{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T08:05:28Z","timestamp":1771747528848,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T00:00:00Z","timestamp":1537833600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002383","name":"King Saud University","doi-asserted-by":"publisher","award":["RG#1435-051"],"award-info":[{"award-number":["RG#1435-051"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004386","name":"Universiti Malaya","doi-asserted-by":"publisher","award":["BKS084-2017"],"award-info":[{"award-number":["BKS084-2017"]}],"id":[{"id":"10.13039\/501100004386","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s11042-018-6684-z","type":"journal-article","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T14:39:13Z","timestamp":1537886353000},"page":"29899-29920","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["A novel countermeasure technique for reactive jamming attack in internet of things"],"prefix":"10.1007","volume":"78","author":[{"given":"Alaba Ayotunde","family":"Fadele","sequence":"first","affiliation":[]},{"given":"Mazliza","family":"Othman","sequence":"additional","affiliation":[]},{"given":"Ibrahim Abaker Targio","family":"Hashem","sequence":"additional","affiliation":[]},{"given":"Ibrar","family":"Yaqoob","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Imran","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Shoaib","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,25]]},"reference":[{"issue":"7","key":"6684_CR1","doi-asserted-by":"publisher","first-page":"22","DOI":"10.3390\/s16071003","volume":"16","author":"MS Abdalzaher","year":"2016","unstructured":"Abdalzaher MS, Seddik K, Elsabrouty M, Muta O, Furukawa H, Abdel-Rahman A (2016) Game theory meets wireless sensor networks security requirements and threats mitigation: A survey. Sensors (Switzerland) 16(7):22\u201327","journal-title":"Sensors (Switzerland)"},{"key":"6684_CR2","doi-asserted-by":"crossref","unstructured":"Aman W, Snekkenes E (2015) Managing Security trade-offs in the internet of things using adaptive security. In Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for (pp. 362-368). IEEE","DOI":"10.1109\/ICITST.2015.7412122"},{"key":"6684_CR3","doi-asserted-by":"crossref","unstructured":"Babar SD, Prasad NR, Prasad R (2013) Jamming attack: Behavioral modelling and analysis. In Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 2013 3rd International Conference on (pp. 1-5). IEEE","DOI":"10.1109\/VITAE.2013.6617054"},{"key":"6684_CR4","doi-asserted-by":"crossref","unstructured":"Babar S, Stango A, Prasad N, Sen J, Prasad R (2011) Proposed embedded security framework for internet of things (iot). In Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on (pp. 1-5). IEEE","DOI":"10.1109\/WIRELESSVITAE.2011.5940923"},{"issue":"12","key":"6684_CR5","doi-asserted-by":"publisher","first-page":"608162","DOI":"10.1155\/2014\/608162","volume":"10","author":"A Derhab","year":"2014","unstructured":"Derhab A, Bouras A, Senouci MR, Imran M (2014) Fortifying intrusion detection systems in dynamic Ad Hoc and wireless sensor networks. Int J Distrib Sens Netw 10(12):608162","journal-title":"Int J Distrib Sens Netw"},{"issue":"1","key":"6684_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.trit.2017.01.001","volume":"2","author":"E Ergul","year":"2017","unstructured":"Ergul E (2017) Relative attribute based incremental learning for image recognition. CAAI Trans Intell Technol 2(1):1\u201311","journal-title":"CAAI Trans Intell Technol"},{"key":"6684_CR7","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","volume":"88","author":"AA Fadele","year":"2017","unstructured":"Fadele AA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things Security: A Survey. J Netw Comput Appl 88:10\u201328","journal-title":"J Netw Comput Appl"},{"key":"6684_CR8","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.parco.2016.10.004","volume":"61","author":"H Fu","year":"2017","unstructured":"Fu H, Chen H, Zhu Y, Yu W (2017) FARMS\u00a0: Efficient mapreduce speculation for failure recovery in short jobs. Parallel Comput 61:68\u201382","journal-title":"Parallel Comput"},{"issue":"1","key":"6684_CR9","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1186\/s13638-016-0528-1","volume":"2016","author":"P Ganeshkumar","year":"2016","unstructured":"Ganeshkumar P, Vijayakumar KP, Anandaraj M (2016) A novel jammer detection framework for cluster-based wireless sensor networks. EURASIP J Wirel Commun Netw 2016(1):35","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"6684_CR10","doi-asserted-by":"crossref","unstructured":"Goyal D, Tripathy MR (2012) Routing protocols in wireless sensor networks: A survey. In 2012 Second International Conference on Advanced Computing & Communication Technologies (pp. 474-480). IEEE","DOI":"10.1109\/ACCT.2012.98"},{"issue":"c","key":"6684_CR11","first-page":"1","volume":"73100","author":"G Hatzivasilis","year":"2017","unstructured":"Hatzivasilis G, Papaefstathiou I, Manifavas C (2017) SCOTRES: Secure Routing for IoT and CPS. IEEE Internet Things J 73100(c):1\u20131","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"6684_CR12","first-page":"345","volume":"2","author":"J Heo","year":"2017","unstructured":"Heo J, Kim J, Bahk S (2017) Dodge-Jam\u00a0: Anti-Jamming Technique for Low-power and Lossy Wireless Networks. IEEE Access 2(3):345\u2013359","journal-title":"IEEE Access"},{"issue":"10","key":"6684_CR13","doi-asserted-by":"publisher","first-page":"2704","DOI":"10.1109\/TSMC.2017.2698457","volume":"47","author":"K Huang","year":"2017","unstructured":"Huang K, Zhang Q, Zhou C, Xiong N, Qin Y (2017) An efficient intrusion detection approach for visual sensor networks based on traffic pattern learning. IEEE Trans Syst Man Cybern Part A Syst Hum 47(10):2704\u20132713","journal-title":"IEEE Trans Syst Man Cybern Part A Syst Hum"},{"key":"6684_CR14","doi-asserted-by":"crossref","unstructured":"Kasinathan P, Pastrone C, Spirito MA, Vinkovits M (2013) Denial-of-Service detection in 6LoWPAN based Internet of Things. In 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob) (pp. 600-607). IEEE","DOI":"10.1109\/WiMOB.2013.6673419"},{"issue":"11","key":"6684_CR15","doi-asserted-by":"publisher","first-page":"1903","DOI":"10.1109\/LCOMM.2012.091712.121811","volume":"16","author":"JJ Lee","year":"2012","unstructured":"Lee JJ, Lim J (2012) Effective and efficient jamming based on routing in wireless ad hoc networks. IEEE Commun Lett 16(11):1903\u20131906","journal-title":"IEEE Commun Lett"},{"issue":"2","key":"6684_CR16","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1108\/IntR-07-2014-0173","volume":"26","author":"S Li","year":"2016","unstructured":"Li S, Tryfonas T, Li H (2016) The Internet of Things: a security point of view. Internet Res 26(2):337\u2013359","journal-title":"Internet Res"},{"issue":"1","key":"6684_CR17","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.trit.2017.04.001","volume":"2","author":"H Liu","year":"2017","unstructured":"Liu H, Hu L, Ma L (2017) Online RGB-D person re-identification based on metric model update. CAAI Trans Intell Technol 2(1):48\u201355","journal-title":"CAAI Trans Intell Technol"},{"key":"6684_CR18","unstructured":"Lu C (2014) Overview of Security and Privacy Issues in the Internet of Things. 1\u201311"},{"key":"6684_CR19","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.future.2017.07.013","volume":"77","author":"Y Lu","year":"2017","unstructured":"Lu Y, Wu S, Fang Z, Xiong N, Yoon S, Park DS (2017) Exploring finger vein based personal authentication for secure IoT. Futur Gener Comput Syst 77:149\u2013160","journal-title":"Futur Gener Comput Syst"},{"issue":"4","key":"6684_CR20","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/SURV.2009.090404","volume":"11","author":"A Mpitziopoulos","year":"2014","unstructured":"Mpitziopoulos A, Gavalas D, Konstantopoulos C, Pantziou G (2014) A survey on jamming attacks and countermeasures in WSNs. IEEE Commun Surv Tutorials 11(4):42\u201356","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"2","key":"6684_CR21","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1108\/IntR-03-2014-0082","volume":"26","author":"J Nolin","year":"2016","unstructured":"Nolin J, Olson N (2016) The Internet of Things and convenience. Internet Res 26(2):360\u2013376","journal-title":"Internet Res"},{"issue":"1","key":"6684_CR22","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1186\/s13638-015-0354-x","volume":"2015","author":"E Pei","year":"2015","unstructured":"Pei E, Han H, Sun Z, Shen B, Zhang T (2015) LEAUCH: low-energy adaptive uneven clustering hierarchy for cognitive radio sensor network. EURASIP J Wirel Commun Netw 2015(1):122","journal-title":"EURASIP J Wirel Commun Netw"},{"issue":"6","key":"6684_CR23","doi-asserted-by":"publisher","first-page":"2074","DOI":"10.1109\/TII.2016.2604681","volume":"12","author":"Y Qiu","year":"2016","unstructured":"Qiu Y, Ma M (2016) A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN. IEEE Trans Ind Informatics 12(6):2074\u20132085","journal-title":"IEEE Trans Ind Informatics"},{"issue":"1","key":"6684_CR24","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/TVT.2008.921621","volume":"58","author":"DR Raymond","year":"2011","unstructured":"Raymond DR, Marchany RC, Brownfield MI, Midkiff SF (2011) Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Trans Veh Technol 58(1):367\u2013380","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"6684_CR25","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1504\/IJHM.2018.090304","volume":"1","author":"I Rehab","year":"2018","unstructured":"Rehab I, Tian X, Gu F, Ball AD (2018) The influence of rolling bearing clearances on diagnostic signatures based on a numerical simulation and experimental evaluation. Int J Hydromechatronics 1(1):16\u201346","journal-title":"Int J Hydromechatronics"},{"key":"6684_CR26","unstructured":"Restuccia F, D'Oro S, Melodia T (2018) Securing the Internet of Things: New Perspectives and Research Challenges. arXiv preprint arXiv:1803.05022"},{"key":"6684_CR27","doi-asserted-by":"crossref","unstructured":"Sankaran S (2016) Lightweight security framework for IoTs using identity based cryptography. In Advances in Computing, Communications and Informatics (ICACCI), 2016 International Conference on (pp. 880-886). IEEE","DOI":"10.1109\/ICACCI.2016.7732156"},{"issue":"2","key":"6684_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1824766.1824772","volume":"7","author":"M Strasser","year":"2010","unstructured":"Strasser M, Danev B, \u010capkun S (2010) Detection of reactive jamming in sensor networks. ACM Trans Sens Networks 7(2):1\u201329","journal-title":"ACM Trans Sens Networks"},{"key":"6684_CR29","first-page":"648","volume":"3","author":"H Suo","year":"2012","unstructured":"Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: A review. Proc - 2012 Int Conf Comput Sci Electron Eng ICCSEE 2012 3:648\u2013651","journal-title":"Proc - 2012 Int Conf Comput Sci Electron Eng"},{"key":"6684_CR30","doi-asserted-by":"crossref","unstructured":"Tarkowski M, Rzymowski M, Kulas L, Nyka K (2017) Improved jamming resistance using electronically steerable parasitic antenna radiator. 17th IEEE Int Conf Smart Technol EUROCON 2017 - Conf. Proc, pp 6\u20138","DOI":"10.1109\/EUROCON.2017.8011161"},{"key":"6684_CR31","unstructured":"Romdhani I, Qasem M, Al-Dubai AY, Ghaleb B (2016) Cooja simulator manual. Edinburgh Napier University"},{"key":"6684_CR32","unstructured":"Weber SG, Martucci LA, Ries S, M\u00fchlh\u00e4user M (2010) Towards trustworthy identity and access management for the future internet. In Proc. 4th International Workshop on Trustworthy Internet of People, Things & Services (IoPTS) (Vol. 29)"},{"issue":"3","key":"6684_CR33","first-page":"60","volume":"2","author":"AD Wood","year":"2011","unstructured":"Wood AD, Stankovic JA, Zhou G (2011) DEEJAM\u00a0: Defeating Energy-Efficient Networks. IEEE Sensors J 2(3):60\u201369","journal-title":"IEEE Sensors J"},{"issue":"3","key":"6684_CR34","first-page":"41","volume":"20","author":"W Xu","year":"2013","unstructured":"Xu W, Ma K, Trappe W, Zhang Y (2013) Jamming sensor networks: Attack and defense strategies. IEEE Netw 20(3):41\u201347","journal-title":"IEEE Netw"},{"issue":"1","key":"6684_CR35","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.trit.2016.12.002","volume":"2","author":"X Yang","year":"2017","unstructured":"Yang X, Xie L, Han J, Wang Z (2017) Cognitive-affective regulation process for micro-expressions based on Gaussian cloud distribution. CAAI Trans Intell Technol 2(1):56\u201361","journal-title":"CAAI Trans Intell Technol"},{"key":"6684_CR36","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.comnet.2017.09.003","volume":"129","author":"I Yaqoob","year":"2017","unstructured":"Yaqoob I et al (2017) The rise of ransomware and emerging security challenges in the Internet of Things. Comput Netw 129:444\u2013458","journal-title":"Comput Netw"},{"issue":"4","key":"6684_CR37","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1007\/s11227-017-2150-3","volume":"74","author":"W Zhang","year":"2018","unstructured":"Zhang W, Zhu S, Tang J, Xiong N (2018) A novel trust management scheme based on Dempster\u2013Shafer evidence theory for malicious nodes detection in wireless sensor networks. J Supercomput 74(4):1779\u20131801","journal-title":"J Supercomput"},{"issue":"9","key":"6684_CR38","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","volume":"104","author":"Y Zou","year":"2016","unstructured":"Zou Y, Zhu J, Wang X, Hanzo L (2016) A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc IEEE 104(9):1727\u20131765","journal-title":"Proc IEEE"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6684-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6684-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6684-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,5]],"date-time":"2020-03-05T11:29:03Z","timestamp":1583407743000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6684-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,25]]},"references-count":38,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["6684"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6684-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,25]]},"assertion":[{"value":"24 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}