Archive

  • Select all
    |
    FEATURE TOPIC:INTELLIGENT COVERT COMMUNICATION
  • FEATURE TOPIC:INTELLIGENT COVERT COMMUNICATION
    Zhou Xiaobo, Jiang Yong, Xia Tingting, Xia Guiyang, Shen Tong
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    This work employs intelligent reflecting surface (IRS) to enhance secure and covert communication performance. We formulate an optimization problem to jointly design both the reflection beamformer at IRS and transmit power at transmitter Alice in order to optimize the achievable secrecy rate at Bob subject to a covertness constraint. We first develop a Dinkelbach-based algorithm to achieve an upper bound performance and a high-quality solution. For reducing the overhead and computational complexity of the Dinkelbach-based scheme, we further conceive a low-complexity algorithm in which analytical expression for the IRS reflection beamforming is derived at each iteration. Examination result shows that the devised low-complexity algorithm is able to achieve similar secrecy rate performance as the Dinkelbach-based algorithm. Our examination also shows that introducing an IRS into the considered system can significantly improve the secure and covert communication performance relative to the scheme without IRS.

  • FEATURE TOPIC:INTELLIGENT COVERT COMMUNICATION
    Gao Ang, Ren Xiaoyu, Deng Bin, Sun Xinshun, Zhang Jiankang
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Intelligent Reflecting Surface (IRS), with the potential capability to reconstruct the electromagnetic propagation environment, evolves a new IRS-assisted covert communications paradigm to eliminate the negligible detection of malicious eavesdroppers by coherently beaming the scattered signals and suppressing the signals leakage. However, when multiple IRSs are involved, accurate channel estimation is still a challenge due to the extra hardware complexity and communication overhead. Besides the cross-interference caused by massive reflecting paths, it is hard to obtain the close-formed solution for the optimization of covert communications. On this basis, the paper improves a heterogeneous multi-agent deep deterministic policy gradient (MADDPG) approach for the joint active and passive beamforming (Joint A&P BF) optimization without the channel estimation, where the base station (BS) and multiple IRSs are taken as different types of agents and learn to enhance the covert spectrum efficiency (CSE) cooperatively. Thanks to the 'centralized training and distributed execution' feature of MADDPG, each agent can execute the active or passive beamforming independently based on its partial observation without referring to others. Numeral results demonstrate that the proposed deep reinforcement learning (DRL) approach could not only obtain a preferable CSE of legitimate users and a low detection of probability (LPD) of warden, but also alleviate the communication overhead and simplify the IRSs deployment.

  • FEATURE TOPIC:INTELLIGENT COVERT COMMUNICATION
    Shi Jia, Li Xiaomeng, Liao Xiaomin, Tie Zhuangzhuang, Hu Junfan
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In this paper, we study the covert performance of the downlink low earth orbit (LEO) satellite communication, where the unmanned aerial vehicle (UAV) is employed as a cooperative jammer. To maximize the covert rate of the LEO satellite transmission, a multi-objective problem is formulated to jointly optimize the UAV's jamming power and trajectory. For practical consideration, we assume that the UAV can only have partial environmental information, and can't know the detection threshold and exact location of the eavesdropper on the ground. To solve the multi-objective problem, we propose the data-driven generative adversarial network (DD-GAN) based method to optimize the power and trajectory of the UAV, in which the sample data is collected by using genetic algorithm (GA). Simulation results show that the jamming solution of UAV generated by DD-GAN can achieve an effective trade-off between covert rate and probability of detection errors when only limited prior information is obtained.

  • FEATURE TOPIC:INTELLIGENT COVERT COMMUNICATION
    Shen Weiguo, Chen Jiepeng, Zheng Shilian, Zhang Luxin, Pei Zhangbin, Lu Weidang, Yang Xiaoniu
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In recent years, deep learning has been gradually used in communication physical layer receivers and has achieved excellent performance. In this paper, we employ deep learning to establish covert communication systems, enabling the transmission of signals through high-power signals present in the prevailing environment while maintaining covertness, and propose a convolutional neural network (CNN) based model for covert communication receivers, namely DeepCCR. This model leverages CNN to execute the signal separation and recovery tasks commonly performed by traditional receivers. It enables the direct recovery of covert information from the received signal. The simulation results show that the proposed DeepCCR exhibits significant advantages in bit error rate (BER) compared to traditional receivers in the face of noise and multipath fading. We verify the covert performance of the covert method proposed in this paper using the maximum-minimum eigenvalue ratio-based method and the frequency domain entropy-based method. The results indicate that this method has excellent covert performance. We also evaluate the mutual influence between covert signals and opportunity signals, indicating that using opportunity signals as cover can cause certain performance losses to covert signals. When the interference-to-signal power ratio (ISR) is large, the impact of covert signals on opportunity signals is minimal.

  • FEATURE TOPIC:INTELLIGENT COVERT COMMUNICATION
    Hu Zhijuan, Liu Shuangyu, Xu Fei, Liu Liqiang, Li Guiping
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Covert communication can conceal the existence of wireless transmission and thus has the ability to address information security transfer issue in many applications of the booming Internet of Things (IoT). However, the proliferation of sensing devices has generated massive amounts of data, which has increased the burden of covert communication. Considering the spatiotemporal correlation of data collection causing redundancy between data, eliminating duplicate data before transmission is beneficial for shortening transmission time, reducing the average received signal power of warden, and ultimately realizing covert communication. In this paper, we propose to apply delta compression technology in the gateway to reduce the amount of data generated by IoT devices, and then sent it to the cloud server. To this end, a cost model and evaluation method that is closer to the actual storage mode of computer systems is been constructed. Based on which, the delta version sequence obtained by existing delta compression algorithms is no longer compact, manifested by the still high cost. In this situation, we designed the correction scheme based on instructions merging (CSIM) correction to save costs by merging instructions. Firstly, the delta version sequence is divided into five categories and corresponding merge rules were derived. Then, for any COPY/ADD class delta compression algorithm, merge according to strict to relaxed to selection rules while generating instructions. Finally, a more cost-effective delta version sequence can be gained. The experimental results on random data show that the delta version sequences output by the CSIM corrected 1.5-pass and greedy algorithms have better performance in cost reducing.

  • FEATURE TOPIC:INTELLIGENT COVERT COMMUNICATION
    Liu Changjun, Shi Jia, Tie Zhuangzhuang, Wang Yongchao
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In this work, we investigate the covert communication in cognitive radio (CR) networks with the existence of multiple cognitive jammers (CJs). Specifically, the secondary transmitter (ST) helps the primary transmitter (PT) to relay information to primary receiver (PR), as a reward, the ST can use PT's spectrum to transmit private information against the eavesdropper (Eve) under the help of one selected cognitive jammer (CJ). Meanwhile, we propose three jammer-selection schemes, namely, link-oriented jammer selection (LJS), min-max jammer selection (MMJS) and random jammer selection (RJS). For each scheme, we analyze the average covert throughput (ACT) and covert outage probability (COP). Our simulation results show that CJ is helpful to ST's covert communication, the expected minimum detection error probability and ACT can be significantly improved with the increase of false alarm of CJ. Moreover, the LJS scheme achieves best performance in ACT and COP, followed by RJS scheme, and MMJS scheme shows the worst performance.

  • FEATURE TOPIC:INTELLIGENT COVERT COMMUNICATION
    Wan Pengwu, Chen Dongrui, Wang Danyang, Hui Xi, Peng Kang
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Covert communication technology makes wireless communication more secure, but it also provides more opportunities for illegal users to transmit harmful information. In order to detect the illegal covert communication of the lawbreakers in real time for subsequent processing, this paper proposes a Gamma approximation-based detection method for multi-antenna covert communication systems. Specifically, the Gamma approximation property is used to calculate the miss detection rate and false alarm rate of the monitor firstly. Then the optimization problem to minimize the sum of the missed detection rate and the false alarm rate is proposed. The optimal detection threshold and the minimum error detection probability are solved according to the properties of the Lambert W function. Finally, simulation results are given to demonstrate the effectiveness of the proposed method.

  • FEATURE TOPIC:INTELLIGENT COVERT COMMUNICATION
    Huang Haiyan, Zhang Hongsheng, Liang Linlin, Li Yahong
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    With the increasing number of communication devices and the complexity of communication environments, unmanned aerial vehicles (UAV), due to their flexible deployment and convenient networking capabilities, have shown significant advantages in tasks such as high-density communication areas and emergency rescue within special communication scenarios. Considering the openness of air-to-ground wireless communication, it is more susceptible to eavesdropping attacks. As a result, the introduction of physical layer security (PLS) in UAV communication systems is crucial to safeguard the security of transmitted data. In this paper, we investigate the PLS issues in a UAV cooperative communication system operating in Nakagami-$m$ fading channels with the presence of friendly interference. It considers the effects of imperfect successive interference cancellation (iSIC) and power allocation coefficients on system performance based on non-orthogonal multiple access (NOMA) techniques. By deriving closed-form expressions for the outage probabilities at the receiving users and the intercept probability of UAV eavesdropper (U-EAV), the performance of the considered cooperative UAV-assisted NOMA relay system with the presence of friendly interference is evaluated.

  • REVIEW PAPER
  • REVIEW PAPER
    Sun Yukun, Lei Bo, Liu Junlin, Huang Haonan, Zhang Xing, Peng Jing, Wang Wenbo
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    With the rapid development of cloud computing, edge computing, and smart devices, computing power resources indicate a trend of ubiquitous deployment. The traditional network architecture cannot efficiently leverage these distributed computing power resources due to computing power island effect. To overcome these problems and improve network efficiency, a new network computing paradigm is proposed, i.e., Computing Power Network (CPN). Computing power network can connect ubiquitous and heterogenous computing power resources through networking to realize computing power scheduling flexibly. In this survey, we make an exhaustive review on the state-of-the-art research efforts on computing power network. We first give an overview of computing power network, including definition, architecture, and advantages. Next, a comprehensive elaboration of issues on computing power modeling, information awareness and announcement, resource allocation, network forwarding, computing power transaction platform and resource orchestration platform is presented. The computing power network testbed is built and evaluated. The applications and use cases in computing power network are discussed. Then, the key enabling technologies for computing power network are introduced. Finally, open challenges and future research directions are presented as well.

  • COMMUNICATIONS THEORIES & SYSTEMS
  • COMMUNICATIONS THEORIES & SYSTEMS
    Jiang Ling, Zhang Qi, Zhu Hongbo
    Abstract ( )   Knowledge map   Save
    Cell-free massive multiple-input multiple-output (MIMO) is a promising technology for future wireless communications, where a large number of distributed access points (APs) simultaneously serve all users over the same time-frequency resources. Since users and APs may locate close to each other, the line-of-sight (LoS) transmission occurs more frequently in cell-free massive MIMO systems. Hence, in this paper, we investigate the cell-free massive MIMO system with LoS and non-line-of-sight (NLoS) transmissions, where APs and users are both distributed according to Poisson point process. Using tools from stochastic geometry, we derive a tight lower bound for the user downlink achievable rate and we further obtain the energy efficiency (EE) by considering the power consumption on downlink payload transmissions and circuitry dissipation. Based on the analysis, the optimal AP density and AP antenna number that maximize the EE are obtained. It is found that compared with the previous work that only considers NLoS transmissions, the actual optimal AP density should be much smaller, and the maximized EE is actually much higher.
  • COMMUNICATIONS THEORIES & SYSTEMS
    N Tamilarasan, SB Lenin, P Mukunthan, NC Sendhilkumar
    Abstract ( )   Knowledge map   Save
    In Wireless Sensor Networks (WSNs), Clustering process is widely utilized for increasing the lifespan with sustained energy stability during data transmission. Several clustering protocols were devised for extending network lifetime, but most of them failed in handling the problem of fixed clustering, static rounds, and inadequate Cluster Head (CH) selection criteria which consumes more energy. In this paper, Stochastic Ranking Improved Teaching-Learning and Adaptive Grasshopper Optimization Algorithm (SRITL-AGOA)-based Clustering Scheme for energy stabilization and extending network lifespan. This SRITL-AGOA selected CH depending on the weightage of factors such as node mobility degree, neighbour’s density distance to sink, single-hop or multi-hop communication and Residual Energy (RE) that directly influences the energy consumption of sensor nodes. In specific, Grasshopper Optimization Algorithm (GOA) is improved through tangent-based non-linear strategy for enhancing the ability of global optimization. On the other hand, stochastic ranking and violation constraint handling strategies are embedded into Teaching-Learning-based Optimization Algorithm (TLOA) for improving its exploitation tendencies. Then, SR and VCH improved TLOA is embedded into the exploitation phase of AGOA for selecting better CH by maintaining better balance amid exploration and exploitation. Simulation results confirmed that the proposed SRITL-AGOA improved throughput by 21.86%, network stability by 18.94%, load balancing by 16.14% with minimized energy depletion by 19.21%, compared to the competitive CH selection approaches.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Jiang Yunhao, Liu Zhipeng, Yuan Lei, Xu Anfei, Wang Hang, Zhao Nan, Wu Minghu
    Abstract ( )   Knowledge map   Save
    With the development of wireless communication technology, an urgent problem to be solved is co-site broadband interference on independent communication platforms such as satellites, space stations, aircrafts and ships. Also, the problem of strong self-interference rejection should be solved in the co-time co-frequency full duplex mode which realizes spectrum multiplication in 5G communication technology. In the research of such interference rejection, interference cancellation technology has been applied. In order to reject multipath interference, multitap double LMS (Least Mean Square) loop interference cancellation system is often used for cancelling RF (Radio Frequency) domain interference cancelling. However, more taps will lead to a more complex structure of the cancellation system. A novel tap single LMS loop adaptive interference cancellation system was proposed to improve the system compactness and reduce the cost. In addition, a mathematical model was built for the proposed cancellation system, the correlation function of CP2FSK (Continuous Phase Binary Frequency Shift Keying) signal was derived, and the quantitative relationship was established between the correlation function and the interference signal bandwidth and tap delay differential. The steady-state weights and the expression of the average interference cancellation ratio (ICR) were deduced in the scenes of LOS (Line of Sight) interference with antenna swaying on an independent communication platform and indoor multipath interference. The quantitative relationship was deeply analyzed between the interference cancellation performance and the parameters such as antenna swing, LMS loop gain, and interference signal bandwidth, which was verified by simulation experiment. And the performance of the proposed interference cancellation system was compared with that of the traditional double LMS loop cancellation system. The results showed that the compact single LMS loop cancellation system can achieve an average interference rejection capability comparable to the double LMS loop cancellation system.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Luo Mei, Long Yu, Xiong Youzhi, Qin Shuang
    Abstract ( )   Knowledge map   Save
    In the time-difference-of-arrival (TDOA) localization, robust least squares (LS) problems solved by mathematical programming were proven to be superior in mitigating the effects of non-line-of-sight (NLOS) propagation. However, the existing algorithms still suffer from two disadvantages: 1) The algorithms strongly depend on prior information; 2) The approaches do not satisfy the mean square error (MSE) optimal criterion of the measurement noise. To tackle the troubles, we first formulate an MSE minimization model for measurement noise by taking the source and the NLOS biases as variables. To obtain stable solutions, we introduce a penalty function to avoid abnormal estimates. We further tackle the nonconvex locating problem with semidefinite relaxation techniques. Finally, we incorporate mixed constraints and variable information to improve the estimation accuracy. Simulations and experiments show that the proposed method achieves consistent performance and good accuracy in dynamic NLOS environments.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Che Bohan, Sha Nan, YangWeiwei, Lu Xingbo, Gao Chang
    Abstract ( )   Knowledge map   Save
    This paper investigates the jammer-assisted multi-channel covert wireless communication (CWC) by exploiting the randomness of sub-channel selection to confuse the warden. In particular, we propose two sub-channel selection transmission schemes, named random sub-channel selection (RSS) scheme and maximum sub-channel selection (MSS) scheme, to enhance communication covertness. For each proposed scheme, we first derive closed-form expressions of the transmission outage probability (TOP), the average effective rate, and the minimum average detection error probability (DEP). Then, the average effective covert rate (ECR) is maximized by jointly optimizing the transmit power at the transmitter and the number of sub-channels. Numerical results show that there is an optimal value of the number of sub-channels that maximizes the average ECR. We also find that to achieve the maximum average ECR, a larger number of sub-channels are needed facing a stricter covertness constraint.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Li Qi, Xu Jiasheng, Zhang Haonan, Kang Huquan, Fu Luoyi, Long Fei, Wang Xinbing
    Abstract ( )   Knowledge map   Save
    This paper focuses on optimally determining the existence of connected paths between some given nodes in random ring-based graphs. Serving as a fundamental underlying structure in network modeling, ring topology appears as commonplace in many realistic scenarios. Regarding this, we consider graphs composed of rings, with some possible connected paths between them. Without prior knowledge of the exact node permutations on rings, the existence of each edge can be unraveled through edge testing at a unit cost in one step. The problem examined is that of determining whether the given nodes are connected by a path or separated by a cut, with the minimum expected costs involved.
    Dividing the problem into different cases based on different topologies of the ring-based networks, we propose the corresponding policies that aim to quickly seek the paths between nodes. A common feature shared by all those policies is that we stick to going in the same direction during edge searching, with edge testing in each step only involving the test between the source and the node that has been tested most. The simple searching rule, interestingly, can be interpreted as a delightful property stemming from the neat structure of ring-based networks, which makes the searching process not rely on any sophisticated behaviors.
    We prove the optimality of the proposed policies by calculating the expected cost incurred and making a comparison with the other class of strategies. The effectiveness of the proposed policies is also verified through extensive simulations, from which we even disclose three extra intriguing findings: i) in a one-ring network, the cost will grow drastically with the number of designated nodes when the number is small and will grow slightly when that number is large; ii) in ring-based network, Depth First is optimal in detecting the connectivity between designated nodes; iii) the problem of multi-ring networks shares large similarity with that of two-ring networks, and a larger number of ties between rings will not influence the expected cost.
  • NETWORKS & SECURITY
  • NETWORKS & SECURITY
    Wu Zhijun, Liang Cheng, Zhang Yun, Liu Rusen, Yue Meng
    Abstract ( )   Knowledge map   Save
    The BeiDou-II civil navigation message (BDII-CNAV) is transmitted in an open environment and no information integrity protection measures are provided. Hence, the BDII-CNAV faces the threat of spoofing attacks, which can lead to wrong location reports and time indication. In order to deal with this threat, we proposed a scheme of anti-spoofing for BDII-CNAV based on integrated information authentication. This scheme generates two type authentication information, one is authentication code information (ACI), which is applied to confirm the authenticity and reliability of satellite time information, and the other is signature information, which is used to authenticate the integrity of satellite location information and other information. Both authentication information is designed to embed into the reserved bits in BDII-CNAV without changing the frame structure. In order to avoid authentication failure caused by public key error or key error, the key or public key prompt information (KPKPI) are designed to remind the receiver to update both keys in time. Experimental results indicate that the scheme can successfully detect spoofing attacks, and the authentication delay is less than 1% of the transmission delay, which meets the requirements of BDII-CNAV information authentication.
  • NETWORKS & SECURITY
    Huang Wanwei, Yuan Bo, Wang Sunan, Ding Yi, Li Yuhua
    Abstract ( )   Knowledge map   Save
    Existing researches on cyber attack-defense analysis have typically adopted stochastic game theory to model the problem for solutions, but the assumption of complete rationality is used in modeling, ignoring the information opacity in practical attack and defense scenarios, and the model and method lack accuracy. To such problem, we investigate network defense policy methods under finite rationality constraints and propose network defense policy selection algorithm based on deep reinforcement learning. Based on graph theoretical methods, we transform the decision-making problem into a path optimization problem, and use a compression method based on service node to map the network state. On this basis, we improve the A3C algorithm and design the Defense-A3C defense policy selection algorithm with online learning capability. The experimental results show that the model and method proposed in this paper can stably converge to a better network state after training, which is faster and more stable than the original A3C algorithm. Compared with the existing typical approaches, Defense-A3C is verified its advancement.% so as to reduce the out-of-band (OOB) radiation as much as possible. Parameters of the proposed scheme are solved under joint con-straints of constant power and unity cumulative distribution. A new receiving method is also proposed to improve the bit error rate (BER) performance of OFDM systems. Simulation results indicate the proposed scheme can achieve better OOB radiation and BER performance at same PAPR levels, compared with existing similar companding algorithms.
  • NETWORKS & SECURITY
    Lin Zhi, Niu Hehao, He Yuanzhi, An Kang, Zhong Xudong, Chu Zheng, Xiao Pei
    Abstract ( )   Knowledge map   Save
    Satellite communications have attracted significant interests due to its advantages of large footprint and massive access. However, the commonly used onboard beamforming is hard to achieve reliable security because of the highly correlated legitimate and wiretap downlink channels. We exploit the benefits of satellite-terrestrial integrated network (STIN) and a novel absorptive reconfigurable intelligent surface (RIS) for improving the security of satellite downlink communications (SDC) in the presence of eavesdroppers (Eves). This paper aims to maximize the achievable secrecy rate of the earth station (ES) while satisfying the signal reception constraints, harvested power threshold at the RIS, and total transmit power budget. To solve this nonconvex problem, we propose a penalty-function based dual decomposition scheme, which firstly transforms the original problem into a two-layer optimization problem. Then, the outer layer and inner problems are solved by utilizing the successive convex approximation, Lagrange-dual and Rayleigh quotient methods to obtain the beamforming weight vectors and the reflective coefficient matrix. Finally, simulation results verify the effectiveness of the proposed scheme for enhancing the SDC security.
  • NETWORKS & SECURITY
    Gulab Sah, Sweety Singh, Subhasish Banerjee
    Abstract ( )   Knowledge map   Save
    The key objective of intrusion detection systems (IDS) is to protect the particular host or network by investigating and predicting the network traffic as an attack or normal. These IDS uses many methods of machine learning (ML) to learn from past-experience attack i.e. signatures based and identify the new ones. Even though these methods are effective, but they have to suffer from large computational costs due to considering all the traffic features, together. Moreover, emerging technologies like the Internet of Things (IoT), big data, etc. are getting advanced day by day; as a result, network traffics are also increasing rapidly. Therefore, the issue of computational cost needs to be addressed properly. Thus, in this research, firstly, the ML methods have been used with the feature selection technique (FST) to reduce the number of features by picking out only the important ones from NSL-KDD, CICIDS2017, and CIC-DDoS2019 datasets later that helped to build IDSs with lower cost but with the higher performance which would be appropriate for vast scale network. The experimental result demonstrated that the proposed model i.e. Decision tree (DT) with Recursive feature elimination (RFE) performs better than other classifiers with RFE in terms of accuracy, specificity, precision, sensitivity, F1-score, and G-means on the investigated datasets.
  • NETWORKS & SECURITY
    Miao Jiansong, Chen Haoqiang, Wang Pengjie, Li Hairui, Zhao Yan, Mu Junsheng, Yan Shi
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    In this paper, we develop a 6G wireless powered Internet of Things (IoT) system assisted by unmanned aerial vehicles (UAVs) to intelligently supply energy and collect data at the same time. In our dual-UAV scheme, UAV-E, with a constant power supply, transmits energy to charge the IoT devices on the ground, whereas UAV-B serves the IoT devices by data collection as a base station. In this framework, the system's energy efficiency is maximized, which we define as a ratio of the sum rate of IoT devices to the energy consumption of two UAVs during a fixed working duration. With the constraints of duration, transmit power, energy, and mobility, a difficult non-convex issue is presented by optimizing the trajectory, time duration allocation, and uplink transmit power of concurrently. To tackle the non-convex fractional optimization issue, we deconstruct it into three subproblems and we solve each of them iteratively using the descent method in conjunction with sequential convex approximation (SCA) approaches and the Dinkelbach algorithm. The simulation findings indicate that the suggested cooperative design has the potential to greatly increase the energy efficiency of the 6G intelligent UAV-assisted wireless powered IoT system when compared to previous benchmark systems.