{"id":"https://openalex.org/W4415748092","doi":"https://doi.org/10.1109/jiot.2025.3627789","title":"Secure and Covert Communication in Energy Harvesting Relay IoT Networks: Impacts of Hardware Impairments","display_name":"Secure and Covert Communication in Energy Harvesting Relay IoT Networks: Impacts of Hardware Impairments","publication_year":2025,"publication_date":"2025-10-31","ids":{"openalex":"https://openalex.org/W4415748092","doi":"https://doi.org/10.1109/jiot.2025.3627789"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3627789","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3627789","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120208074","display_name":"Reza Aghaei","orcid":"https://orcid.org/0009-0007-6557-416X"},"institutions":[{"id":"https://openalex.org/I4210125640","display_name":"Amol University of Special Modern Technologies","ror":"https://ror.org/02twggb97","country_code":"IR","type":"education","lineage":["https://openalex.org/I4210125640"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Reza Aghaei","raw_affiliation_strings":["Faculty of Engineering Technology, Amol University of Special Modern Technologies, Amol, Iran"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering Technology, Amol University of Special Modern Technologies, Amol, Iran","institution_ids":["https://openalex.org/I4210125640"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5120208075","display_name":"Moslem Forouzesh","orcid":"https://orcid.org/0009-0007-7456-0552"},"institutions":[{"id":"https://openalex.org/I4210125640","display_name":"Amol University of Special Modern Technologies","ror":"https://ror.org/02twggb97","country_code":"IR","type":"education","lineage":["https://openalex.org/I4210125640"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Moslem Forouzesh","raw_affiliation_strings":["Faculty of Engineering Technology, Amol University of Special Modern Technologies, Amol, Iran"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering Technology, Amol University of Special Modern Technologies, Amol, Iran","institution_ids":["https://openalex.org/I4210125640"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5120208074"],"corresponding_institution_ids":["https://openalex.org/I4210125640"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31728745,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"1","first_page":"1152","last_page":"1168"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.916100025177002,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.916100025177002,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.035599999129772186,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.011800000444054604,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.8046000003814697},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.7005000114440918},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.6794000267982483},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.6757000088691711},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6284000277519226},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.5149999856948853},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5052000284194946},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.5029000043869019},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4456000030040741}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8090999722480774},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.8046000003814697},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.7005000114440918},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.6794000267982483},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.6757000088691711},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6284000277519226},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6121000051498413},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.5149999856948853},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5052000284194946},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.5029000043869019},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4456000030040741},{"id":"https://openalex.org/C101518730","wikidata":"https://www.wikidata.org/wiki/Q930236","display_name":"Energy harvesting","level":3,"score":0.42640000581741333},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.4075999855995178},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.39399999380111694},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3846000134944916},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.36719998717308044},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.35010001063346863},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.32989999651908875},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.32760000228881836},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.32170000672340393},{"id":"https://openalex.org/C65422117","wikidata":"https://www.wikidata.org/wiki/Q358527","display_name":"Transmitter power output","level":4,"score":0.30300000309944153},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.30300000309944153},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.301800012588501},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.27810001373291016},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.27230000495910645},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.266400009393692},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.2628999948501587},{"id":"https://openalex.org/C46257984","wikidata":"https://www.wikidata.org/wiki/Q7310895","display_name":"Relay channel","level":4,"score":0.25609999895095825},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.2551000118255615}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3627789","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3627789","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W1676355938","https://openalex.org/W2055350048","https://openalex.org/W2096293234","https://openalex.org/W2098346479","https://openalex.org/W2105269883","https://openalex.org/W2120073444","https://openalex.org/W2142238976","https://openalex.org/W2320703891","https://openalex.org/W2339094490","https://openalex.org/W2344182745","https://openalex.org/W2506174538","https://openalex.org/W2593419552","https://openalex.org/W2897986532","https://openalex.org/W2963125781","https://openalex.org/W2963728200","https://openalex.org/W2963874728","https://openalex.org/W3009494512","https://openalex.org/W3028777793","https://openalex.org/W3035904061","https://openalex.org/W3095693198","https://openalex.org/W3105644655","https://openalex.org/W3119223610","https://openalex.org/W3119936166","https://openalex.org/W3158646292","https://openalex.org/W3168211341","https://openalex.org/W3210730248","https://openalex.org/W4205566404","https://openalex.org/W4213191624","https://openalex.org/W4250589301","https://openalex.org/W4254549731","https://openalex.org/W4289655257","https://openalex.org/W4290715054","https://openalex.org/W4309995309","https://openalex.org/W4319990028","https://openalex.org/W4362500847","https://openalex.org/W4382935531","https://openalex.org/W4387976186","https://openalex.org/W4389692423","https://openalex.org/W4392152348","https://openalex.org/W4399527354","https://openalex.org/W4399881861","https://openalex.org/W4402629287","https://openalex.org/W4402673610","https://openalex.org/W4402835268","https://openalex.org/W4403390189","https://openalex.org/W4404317193","https://openalex.org/W4408564554","https://openalex.org/W4408709277","https://openalex.org/W4409761113","https://openalex.org/W4411600838"],"related_works":[],"abstract_inverted_index":{"In":[0,52,69,154],"the":[1,24,35,53,56,61,64,72,80,89,97,100,120,131,144,151,155,160,173,176,218,248,260,278],"context":[2],"of":[3,26,37,66,99,108,262,280],"Internet-of-Things":[4],"(IoT)":[5],"applications,":[6],"ensuring":[7],"secure":[8,254],"and":[9,49,82,157,167,191,255,265],"covert":[10,50,200,256,281],"wireless":[11],"communication":[12,39,145,195,201,210,282],"remains":[13],"a":[14,30,127,164,180,266],"critical":[15],"challenge,":[16],"especially":[17],"when":[18,183,274],"using":[19],"energy":[20],"harvesting":[21],"relays.":[22],"Moreover,":[23,269],"analysis":[25],"hardware":[27,67,263],"impairments":[28,264],"is":[29,58,103,139,162,170,215,271,283],"pivotal":[31],"practical":[32],"aspect":[33],"in":[34,63,93,119,211,235,259],"evaluation":[36],"IoT":[38],"networks.":[40],"This":[41,197],"paper":[42],"investigates":[43],"four":[44],"scenarios":[45,214],"to":[46,84,106,123,133,142,193,203],"address":[47],"security":[48,62,110],"communication.":[51],"first":[54],"scenario,":[55,95,122],"focus":[57],"on":[59],"guaranteeing":[60],"presence":[65,261],"impairments.":[68],"this":[70,94,125],"case,":[71],"external":[73,177],"jammer":[74,178],"transmits":[75],"interference":[76,185],"signals":[77,136,186],"toward":[78,188],"both":[79],"relay":[81,102,161],"Bob":[83],"prevent":[85],"information":[86,148],"leakage":[87,149],"from":[88,150,206],"untrusted":[90,101,152],"relay.":[91,153],"However,":[92],"since":[96],"state":[98],"always":[104],"superior":[105],"that":[107,247,273],"Bob,":[109,189],"cannot":[111],"be":[112],"guaranteed":[113],"under":[114,217],"any":[115],"network":[116],"parameters.":[117],"Accordingly,":[118],"second":[121],"tackle":[124],"problem,":[126],"receiver":[128],"equipped":[129],"with":[130,241],"capability":[132],"transmit":[134],"jamming":[135],"(receiver":[137],"jammer)":[138],"proposed,":[140],"aiming":[141],"protect":[143],"against":[146],"potential":[147],"third":[156],"fourth":[158],"scenarios,":[159],"considered":[163],"trusted":[165],"node,":[166],"warden":[168],"(Willie)":[169],"introduced":[171],"into":[172],"system.":[174],"Here,":[175],"plays":[179],"crucial":[181],"role":[182],"transmitting":[184],"simultaneously":[187],"relay,":[190],"Willie":[192,224,232,275],"ensure":[194],"security.":[196],"scenario":[198],"incorporates":[199],"designed":[202],"counter":[204],"threats":[205],"Willie\u2019s":[207],"detection.":[208],"Covert":[209],"these":[212],"two":[213,220],"analyzed":[216],"following":[219],"conditions:":[221],"1)":[222],"When":[223,231],"has":[225,276],"Channel":[226],"State":[227],"Information":[228],"(CSI);":[229],"2)":[230],"lacks":[233],"CSI,":[234,277],"which":[236],"case":[237],"he":[238],"equips":[239],"himself":[240],"multiple":[242],"antennas.":[243],"Simulation":[244],"results":[245],"show":[246],"proposed":[249],"power":[250],"allocation":[251],"can":[252],"enhance":[253],"communications,":[257],"even":[258],"multi-antenna":[267],"Willie.":[268],"it":[270],"shown":[272],"performance":[279],"severely":[284],"reduced.":[285]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-31T00:00:00"}
