI":"10.1109\/TCOMM.2006.877962","volume":"54","author":"W W Yu","year":"2006","unstructured":"W Yu W, Lui R: Dual methods for nonconvex spectrum optimization of multicarrier systems. IEEE Trans. Commun 2006, 54(7):1310-1322.","journal-title":"IEEE Trans. Commun"},{"key":"761_CR18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441","volume-title":"Convex Optimization","author":"S Boyd","year":"2004","unstructured":"Boyd S, Vandenberghe L: Convex Optimization. London: Cambridge University Press; 2004."},{"key":"761_CR19","volume-title":"Integer Programming","author":"L Wolsey","year":"1998","unstructured":"Wolsey L: Integer Programming. San Francisco: Wiley-Interscience Publication; 1998."},{"key":"761_CR20","first-page":"1470","volume":"3","author":"P Marbach","year":"2002","unstructured":"Marbach P, Berry R: Downlink resource allocation and pricing for wireless networks. IEEE INFOCOM 2002, 3: 1470-1479.","journal-title":"IEEE INFOCOM"},{"issue":"5","key":"761_CR21","doi-asserted-by":"publisher","first-page":"1452","DOI":"10.1257\/0002828043052330","volume":"94","author":"LM Ausubel","year":"2004","unstructured":"Ausubel LM: An efficient ascending-bid auction for multiple objects. Am. Eco. Rev 2004, 94(5):1452-1475. 10.1257\/0002828043052330","journal-title":"Am. Eco. Rev"},{"issue":"4","key":"761_CR22","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1109\/LCOMM.2010.04.092315","volume":"14","author":"D Zhang","year":"2010","unstructured":"Zhang D, Wang Y, Lu J, Qos aware relay selection and subcarrier allocation in cooperative OFDMA systems: IEEE Commun. Lett. 2010, 14(4):294-296.","journal-title":"IEEE Commun. Lett"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-193.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2013-193\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-193.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T00:52:36Z","timestamp":1630543956000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2013-193"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,18]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["761"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2013-193","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,18]]},"assertion":[{"value":"4 December 2012","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2013","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2013","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"193"}}