{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T14:10:04Z","timestamp":1756476604396,"version":"3.44.0"},"reference-count":19,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T00:00:00Z","timestamp":1748649600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62473329","62471430"],"award-info":[{"award-number":["62473329","62471430"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Internet Technology Letters"],"published-print":{"date-parts":[[2025,7]]},"abstract":"<jats:title>ABSTRACT<\/jats:title><jats:p>Network survivability refers to the capability of the networks to maintain a guaranteed quality of service (QoS) in the presence of malicious attacks and node failures. The covert wireless communication (CWC) technique can improve the survivability of wireless Internet of Things (IoT) networks by hiding the desired signals in background noises. In this paper, the CWC scheme for the multiple jammers and multiple wardens networks is investigated, where the truncated channel inversion power control (TCIPC) is applied. The outage probability is utilized to evaluate the communication effectiveness, and the detection error probability (DEP) is used to evaluate the covertness. Then, the association problem between the multiple jammers and the multiple wardens is studied. The optimal association problem is formulated as a min\u2010max integer programming problem to minimize the outage probability between Alice and Bob, subject to the DEP constraints, which are hard to solve. It is demonstrated that the genetic algorithm is a valid method to solve the proposed min\u2010max integer programming problem, and the performances are analyzed.<\/jats:p>","DOI":"10.1002\/itl2.70049","type":"journal-article","created":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T05:14:16Z","timestamp":1748668456000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Association Problem Between Multiple Jammers and Multiple Wardens in Covert Communication Networks With <scp>TCIPC<\/scp>"],"prefix":"10.1002","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-8552-7431","authenticated-orcid":false,"given":"Fanfeng","family":"Shi","sequence":"first","affiliation":[{"name":"School of Information Engineering, Yangzhou Polytechnic Institute  Yangzhou China"}]},{"given":"Xinfeng","family":"Zhu","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Yangzhou University  Yangzhou China"}]}],"member":"311","published-online":{"date-parts":[[2025,5,31]]},"reference":[{"key":"e_1_2_1_7_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3223357"},{"key":"e_1_2_1_7_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3219474"},{"key":"e_1_2_1_7_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2022.3190477"},{"key":"e_1_2_1_7_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1800070"},{"key":"e_1_2_1_7_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963320"},{"key":"e_1_2_1_7_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3327272"},{"key":"e_1_2_1_7_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130923"},{"key":"e_1_2_1_7_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2507594"},{"key":"e_1_2_1_7_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2900915"},{"key":"e_1_2_1_7_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3183892"},{"key":"e_1_2_1_7_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2023.3321957"},{"key":"e_1_2_1_7_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2023.3253819"},{"issue":"1","key":"e_1_2_1_7_14_1","first-page":"370","article-title":"Integrated AHP\u2010IOWA, POWA Framework for Ideal Cloud Provider Selection and Optimum Resource Management","volume":"16","author":"Hussain W.","year":"2023","journal-title":"IEEE Transactions on Services Computing"},{"key":"e_1_2_1_7_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2022.3149279"},{"key":"e_1_2_1_7_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2022.3172683"},{"key":"e_1_2_1_7_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2023.3321679"},{"key":"e_1_2_1_7_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3310986"},{"key":"e_1_2_1_7_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2023.3329023"},{"key":"e_1_2_1_7_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2949304"}],"container-title":["Internet Technology Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/itl2.70049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T13:44:14Z","timestamp":1756475054000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/itl2.70049"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,31]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["10.1002\/itl2.70049"],"URL":"https:\/\/doi.org\/10.1002\/itl2.70049","archive":["Portico"],"relation":{},"ISSN":["2476-1508","2476-1508"],"issn-type":[{"type":"print","value":"2476-1508"},{"type":"electronic","value":"2476-1508"}],"subject":[],"published":{"date-parts":[[2025,5,31]]},"assertion":[{"value":"2025-02-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-21","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70049"}}