{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:56:30Z","timestamp":1760151390341,"version":"build-2065373602"},"reference-count":34,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T00:00:00Z","timestamp":1647820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The security issue of wireless communication is a common concern because of its broadcast nature, especially when the relay becomes an eavesdropper. In the orthogonal frequency division multiplexing (OFDM) relay system, when the relay is untrusted, the security of the system faces serious threats. Although there exist some resource allocation schemes in a single-carrier system with untrusted relaying, it is difficult to apply them to the multi-carrier system. Hence, a resource allocation scheme for the multi-carrier system is needed. Compared to the one-way relay system, a two-way relay system can improve the data transmission efficiency. In this paper, we consider joint secure resource allocation for a two-way cooperative OFDM system with an untrusted relay. The joint resource allocation problem of power allocation and subcarrier pairing is formulated to maximize the sum secrecy rate of the system under individual power constraints. To solve the non-convex problem efficiently, we propose an algorithm based on the alternative optimization method. The proposed algorithm is evaluated by simulation results and compared with the benchmarks in the literature. According to the numerical results, in a high signal-to-noise ratio (SNR) scenario, the proposed algorithm improves the achievable sum secrecy rate of the system by more than 15% over conventional algorithms.<\/jats:p>","DOI":"10.3390\/s22062398","type":"journal-article","created":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T21:48:42Z","timestamp":1647899322000},"page":"2398","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Joint Resource Allocation in Secure OFDM Two-Way Untrusted Relay System"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2343-7139","authenticated-orcid":false,"given":"Yifeng","family":"Jin","sequence":"first","affiliation":[{"name":"School of Electronics, Peking University, Beijing 100871, China"}]},{"given":"Xunan","family":"Li","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical Team Coordination Center of China, Beijing 100029, China"}]},{"given":"Guocheng","family":"Lv","sequence":"additional","affiliation":[{"name":"School of Electronics, Peking University, Beijing 100871, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1922-2968","authenticated-orcid":false,"given":"Meihui","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Electronics, Peking University, Beijing 100871, China"}]},{"given":"Ye","family":"Jin","sequence":"additional","affiliation":[{"name":"School of Electronics, Peking University, Beijing 100871, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,3,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Debbah, M. (2008, January 6\u20139). Mobile Flexible Networks: The Challenges Ahead. Proceedings of the 2008 International Conference on Advanced Technologies for Communications, Hanoi, Vietnam.","DOI":"10.1109\/ATC.2008.4760505"},{"key":"ref_2","unstructured":"Liang, Y., Poor, H.V., and Shamai, S. (2010). Information Theoretic Security, Now Foundations and Trends."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","article-title":"The Wire-Tap Channel","volume":"54","author":"Wyner","year":"1975","journal-title":"Bell Labs. Tech. J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"10019","DOI":"10.1109\/TVT.2020.3004889","article-title":"Joint Power Allocation and Beamforming for Overlaid Secrecy Transmissions in MIMO-OFDM Channels","volume":"69","author":"Yuan","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1698","DOI":"10.1109\/TCOMM.2019.2960345","article-title":"Secrecy-Enhancing Design for Cooperative Downlink and Uplink NOMA With an Untrusted Relay","volume":"68","author":"Lv","year":"2020","journal-title":"IEEE Trans. Commun."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"5719","DOI":"10.1109\/TWC.2019.2938757","article-title":"Physical Layer Security in Millimeter Wave DF Relay Systems","volume":"18","author":"Ju","year":"2019","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s11276-016-1318-8","article-title":"SNR based secure communication via untrusted amplify-and-forward relay nodes using artificial noise","volume":"24","author":"Sarma","year":"2016","journal-title":"Wirel. Netw."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"6286","DOI":"10.1109\/TVT.2018.2817216","article-title":"Joint Resource Allocation for OFDM-Based Cognitive Two-Way Multiple AF Relays Networks with Imperfect Spectrum Sensing","volume":"67","author":"Li","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"11248","DOI":"10.1109\/TVT.2018.2865781","article-title":"Optimizing Wireless Powered Two-Way Communication System with EH Relays and Non-EH Relays","volume":"67","author":"Jia","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"6682","DOI":"10.1109\/TCOMM.2019.2927210","article-title":"Optimum Design of Energy Harvesting Relay for Two-Way Decode-and-Forward Relay Networks Under Max\u2013Min and Max-Sum Criterions","volume":"67","author":"Ju","year":"2019","journal-title":"IEEE Trans. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1714","DOI":"10.1109\/TII.2015.2489610","article-title":"Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming","volume":"12","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1109\/LCOMM.2017.2655050","article-title":"Secure full-duplex two-way relaying networks with optimal relay selection","volume":"21","author":"Zhong","year":"2017","journal-title":"IEEE Commun. Lett."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"3693","DOI":"10.1109\/TVT.2012.2209692","article-title":"Physical Layer Security for Two-Way Untrusted Relaying with Friendly Jammers","volume":"61","author":"Zhang","year":"2012","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"50950","DOI":"10.1109\/ACCESS.2018.2868500","article-title":"Cooperative Interference and Power Allocation in a Bidirectional Untrusted Relay Network with Channel Estimation Errors","volume":"6","author":"Gong","year":"2018","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1861","DOI":"10.1109\/TCOMM.2016.2538221","article-title":"Secure Green Communication via Untrusted Two-Way Relaying: A Physical Layer Approach","volume":"64","author":"Wang","year":"2016","journal-title":"IEEE Trans. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2464","DOI":"10.1109\/TIFS.2018.2819132","article-title":"Joint Beamforming Alignment with Suboptimal Power Allocation for a Two-Way Untrusted Relay Network","volume":"13","author":"Mekkawy","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2671","DOI":"10.1109\/TCOMM.2018.2802951","article-title":"Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks with an External Jammer","volume":"66","author":"Kuhestani","year":"2018","journal-title":"IEEE Trans. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"11979","DOI":"10.1109\/TVT.2018.2877718","article-title":"Secure Relay Selection for Two Way Amplify-and-Forward Untrusted Relaying Networks","volume":"67","author":"Mekkawy","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"3775","DOI":"10.1109\/TIFS.2020.3001733","article-title":"Secure Beamforming for Full-Duplex MIMO Two-Way Untrusted Relay Systems","volume":"15","author":"Zhao","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"4189","DOI":"10.1109\/TII.2019.2898174","article-title":"Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics","volume":"15","author":"Sangaiah","year":"2019","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Sangaiah, A.K., Hosseinabadi, A.A.R., Shareh, M.B., Bozorgi Rad, S.Y., Zolfagharian, A., and Chilamkurti, N. (2020). IoT Resource Allocation and Optimization Based on Heuristic Algorithm. Sensors, 20.","DOI":"10.3390\/s20020539"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/WCL.2012.011712.110170","article-title":"Resource Allocation with Subcarrier Pairing in OFDMA Two-Way Relay Networks","volume":"1","author":"Zhang","year":"2012","journal-title":"IEEE Commun. Lett."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"10728","DOI":"10.1109\/TVT.2019.2937575","article-title":"Generalized Benders Decomposition to Secure Energy-Efficient Resource Allocation for Multiuser Full-Duplex Relay Cooperative Networks","volume":"68","author":"Li","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"156818","DOI":"10.1109\/ACCESS.2021.3130067","article-title":"Secure Resource Allocation for Cooperative OFDMA System With Untrusted AF Relaying","volume":"9","author":"Jin","year":"2021","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1332","DOI":"10.1109\/TVT.2021.3051501","article-title":"Optimal Power Allocation for Superposed Secrecy Transmission in Multicarrier Systems","volume":"70","author":"Yuan","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"4874","DOI":"10.1109\/TCOMM.2013.111513.120888","article-title":"Link Adaptation with Untrusted Relay Assignment: Design and Performance Analysis","volume":"61","author":"Khodakarami","year":"2013","journal-title":"IEEE Trans. Commun."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2735","DOI":"10.1109\/TIT.2008.921680","article-title":"The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming","volume":"54","author":"Tekin","year":"2008","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1398","DOI":"10.1109\/LCOMM.2015.2444403","article-title":"Resource Allocation for Device-to-Device Communication Underlaying Cellular Networks: An Alternating Optimization Method","volume":"19","author":"Zhao","year":"2015","journal-title":"IEEE Commun. Lett."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1109\/LCOMM.2019.2958694","article-title":"Alternating Optimization Based Low Complexity Hybrid Precoding in Millimeter Wave MIMO Systems","volume":"24","author":"Huang","year":"2020","journal-title":"IEEE Commun. Lett."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1109\/TWC.2018.2880436","article-title":"Revisiting the MIMO Capacity With Per-Antenna Power Constraint: Fixed-Point Iteration and Alternating Optimization","volume":"18","author":"Pham","year":"2019","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_31","unstructured":"Boyd, S., and Mutapcic, A. (2003). Subgradient Methods. Notes for EE364, Standford University."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Boyd, S., and Vandenberghe, L. (2004). Convex Optimization, Cambridge University Press.","DOI":"10.1017\/CBO9780511804441"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1002\/nav.20053","article-title":"The Hungarian method for the assignment problem","volume":"52","author":"Kuhn","year":"1955","journal-title":"Nav. Res. Logist."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3255","DOI":"10.1109\/TIFS.2020.2985548","article-title":"Design and Performance Analysis of Channel Estimators Under Pilot Spoofing Attacks in Multiple-Antenna Systems","volume":"15","author":"Darsena","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/6\/2398\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:40:03Z","timestamp":1760136003000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/6\/2398"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,21]]},"references-count":34,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2022,3]]}},"alternative-id":["s22062398"],"URL":"https:\/\/doi.org\/10.3390\/s22062398","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2022,3,21]]}}}