{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:26:50Z","timestamp":1759364810109,"version":"build-2065373602"},"reference-count":33,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.mdpi.com"],"crossmark-restriction":true},"short-container-title":["Algorithms"],"abstract":"<jats:p>This paper presents a resilient and energy-efficient framework for jamming mitigation in cluster-based wireless sensor networks (WSNs), addressing a critical vulnerability in hostile or interference-prone environments. The proposed approa ch integrates dynamic cluster reorganization, adaptive MAC-layer behavior, and multipath routing strategies to restore communication capabilities and sustain network functionality under jamming conditions. The framework is evaluated across heterogeneous topologies using Zigbee and Bluetooth Low Energy (BLE); both stacks were validated in a physical testbed with matched jammer and traffic conditions, while simulation was used solely to tune parameters and support sensitivity analyses. Results demonstrate significant improvements in Packet Delivery Ratio, end-to-end delay, energy consumption, and retransmission rate, with BLE showing particularly high resilience when combined with the mitigation mechanism. Furthermore, a comparative analysis of routing protocols including AODV, GAF, and LEACH reveals that hierarchical protocols achieve superior performance when integrated with the proposed method. This framework has broader applicability in mission-critical IoT domains, including environmental monitoring, industrial automation, and healthcare systems. The findings confirm that the framework offers a scalable and protocol-agnostic defense mechanism, with potential applicability in mission-critical and interference-sensitive IoT deployments.<\/jats:p>","DOI":"10.3390\/a18100614","type":"journal-article","created":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T14:01:39Z","timestamp":1759154499000},"page":"614","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Resilient Energy-Efficient Framework for Jamming Mitigation in Cluster-Based Wireless Sensor Networks"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0272-3275","authenticated-orcid":false,"given":"Carolina","family":"Del-Valle-Soto","sequence":"first","affiliation":[{"name":"Facultad de Ingenier\u00eda, Universidad Panamericana, \u00c1lvaro del Portillo 49, Zapopan 45010, Jalisco, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4039-1694","authenticated-orcid":false,"given":"Jos\u00e9 A.","family":"Del-Puerto-Flores","sequence":"additional","affiliation":[{"name":"Facultad de Ingenier\u00eda, Universidad Panamericana, \u00c1lvaro del Portillo 49, Zapopan 45010, Jalisco, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7545-7441","authenticated-orcid":false,"given":"Leonardo J.","family":"Valdivia","sequence":"additional","affiliation":[{"name":"Facultad de Ingenier\u00eda, Universidad Panamericana, \u00c1lvaro del Portillo 49, Zapopan 45010, Jalisco, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1762-419X","authenticated-orcid":false,"given":"Aim\u00e9","family":"Lay-Ekuakille","sequence":"additional","affiliation":[{"name":"Department of Innovation Engineering, University of Salento, 73100 Lecce, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4058-4042","authenticated-orcid":false,"given":"Paolo","family":"Visconti","sequence":"additional","affiliation":[{"name":"Department of Innovation Engineering, University of Salento, 73100 Lecce, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2025,9,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Kandris, D., Nakas, C., Vomvas, D., and Koulouras, G. (2020). Applications of wireless sensor networks: An up-to-date survey. Appl. Syst. Innov., 3.","DOI":"10.3390\/asi3010014"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1007\/s11277-023-10773-x","article-title":"A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications","volume":"133","author":"Kumar","year":"2023","journal-title":"Wirel. Pers. Commun."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Del-Valle-Soto, C., Mex-Perera, C., Nolazco-Flores, J.A., Rodr\u00edguez, A., Rosas-Caro, J.C., and Mart\u00ednez-Herrera, A.F. (2021). A low-cost jamming detection approach using performance metrics in cluster-based wireless sensor networks. Sensors, 21.","DOI":"10.3390\/s21041179"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"e7815","DOI":"10.1002\/cpe.7815","article-title":"Underwater acoustic sensor networks: Taxonomy on applications, architectures, localization methods, deployment techniques, routing techniques, and threats: A systematic review","volume":"35","author":"Gola","year":"2023","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Alaba, F.A., and Rocha, A. (2024). Security Framework and Defense Mechanisms for IoT Reactive Jamming Attacks, Springer.","DOI":"10.1007\/978-3-031-65929-4"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1798","DOI":"10.1109\/COMST.2024.3482973","article-title":"Game Theory and Reinforcement Learning for Anti-jamming Defense in Wireless Communications: Current Research, Challenges, and Solutions","volume":"27","author":"Jia","year":"2024","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1109\/TSMCC.2010.2045373","article-title":"A security analysis for wireless sensor mesh networks in highly critical systems","volume":"40","author":"Alcaraz","year":"2010","journal-title":"IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.)"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2602","DOI":"10.1109\/TIFS.2020.2973875","article-title":"A collaborative security framework for software-defined wireless sensor networks","volume":"15","author":"Miranda","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Khare, A., Madhu, G., and Khare, P. (2022, January 23\u201325). Location and Time Aware Resource Seeking Framework for Mobile P2P and Ad Hoc Networks. Proceedings of the 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India.","DOI":"10.23919\/INDIACom54597.2022.9763222"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"4373","DOI":"10.1109\/JIOT.2020.3026475","article-title":"A lightweight secure and resilient transmission scheme for the Internet of Things in the presence of a hostile jammer","volume":"8","author":"Letafati","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Li, M., Koutsopoulos, I., and Poovendran, R. (2007, January 6\u201312). Optimal jamming attacks and network defense policies in wireless sensor networks. Proceedings of the IEEE INFOCOM 2007\u201426th IEEE International Conference on Computer Communications, Anchorage, AK, USA.","DOI":"10.1109\/INFCOM.2007.155"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1593","DOI":"10.1109\/TWC.2013.013014.131037","article-title":"Detection of reactive jamming in DSSS-based wireless communications","volume":"13","author":"Spuhler","year":"2014","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"12893","DOI":"10.1007\/s00500-021-06111-7","article-title":"Deep learning model-based detection of jamming attacks in low-power and lossy wireless networks","volume":"26","author":"Jayabalan","year":"2022","journal-title":"Soft Comput."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"4957","DOI":"10.1109\/JIOT.2020.3034128","article-title":"Securing ZigBee communications against constant jamming attack using neural network","volume":"8","author":"Pirayesh","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_15","first-page":"1113","article-title":"A Cross-Layer Framework for Optimizing Energy Efficiency in Wireless Sensor Networks: Design, Implementation, and Future Directions","volume":"16","author":"Alenezi","year":"2025","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Pathak, V., Singh, K., Khan, T., Shariq, M., Chaudhry, S.A., and Das, A.K. (2024). A secure and lightweight trust evaluation model for enhancing decision-making in resource-constrained industrial WSNs. Sci. Rep., 14.","DOI":"10.1038\/s41598-024-75414-0"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Jaganathan, L., Dhanasekaran, S., Kantha, P., and Garg, A. (2023, January 23\u201325). Exploring InterferenceAware Spectrum Allocation in 6G Cellular Networks using dynamic resource Sharing Algorithm. Proceedings of the 5th International Conference on Information Management & Machine Intelligence, Jaipur, India.","DOI":"10.1145\/3647444.3647851"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MCOM.001.00496","article-title":"Game-theoretic learning anti-jamming approaches in wireless networks","volume":"60","author":"Jia","year":"2022","journal-title":"IEEE Commun. Mag."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"L\u00f3pez-Vilos, N., Valencia-Cordero, C., Souza, R.D., and Montejo-S\u00e1nchez, S. (2023). Clustering-based energy-efficient self-healing strategy for WSNs under jamming attacks. Sensors, 23.","DOI":"10.3390\/s23156894"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1464420.1464426","article-title":"Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols","volume":"5","author":"Law","year":"2009","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Ettouijri, Y., and Salih-Alj, Y. (2014, January 14\u201316). Countermeasures against energy-efficient jamming on wireless sensor networks. Proceedings of the 2014 International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, Morocco.","DOI":"10.1109\/ICMCS.2014.6911262"},{"key":"ref_22","first-page":"304","article-title":"Analysis of the WSN MAC Protocols under Jamming DoS Attack","volume":"16","author":"Mihajlov","year":"2014","journal-title":"Int. J. Netw. Secur."},{"key":"ref_23","unstructured":"(2020). IEEE Standard for Low-Rate Wireless Networks (Standard No. 802.15.4-2020)."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Proto, A., Miers, C.C., and Carvalho, T.C.M. (2024, January 28\u201330). An Intrusion Detection Architecture Based on the Energy Consumption of Sensors Against Energy Depletion Attacks in LoRaWAN. Proceedings of the 9th International Conference on Internet of Things, Big Data and Security (IoTBDS 2024), Angers, France.","DOI":"10.5220\/0012703400003705"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Tang, L., Sun, Y., Gurewitz, O., and Johnson, D.B. (2011, January 16\u201319). EM-MAC: A dynamic multichannel energy-efficient MAC protocol for wireless sensor networks. Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing, Paris, France.","DOI":"10.1145\/2107502.2107533"},{"key":"ref_26","first-page":"494","article-title":"HEERPOP: Hybrid Energy Efficiency Routing Protocol for Optimal Path in the Internet of Things-Based Sensor Networks","volume":"11","author":"Shial","year":"2024","journal-title":"Int. J. Comput. Netw. Appl. (IJCNA)"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Soreanu, P., Volkovich, Z., and Barzily, Z. (2008, January 25\u201331). Energy-efficient predictive jamming holes detection protocol for wireless sensor networks. Proceedings of the 2008 Second International Conference on Sensor Technologies and Applications (Sensorcomm 2008), Cap Esterel, France.","DOI":"10.1109\/SENSORCOMM.2008.118"},{"key":"ref_28","unstructured":"Tayeh, G.B. (2020). Towards Smart Firefighting Using the Internet of Things and Machine Learning. [Ph.D. Thesis, Universit\u00e9 Bourgogne Franche-Comt\u00e9]."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Yilmaz, S., and Dener, M. (2024). Security with Wireless Sensor Networks in Smart Grids: A Review. Symmetry, 16.","DOI":"10.3390\/sym16101295"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E., and Das, S. (2003). Ad Hoc On-Demand Distance Vector (AODV) Routing, IETF. Technical report.","DOI":"10.17487\/rfc3561"},{"key":"ref_31","first-page":"309","article-title":"Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing","volume":"1","author":"Roychowdhury","year":"2010","journal-title":"Int. J. Comput. Commun. Technol."},{"key":"ref_32","unstructured":"Loscri, V., Morabito, G., and Marano, S. (2005, January 25\u201328). A two-levels hierarchy for low-energy adaptive clustering hierarchy (TL-LEACH). Proceedings of the IEEE Vehicular Technology Conference, Dallas, TX, USA."},{"key":"ref_33","first-page":"91","article-title":"CML-WSN: A Configurable Multi-layerWireless Sensor Network Simulator","volume":"Volume 179","author":"Sucar","year":"2017","journal-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Proceedings of the AFI 2016, Puebla, Mexico, 25\u201328 May 2016"}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/18\/10\/614\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T04:12:53Z","timestamp":1759291973000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/18\/10\/614"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,29]]},"references-count":33,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["a18100614"],"URL":"https:\/\/doi.org\/10.3390\/a18100614","relation":{},"ISSN":["1999-4893"],"issn-type":[{"type":"electronic","value":"1999-4893"}],"subject":[],"published":{"date-parts":[[2025,9,29]]}}}