{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T23:04:10Z","timestamp":1769209450258,"version":"3.49.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T00:00:00Z","timestamp":1598659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T00:00:00Z","timestamp":1598659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s12083-020-00988-1","type":"journal-article","created":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T09:02:42Z","timestamp":1598691762000},"page":"135-150","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["On the issues of selective jamming in IEEE 802.15.4-based wireless body area networks"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5091-5768","authenticated-orcid":false,"given":"M\u2019hammed","family":"Achour","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"MANA","sequence":"additional","affiliation":[]},{"given":"Abderrezak","family":"Rachedi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,29]]},"reference":[{"key":"988_CR1","doi-asserted-by":"publisher","unstructured":"IEEE 802.15 WG (2006) IEEE Standard for Information technology\u2013 Local and metropolitan area networks\u2013 Specific requirements\u2013 Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (WPANs). IEEE Std 802.15.4-2006 (Revision of IEEE Std 802.15.4-2003), pp 1\u2013320. https:\/\/doi.org\/10.1109\/IEEESTD.2006.232110","DOI":"10.1109\/IEEESTD.2006.232110"},{"key":"988_CR2","doi-asserted-by":"crossref","unstructured":"Achour M, Mana M, Rachedi A (2018) New Slot-Head jamming attack and mitigation mechanism for wireless body area networks. In: 2018 IEEE Global communications conference: ad hoc and sensor networks (globecom2018 AHSN). Abu Dhabi, United Arab Emirates","DOI":"10.1109\/GLOCOM.2018.8647717"},{"issue":"2","key":"988_CR3","first-page":"243","volume":"3","author":"SMR Al Masud","year":"2013","unstructured":"Al Masud SMR (2013) Study and analysis of scientific scopes, issues and challenges towards developing a righteous wireless body area network. Int J Soft Comput Eng (IJSCE) 3(2):243\u2013251","journal-title":"Int J Soft Comput Eng (IJSCE)"},{"issue":"C","key":"988_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.comcom.2014.10.004","volume":"74","author":"M Bouaziz","year":"2016","unstructured":"Bouaziz M, Rachedi A (2016) A survey on mobility management protocols in wireless sensor networks based on 6lowpan technology. Comput. Commun 74(C):3\u201315. https:\/\/doi.org\/10.1016\/j.comcom.2014.10.004","journal-title":"Comput. Commun"},{"key":"988_CR5","unstructured":"Chen F, Dressler F (2007) A simulation model of ieee 802.15. 4 in omnet++. Proc. of the 6th GI\/ITG KuVS Fachgesprach Drahtlose Sensornetze (FGSN), pp 35\u201338"},{"issue":"2","key":"988_CR6","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s11036-010-0260-8","volume":"16","author":"M Chen","year":"2011","unstructured":"Chen M, Gonzalez S, Vasilakos A, Cao H, Leung VC (2011) Body area networks: A survey. Mob. Netw. Appl 16(2):171\u2013193. https:\/\/doi.org\/10.1007\/s11036-010-0260-8","journal-title":"Mob. Netw. Appl"},{"issue":"5","key":"988_CR7","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1007\/s11276-013-0673-y","volume":"20","author":"R Daidone","year":"2014","unstructured":"Daidone R, Dini G, Tiloca M (2014) A solution to the gts-based selective jamming attack on ieee 802.15.4 networks. Wirel. Netw 20(5):1223\u20131235. https:\/\/doi.org\/10.1007\/s11276-013-0673-y","journal-title":"Wirel. Netw"},{"issue":"5","key":"988_CR8","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MC.2004.1297237,","volume":"37","author":"E Dishman","year":"2004","unstructured":"Dishman E (2004) Inventing wellness systems for aging in place. Computer 37(5):34\u201341. https:\/\/doi.org\/10.1109\/MC.2004.1297237,","journal-title":"Computer"},{"key":"988_CR9","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.adhoc.2016.05.008","volume":"48","author":"N Haddadou","year":"2016","unstructured":"Haddadou N, Rachedi A, Ghamri-Doudane Y (2016) To send or to defer? improving the ieee 802.11p\/1609.4 transmission scheme. Ad Hoc Netw 48:53\u201365","journal-title":"Ad Hoc Netw"},{"key":"988_CR10","doi-asserted-by":"crossref","unstructured":"Istepanian R, Laxminarayan S, Pattichis CS (2007) M-health: emerging mobile health systems springer science & business media","DOI":"10.1007\/b137697"},{"issue":"5","key":"988_CR11","doi-asserted-by":"publisher","first-page":"1517","DOI":"10.1007\/s11276-014-0855-2","volume":"21","author":"SS Jung","year":"2015","unstructured":"Jung SS, Valero M, Bourgeois A, Beyah R (2015) Attacking and securing beacon-enabled 802.15.4 networks. Wireless Networks 21(5):1517\u20131535. https:\/\/doi.org\/10.1007\/s11276-014-0855-2","journal-title":"Wireless Networks"},{"issue":"1","key":"988_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11276-010-0252-4","volume":"17","author":"B Latr\u00e9","year":"2011","unstructured":"Latr\u00e9 B, Braem B, Moerman I, Blondia C, Demeester P (2011) A survey on wireless body area networks. Wirel. Netw 17(1):1\u201318. https:\/\/doi.org\/10.1007\/s11276-010-0252-4","journal-title":"Wirel. Netw"},{"key":"988_CR13","unstructured":"Mana M, Feham M, Bensaber BA (2009) Sekeban (secure and efficient key exchange for wireless body area network )"},{"key":"988_CR14","first-page":"75","volume":"12","author":"M Mana","year":"2011","unstructured":"Mana M, Feham M, Bensaber BA (2011) Trust key management scheme for wireless body area networks. I. J. Network Security 12:75\u201383","journal-title":"I. J. Network Security"},{"issue":"5","key":"988_CR15","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1016\/j.adhoc.2004.08.002","volume":"3","author":"J Mi\u0161i\u0107","year":"2005","unstructured":"Mi\u0161i\u0107 J, Shafi S, Mi\u0161i\u0107 VB (2005) The impact of mac parameters on the performance of 802.15. 4 pan. Ad Hoc Networks 3(5):509\u2013528","journal-title":"Ad Hoc Networks"},{"issue":"3","key":"988_CR16","doi-asserted-by":"publisher","first-page":"1658","DOI":"10.1109\/SURV.2013.121313.00064","volume":"16","author":"S Movassaghi","year":"2014","unstructured":"Movassaghi S, Abolhasan M, Lipman J, Smith D, Jamalipour A (2014) Wireless body area networks: a survey. IEEE Communications Surveys Tutorials 16(3):1658\u20131686. https:\/\/doi.org\/10.1109\/SURV.2013.121313.00064","journal-title":"IEEE Communications Surveys Tutorials"},{"key":"988_CR17","doi-asserted-by":"publisher","unstructured":"Nguyen-Minh H, Benslimane A, Rachedi A (2015) Jamming detection on 802.11p under multi-channel operation in vehicular networks. In: 2015 IEEE 11Th international conference on wireless and mobile computing, networking and communications (wimob), pp. 764\u2013770, DOI https:\/\/doi.org\/10.1109\/WiMOB.2015.7348039","DOI":"10.1109\/WiMOB.2015.7348039"},{"issue":"4","key":"988_CR18","first-page":"307","volume":"1","author":"C Otto","year":"2005","unstructured":"Otto C, Milenkovi\u0107 A, Sanders C, Jovanov E (2005) System architecture of a wireless body area sensor network for ubiquitous health monitoring. J. Mob. Multimed 1(4):307\u2013326. http:\/\/dl.acm.org\/citation.cfm?id=2010498.2010502","journal-title":"J. Mob. Multimed"},{"issue":"1","key":"988_CR19","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/TDSC.2011.41","volume":"9","author":"A Proano","year":"2012","unstructured":"Proano A, Lazos L (2012) Packet-hiding methods for preventing selective jamming attacks. IEEE Transactions on Dependable and Secure Computing 9(1):101\u2013114. https:\/\/doi.org\/10.1109\/TDSC.2011.41","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"988_CR20","doi-asserted-by":"publisher","unstructured":"Rachedi A, Benslimane A (2016) Multi-objective optimization for security and qos adaptation in wireless sensor networks. In: 2016 IEEE International conference on communications (ICC), pp. 1\u20137, DOI https:\/\/doi.org\/10.1109\/ICC.2016.7510879","DOI":"10.1109\/ICC.2016.7510879"},{"issue":"3","key":"988_CR21","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1007\/s12083-016-0507-7","volume":"10","author":"VK Sharma","year":"2017","unstructured":"Sharma VK, Kumar M (2017) Adaptive congestion control scheme in mobile ad-hoc networks. Peer-to-Peer Networking and Applications 10(3):633\u2013657","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"1","key":"988_CR22","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1080\/00207217.2018.1501613","volume":"106","author":"VK Sharma","year":"2019","unstructured":"Sharma VK, Kumar M (2019) Adaptive load distribution approach based on congestion control scheme in ad-hoc networks. Int J Electron 106(1):48\u201368","journal-title":"Int J Electron"},{"issue":"2","key":"988_CR23","doi-asserted-by":"publisher","first-page":"72","DOI":"10.5815\/ijisa.2018.02.07","volume":"11","author":"VK Sharma","year":"2018","unstructured":"Sharma VK, Verma LP, Kumar M (2018) A fuzzy-based adaptive energy efficient load distribution scheme in ad-hoc networks. International Journal of Intelligent Systems and Applications 11(2):72","journal-title":"International Journal of Intelligent Systems and Applications"},{"key":"988_CR24","doi-asserted-by":"publisher","unstructured":"Sokullu R, Dagdeviren O, Korkmaz I (2008) On the ieee 802.15.4 mac layer attacks: Gts attack. In: 2008 Second international conference on sensor technologies and applications (sensorcomm 2008), pp. 673\u2013678, DOI https:\/\/doi.org\/10.1109\/SENSORCOMM.2008.75","DOI":"10.1109\/SENSORCOMM.2008.75"},{"issue":"1","key":"988_CR25","first-page":"104","volume":"2","author":"R Sokullu","year":"2009","unstructured":"Sokullu R, Korkmaz I, Dagdeviren O (2009) Gts attack:, An ieee 802.15. 4 mac layer attack in wireless sensor networks. International Journal On Advances in Internet Technologies 2(1):104\u2013114","journal-title":"International Journal On Advances in Internet Technologies"},{"key":"988_CR26","doi-asserted-by":"crossref","unstructured":"Tiloca M, De Guglielmo D, Dini G, Anastasi G, Das SK (2018) Dish: Distributed shuffling against selective jamming attack in ieee 802.15. 4e tsch networks ACM transactions on sensor networks","DOI":"10.1145\/3241052"},{"issue":"4","key":"988_CR27","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1109\/TDSC.2015.2467391","volume":"14","author":"M Tiloca","year":"2017","unstructured":"Tiloca M, Guglielmo DD, Dini G, Anastasi G, Das SK (2017) Jammy: a distributed and dynamic solution to selective jamming attack in tdma wsns. IEEE Transactions on Dependable and Secure Computing 14(4):392\u2013405. https:\/\/doi.org\/10.1109\/TDSC.2015.2467391","journal-title":"IEEE Transactions on Dependable and Secure Computing"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00988-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-020-00988-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00988-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,28]],"date-time":"2021-08-28T23:39:29Z","timestamp":1630193969000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-020-00988-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,29]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["988"],"URL":"https:\/\/doi.org\/10.1007\/s12083-020-00988-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,29]]},"assertion":[{"value":"3 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}