{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T09:04:28Z","timestamp":1772355868231,"version":"3.50.1"},"reference-count":94,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T00:00:00Z","timestamp":1713916800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T00:00:00Z","timestamp":1713916800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SOCA"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s11761-024-00396-w","type":"journal-article","created":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T10:02:06Z","timestamp":1713952926000},"page":"225-247","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A detailed review\u00a0of\u00a0wireless sensor network, jammer, the types, location,\u00a0detection and countermeasures of jammers"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1927-8569","authenticated-orcid":false,"given":"Zainab Shaker Matar","family":"Al-Husseini","sequence":"first","affiliation":[]},{"given":"Hussain K.","family":"Chaiel","sequence":"additional","affiliation":[]},{"given":"Amel","family":"Meddeb","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Fakhfakh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,24]]},"reference":[{"key":"396_CR1","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Commun Mag 40:102\u2013114","journal-title":"IEEE Commun Mag"},{"key":"396_CR2","doi-asserted-by":"crossref","unstructured":"Mann PS, Singh S, Kumar A (2016) Computational intelligence based meta heuristic for energy-efficient routing in wireless sensor networks. In: Congress on evolutionary computation (CEC). IEEE, pp 4460\u20134467","DOI":"10.1109\/CEC.2016.7744357"},{"issue":"10","key":"396_CR3","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MC.2008.441","volume":"41","author":"JA Stankovic","year":"2008","unstructured":"Stankovic JA (2008) Wireless sensor networks. Computer (Long Beach Calif) 41(10):92\u201395. https:\/\/doi.org\/10.1109\/MC.2008.441","journal-title":"Computer (Long Beach Calif)"},{"issue":"2","key":"396_CR4","doi-asserted-by":"publisher","first-page":"63","DOI":"10.5121\/ijcses.2010.1206","volume":"1","author":"SK Singh","year":"2010","unstructured":"Singh SK, Singh MP (2010) Singh DK (2010) Routing protocols in wireless sensor networks\u2014a survey. Int J Comput Sci Eng Surv 1(2):63\u201383","journal-title":"Int J Comput Sci Eng Surv"},{"key":"396_CR5","doi-asserted-by":"crossref","unstructured":"Tamandani Y, Bokhari M (2015) SEPFL routing protocol based on fuzzy logic control to extend the lifetime and throughput of the wireless sensor network. Wirel Netw, pp 1\u20135","DOI":"10.1007\/s11276-015-0997-x"},{"key":"396_CR6","volume-title":"A secure platform of wireless sensor networks","author":"A. Moh\u2019d, H. Marzi, N. Aslam,","year":"2011","unstructured":"A. Moh\u2019d, H. Marzi, N. Aslam, et al (2011) A secure platform of wireless sensor networks. Elsevier, Amsterdam"},{"key":"396_CR7","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/J.PROCS.2016.03.094","volume":"79","author":"S Patil","year":"2016","unstructured":"Patil S, Chaudhari S (2016) DoS attack prevention technique in wireless sensor networks. Proc Comput Sci 79:715\u2013721. https:\/\/doi.org\/10.1016\/J.PROCS.2016.03.094","journal-title":"Proc Comput Sci"},{"issue":"6","key":"396_CR8","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A Perrig","year":"2004","unstructured":"Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Commun ACM 47(6):53\u201357. https:\/\/doi.org\/10.1145\/990680.990707","journal-title":"Commun ACM"},{"key":"396_CR9","doi-asserted-by":"crossref","unstructured":"Jaitly S, Malhotra H, et al (2017\u200f) Security vulnerabilities and countermeasures against jamming attacks in wireless sensor networks: a survey\u200f. In: 2017 international conference on computer, communications and electronics (Comptelix). Accessed 15 Sep 2023. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/8004033\/","DOI":"10.1109\/COMPTELIX.2017.8004033"},{"issue":"4","key":"396_CR10","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1016\/j.comnet.2006.10.002","volume":"51","author":"I Akyildiz","year":"2007","unstructured":"Akyildiz I, Melodia T et al (2007) A survey on wireless multimedia sensor networks. Comput Network 51(4):921\u2013960. https:\/\/doi.org\/10.1016\/j.comnet.2006.10.002","journal-title":"Comput Network"},{"issue":"4","key":"396_CR11","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393\u2013422","journal-title":"Comput Netw"},{"key":"396_CR12","unstructured":"Stafford KM (1995) Characterization of blue whale calls from the northeast Pacific and development of a matched filter to locate blue whales on the U.S. Navy SOSUS (SOundSUrveillance System) arrays. Accessed 15 Sep 2023. Available: https:\/\/ir.library.oregonstate.edu\/concern\/graduate_thesis_or_dissertations\/9880vv98j?locale=en"},{"issue":"4","key":"396_CR13","first-page":"13","volume":"27","author":"CE Nishimura","year":"1993","unstructured":"Nishimura CE (1993) IUSS dual use: monitoring whales and earthquakes using SOSUS. Mar Technol Soc J 27(4):13\u201321","journal-title":"Mar Technol Soc J"},{"key":"396_CR14","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.1109\/JPROC.2003.814918","volume":"91","author":"CY Chong","year":"2003","unstructured":"Chong CY, Kumar SP (2003) Sensor networks: evolution, opportunities, and challenges. Proc IEEE 91:1247\u20131256","journal-title":"Proc IEEE"},{"key":"396_CR15","volume-title":"Microsensors, MEMS, and smart devices","author":"JW Gardner","year":"2003","unstructured":"Gardner JW, Varadan VK, Awadelkarim OO (2003) Microsensors, MEMS, and smart devices. Wiley, New York"},{"key":"396_CR16","unstructured":"Wireless sensor networks (2006). Accessed 15 Sep 2023. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/4640674\/."},{"issue":"2","key":"396_CR17","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/S10776-016-0307-2\/METRICS","volume":"23","author":"P Mohanty","year":"2016","unstructured":"Mohanty P, Kabat MR (2016) Energy efficient reliable multi-path data transmission in WSN for healthcare application. Int J Wirel Inf Netw 23(2):162\u2013172. https:\/\/doi.org\/10.1007\/S10776-016-0307-2\/METRICS","journal-title":"Int J Wirel Inf Netw"},{"issue":"9","key":"396_CR18","doi-asserted-by":"publisher","first-page":"1132","DOI":"10.1016\/J.COMCOM.2011.11.007","volume":"35","author":"H Yousefi","year":"2012","unstructured":"Yousefi H, Yeganeh MH, Alinaghipour N, Movaghar A (2012) Structure-free real-time data aggregation in wireless sensor networks. Comput Commun 35(9):1132\u20131140. https:\/\/doi.org\/10.1016\/J.COMCOM.2011.11.007","journal-title":"Comput Commun"},{"issue":"3","key":"396_CR19","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.eij.2012.10.003","volume":"13","author":"HH Soliman","year":"2012","unstructured":"Soliman HH, Hikal NA, Sakr NA (2012) A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks. Egypt Inform J 13(3):225\u2013238","journal-title":"Egypt Inform J"},{"issue":"4","key":"396_CR20","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1016\/J.ASEJ.2014.05.009","volume":"5","author":"P Mohanty","year":"2014","unstructured":"Mohanty P, Kabat MR (2014) A hierarchical energy efficient reliable transport protocol for wireless sensor networks. Ain Shams Eng J 5(4):1141\u20131155. https:\/\/doi.org\/10.1016\/J.ASEJ.2014.05.009","journal-title":"Ain Shams Eng J"},{"key":"396_CR21","unstructured":"Rani S, Gulati ET (2012) An improved PEGASIS protocol to enhance energy utilization in WSN. Accessed 17 Sep 2023. Available: http:\/\/www.ijccr.com"},{"key":"396_CR22","doi-asserted-by":"publisher","unstructured":"Chauhan S, Nene MJ (2023) PEGASIS - LEACH: energy efficient protocols with route optimised techniques. In: 2023 international conference for advancement in technology, ICONAT 2023. https:\/\/doi.org\/10.1109\/ICONAT57137.2023.10080381","DOI":"10.1109\/ICONAT57137.2023.10080381"},{"key":"396_CR23","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/J.PROCS.2021.10.062","volume":"194","author":"S Sadhana","year":"2021","unstructured":"Sadhana S, Sivaraman E, Daniel D (2021) Enhanced energy efficient routing for wireless sensor network using extended power efficient gathering in sensor information systems (E-PEGASIS) protocol. Proc Comput Sci 194:89\u2013101. https:\/\/doi.org\/10.1016\/J.PROCS.2021.10.062","journal-title":"Proc Comput Sci"},{"key":"396_CR24","doi-asserted-by":"publisher","unstructured":"Chao CM, Hsiao TY (2009) Design of structure-free and energy-balanced data aggregation in wireless sensor networks. In: 11th IEEE international conference on high performance computing and communications, HPCC 2009, pp. 222\u2013229. https:\/\/doi.org\/10.1109\/HPCC.2009.63.","DOI":"10.1109\/HPCC.2009.63"},{"key":"396_CR25","doi-asserted-by":"publisher","unstructured":"Yeganeh MH, Yousefi H, Alinaghipour N, Movaghar A (2011) RDAG: a structure-free real-time data aggregation protocol for wireless sensor networks. In: Proceedings - 17th IEEE international conference on embedded and real-time computing systems and applications, RTCSA 2011, vol 1, pp 51\u201360. https:\/\/doi.org\/10.1109\/RTCSA.2011.70.","DOI":"10.1109\/RTCSA.2011.70"},{"key":"396_CR26","doi-asserted-by":"publisher","first-page":"103594","DOI":"10.1016\/J.JNCA.2023.103594","volume":"213","author":"ES Ali","year":"2023","unstructured":"Ali ES, Saeed RA, Eltahir IK, Khalifa OO (2023) A systematic review on energy efficiency in the internet of underwater things (IoUT): recent approaches and research gaps. J Netw Comput Appl 213:103594. https:\/\/doi.org\/10.1016\/J.JNCA.2023.103594","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"396_CR27","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/SURV.2009.090404","volume":"11","author":"A Mpitziopoulos","year":"2009","unstructured":"Mpitziopoulos A, Gavalas D, Konstantopoulos C, Pantziou G (2009) A survey on jamming attacks and countermeasures in WSNs. IEEE Commun Surv Tutor 11(4):42\u201356. https:\/\/doi.org\/10.1109\/SURV.2009.090404","journal-title":"IEEE Commun Surv Tutor"},{"issue":"4","key":"396_CR28","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/COMST.2007.4444752","volume":"9","author":"NA Pantazis","year":"2023","unstructured":"Pantazis NA (2023) A survey on power control issues in wireless sensor networks. IEEE Commun Surv Tutor 9(4):86\u2013107","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"396_CR29","doi-asserted-by":"publisher","first-page":"650","DOI":"10.3390\/s120100650","volume":"12","author":"M Radi","year":"2012","unstructured":"Radi M, Dezfouli B, Bakar KA, Lee M (2012) Multipath routing in wireless sensor networks: survey and research challenges. Sensors 12(1):650\u2013685. https:\/\/doi.org\/10.3390\/s120100650","journal-title":"Sensors"},{"issue":"9","key":"396_CR30","doi-asserted-by":"publisher","first-page":"11196","DOI":"10.3390\/s130911196","volume":"13","author":"GP Joshi","year":"2013","unstructured":"Joshi GP, Nam SY, Kim SW (2013) Cognitive radio wireless sensor networks: Applications, challenges and research trends. Sensors 13(9):11196\u201311228. https:\/\/doi.org\/10.3390\/s130911196","journal-title":"Sensors"},{"key":"396_CR31","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-981-19-0604-6_12\/COVER","volume":"394","author":"AS Abdalkafor","year":"2022","unstructured":"Abdalkafor AS, Aliesawi SA (2022) Efficient data aggregation strategy in wireless sensor networks: challenges and significant applications. Lect Notes Netw Syst 394:131\u2013139. https:\/\/doi.org\/10.1007\/978-981-19-0604-6_12\/COVER","journal-title":"Lect Notes Netw Syst"},{"key":"396_CR32","doi-asserted-by":"publisher","unstructured":"Sharma S, Bansal RK, Bansal S (2014) Issues and challenges in wireless sensor networks. In: Proceedings - 2013 international conference on machine intelligence research and advancement, ICMIRA 2013, pp 58\u201362. https:\/\/doi.org\/10.1109\/ICMIRA.2013.18","DOI":"10.1109\/ICMIRA.2013.18"},{"key":"396_CR33","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1109\/EUROCON.2013.6624996","volume":"2013","author":"A De La Piedra","year":"2013","unstructured":"De La Piedra A, Benitez-Capistros F, Dominguez F, Touhafi A (2013) Wireless sensor networks for environmental research: a survey on limitations and challenges. IEEE EuroCon 2013:267\u2013274. https:\/\/doi.org\/10.1109\/EUROCON.2013.6624996","journal-title":"IEEE EuroCon"},{"issue":"10","key":"396_CR34","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"AD Wood","year":"2002","unstructured":"Wood AD, Stankovic JA (2002) Denial of service in sensor networks. Computer 35(10):54\u201362. https:\/\/doi.org\/10.1109\/MC.2002.1039518","journal-title":"Computer"},{"key":"396_CR35","doi-asserted-by":"publisher","unstructured":"Mpitziopoulos A, Gavalas D, Pantziou G, Konstantopoulos C (2007) Defending wireless sensor networks from jamming attacks. In: IEEE international symposium on personal, indoor and mobile radio communications, PIMRC, 2007. https:\/\/doi.org\/10.1109\/PIMRC.2007.4394775","DOI":"10.1109\/PIMRC.2007.4394775"},{"issue":"4","key":"396_CR36","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/s10878-007-9071-7","volume":"14","author":"CW Commander","year":"2007","unstructured":"Commander CW, Pardalos PM, Ryabchenko V, Uryasev S, Zrazhevsky G (2007) The wireless network jamming problem. J Comb Optim 14(4):481\u2013498. https:\/\/doi.org\/10.1007\/s10878-007-9071-7","journal-title":"J Comb Optim"},{"issue":"8","key":"396_CR37","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1109\/TMC.2010.75","volume":"9","author":"M Li","year":"2010","unstructured":"Li M, Koutsopoulos I, Poovendran R (2010) Optimal jamming attack strategies and network defense policies in wireless sensor networks. IEEE Trans Mob Comput 9(8):1119\u20131133. https:\/\/doi.org\/10.1109\/TMC.2010.75","journal-title":"IEEE Trans Mob Comput"},{"issue":"10","key":"396_CR38","doi-asserted-by":"publisher","first-page":"1515","DOI":"10.1093\/comjnl\/bxz055","volume":"62","author":"J Fan","year":"2019","unstructured":"Fan J, Liang T, Wang T, Liu J (2019) Identification and localization of the jammer in wireless sensor networks. Comput J 62(10):1515\u20131527. https:\/\/doi.org\/10.1093\/comjnl\/bxz055","journal-title":"Comput J"},{"key":"396_CR39","doi-asserted-by":"publisher","unstructured":"\u00c7akiroglu M, \u00d6zcerit AT (2010) Jamming detection mechanisms for wireless sensor networks. In: ACM international conference proceeding series, vol 2008. https:\/\/doi.org\/10.4108\/ICST.INFOSCALE2008.3484","DOI":"10.4108\/ICST.INFOSCALE2008.3484"},{"issue":"8","key":"396_CR40","doi-asserted-by":"publisher","first-page":"233","DOI":"10.22214\/ijraset.2020.30844","volume":"8","author":"K Dhivyasri","year":"2020","unstructured":"Dhivyasri K (2020) Wireless sensor network jammer attack: a detailed review. Int J Res Appl Sci Eng Technol 8(8):233\u2013238. https:\/\/doi.org\/10.22214\/ijraset.2020.30844","journal-title":"Int J Res Appl Sci Eng Technol"},{"issue":"1","key":"396_CR41","doi-asserted-by":"publisher","first-page":"178","DOI":"10.3390\/s22010178","volume":"22","author":"A Cort\u00e9s-Leal","year":"2022","unstructured":"Cort\u00e9s-Leal A, Del-Valle-soto C, Cardenas C, Valdivia LJ, Del Puerto-Flores JA (2022) Performance metric analysis for a jamming detection mechanism under collaborative and cooperative schemes in industrial wireless sensor networks. Sensors 22(1):178. https:\/\/doi.org\/10.3390\/s22010178","journal-title":"Sensors"},{"key":"396_CR42","doi-asserted-by":"publisher","unstructured":"Alnifie G, Simon R (2007) A multi-channel defense against jamming attacks in wireless sensor networks. In: Q2SWinet\u201907: proceedings of the third ACM workshop on Q2S and security for wireless and mobile networks, pp 95\u2013104. https:\/\/doi.org\/10.1145\/1298239.1298257","DOI":"10.1145\/1298239.1298257"},{"key":"396_CR43","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MNET.2006.1637931","volume":"20","author":"W Xu","year":"2006","unstructured":"Xu W, Ma K, Trappe W, Zhang Y (2006) Jamming sensor networks: attack and defense strategies. IEEE Netw 20:41\u201347","journal-title":"IEEE Netw"},{"issue":"11","key":"396_CR44","first-page":"3694","volume":"12","author":"JJ Jinisha","year":"2021","unstructured":"Jinisha JJ, Jerine S (2021) Survey on various attacks and intrusion detection mechanisms in wireless sensor networks. Turk J Comput Math Educ 12(11):3694\u20133704","journal-title":"Turk J Comput Math Educ"},{"key":"396_CR45","doi-asserted-by":"crossref","unstructured":"Wood AD, Stankovic JA, Zhou G (2007) DEEJAM: defeating energy-efficient jamming in IEEE 802.15. 4-based wireless networks. In: 4th Annual IEEE communications society conference on sensor, mesh and Ad Hoc communications and networks. IEEE, pp 60\u201369","DOI":"10.1109\/SAHCN.2007.4292818"},{"key":"396_CR46","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/J.IJPE.2015.11.008","volume":"172","author":"S Vadlamani","year":"2016","unstructured":"Vadlamani S, Eksioglu B, Medal H, Nandi A (2016) Jamming attacks on wireless networks: a taxonomic survey. Int J Prod Econ 172:76\u201394. https:\/\/doi.org\/10.1016\/J.IJPE.2015.11.008","journal-title":"Int J Prod Econ"},{"key":"396_CR47","doi-asserted-by":"publisher","unstructured":"Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the international symposium on mobile Ad Hoc networking and computing (MobiHoc), pp 46\u201357. https:\/\/doi.org\/10.1145\/1062689.1062697","DOI":"10.1145\/1062689.1062697"},{"issue":"6","key":"396_CR48","doi-asserted-by":"publisher","first-page":"1691","DOI":"10.3390\/s18061691","volume":"18","author":"O Osanaiye","year":"2018","unstructured":"Osanaiye O, Alfa AS, Hancke GP (2018) A statistical approach to detect jamming attacks in wireless sensor networks. Sensors 18(6):1691. https:\/\/doi.org\/10.3390\/s18061691","journal-title":"Sensors"},{"key":"396_CR49","doi-asserted-by":"publisher","unstructured":"Panyim K, Hayajneh T, Krishnamurthy P, Tipper D (2009) On limited-range strategic\/random jamming attacks in wireless ad hoc networks. In: Proceedings - conference on local computer networks, LCN, pp 922\u2013929. https:\/\/doi.org\/10.1109\/LCN.2009.5355041","DOI":"10.1109\/LCN.2009.5355041"},{"issue":"2","key":"396_CR50","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/SURV.2011.041110.00022","volume":"13","author":"K Pelechrinis","year":"2010","unstructured":"Pelechrinis K, Iliofotou M, Krishnamurthy SV (2010) Denial of service attacks in wireless networks: The case of jammers. IEEE Commun Surv Tutor 13(2):245\u2013257","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"396_CR51","doi-asserted-by":"publisher","first-page":"178","DOI":"10.3390\/s22010178","volume":"22","author":"A Cort\u00e9s-Leal","year":"2022","unstructured":"Cort\u00e9s-Leal A, Del-Valle-Soto C, Cardenas C, Valdivia LJ, Del Puerto-Flores JA (2022) \u201cPerformance metric analysis for a jamming detection mechanism under collaborative and cooperative schemes in industrial wireless sensor networks. Sensors 22(1):178. https:\/\/doi.org\/10.3390\/s22010178","journal-title":"Sensors"},{"issue":"5","key":"396_CR52","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1002\/WCM.734","volume":"10","author":"G Alnifie","year":"2010","unstructured":"Alnifie G, Simon R (2010) MULEPRO: a multi-channel response to jamming attacks in wireless sensor networks. Wirel Commun Mob Comput 10(5):704\u2013721. https:\/\/doi.org\/10.1002\/WCM.734","journal-title":"Wirel Commun Mob Comput"},{"issue":"12","key":"396_CR53","doi-asserted-by":"publisher","first-page":"62480","DOI":"10.1117\/12.666330","volume":"6248","author":"R Muraleedharan","year":"2006","unstructured":"Muraleedharan R, Osadciw LA (2006) Jamming attack detection and countermeasures in wireless sensor network using ant system. Wirel Sens Process 6248(12):62480. https:\/\/doi.org\/10.1117\/12.666330","journal-title":"Wirel Sens Process"},{"key":"396_CR54","doi-asserted-by":"publisher","unstructured":"Lazos L, Liu S, Krunz M (2009) Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In: Proceedings of the 2nd ACM conference on wireless network security, WiSec\u201909, pp 169\u2013180. https:\/\/doi.org\/10.1145\/1514274.1514299","DOI":"10.1145\/1514274.1514299"},{"key":"396_CR55","doi-asserted-by":"publisher","unstructured":"Broustis I, Pelechrinis K, Syrivelis D, Krishnamurthy SV, Tassiulas L (2009) FIJI: Fighting implicit jamming in 802.11 WLANs. In: Lecture notes of the institute for computer sciences, social-informatics and telecommunications engineering, vol 19 LNICST, pp 21\u201340. https:\/\/doi.org\/10.1007\/978-3-642-05284-2_2","DOI":"10.1007\/978-3-642-05284-2_2"},{"key":"396_CR56","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.183","author":"E Bayraktaroglu","year":"2008","unstructured":"Bayraktaroglu E, King C, Liu X, Noubir G, Rajaraman R, Thapa B (2008) On the Performance of IEEE 802.11 under Jamming. Mobile Netw Appl. https:\/\/doi.org\/10.1109\/INFOCOM.2008.183","journal-title":"Mobile Netw Appl"},{"key":"396_CR57","unstructured":"Bellardo J, Savage S (2003) 802.11 {Denial-of-Service} attacks: real vulnerabilities and practical solutions. In: 12th USENIX security symposium (USENIX Security 03)"},{"key":"396_CR58","doi-asserted-by":"publisher","unstructured":"Tague P, Slater D, Poovendran R, Noubir G (2008) Linear programming models for jamming attacks on network traffic flows. In: 2008 6th international symposium on modeling and optimization in mobile, Ad Hoc, and wireless networks and workshops. IEEE, pp 207\u2013216. https:\/\/doi.org\/10.1109\/WIOPT.2008.4586066","DOI":"10.1109\/WIOPT.2008.4586066"},{"key":"396_CR59","doi-asserted-by":"crossref","unstructured":"Li M, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: IEEE INFOCOM 2007-26th IEEE international conference on computer communications. IEEE, pp 1307\u20131315","DOI":"10.1109\/INFCOM.2007.155"},{"issue":"1","key":"396_CR60","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/S11590-006-0043-0","volume":"2","author":"CW Commander","year":"2008","unstructured":"Commander CW, Pardalos PM, Ryabchenko V, Shylo O, Uryasev S, Zrazhevsky G (2008) Jamming communication networks under complete uncertainty. Optim Lett 2(1):53\u201370. https:\/\/doi.org\/10.1007\/S11590-006-0043-0","journal-title":"Optim Lett"},{"key":"396_CR61","doi-asserted-by":"crossref","unstructured":"Panyim K, Hayajneh T, Krishnamurthy P, Tipper D (2009) On limited-range strategic\/random jamming attacks in wireless ad hoc networks. In: IEEE 34th conference on local computer networks. IEEE, pp 922\u2013929","DOI":"10.1109\/LCN.2009.5355041"},{"issue":"1","key":"396_CR62","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/S10796-007-9046-3\/METRICS","volume":"10","author":"C Gencer","year":"2008","unstructured":"Gencer C, Aydogan EK, Celik C (2008) A decision support system for locating VHF\/UHF radio jammer systems on the terrain. Inf Sys Front 10(1):111\u2013124. https:\/\/doi.org\/10.1007\/S10796-007-9046-3\/METRICS","journal-title":"Inf Sys Front"},{"issue":"7","key":"396_CR63","doi-asserted-by":"publisher","first-page":"2316","DOI":"10.1109\/TWC.2011.052311.101613","volume":"10","author":"H Huang","year":"2011","unstructured":"Huang H, Ahmed N, Karthik P (2011) On a new type of denial of service attack in wireless networks: the distributed jammer network. IEEE Trans Wirel Commun 10(7):2316\u20132324","journal-title":"IEEE Trans Wirel Commun"},{"issue":"2","key":"396_CR64","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/S11276-010-0295-6","volume":"17","author":"H Liu","year":"2011","unstructured":"Liu H, Liu Z, Chen Y, Xu W (2011) Determining the position of a jammer using a virtual-force iterative approach. Wirel Netw 17(2):531\u2013547. https:\/\/doi.org\/10.1007\/S11276-010-0295-6","journal-title":"Wirel Netw"},{"key":"396_CR65","doi-asserted-by":"publisher","unstructured":"Sun Y, Wang X (2009) Jammer localization in wireless sensor networks. In: 2009 5th international conference on wireless communications, networking and mobile computing, pp 1-4. IEEE.https:\/\/doi.org\/10.1109\/WICOM.2009.5302614","DOI":"10.1109\/WICOM.2009.5302614"},{"key":"396_CR66","doi-asserted-by":"publisher","unstructured":"Pelechrinis K, Koutsopoulos I, Broustis I, Krishnamurthy SV (2009) Lightweight jammer localization in wireless networks: system design and implementation. In: GLOBECOM\u2014IEEE global telecommunications conference. https:\/\/doi.org\/10.1109\/GLOCOM.2009.5425405","DOI":"10.1109\/GLOCOM.2009.5425405"},{"issue":"3","key":"396_CR67","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1109\/TPDS.2011.154","volume":"23","author":"Z Liu","year":"2011","unstructured":"Liu Z, Liu H, Xu W, Chen Y (2011) Exploiting jamming-caused neighbor changes for jammer localization. IEEE Trans Parallel Distrib Syst 23(3):547\u2013555","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"396_CR68","doi-asserted-by":"publisher","unstructured":"Wood AD, Stankovic JA, Son SH (2003) JAM: a jammed-area mapping service for sensor networks. In: Proceedings - real-time systems symposium, pp 286\u2013297. https:\/\/doi.org\/10.1109\/REAL.2003.1253275","DOI":"10.1109\/REAL.2003.1253275"},{"key":"396_CR69","doi-asserted-by":"crossref","unstructured":"Jain SK, Garg K (2009) A hybrid model of defense techniques against base station jamming attack in wireless sensor networks. In: 2009 first international conference on computational intelligence, communication systems and networks","DOI":"10.1109\/CICSYN.2009.57"},{"key":"396_CR70","doi-asserted-by":"publisher","unstructured":"Xu W, Wood T, Trappe W, Zhang Y (2004) Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceedings of the 3rd ACM workshop on wireless security, pp 80\u201389. https:\/\/doi.org\/10.1145\/1023646.1023661","DOI":"10.1145\/1023646.1023661"},{"key":"396_CR71","doi-asserted-by":"publisher","first-page":"3444","DOI":"10.3390\/s100403444","volume":"10","author":"S Misra","year":"2010","unstructured":"Misra S, Singh R, Rohith Mohan SV (2010) Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system. Sensors 10:3444\u20133479","journal-title":"Sensors"},{"key":"396_CR72","doi-asserted-by":"publisher","unstructured":"Thamilarasu G, Sridhar R (2009) Game theoretic modeling of jamming attacks in Ad hoc networks. In: Proceedings - international conference on computer communications and networks, ICCCN. https:\/\/doi.org\/10.1109\/ICCCN.2009.5235211","DOI":"10.1109\/ICCCN.2009.5235211"},{"key":"396_CR73","doi-asserted-by":"crossref","unstructured":"Khattab S, Mosse D, Melhem R (2008). Jamming mitigation in multi-radio wireless networks: reactive or proactive? In: Proceedings of the 4th international conference on Security and privacy in communication networks, pp 1\u201310","DOI":"10.1145\/1460877.1460912"},{"key":"396_CR74","doi-asserted-by":"publisher","unstructured":"Navda V, Bohra A, Ganguly S, Rubenstein D (2007) Using channel hopping to increase 802.11 resilience to jamming attacks. In: Proceedings\u2014IEEE INFOCOM, pp 2526\u20132530. https:\/\/doi.org\/10.1109\/INFCOM.2007.314","DOI":"10.1109\/INFCOM.2007.314"},{"issue":"4","key":"396_CR75","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/1282427.1282424","volume":"37","author":"R Gummadi","year":"2007","unstructured":"Gummadi R, Wetherall D, Greenstein B, Seshan S (2007) Understanding and mitigating the impact of RF interference on 802.11 networks. ACM SIGCOMM Comput Commun Rev 37(4):385\u2013396. https:\/\/doi.org\/10.1145\/1282427.1282424","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"396_CR76","doi-asserted-by":"publisher","unstructured":"Kerkez B, Watteyne T, Magliocco M, Glaser S, Pister K (2012) Feasibility analysis of controller design for adaptive channel hopping. In: Proceedings of the fourth international icst conference on performance evaluation methodologies and tools. https:\/\/doi.org\/10.4108\/ICST.VALUETOOLS2009.7934","DOI":"10.4108\/ICST.VALUETOOLS2009.7934"},{"key":"396_CR77","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1109\/TWC.2011.010411.100057","volume":"10","author":"H Wang","year":"2011","unstructured":"Wang H, Zhang L, Li T, Tugnait J (2011) Spectrally efficient jamming mitigation based on code-controlled frequency hopping. IEEE Trans Wirel Commun 10:728\u2013732","journal-title":"IEEE Trans Wirel Commun"},{"key":"396_CR78","doi-asserted-by":"crossref","unstructured":"Yoon SU, Murawski R, Ekici E, Park S, Mir ZH (2010) Adaptive channel hopping for interference robust wireless sensor networks. In: 2010 IEEE international conference on communications. IEEE, pp 1\u20135","DOI":"10.1109\/ICC.2010.5502780"},{"key":"396_CR79","doi-asserted-by":"crossref","unstructured":"Pelechrinis K, Koufogiannakis C, Krishnamurthy SV (2009) Gaming the jammer: Is frequency hopping effective? In: 2009 7th international symposium on modeling and optimization in mobile, ad hoc, and wireless networks","DOI":"10.1109\/WIOPT.2009.5291621"},{"key":"396_CR80","doi-asserted-by":"publisher","unstructured":"Khattab S, Moss\u00e9 D, Melhem R (2008) Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks. In: Proceedings of the 5th annual international conference on mobile and ubiquitous systems: computing, networking, and services. https:\/\/doi.org\/10.4108\/ICST.MOBIQUITOUS2008.3604","DOI":"10.4108\/ICST.MOBIQUITOUS2008.3604"},{"issue":"2","key":"396_CR81","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1824766.1824772","volume":"7","author":"M Strasser","year":"2010","unstructured":"Strasser M, Danev B, \u010capkun S (2010) Detection of reactive jamming in sensor networks. ACM Trans Sens Netw 7(2):1\u201329. https:\/\/doi.org\/10.1145\/1824766.1824772","journal-title":"ACM Trans Sens Netw"},{"key":"396_CR82","doi-asserted-by":"publisher","unstructured":"Chiang JT, Hu YC (2007) Cross-layer jamming detection and mitigation in wireless broadcast networks. In: Proceedings of the annual international conference on mobile computing and networking, MOBICOM, pp 346\u2013349. https:\/\/doi.org\/10.1145\/1287853.1287901","DOI":"10.1145\/1287853.1287901"},{"key":"396_CR83","unstructured":"IEEE Staff (2017). In: 2007 international conference on computer, communications and electronics (Comptelix). IEEE"},{"key":"396_CR84","unstructured":"Ilavarasan S (2018) A survey on jamming attacks in wireless sensor networks. Int J Innov Eng Sci 3(7):1\u201310."},{"issue":"21","key":"396_CR85","doi-asserted-by":"publisher","first-page":"8159","DOI":"10.3390\/s22218159","volume":"22","author":"Y Chen","year":"2022","unstructured":"Chen Y, Niu Y, Chen C, Zhou Q, Xiang P (2022) A distributed anti-jamming algorithm based on actor\u2013critic countering intelligent malicious jamming for WSN. Sensors 22(21):8159. https:\/\/doi.org\/10.3390\/s22218159","journal-title":"Sensors"},{"issue":"12","key":"396_CR86","doi-asserted-by":"publisher","first-page":"4060","DOI":"10.3390\/s21124060","volume":"21","author":"J Parras","year":"2021","unstructured":"Parras J, H\u00fcttenrauch M, Zazo S, Neumann G (2021) Deep reinforcement learning for attacking wireless sensor networks. Sensors 21(12):4060. https:\/\/doi.org\/10.3390\/s21124060","journal-title":"Sensors"},{"issue":"12","key":"396_CR87","doi-asserted-by":"publisher","first-page":"16288","DOI":"10.1109\/TVT.2020.3040334","volume":"69","author":"B Duo","year":"2020","unstructured":"Duo B, Wu Q, Yuan X, Zhang R (2020) Anti-jamming 3D trajectory design for UAV-enabled wireless sensor networks under probabilistic LoS channel. IEEE Trans Veh Technol 69(12):16288\u201316293. https:\/\/doi.org\/10.1109\/TVT.2020.3040334","journal-title":"IEEE Trans Veh Technol"},{"key":"396_CR88","doi-asserted-by":"publisher","first-page":"101874","DOI":"10.1016\/j.adhoc.2019.101874","volume":"91","author":"SG Hymlin Rose","year":"2019","unstructured":"Hymlin Rose SG, Jayasree T (2019) Detection of jamming attack using timestamp for WSN. Ad Hoc Netw 91:101874. https:\/\/doi.org\/10.1016\/j.adhoc.2019.101874","journal-title":"Ad Hoc Netw"},{"issue":"11","key":"396_CR89","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijcnis.2019.11.01","volume":"11","author":"NFA Al-Shai","year":"2019","unstructured":"Al-Shai NFA, Hassanpour R (2019) Active defense strategy against jamming attack in wireless sensor networks. Int J Comput Netw Inf Sec 11(11):1\u201313. https:\/\/doi.org\/10.5815\/ijcnis.2019.11.01","journal-title":"Int J Comput Netw Inf Sec"},{"issue":"2","key":"396_CR90","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1007\/s11277-018-6042-5","volume":"104","author":"M Meenalochani","year":"2019","unstructured":"Meenalochani M, Sudha S (2019) Jammed node detection and routing in a multihop wireless sensor network using hybrid techniques. Wirel Pers Commun 104(2):663\u2013675. https:\/\/doi.org\/10.1007\/s11277-018-6042-5","journal-title":"Wirel Pers Commun"},{"issue":"4","key":"396_CR91","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1109\/TCOMM.2017.2736550","volume":"66","author":"P Bhavathankar","year":"2018","unstructured":"Bhavathankar P, Chatterjee S, Misra S (2018) Link-quality aware path selection in the presence of proactive jamming in fallible wireless sensor networks. IEEE Trans Commun 66(4):1689\u20131704. https:\/\/doi.org\/10.1109\/TCOMM.2017.2736550","journal-title":"IEEE Trans Commun"},{"issue":"1","key":"396_CR92","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-016-0528-1","volume":"2016","author":"P Ganeshkumar","year":"2016","unstructured":"Ganeshkumar P, Vijayakumar KP, Anandaraj M (2016) A novel jammer detection framework for cluster-based wireless sensor networks. Eurasip J Wirel Commun Netw 2016(1):1\u201325. https:\/\/doi.org\/10.1186\/s13638-016-0528-1","journal-title":"Eurasip J Wirel Commun Netw"},{"issue":"1","key":"396_CR93","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3906\/elk-0912-334","volume":"19","author":"M \u00c7akiro\u01e7lu","year":"2011","unstructured":"\u00c7akiro\u01e7lu M, \u00d6ozcerit AT (2011) Design and evaluation of a query-based jamming detection algorithm for wireless sensor networks. Turk J Electr Eng Comput Sci 19(1):1\u201319. https:\/\/doi.org\/10.3906\/elk-0912-334","journal-title":"Turk J Electr Eng Comput Sci"},{"issue":"4","key":"396_CR94","doi-asserted-by":"publisher","first-page":"3444","DOI":"10.3390\/s100403444","volume":"10","author":"S Misra","year":"2010","unstructured":"Misra S, Singh R, Rohith Mohan SV (2010) Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system. Sensors 10(4):3444\u20133479. https:\/\/doi.org\/10.3390\/s100403444","journal-title":"Sensors"}],"container-title":["Service Oriented Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-024-00396-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11761-024-00396-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-024-00396-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T10:18:28Z","timestamp":1726481908000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11761-024-00396-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,24]]},"references-count":94,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["396"],"URL":"https:\/\/doi.org\/10.1007\/s11761-024-00396-w","relation":{},"ISSN":["1863-2386","1863-2394"],"issn-type":[{"value":"1863-2386","type":"print"},{"value":"1863-2394","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,24]]},"assertion":[{"value":"30 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}