{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:14:21Z","timestamp":1740158061513,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T00:00:00Z","timestamp":1637107200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T00:00:00Z","timestamp":1637107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s12652-021-03589-9","type":"journal-article","created":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T06:03:41Z","timestamp":1637129021000},"page":"4057-4075","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secrecy performance of a novel energy efficient hybrid CIoT network with beacon-aided RF energy harvesting under dissimilar fading environments"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7091-4743","authenticated-orcid":false,"given":"Chandrima","family":"Thakur","sequence":"first","affiliation":[]},{"given":"Sudipta","family":"Chattopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,17]]},"reference":[{"key":"3589_CR1","doi-asserted-by":"publisher","first-page":"75110","DOI":"10.1109\/ACCESS.2018.2882941","volume":"6","author":"H Ali","year":"2018","unstructured":"Ali H, Tariq UU, Zheng Y, Zhai X, Liu L (2018) Contention & energy-aware real-time task mapping on NOC based heterogeneous MPSOCs. IEEE Access 6:75110\u201375123","journal-title":"IEEE Access"},{"issue":"2","key":"3589_CR2","doi-asserted-by":"publisher","first-page":"2386","DOI":"10.1109\/jsyst.2020.2986811","volume":"15","author":"H Ali","year":"2020","unstructured":"Ali H, Tariq UU, Hussain M, Lu L, Panneerselvam J, Zhai X (2020) ARSH-FATI a novel metaheuristic for cluster head selection in wireless sensor networks. IEEE Syst J 15(2):2386\u20132397. https:\/\/doi.org\/10.1109\/jsyst.2020.2986811","journal-title":"IEEE Syst J"},{"key":"3589_CR3","doi-asserted-by":"crossref","unstructured":"Ali H, Tariq UU, Liu L, Panneerselvam J, Zhai X (2019) Energy optimization of streaming applications in IoT on NoC based heterogeneous MPSoCs using re-timing and DVFs. In: 2019 IEEE smart world, ubiquitous intelligence & computing, advanced & trusted computing, scalable computing & communications, cloud & big data computing, internet of people and smart city innovation (SMART WORLD \/SCALCOM\/UIC\/ATC\/CBD Com\/IOP\/SCI), pp 1297\u20131304","DOI":"10.1109\/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00240"},{"issue":"6","key":"3589_CR4","doi-asserted-by":"publisher","first-page":"2094","DOI":"10.1109\/jsyst.2020.2986811","volume":"63","author":"Z Bai","year":"2015","unstructured":"Bai Z, Jia J, Wang CX, Yuan D (2015) Performance analysis of SNR-based incremental hybrid decode-amplify-forward cooperative relaying protocol. IEEE Trans Commun 63(6):2094\u20132106. https:\/\/doi.org\/10.1109\/jsyst.2020.2986811","journal-title":"IEEE Trans Commun"},{"issue":"9","key":"3589_CR5","doi-asserted-by":"publisher","first-page":"5135","DOI":"10.1109\/TWC.2015.2433291","volume":"14","author":"X Chen","year":"2015","unstructured":"Chen X, Lei L, Zhang H, Yuen C (2015) Large-scale mimo relaying techniques for physical layer security: AF or DF? IEEE Trans Wirel Commun 14(9):5135\u20135146","journal-title":"IEEE Trans Wirel Commun"},{"issue":"6","key":"3589_CR6","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1007\/s12652-015-0323-6","volume":"7","author":"RC Chen","year":"2016","unstructured":"Chen RC, Hsieh CF, Chang WL (2016) Using ambient intelligence to extend network lifetime in wireless sensor networks. J Ambient Intell Human Comput 7(6):777\u2013788","journal-title":"J Ambient Intell Human Comput"},{"key":"3589_CR7","doi-asserted-by":"crossref","unstructured":"Chen H, Liu J, Zhai C, Zheng L (2010) Performance analysis of SNR based hybrid decode amplify-forward cooperative diversity networks over rayleigh fading channels. In: 2010 IEEE wireless communication and networking conference (WCNC), pp 1\u20136","DOI":"10.1109\/WCNC.2010.5506122"},{"key":"3589_CR8","volume-title":"Tables of integrals, series, and products","author":"IS Gradshteyn","year":"2007","unstructured":"Gradshteyn IS, Ryzhik IM (2007) Tables of integrals, series, and products. Academic Press, London, UK"},{"key":"3589_CR9","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3182","author":"KK Gurrala","year":"2017","unstructured":"Gurrala KK, Das S (2017) Performance study of hybrid decode\u2013amplify\u2013forward (HDAF) relaying scheme for physical layer security in wireless cooperative network. Int J Commun Syst. https:\/\/doi.org\/10.1002\/dac.3182","journal-title":"Int J Commun Syst"},{"key":"3589_CR10","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/305146","author":"X He","year":"2009","unstructured":"He X, Yener A (2009) Two-hop secure communication using an untrusted relay. J Wirel Commun Netw. https:\/\/doi.org\/10.1155\/2009\/305146","journal-title":"J Wirel Commun Netw"},{"issue":"3","key":"3589_CR11","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/MWC.2014.6845056","volume":"21","author":"E Hossain","year":"2014","unstructured":"Hossain E, Rasti M, Tabassum H, Abdelnasser A (2014) Evolution toward 5g multi-tier cellular wireless networks: an interference management perspective. IEEE Wirel Commun 21(3):118\u2013127","journal-title":"IEEE Wirel Commun"},{"issue":"1","key":"3589_CR12","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/JIOT.2017.2778185","volume":"5","author":"L Hu","year":"2017","unstructured":"Hu L et al (2017) Cooperative jamming for physical layer security enhancement in internet of things. IEEE Internet Things J 5(1):219\u2013228. https:\/\/doi.org\/10.1109\/JIOT.2017.2778185","journal-title":"IEEE Internet Things J"},{"issue":"10","key":"3589_CR13","doi-asserted-by":"publisher","first-page":"2536","DOI":"10.1109\/TSP.2013.2247600","volume":"61","author":"J Huang","year":"2015","unstructured":"Huang J, Mukherjee A, Swindlehurst, (2015) Secure communication via an untrusted non-regenerative relay in fading channels. IEEE Trans Signal Process 61(10):2536\u20132550","journal-title":"IEEE Trans Signal Process"},{"key":"3589_CR14","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1016\/j.comcom.2019.12.008","volume":"150","author":"Z Huang","year":"2020","unstructured":"Huang Z, Niu Q, Xiao S, Li T (2020) Energy harvesting algorithm considering max flow problem in wireless sensor networks. Comput Commun 150:626\u2013633","journal-title":"Comput Commun"},{"issue":"2","key":"3589_CR15","doi-asserted-by":"publisher","first-page":"e32","DOI":"10.1002\/itl2.32","volume":"1","author":"F Jameel","year":"2018","unstructured":"Jameel F, Javed MA, Jayakody DN, Hassan SA (2018) On secrecy performance of industrial internet of things. Internet Technol Lett 1(2):e32","journal-title":"Internet Technol Lett"},{"issue":"12","key":"3589_CR16","doi-asserted-by":"publisher","first-page":"6384","DOI":"10.1109\/TCOMM.2018.2865944","volume":"66","author":"H Lei","year":"2018","unstructured":"Lei H, Dai Z, Park K, Lei W, Pan G, Alouini M (2018) Secrecy outage analysis of mixed RF-FSO downlink SWIPT systems. IEEE Trans Commun 66(12):6384\u20136395. https:\/\/doi.org\/10.1109\/TCOMM.2018.2865944","journal-title":"IEEE Trans Commun"},{"issue":"9","key":"3589_CR17","doi-asserted-by":"publisher","first-page":"8451","DOI":"10.1109\/TVT.2018.2848648","volume":"67","author":"MT Mamaghani","year":"2018","unstructured":"Mamaghani MT, Kuhestani A, Wong K (2018) Secure two-way transmission via wireless-powered untrusted relay and external jammer. IEEE Trans Veh Technol 67(9):8451\u20138465. https:\/\/doi.org\/10.1109\/TVT.2018.2848648","journal-title":"IEEE Trans Veh Technol"},{"issue":"4","key":"3589_CR18","doi-asserted-by":"publisher","first-page":"448","DOI":"10.3390\/electronics8040448","volume":"8","author":"TN Nguyen","year":"2019","unstructured":"Nguyen TN, Tran M, Nguyen TL, Ha DH, Voznak M (2019) Performance analysis of a user selection protocol in cooperative networks with power splitting protocol-based energy harvesting over nakagami-m\/rayleigh channels. Electronics 8(4):448","journal-title":"Electronics"},{"issue":"6","key":"3589_CR19","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MWC.2017.1600116","volume":"24","author":"D Niyato","year":"2017","unstructured":"Niyato D, Kim DI, Maso M, Han Z (2017) Wireless powered communication networks: research directions and technological approaches. IEEE Wirel Commun 24(6):88\u201397","journal-title":"IEEE Wirel Commun"},{"key":"3589_CR20","doi-asserted-by":"publisher","first-page":"4125","DOI":"10.1109\/ACCESS.2017.2682838","volume":"5","author":"N Ouyang","year":"2017","unstructured":"Ouyang N, Jiang X, Bai E, Wang H (2017) Destination assisted jamming and beamforming for improving the security of AF relay systems. IEEE Access 5:4125\u20134131","journal-title":"IEEE Access"},{"key":"3589_CR21","doi-asserted-by":"publisher","DOI":"10.3390\/en12132579","author":"VD Phan","year":"2019","unstructured":"Phan VD, Nguyen TN, Tran M, Trang TT, Voznak M, Ha DH, Nguyen TL (2019) Power beacon-assisted energy harvesting in a half-duplex communication network under co-channel interference over a rayleigh fading environment: energy efficiency and outage probability analysis. Energies. https:\/\/doi.org\/10.3390\/en12132579","journal-title":"Energies"},{"key":"3589_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03520-2","author":"AM Pourmohammad","year":"2021","unstructured":"Pourmohammad AM, Musevi NJ, Mohassel FM (2021) On the outage performance of energy harvesting NOMA-based simultaneous cooperate and transmit IoT networks. J Ambient Intell Human Comput. https:\/\/doi.org\/10.1007\/s12652-021-03520-2","journal-title":"J Ambient Intell Human Comput"},{"key":"3589_CR23","doi-asserted-by":"crossref","unstructured":"Sharma S, Roy SD, Kundu S (2017) Two-way secure communication with two half-duplex DF relay. In: 2017 IEEE region 10 conference (TENCON) 869\u2013874","DOI":"10.1109\/TENCON.2017.8227980"},{"issue":"6","key":"3589_CR24","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MWC.2013.6704479","volume":"20","author":"Z Sheng","year":"2013","unstructured":"Sheng Z, Yang S, Yu Y, Vasilakos AV, Mccann JA, Leung KK (2013) A survey on the IETF protocol suite for the internet of things: standards, challenges, and opportunities. Wirel Commun 20(6):91\u201398. https:\/\/doi.org\/10.1109\/MWC.2013.6704479","journal-title":"Wirel Commun"},{"issue":"3","key":"3589_CR25","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1007\/s11277-016-3583-3","volume":"92","author":"R Singh","year":"2017","unstructured":"Singh R, Soni S, Rao RS, Kumar S (2017) A new closed form distribution and performance analysis of a composite weibull\/log-normal fading channel. Wirel Pers Commun 92(3):883\u2013900","journal-title":"Wirel Pers Commun"},{"key":"3589_CR26","doi-asserted-by":"crossref","unstructured":"Sinha R, Jindal P (2017) A study of physical layer security with energy harvesting in single hop relaying environment. In:\u00a04th IEEE international conference on signal processing and integrated networks (SPIN), pp 530\u2013533","DOI":"10.1109\/SPIN.2017.8050007"},{"issue":"8","key":"3589_CR27","doi-asserted-by":"publisher","first-page":"1728","DOI":"10.1109\/LCOMM.2018.2837859","volume":"22","author":"M Srinivasan","year":"2018","unstructured":"Srinivasan M, Kalyani S (2018) Secrecy capacity of \u03ba-\u03bc shadowed fading channels. IEEE Commun Lett 22(8):1728\u20131731","journal-title":"IEEE Commun Lett"},{"key":"3589_CR28","doi-asserted-by":"publisher","DOI":"10.1145\/3336121","author":"UU Tariq","year":"2019","unstructured":"Tariq UU, Ali H, Lu L, John P, Xiaojun Z (2019) Energy-efficient static task scheduling on VFI-based NoC-HMPSoCs for intelligent edge devices in cyber-physical systems. ACM Trans Int Syst Technol. https:\/\/doi.org\/10.1145\/3336121","journal-title":"ACM Trans Int Syst Technol"},{"key":"3589_CR29","first-page":"7","volume-title":"Internet of things-from research and innovation to market deployment","author":"O Vermesan","year":"2014","unstructured":"Vermesan O, Friess P (2014) Internet of things-from research and innovation to market deployment. River publishers, Denmark, pp 7\u2013142"},{"key":"3589_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3116190","author":"J Yang","year":"2021","unstructured":"Yang J, Wu X, Peppas KP, Mathiopoulos PT (2021) Capacity analysis of power beacon-assisted energy harvesting MIMO system over shadowed fading channels. IEEE Trans Veh Technol. https:\/\/doi.org\/10.1109\/TVT.2021.3116190","journal-title":"IEEE Trans Veh Technol"},{"issue":"22","key":"3589_CR31","doi-asserted-by":"publisher","first-page":"1879","DOI":"10.1049\/el.2016.3201","volume":"52","author":"R Yao","year":"2016","unstructured":"Yao R, Xu F, Mekkawy T, Xu J (2016) Optimised power allocation to maximise secure rate in energy harvesting relay network. Electron Lett 52(22):1879\u20131881","journal-title":"Electron Lett"},{"issue":"10","key":"3589_CR32","doi-asserted-by":"publisher","first-page":"1848","DOI":"10.3390\/su9101848","volume":"9","author":"H Yu","year":"2017","unstructured":"Yu H, Lee H, Jeon H (2017) What is 5G? emerging 5G mobile services and network requirements. Sustainability 9(10):1848. https:\/\/doi.org\/10.3390\/su9101848","journal-title":"Sustainability"},{"key":"3589_CR33","doi-asserted-by":"publisher","first-page":"198436","DOI":"10.1109\/ACCESS.2020.3034917","volume":"8","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Feng S, Tang W (2020) Performance analysis and optimization for power beacon-assisted wireless powered cooperative NOMA systems. IEEE Access 8:198436\u2013198450","journal-title":"IEEE Access"},{"key":"3589_CR34","doi-asserted-by":"crossref","unstructured":"Zou Y, Zhu J, Wang X, Leung VC (2015) Improving physical-layer security in wireless communications using diversity techniques. IEEE Netw 29(1):42\u201348. https:\/\/arxiv.org\/abs\/1405.3725","DOI":"10.1109\/MNET.2015.7018202"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03589-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-021-03589-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03589-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T16:31:48Z","timestamp":1657557108000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-021-03589-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,17]]},"references-count":34,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["3589"],"URL":"https:\/\/doi.org\/10.1007\/s12652-021-03589-9","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2021,11,17]]},"assertion":[{"value":"19 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}