{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T23:51:54Z","timestamp":1777074714655,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T00:00:00Z","timestamp":1574640000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,25]]},"DOI":"10.1145\/3345768.3355944","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T13:19:56Z","timestamp":1574687996000},"page":"323-327","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Secure Routing in Multi-hop IoT-based Cognitive Radio Networks under Jamming Attacks"],"prefix":"10.1145","author":[{"given":"Haythem","family":"Bany Salameh","sequence":"first","affiliation":[{"name":"Yarmouk University, Irbid, Jordan"}]},{"given":"Rawan","family":"Derbas","sequence":"additional","affiliation":[{"name":"Yarmouk University, Irbid, Jordan"}]},{"given":"Moayad","family":"Aloqaily","sequence":"additional","affiliation":[{"name":"Gnowit Inc., Ottawa, ON, Canada"}]},{"given":"Azzedine","family":"Boukerche","sequence":"additional","affiliation":[{"name":"University of Ottawa, Ottawa, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2019,11,25]]},"reference":[{"key":"e_1_3_2_1_1_1","article-title":"A Profitable and Energy-Efficient Cooperative Fog Solution for IoT Services","author":"Ridhawi","year":"2019","unstructured":"l Ridhawi , Ismaeel, \" A Profitable and Energy-Efficient Cooperative Fog Solution for IoT Services .\" IEEE Transactions on Industrial Informatics ( 2019 ). l Ridhawi, Ismaeel, et al. \"A Profitable and Energy-Efficient Cooperative Fog Solution for IoT Services.\" IEEE Transactions on Industrial Informatics (2019).","journal-title":"IEEE Transactions on Industrial Informatics ("},{"key":"e_1_3_2_1_2_1","first-page":"1","volume-title":"Shanghai","author":"Balasubramanian F.","year":"2019","unstructured":". Balasubramanian , F. Zaman , M. Aloqaily , I. A. Ridhawi , Y. Jararweh and H. B. Salameh , \" A Mobility Management Architecture for Seamless Delivery of 5G-IoT Services,\" ICC 2019 - 2019 IEEE International Conference on Communications (ICC) , Shanghai , China , 2019 , pp. 1 -- 7 . . Balasubramanian, F. Zaman, M. Aloqaily, I. A. Ridhawi, Y. Jararweh and H. B. Salameh, \"A Mobility Management Architecture for Seamless Delivery of 5G-IoT Services,\" ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1--7."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803174"},{"key":"e_1_3_2_1_4_1","volume-title":"\u201c$When Cognitive Radio Meets the Internet of Things,$\"$ IEEE 12th Int'l. Wireless Commun. $&$ Mobile Computing Conf., Paphos, Cyprus, Sept. 5--9 2016","author":"Khan M. H.","unstructured":". A. Khan , M. H. Rehmani , and A. Rachedi , $ \u201c$When Cognitive Radio Meets the Internet of Things,$\"$ IEEE 12th Int'l. Wireless Commun. $&$ Mobile Computing Conf., Paphos, Cyprus, Sept. 5--9 2016 . . A. Khan, M. H. Rehmani, and A. Rachedi, $\u201c$When Cognitive Radio Meets the Internet of Things,$\"$ IEEE 12th Int'l. Wireless Commun. $&$ Mobile Computing Conf., Paphos, Cyprus, Sept. 5--9 2016."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.02.001"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.146"},{"key":"e_1_3_2_1_7_1","first-page":"1","volume-title":"Communication and Networking (ICSCN)","author":"Mourougayane S.","year":"2015","unstructured":". Mourougayane and S. Srikanth , $ \u201c$Intelligent jamming threats to cognitive radio based strategic communication networks - a survey,$\"$ in 2015 3rd International Conference on Signal Processing , Communication and Networking (ICSCN) , March 2015 , pp. 1 -- 6 . . Mourougayane and S. Srikanth, $\u201c$Intelligent jamming threats to cognitive radio based strategic communication networks - a survey,$\"$ in 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN), March 2015, pp. 1--6."},{"issue":"3","key":"e_1_3_2_1_8_1","first-page":"1903","article-title":"\u201c$Spectrum assignment in cognitive radio networks for internet-of-things delaysensitive applications under jamming attacks,$","volume":"5","author":"Bany Salameh S.","year":"2018","unstructured":"Bany Salameh , S. Almajali , M. Ayyash and H. Elgala , $ \u201c$Spectrum assignment in cognitive radio networks for internet-of-things delaysensitive applications under jamming attacks,$ \" $ IEEE Internet of Things Journal , vol. 5 , no. 3 , pp. 1903 -- 1913 , June 2018 . Bany Salameh, S. Almajali, M. Ayyash and H. Elgala, $\u201c$Spectrum assignment in cognitive radio networks for internet-of-things delaysensitive applications under jamming attacks,$\"$ IEEE Internet of Things Journal, vol. 5, no. 3, pp. 1903--1913, June 2018.","journal-title":"$ IEEE Internet of Things Journal"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSENS.2017.2752719"},{"key":"e_1_3_2_1_10_1","volume-title":"Secure opportunistic routing protocols: methods, models, and classification. Wireless Networks, 25(2), 559--571","author":"Boukerche A.","year":"2019","unstructured":"alehi, M., & Boukerche , A. ( 2019 ). Secure opportunistic routing protocols: methods, models, and classification. Wireless Networks, 25(2), 559--571 . alehi, M., & Boukerche, A. (2019). Secure opportunistic routing protocols: methods, models, and classification. Wireless Networks, 25(2), 559--571."},{"key":"e_1_3_2_1_11_1","first-page":"24","volume-title":"IEEE Symp. Comput. Intell. Commun. Syst. Netw.","author":"Rawi K.","year":"2013","unstructured":". Rawi and K. Yau , $ \u201c$Route selection for minimizing interference to primary users in cognitive radio networks: A reinforcement learning approach,$\"$ in Proc . IEEE Symp. Comput. Intell. Commun. Syst. Netw. , Singapore , 2013 , pp. 24 -- 30 . . Rawi and K. Yau, $\u201c$Route selection for minimizing interference to primary users in cognitive radio networks: A reinforcement learning approach,$\"$ in Proc. IEEE Symp. Comput. Intell. Commun. Syst. Netw., Singapore, 2013, pp. 24--30."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.931"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.112513.122082"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.24138\/jcomss.v14i3.557"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"SARNOFF '09","author":"Chowdhury M.","year":"2009","unstructured":". Chowdhury and M. Di Felice , $ \u201c$Search: A routing protocol for mobile cognitive radio ad-hoc networks,$\"$ in Sarnoff Symposium, 2009 . SARNOFF '09 . IEEE, 2009 , pp. 1 -- 6 . . Chowdhury and M. Di Felice, $\u201c$Search: A routing protocol for mobile cognitive radio ad-hoc networks,$\"$ in Sarnoff Symposium, 2009. SARNOFF '09. IEEE, 2009, pp. 1--6."},{"issue":"4","key":"e_1_3_2_1_16_1","first-page":"996","article-title":"Semi-Structure Routing and Analytical Frameworks for Cognitive Radio Networks","volume":"15","author":"Ji M.","unstructured":". Ji , M. Yan , R. Beyah and Z. Cai , \" Semi-Structure Routing and Analytical Frameworks for Cognitive Radio Networks ,\" in IEEE Transactions on Mobile Computing , vol. 15 , no. 4 , pp. 996 -- 1008 , 1. . Ji, M. Yan, R. Beyah and Z. Cai, \"Semi-Structure Routing and Analytical Frameworks for Cognitive Radio Networks,\" in IEEE Transactions on Mobile Computing, vol. 15, no. 4, pp. 996--1008, 1.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"Shanghai","author":"Otoum B.","year":"2019","unstructured":". Otoum , B. Kantarci and H. Mouftah , \" Empowering Reinforcement Learning on Big Sensed Data for Intrusion Detection,\" ICC 2019 - 2019 IEEE International Conference on Communications (ICC) , Shanghai , China , 2019 , pp. 1 -- 7 . . Otoum, B. Kantarci and H. Mouftah, \"Empowering Reinforcement Learning on Big Sensed Data for Intrusion Detection,\" ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1--7."},{"key":"e_1_3_2_1_18_1","first-page":"1","volume-title":"Shanghai","author":"Otoum B.","year":"2019","unstructured":". Otoum , B. Kantarci and H. Mouftah , \" Empowering Reinforcement Learning on Big Sensed Data for Intrusion Detection,\" ICC 2019 - 2019 IEEE International Conference on Communications (ICC) , Shanghai , China , 2019 , pp. 1 -- 7 . . Otoum, B. Kantarci and H. Mouftah, \"Empowering Reinforcement Learning on Big Sensed Data for Intrusion Detection,\" ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1--7."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2019.2901792"},{"issue":"6","key":"e_1_3_2_1_20_1","first-page":"69","article-title":"\u201c$Detection of Jamming Attack in Cognitive Radio Networks$","volume":"2","author":"Manogna K.","year":"2014","unstructured":"Manogna and K. Naik , $ \u201c$Detection of Jamming Attack in Cognitive Radio Networks$ \" $, International Journal of Recent Advances in Engineering $&$ Technology (IJRAET) , Vol. 2 , Issue 6 , pp. 69 -- 72 , 2014 . Manogna and K. Naik, $\u201c$Detection of Jamming Attack in Cognitive Radio Networks$\"$, International Journal of Recent Advances in Engineering $&$ Technology (IJRAET), Vol. 2, Issue 6, pp. 69--72, 2014.","journal-title":"$, International Journal of Recent Advances in Engineering $&$ Technology (IJRAET)"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2418776"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996709"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"hamayseh Yaser et al. \"Dynamic framework to mining Internet of Things for multimedia services.\" Expert Systems (2019):  e12404.  hamayseh Yaser et al. \"Dynamic framework to mining Internet of Things for multimedia services.\" Expert Systems (2019): e12404.","DOI":"10.1111\/exsy.12404"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800624"},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. of the IEEE Globecom Conference","author":"Wu B.","year":"2010","unstructured":". Wu , B. Wang , and K. Liu , $ \u201c$Optimal defense against jamming attacks in cognitive radio networks using the Markov decision process approach$\"$ , in Proc. of the IEEE Globecom Conference , 2010 . Wu, B. Wang, and K. Liu, $\u201c$Optimal defense against jamming attacks in cognitive radio networks using the Markov decision process approach$\"$, in Proc. of the IEEE Globecom Conference, 2010"},{"key":"e_1_3_2_1_26_1","first-page":"1","volume-title":"IEEE Global Telecommunications Conference GLOBECOM'10","author":"Bany Salameh","year":"2010","unstructured":"Bany Salameh , $\"$ Rate-Maximization Channel Assignment Scheme for Cognitive Radio Networks,$\"$ in IEEE Global Telecommunications Conference GLOBECOM'10 , Miami, FL , 2010 , pp. 1 -- 5 . Bany Salameh, $\"$ Rate-Maximization Channel Assignment Scheme for Cognitive Radio Networks,$\"$ in IEEE Global Telecommunications Conference GLOBECOM'10, Miami, FL, 2010, pp. 1--5."}],"event":{"name":"MSWiM '19: 22nd Int'l ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","location":"Miami Beach FL USA","acronym":"MSWiM '19","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"]},"container-title":["Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3345768.3355944","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3345768.3355944","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:20Z","timestamp":1750202000000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3345768.3355944"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,25]]},"references-count":26,"alternative-id":["10.1145\/3345768.3355944","10.1145\/3345768"],"URL":"https:\/\/doi.org\/10.1145\/3345768.3355944","relation":{},"subject":[],"published":{"date-parts":[[2019,11,25]]},"assertion":[{"value":"2019-11-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}