{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T18:53:28Z","timestamp":1766602408415,"version":"3.48.0"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2026,1,1]]},"DOI":"10.1109\/jiot.2025.3627789","type":"journal-article","created":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:13:11Z","timestamp":1761930791000},"page":"1152-1168","source":"Crossref","is-referenced-by-count":0,"title":["Secure and Covert Communication in Energy Harvesting Relay IoT Networks: Impacts of Hardware Impairments"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-6557-416X","authenticated-orcid":false,"given":"Reza","family":"Aghaei","sequence":"first","affiliation":[{"name":"Faculty of Engineering Technology, Amol University of Special Modern Technologies, Amol, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7456-0552","authenticated-orcid":false,"given":"Moslem","family":"Forouzesh","sequence":"additional","affiliation":[{"name":"Faculty of Engineering Technology, Amol University of Special Modern Technologies, Amol, Iran"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/OJCOMS.2024.3481264"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/NaNA63151.2024.00021"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.3390\/s23218747"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/JIOT.2021.3051694"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TWC.2021.3080382"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICNC59896.2024.10556267"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/VTC2024-Spring62846.2024.10683321"},{"key":"ref8","article-title":"Enhancing covert communication in relay systems using multi-antenna technique","author":"Zhu","year":"2024","journal-title":"arXiv:2407.11882"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/LWC.2020.3003472"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/COMST.2023.3263921"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/JIOT.2023.3237640"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TVT.2021.3076709"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/JIOT.2020.3038682"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TVT.2020.2997074"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TCOMM.2023.3342213"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/COMST.2022.3159185"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/GLOBECOM54140.2023.10437368"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/BalkanCom58402.2023.10167895"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TWC.2018.2822286"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TGCN.2024.3497327"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/LWC.2020.3033786"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ISTEL.2018.8661020"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/ICCC54389.2021.9674386"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/TCOMM.2020.2978206"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TWC.2017.2720736"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/ISIT50566.2022.9834682"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1007\/s11432-020-2970-y"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/twc.2019.2920961"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/ICTC55196.2022.9952701"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TIFS.2022.3197327"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/TIFS.2022.3152353"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/ICEE63041.2024.10668164"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/ACCESS.2025.3552544"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/MCOM.004.2500025"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/tgcn.2025.3553543"},{"issue":"2","key":"ref36","article-title":"Analysis of impact of hardware impairments on cover communication using a friendly jammer","volume":"13","author":"Keshavarzi","year":"2025","journal-title":"Electron. Cyber Defense"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/LCOMM.2024.3412271"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/JIOT.2025.3563925"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/LCOMM.2016.2558561"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1007\/978-1-4020-6903-1"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/LWC.2017.2676109"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/TIT.2014.2354403"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/icassp.2013.6638602"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/TWC.2017.2659724"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/WSA.2010.5456453"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/VETECF.2007.261"},{"year":"Sep. 2007","author":"Grant","article-title":"CVX: MATLAB software for disciplined convex programming, version 1.1","key":"ref47"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/JSAC.2013.130923"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1007\/978-1-4684-3303-6"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1109\/TWC.2009.090323"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1109\/TVT.2015.2478029"},{"volume-title":"CVX: MATLAB Software for Disciplined Convex Programming, Version 2.0","year":"2012","key":"ref52"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1109\/TVT.2015.2428997"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1017\/CBO9780511804441"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11313656\/11223628.pdf?arnumber=11223628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T18:47:16Z","timestamp":1766602036000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11223628\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,1]]},"references-count":54,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3627789","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2026,1,1]]}}}