{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T11:46:34Z","timestamp":1776167194951,"version":"3.50.1"},"reference-count":53,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/100017413","name":"Innovation Fund","doi-asserted-by":"publisher","award":["2022A-215"],"award-info":[{"award-number":["2022A-215"]}],"id":[{"id":"10.13039\/100017413","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2026,8]]},"DOI":"10.1016\/j.cose.2026.104916","type":"journal-article","created":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T06:12:01Z","timestamp":1775455921000},"page":"104916","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Secure and energy-efficient transmission multiobjective optimization in IRS-assisted IoT WPCN"],"prefix":"10.1016","volume":"167","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1414-7794","authenticated-orcid":false,"given":"Xiangrui","family":"Guan","sequence":"first","affiliation":[]},{"given":"Jianbin","family":"Xue","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.cose.2026.104916_bib0017","doi-asserted-by":"crossref","first-page":"44","DOI":"10.63180\/jcsra.thestap.2025.2.4","article-title":"Secure IoT-based real-time water level monitoring system using ESP32 for critical infrastructure","volume":"2025","author":"A. Al-Shareeda","year":"2025","journal-title":"J. Cyber Secur. Risk Audit."},{"issue":"12","key":"10.1016\/j.cose.2026.104916_bib0042","doi-asserted-by":"crossref","first-page":"5791","DOI":"10.1109\/TWC.2019.2939127","article-title":"Rate control for wireless-powered communication network with reliability and delay constraints","volume":"18","author":"Alcaraz L\u00f3pez","year":"2019","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"1","key":"10.1016\/j.cose.2026.104916_bib0016","doi-asserted-by":"crossref","first-page":"1","DOI":"10.63180\/jcsra.thestap.2025.1.1","article-title":"Cybersecurity threats, countermeasures and mitigation techniques on the IoT: future research directions","volume":"1","author":"Almuqren","year":"2025","journal-title":"J. Cyber Secur. Risk Audit."},{"issue":"1","key":"10.1016\/j.cose.2026.104916_bib0015","doi-asserted-by":"crossref","first-page":"3","DOI":"10.63180\/jcsra.thestap.2023.1.2","article-title":"Towards trustworthy IoT systems: cybersecurity threats, frameworks, and future directions","volume":"2023","author":"Alsalem","year":"2023","journal-title":"J. Cyber Secur. Risk Audit."},{"issue":"12","key":"10.1016\/j.cose.2026.104916_bib0003","doi-asserted-by":"crossref","first-page":"11355","DOI":"10.1109\/JIOT.2020.2991663","article-title":"Beamforming and resource allocation for multiuser full-duplex wireless-powered communications in IoT networks","volume":"7","author":"Asiedu","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"10.1016\/j.cose.2026.104916_bib0005","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MWC.2016.7462480","article-title":"Wireless powered communication networks: an overview","volume":"23","author":"Bi","year":"2016","journal-title":"IEEE Wirel. Commun."},{"issue":"4","key":"10.1016\/j.cose.2026.104916_bib0043","doi-asserted-by":"crossref","first-page":"4768","DOI":"10.1109\/JSYST.2020.3009218","article-title":"Energy-delay tradeoff scheme for NOMA-based D2D groups with WPCNs","volume":"15","author":"Budhiraja","year":"2021","journal-title":"IEEE Syst. J."},{"issue":"10","key":"10.1016\/j.cose.2026.104916_bib0018","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/lsa.2014.99","article-title":"Coding metamaterials, digital metamaterials and programmable metamaterials","volume":"3","author":"CUI","year":"2014","journal-title":"Light: Sci. Appl."},{"issue":"11","key":"10.1016\/j.cose.2026.104916_bib0021","doi-asserted-by":"crossref","first-page":"2450","DOI":"10.1109\/JSAC.2020.3007211","article-title":"Smart radio environments empowered by reconfigurable intelligent surfaces: how it works, State of research, and the road ahead","volume":"38","author":"Di Renzo","year":"2020","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.cose.2026.104916_bib0053","series-title":"Physical Layer Security Transmission For UAV networks[D]","author":"Guen","year":"2024"},{"key":"10.1016\/j.cose.2026.104916_bib0026","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1109\/OJCOMS.2024.3360288","article-title":"Max-min throughput optimization in WPCNs: a hybrid active\/passive IRS-assisted scheme","volume":"5","author":"Hameed","year":"2024","journal-title":"IEEE Open J. Commun. Soc."},{"key":"10.1016\/j.cose.2026.104916_bib0050","doi-asserted-by":"crossref","first-page":"4670","DOI":"10.1109\/ACCESS.2024.3525036","article-title":"Enhancing physical layer security in WPCNs with IRS and controlled jamming for 6G IoT applications","volume":"13","author":"Hameed","year":"2025","journal-title":"IEEE Access"},{"issue":"5","key":"10.1016\/j.cose.2026.104916_bib0052","doi-asserted-by":"crossref","first-page":"918","DOI":"10.1109\/JSTSP.2022.3179840","article-title":"Throughput maximization for IRS-aided MIMO FD-WPCN with non-linear EH model","volume":"16","author":"Hua","year":"2022","journal-title":"IEEE J. Sel. Top. Signal Process"},{"issue":"5","key":"10.1016\/j.cose.2026.104916_bib0008","doi-asserted-by":"crossref","first-page":"3972","DOI":"10.1109\/JIOT.2020.3027101","article-title":"Cooperative transmission of energy-constrained IoT devices in wireless-powered communication networks","volume":"8","author":"Jeong","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"10.1016\/j.cose.2026.104916_bib0025","doi-asserted-by":"crossref","first-page":"23","DOI":"10.23919\/JCC.ja.2022-0320","article-title":"Sum-rate maximization in active RIS-assisted multi-antenna WPCN","volume":"21","author":"Jie","year":"2024","journal-title":"China Commun."},{"issue":"1","key":"10.1016\/j.cose.2026.104916_bib0004","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1109\/TWC.2013.112513.130760","article-title":"Throughput maximization in wireless powered communication networks","volume":"13","author":"Ju","year":"2014","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"10","key":"10.1016\/j.cose.2026.104916_bib0006","doi-asserted-by":"crossref","first-page":"3528","DOI":"10.1109\/TCOMM.2014.2359878","article-title":"Optimal resource allocation in full-duplex wireless powered communication network","volume":"62","author":"Ju","year":"2014","journal-title":"IEEE Trans. Commun."},{"issue":"2","key":"10.1016\/j.cose.2026.104916_bib0012","doi-asserted-by":"crossref","first-page":"913","DOI":"10.1109\/TWC.2016.2633471","article-title":"Sum throughput maximization for Multi-user MIMO Cognitive Wireless powered communication networks","volume":"16","author":"Kim","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"8","key":"10.1016\/j.cose.2026.104916_bib0030","doi-asserted-by":"crossref","first-page":"2075","DOI":"10.1109\/LWC.2024.3400974","article-title":"Secrecy rate maximization for ARIS-aided Wireless powered communication networks","volume":"13","author":"Kong","year":"2024","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"10.1016\/j.cose.2026.104916_bib0037","doi-asserted-by":"crossref","DOI":"10.12968\/S1353-4858(24)70011-7","article-title":"Securing communication protocols in military computing","author":"Kumar","year":"2024","journal-title":"Netw. Secur."},{"issue":"2","key":"10.1016\/j.cose.2026.104916_bib0038","doi-asserted-by":"crossref","DOI":"10.12968\/S1361-3723(24)70007-4","article-title":"Securing military computing with the blockchain","author":"Kumar","year":"2024","journal-title":"Comput. Fraud Secur."},{"key":"10.1016\/j.cose.2026.104916_bib0036","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1007\/s00146-024-01904-4","article-title":"Assessing the impact of heat vulnerability on urban public spaces using a fuzzy-based unified computational technique","volume":"40","author":"Kumar","year":"2025","journal-title":"AI Soc"},{"key":"10.1016\/j.cose.2026.104916_bib0035","doi-asserted-by":"crossref","first-page":"72694","DOI":"10.1109\/ACCESS.2020.2987941","article-title":"A hybrid model of hesitant fuzzy decision-making analysis for estimating usable-security of software","volume":"8","author":"Kumar","year":"2020","journal-title":"in IEEE Access"},{"key":"10.1016\/j.cose.2026.104916_bib0034","series-title":"Software Durability: Concepts and Practices","author":"Kumar","year":"2023"},{"key":"10.1016\/j.cose.2026.104916_bib0031","doi-asserted-by":"crossref","unstructured":"R. Kumar, S.A. Khan, N. Alharbe, and R.A. Khan, \u201cCode of silence: cyber security strategies for combating deepfake disinformation,\u201d in Comput. Fraud Secur., vol. 2024, no. 4. https:\/\/doi.org\/10.12968\/S1361-3723(24)70013-X.","DOI":"10.12968\/S1361-3723(24)70013-X"},{"issue":"22","key":"10.1016\/j.cose.2026.104916_bib0010","doi-asserted-by":"crossref","first-page":"10898","DOI":"10.1109\/JSEN.2019.2932095","article-title":"Performance optimization of a multi-source, multi-sensor beamforming wireless powered communication network with backscatter","volume":"19","author":"Kwan","year":"2019","journal-title":"IEEE Sens. J."},{"issue":"8","key":"10.1016\/j.cose.2026.104916_bib0044","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1109\/LCOMM.2020.2997027","article-title":"Ergodic capacity of intelligent reflecting surface-assisted communication systems with phase errors","volume":"24","author":"Li","year":"2020","journal-title":"IEEE Commun. Lett."},{"issue":"2","key":"10.1016\/j.cose.2026.104916_bib0045","doi-asserted-by":"crossref","first-page":"1320","DOI":"10.1109\/TCOMM.2021.3128544","article-title":"How many reflecting elements are needed for energy- and spectral-efficient intelligent reflecting surface-assisted communication","volume":"70","author":"Li","year":"2022","journal-title":"IEEE Trans. Commun."},{"issue":"9","key":"10.1016\/j.cose.2026.104916_bib0019","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1109\/MCOM.2018.1700659","article-title":"A new wireless communication paradigm through software-controlled metasurfaces","volume":"56","author":"Liaskos","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.cose.2026.104916_bib0001","doi-asserted-by":"crossref","unstructured":"Lin XH., Zhang J., Xiang L., et al., \"Energy consumption optimization for UAV-assisted private blockchain-based IIoT networks,\" in 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall), Norman, OK, USA, 2021, pp. 1\u20137, doi: 10.1109\/VTC2021-Fall52928.2021.9625316.","DOI":"10.1109\/VTC2021-Fall52928.2021.9625316"},{"issue":"6","key":"10.1016\/j.cose.2026.104916_bib0024","doi-asserted-by":"crossref","first-page":"3634","DOI":"10.1109\/TCOMM.2024.3358563","article-title":"Ergodic throughput maximization for RIS-equipped-UAV-enabled wireless powered communications with outdated CSI","volume":"72","author":"Lin","year":"2024","journal-title":"IEEE Trans. Commun."},{"issue":"19","key":"10.1016\/j.cose.2026.104916_bib0013","doi-asserted-by":"crossref","first-page":"18908","DOI":"10.1109\/JIOT.2022.3163421","article-title":"Joint antenna and device scheduling in full-duplex MIMO wireless-powered communication networks","volume":"9","author":"Park","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"12","key":"10.1016\/j.cose.2026.104916_bib0009","doi-asserted-by":"crossref","first-page":"12406","DOI":"10.1109\/TVT.2019.2946690","article-title":"Optimal resource allocation in backscatter assisted WPCN with practical energy harvesting model","volume":"68","author":"Ramezani","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"11","key":"10.1016\/j.cose.2026.104916_bib0011","doi-asserted-by":"crossref","first-page":"11908","DOI":"10.1109\/TVT.2021.3116708","article-title":"Backscatter-assisted Wireless powered communication networks empowered by intelligent reflecting surface","volume":"70","author":"Ramezani","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"4","key":"10.1016\/j.cose.2026.104916_bib0014","doi-asserted-by":"crossref","first-page":"6964","DOI":"10.1109\/JIOT.2019.2913219","article-title":"Secrecy throughput maximization for full-duplex wireless powered IoT networks under fairness constraints","volume":"6","author":"Rezaei","year":"2019","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"10.1016\/j.cose.2026.104916_bib0032","article-title":"A secure decentralised finance framework","author":"Sahu","year":"2024","journal-title":"Comput. Fraud Secur."},{"issue":"1","key":"10.1016\/j.cose.2026.104916_bib0039","first-page":"1","article-title":"Telemedicine: how to achieve interoperability without compromising data security","volume":"31","author":"Sahu","year":"2025","journal-title":"Br. J. Healthc. Manag."},{"issue":"1","key":"10.1016\/j.cose.2026.104916_bib0033","first-page":"543","article-title":"Predicting software bugs of newly and large datasets through a unified neuro-fuzzy approach: reliability perspective","volume":"10","author":"Sahu","year":"2021","journal-title":"Adv. Math.: Sci. J."},{"issue":"12","key":"10.1016\/j.cose.2026.104916_bib0049","doi-asserted-by":"crossref","first-page":"17841","DOI":"10.1109\/TWC.2024.3454473","article-title":"Robust transmission design for IRS-aided secure cognitive radio systems against internal eavesdropping","volume":"23","author":"Shen","year":"2024","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"11","key":"10.1016\/j.cose.2026.104916_bib0028","doi-asserted-by":"crossref","first-page":"7520","DOI":"10.1109\/TCOMM.2022.3212734","article-title":"Secrecy throughput maximization for IRS-aided MIMO Wireless powered communication networks","volume":"70","author":"Shi","year":"2022","journal-title":"IEEE Trans. Commun."},{"issue":"18","key":"10.1016\/j.cose.2026.104916_bib0002","doi-asserted-by":"crossref","first-page":"30309","DOI":"10.1109\/JIOT.2024.3411311","article-title":"Sum rate maximization in IoT networks with diversity-enhanced energy harvesting: a DRL-guided approach","volume":"11","author":"Ullah","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"10.1016\/j.cose.2026.104916_bib0046","doi-asserted-by":"crossref","first-page":"155","DOI":"10.23919\/JCC.2021.03.013","article-title":"Adaptive secure transmission for wireless powered communication networks","volume":"18","author":"Wang","year":"2021","journal-title":"China Commun."},{"issue":"4","key":"10.1016\/j.cose.2026.104916_bib0029","doi-asserted-by":"crossref","first-page":"2715","DOI":"10.1109\/TWC.2022.3213544","article-title":"Robust resource allocation design for secure IRS-aided WPCN","volume":"22","author":"Wang","year":"2023","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"10.1016\/j.cose.2026.104916_bib0040","doi-asserted-by":"crossref","unstructured":"D. Watabe, K. Yoshikawa and K. Adachi, \"Resource management for wireless power transfer and wireless information transfer in industrial IoT,\" 2024 Fifteenth International Conference on Ubiquitous and Future Networks (ICUFN), Budapest, Hungary, 2024, pp. 126\u2013130, doi: 10.1109\/ICUFN61752.2024.10625014.","DOI":"10.1109\/ICUFN61752.2024.10625014"},{"issue":"11","key":"10.1016\/j.cose.2026.104916_bib0020","doi-asserted-by":"crossref","first-page":"5394","DOI":"10.1109\/TWC.2019.2936025","article-title":"Intelligent reflecting surface enhanced wireless network via joint active and passive beamforming","volume":"18","author":"Wu","year":"2019","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"11","key":"10.1016\/j.cose.2026.104916_bib0022","first-page":"14559","article-title":"Joint energy and information precoding for NOMA-based WPCNs aided by reconfigurable intelligent surface","volume":"72","author":"Wu","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"11","key":"10.1016\/j.cose.2026.104916_bib0007","doi-asserted-by":"crossref","first-page":"765","DOI":"10.23919\/transcom.2024EBP3009","article-title":"Cooperative transmission of energy-constrained wireless devices in IRS-assisted wireless powered communication networks","volume":"E107-B","author":"Wu","year":"2024","journal-title":"IEICE Trans. Commun."},{"key":"10.1016\/j.cose.2026.104916_bib0048","doi-asserted-by":"crossref","unstructured":"F. Yu, C. Liu, Z. Shi, B. Liu, M. Lin and T. -X. Zheng, \"IRS-enabled physical layer secure transmission,\" 2023 International Conference on Wireless Communications and Signal Processing (WCSP), Hangzhou, China, 2023, pp. 731\u2013736, doi: 10.1109\/WCSP58612.2023.10404308.","DOI":"10.1109\/WCSP58612.2023.10404308"},{"issue":"3","key":"10.1016\/j.cose.2026.104916_bib0027","doi-asserted-by":"crossref","first-page":"1957","DOI":"10.1109\/TCOMM.2022.3141777","article-title":"Improving physical layer security in IRS-aided WPCN Multicast systems via Stackelberg game","volume":"70","author":"Zhai","year":"2022","journal-title":"IEEE Trans. Commun."},{"issue":"5","key":"10.1016\/j.cose.2026.104916_bib0023","doi-asserted-by":"crossref","first-page":"3035","DOI":"10.1109\/TCOMM.2024.3351758","article-title":"Robust transmission design for RIS-assisted multi-cluster wireless powered communications with hardware impairments","volume":"72","author":"Zhai","year":"2024","journal-title":"IEEE Trans. Commun."},{"issue":"2","key":"10.1016\/j.cose.2026.104916_bib0047","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1109\/JIOT.2021.3079455","article-title":"Energy management for secure transmission in Wireless powered communication networks","volume":"9","author":"Zhang","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"10","key":"10.1016\/j.cose.2026.104916_bib0051","doi-asserted-by":"crossref","first-page":"13398","DOI":"10.1109\/JIOT.2025.3543823","article-title":"Enhanced secure beamforming for IRS-assisted IoT communication using a generative-diffusion-model-enabled optimization approach","volume":"12","author":"Zhang","year":"2025","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"10.1016\/j.cose.2026.104916_bib0041","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1109\/LWC.2022.3224300","article-title":"Energy harvesting modulation for integrated control State and Energy transfer in industrial IoT","volume":"12","author":"Zhao","year":"2023","journal-title":"IEEE Wirel. Commun. Lett."}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404826000921?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404826000921?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T10:46:17Z","timestamp":1776163577000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404826000921"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,8]]},"references-count":53,"alternative-id":["S0167404826000921"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2026.104916","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2026,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Secure and energy-efficient transmission multiobjective optimization in IRS-assisted IoT WPCN","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2026.104916","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104916"}}