{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T07:07:44Z","timestamp":1763536064064,"version":"3.37.3"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T00:00:00Z","timestamp":1674172800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T00:00:00Z","timestamp":1674172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Deanship of Scientific Research, Prince Sattam bin Abdulaziz University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Radio jamming represents a serious threat in wireless networks that can cause denial of service (DoS) attacks for the network users. The jammer transmits jamming signals to disrupt the normal operation of the wireless networks. With proliferation of unmanned aerial vehicle (UAV)-based wireless networks and Internet of Things technologies, jamming attacks have become a major challenge to the practical adoption of these technologies. In this paper, we investigate the problem of optimizing the performance of the UAV data collection from ground IoT devices in presence of a malicious jammer. The IoT devices are clustered, and the UAV collects the data from the cluster heads (CHs) such that the harmful effect of the jammer is mitigated. The objective is to minimize the flight time of the UAV while collecting the data from the ground IoT devices in presence of the jamming attack. We modeled our problem mathematically as an integer linear program (ILP). Due to the difficulty of solving the optimization problem when the scale of the problem is large, we proposed Jamming-Aware UAV Routing and IoT Devices Clustering Algorithm (JA-RC). This algorithm is Genetic-based and can solve the original optimization problem in a more efficient way. Then, we investigate the performance of the proposed algorithm under different settings and scenarios.<\/jats:p>","DOI":"10.1007\/s40747-023-00970-3","type":"journal-article","created":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T08:00:16Z","timestamp":1674201616000},"page":"4571-4590","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Jamming-aware optimization for UAV trajectory design and internet of things devices clustering"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9805-970X","authenticated-orcid":false,"given":"Abdullah","family":"Almasoud","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,20]]},"reference":[{"key":"970_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7470933","author":"Y Zeng","year":"2016","unstructured":"Zeng Y, Zhang R, Lim TJ (2016) Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Commun Magz. https:\/\/doi.org\/10.1109\/MCOM.2016.7470933","journal-title":"IEEE Commun Magz"},{"key":"970_CR2","doi-asserted-by":"publisher","DOI":"10.3390\/s21196371","author":"AM Almasoud","year":"2021","unstructured":"Almasoud AM (2021) Uav-based intelligent transportation system for emergency reporting in coverage holes of wireless networks. Sensors. https:\/\/doi.org\/10.3390\/s21196371","journal-title":"Sensors"},{"key":"970_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2922263","author":"AM Almasoud","year":"2019","unstructured":"Almasoud AM, Kamal AE (2019) Data dissemination in IoT using a cognitive UAV. IEEE Trans Cognit Commun Netw. https:\/\/doi.org\/10.1109\/TCCN.2019.2922263","journal-title":"IEEE Trans Cognit Commun Netw"},{"key":"970_CR4","doi-asserted-by":"crossref","unstructured":"Almasoud AM, Selim MY, Alqasir A, Shabnam T, Masadeh A, Kamal AE (2018) Energy efficient data forwarding in disconnected networks using cooperative UAVs. In: 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings","DOI":"10.1109\/GLOCOM.2018.8647594"},{"key":"970_CR5","doi-asserted-by":"crossref","unstructured":"Pirayesh H, Zeng H (2022) Jamming attacks and anti-jamming strategies in wireless networks: a comprehensive survey","DOI":"10.1109\/COMST.2022.3159185"},{"key":"970_CR6","doi-asserted-by":"publisher","unstructured":"Xiao L, Lu X, Xu D, Tang Y, Wang L, Zhuang W (2018) UAV relay in VANETs against smart jamming with reinforcement learning. IEEE Trans Vehicular Technol. https:\/\/doi.org\/10.1109\/TVT.2018.2789466","DOI":"10.1109\/TVT.2018.2789466"},{"key":"970_CR7","doi-asserted-by":"publisher","unstructured":"Duo B, Wu Q, Yuan X, Zhang R (2020) Anti-Jamming 3D Trajectory Design for UAV-Enabled Wireless Sensor Networks under Probabilistic LoS Channel. IEEE Transactions on Vehicular Technology. 69(12). https:\/\/doi.org\/10.1109\/TVT.2020.3040334","DOI":"10.1109\/TVT.2020.3040334"},{"key":"970_CR8","doi-asserted-by":"publisher","unstructured":"Wu Y, Yang W, Guan X, Wu Q (2021) Energy-Efficient Trajectory Design for UAV-Enabled Communication under Malicious Jamming. IEEE Wireless Communications Letters. 10(2). https:\/\/doi.org\/10.1109\/LWC.2020.3024548","DOI":"10.1109\/LWC.2020.3024548"},{"key":"970_CR9","doi-asserted-by":"crossref","unstructured":"Lu X, Xu D, Xiao L, Wang L, Zhuang W (2017) Anti-Jamming Communication Game for UAV-Aided VANETs. In: 2017 IEEE Global Communications Conference, GLOBECOM 2017 - Proceedings. vol. 2018-Janua","DOI":"10.1109\/GLOCOM.2017.8253987"},{"key":"970_CR10","doi-asserted-by":"publisher","unstructured":"Lu X, Xiao L, Dai C, Dai H (2020) UAV-Aided Cellular Communications with Deep Reinforcement Learning against Jamming. IEEE Wireless Communications. 27(4). https:\/\/doi.org\/10.1109\/MWC.001.1900207","DOI":"10.1109\/MWC.001.1900207"},{"key":"970_CR11","doi-asserted-by":"publisher","unstructured":"Mah MC, Lim HS, Tan AWC (2019) UAV relay flight path planning in the presence of jamming signal. IEEE Access. 7. https:\/\/doi.org\/10.1109\/ACCESS.2019.2907962","DOI":"10.1109\/ACCESS.2019.2907962"},{"key":"970_CR12","doi-asserted-by":"publisher","unstructured":"Xu Y, Ren G, Chen J, Luo Y, Jia L, Liu X, et\u00a0al (2018) A One-Leader Multi-Follower Bayesian-Stackelberg Game for Anti-Jamming Transmission in UAV Communication Networks. IEEE Access. 6. https:\/\/doi.org\/10.1109\/ACCESS.2018.2828033","DOI":"10.1109\/ACCESS.2018.2828033"},{"key":"970_CR13","doi-asserted-by":"publisher","unstructured":"Peng J, Zhang Z, Wu Q, Zhang B (2019) Anti-Jamming Communications in UAV Swarms: A Reinforcement Learning Approach. IEEE Access. 7. https:\/\/doi.org\/10.1109\/ACCESS.2019.2958328","DOI":"10.1109\/ACCESS.2019.2958328"},{"key":"970_CR14","doi-asserted-by":"crossref","unstructured":"Xu Y, Ren G, Chen J, Zhang X, Jia L, Feng Z, et\u00a0al (2019) Joint Power and Trajectory Optimization in UAV Anti-Jamming Communication Networks. In: IEEE International Conference on Communications. vol. 2019-May","DOI":"10.1109\/ICC.2019.8761467"},{"key":"970_CR15","doi-asserted-by":"crossref","unstructured":"Lv S, Xiao L, Hu Q, Wang X, Hu C, Sun L (2017) Anti-Jamming Power Control Game in Unmanned Aerial Vehicle Networks. In: 2017 IEEE Global Communications Conference, GLOBECOM 2017 - Proceedings. vol. 2018-Janua;","DOI":"10.1109\/GLOCOM.2017.8253988"},{"key":"970_CR16","doi-asserted-by":"publisher","unstructured":"Li X, Tan J, Liu A, Vijayakumar P, Kumar N, Alazab M (2021) A Novel UAV-Enabled Data Collection Scheme for Intelligent Transportation System through UAV Speed Control. IEEE Transactions on Intelligent Transportation Systems. 22(4). https:\/\/doi.org\/10.1109\/TITS.2020.3040557","DOI":"10.1109\/TITS.2020.3040557"},{"key":"970_CR17","doi-asserted-by":"crossref","unstructured":"Pang Y, Zhang Y, Gu Y, Pan M, Han Z, Li P (2014) Efficient data collection for wireless rechargeable sensor clusters in Harsh terrains using UAVs. In: 2014 IEEE Global Communications Conference, GLOBECOM 2014","DOI":"10.1109\/GLOCOM.2014.7036813"},{"key":"970_CR18","doi-asserted-by":"crossref","unstructured":"Chen J, Yan F, Mao S, Shen F, Xia W, Wu Y, et\u00a0al. (2019) Efficient Data Collection in Large-Scale UAV-aided Wireless Sensor Networks. In: 2019 11th International Conference on Wireless Communications and Signal Processing, WCSP 2019","DOI":"10.1109\/WCSP.2019.8927929"},{"key":"970_CR19","doi-asserted-by":"publisher","unstructured":"Nazib RA, Moh S (2021) Energy-Efficient and Fast Data Collection in UAV-Aided Wireless Sensor Networks for Hilly Terrains. IEEE Access. 9. https:\/\/doi.org\/10.1109\/ACCESS.2021.3056701","DOI":"10.1109\/ACCESS.2021.3056701"},{"key":"970_CR20","doi-asserted-by":"publisher","unstructured":"Ebrahimi D, Sharafeddine S, Ho PH, Assi C (2019) UAV-Aided projection-based compressive data gathering in wireless sensor networks. IEEE Internet of Things Journal. 6(2). https:\/\/doi.org\/10.1109\/JIOT.2018.2878834","DOI":"10.1109\/JIOT.2018.2878834"},{"key":"970_CR21","doi-asserted-by":"crossref","unstructured":"Carfang AJ, Frew EW, Brown TX (2010) Improved delay-tolerant communication by considering radio propagation in planning data ferry navigation. In: AIAA Guidance, Navigation, and Control Conference","DOI":"10.2514\/6.2010-8172"},{"key":"970_CR22","doi-asserted-by":"crossref","unstructured":"Dixon C, Henkel D, Frew EW, Brown TX (2006) Phase transitions for controlled mobility in wireless ad hoc networks. In: Collection of Technical Papers - AIAA Guidance, Navigation, and Control Conference 2006. vol.\u00a05","DOI":"10.2514\/6.2006-6464"},{"key":"970_CR23","doi-asserted-by":"publisher","unstructured":"Carfang AJ, Wagle N, Frew EW (2015) Integrating nonparametric learning with path planning for data-ferry communications. Journal of Aerospace Information Systems. 12(12). https:\/\/doi.org\/10.2514\/1.I010275","DOI":"10.2514\/1.I010275"},{"key":"970_CR24","doi-asserted-by":"crossref","unstructured":"Joseph J, Radmanesh M, Sadat MN, Dai R, Kumar M (2020) UAV Path Planning for Data Ferrying with Communication Constraints. In: 2020 IEEE 17th Annual Consumer Communications and Networking Conference, CCNC 2020","DOI":"10.1109\/CCNC46108.2020.9045416"},{"key":"970_CR25","unstructured":"Ji Z, Tu J, Guan X, Yang W, Yang W, Wu Q (2022) Energy Efficient Design in IRS-Assisted UAV Data Collection System under Malicious Jamming. arXiv preprint arXiv:2208.14751"},{"key":"970_CR26","doi-asserted-by":"crossref","unstructured":"Rahmati A, Hosseinalipour S, Guvenc I, Dai H, Bhuyan A (2020) Lifetime Maximization for UAV-Assisted Data Gathering Networks in the Presence of Jamming. In: IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC. vol. 2020-May","DOI":"10.1109\/SPAWC48557.2020.9154318"},{"key":"970_CR27","doi-asserted-by":"crossref","unstructured":"Alfattani S, Jaafar W, Yanikomeroglu H, Yongacoglu A (2019) Multi-UAV data collection framework for wireless sensor networks. In: 2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings","DOI":"10.1109\/GLOBECOM38437.2019.9014306"},{"key":"970_CR28","doi-asserted-by":"publisher","unstructured":"Gong J, Chang TH, Shen C, Chen X (2018) Flight time minimization of UAV for data collection over wireless sensor networks. IEEE Journal on Selected Areas in Communications. 36(9). https:\/\/doi.org\/10.1109\/JSAC.2018.2864420","DOI":"10.1109\/JSAC.2018.2864420"},{"key":"970_CR29","doi-asserted-by":"publisher","unstructured":"Li J, Zhao H, Wang H, Gu F, Wei J, Yin H, et\u00a0al. (2020) Joint Optimization on Trajectory, Altitude, Velocity, and Link Scheduling for Minimum Mission Time in UAV-Aided Data Collection. IEEE Internet of Things Journal. 7(2). https:\/\/doi.org\/10.1109\/JIOT.2019.2955732","DOI":"10.1109\/JIOT.2019.2955732"},{"key":"970_CR30","doi-asserted-by":"publisher","unstructured":"Wang Z, Liu R, Liu Q, Han L, Thompson JS (2021) Feasibility Study of UAV-Assisted Anti-Jamming Positioning. IEEE Transactions on Vehicular Technology. 70(8). https:\/\/doi.org\/10.1109\/TVT.2021.3090403","DOI":"10.1109\/TVT.2021.3090403"},{"key":"970_CR31","doi-asserted-by":"publisher","unstructured":"Samir M, Sharafeddine S, Assi CM, Nguyen TM, Ghrayeb A (2020) UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices. IEEE Transactions on Wireless Communications. 19(1). https:\/\/doi.org\/10.1109\/TWC.2019.2940447","DOI":"10.1109\/TWC.2019.2940447"},{"key":"970_CR32","doi-asserted-by":"publisher","unstructured":"Liu Z, Liu H, Xu W, Chen Y (2014) An error-minimizing framework for localizing jammers in wireless networks. IEEE Transactions on Parallel and Distributed Systems. 25(2). https:\/\/doi.org\/10.1109\/TPDS.2013.33","DOI":"10.1109\/TPDS.2013.33"},{"key":"970_CR33","doi-asserted-by":"publisher","unstructured":"Al-Hourani A, Kandeepan S, Lardner S (2014) Optimal LAP altitude for maximum coverage. IEEE Wireless Communications Letters. 3(6). https:\/\/doi.org\/10.1109\/LWC.2014.2342736","DOI":"10.1109\/LWC.2014.2342736"},{"key":"970_CR34","unstructured":"Garey MR, Johnson DS (1979) Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences). Computers and Intractability"},{"key":"970_CR35","doi-asserted-by":"crossref","unstructured":"Mitchell M (1998) An Introduction to Genetic Algorithms. MIT press","DOI":"10.7551\/mitpress\/3927.001.0001"},{"key":"970_CR36","unstructured":"Davis L (1985) Applying Adaptive Algorithms to Epistatic Domains. In: Proc. of IJCAI-85"},{"key":"970_CR37","unstructured":"Brooke A, Kendrick D, Meeraus A, Raman R.: GAMS\/CPLEX 7.0 User Notes. GAMS Development Corporation, Washington, DC"},{"key":"970_CR38","unstructured":"McCarl BA, Meeraus A, van\u00a0der Eijk P, Bussieck M, Dirkse S, Steacy P, et\u00a0al. (2014) McCarl GAMS user guide. GAMS Development Corporation"},{"key":"970_CR39","unstructured":"IBM.: Branch and cut in CPLEX. Available from: https:\/\/www.ibm.com\/docs\/en\/icos\/12.10.0?topic=concepts-branch-cut-in-cplex"},{"key":"970_CR40","unstructured":"Mitchell JE (2002) Branch-and-Cut Algorithms for Combinatorial Optimization Problems. In: Handbook of Applied Optimization"},{"key":"970_CR41","doi-asserted-by":"publisher","unstructured":"Kanungo T, Mount DM, Netanyahu NS, Piatko CD, Silverman R, Wu AY (2002) An efficient k-means clustering algorithms: Analysis and implementation. IEEE Transactions on Pattern Analysis and Machine Intelligence. 24(7). https:\/\/doi.org\/10.1109\/TPAMI.2002.1017616","DOI":"10.1109\/TPAMI.2002.1017616"},{"key":"970_CR42","doi-asserted-by":"publisher","unstructured":"Garc\u00eda S, Molina D, Lozano M, Herrera F (2009) A study on the use of non-parametric tests for analyzing the evolutionary algorithms\u2019 behaviour: A case study on the CEC\u20192005 Special Session on Real Parameter Optimization. Journal of Heuristics. 15(6). https:\/\/doi.org\/10.1007\/s10732-008-9080-4","DOI":"10.1007\/s10732-008-9080-4"},{"key":"970_CR43","unstructured":"MATLAB.: Statistics Toolbox Release (2022) The MathWorks Inc, Natick, Massachusetts. United States, Natick, Massachusetts, United States"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-00970-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-023-00970-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-00970-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T13:33:05Z","timestamp":1690464785000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-023-00970-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,20]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["970"],"URL":"https:\/\/doi.org\/10.1007\/s40747-023-00970-3","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2023,1,20]]},"assertion":[{"value":"16 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Our research is not involved in human participants and animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"The author has participated actively in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"The author has agreed to publish the article in Complex and Intelligent Systems.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}