I. Introduction
In today's rapidly evolving landscape, the Internet of Things (IoT) has become ubiquitous across diverse sectors, including Structural Health Monitoring (SHM), healthcare monitoring, smart tracking, smart factory, and beyond. This proliferation of wirelessly interconnected devices has revolutionized how to monitor health, optimize industrial processes, and enhance daily life. However, with the increasing reliance on wireless communication within these systems, there emerges a significant vulnerability to cyber threats. The interconnected nature of IoT devices, coupled with their often insufficiently secured communication protocols, presents a challenge in safeguarding against potential attacks [1]. Several IoT protocols have evolved complex Medium Access Control (MAC) layers for authentication and cryptography to mitigate such attacks, as seen in LoRaWAN. However, they remain vulnerable to various cyber-attacks scenarios [2], [3]. Implementing these enhanced security layers into an IoT protocol requires additional computing resources and results in higher power consumption. Furthermore, integrating them into already operational IoT networks adds complexity to the process. In the context of Simultaneous Wireless Information and Power Transfer (SWIPT) and Wireless Power Transfer (WPT) [4], the protocols of IoT systems remain unchanged at the level of information transfer, while the power wave is only utilized for powering the wireless node.