{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:38:29Z","timestamp":1760243909974,"version":"build-2065373602"},"reference-count":28,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2010,4,12]],"date-time":"2010-04-12T00:00:00Z","timestamp":1271030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute.<\/jats:p>","DOI":"10.3390\/s100403626","type":"journal-article","created":{"date-parts":[[2010,4,12]],"date-time":"2010-04-12T11:23:10Z","timestamp":1271071390000},"page":"3626-3640","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System"],"prefix":"10.3390","volume":"10","author":[{"given":"Mihui","family":"Kim","sequence":"first","affiliation":[{"name":"Department of Computer Science, North Carolina State University, 890 Oval Dr., Raleigh, NC 27614, USA"}]},{"given":"Kijoon","family":"Chae","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Ewha Womans University, 11-1 Daehyun-dong, Seodaemun-gu, Seoul, 120-750, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2010,4,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Available online: http:\/\/www.nhk.or.jp\/strl\/publica\/dayori-new\/en\/qa-0108e.html (accessed on January 1, 2010).","DOI":"10.5594\/M001408"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2002.1039518","article-title":"Denial of Service in Sensor Networks","volume":"35","author":"Wood","year":"2002","journal-title":"Computer"},{"key":"ref_3","unstructured":"Li, M., Koutsopoulos, I., and Poovendran, R. (, January May). Optimal jamming attacks and network defense policies in wireless sensor networks. Anchorage, AK, USA."},{"key":"ref_4","unstructured":"Raymond, D., Marchany, R., Brownfield, M., and Midkiff, S. (, January June). Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols. Cagliari, Italy."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MPRV.2008.6","article-title":"Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses","volume":"7","author":"Raymond","year":"2008","journal-title":"IEEE Pervasive Comput"},{"key":"ref_6","unstructured":"Intanagonwiwat, C., Govindan, R., and Estrin, D. (, January August). Directed diffusion: A scalable and robust communication paradigm for sensor networks. Boston, MA, USA."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1023\/A:1013715909417","article-title":"Negotiation-based protocols for disseminating information in wireless sensor networks","volume":"8","author":"Kulik","year":"2002","journal-title":"Wirel. Netw"},{"key":"ref_8","unstructured":"Wood, A., Stankovic, J., and Son, S. (, January December). JAM: A Jammed-Area Mapping Service for Sensor Networks. Cancun, Mexico."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/JSAC.2003.818807","article-title":"SOS: An Architecture for Mitigating DDoS Attacks","volume":"22","author":"Keromytis","year":"2004","journal-title":"IEEE J. Sel. Area. Commun. (JSAC)"},{"key":"ref_10","unstructured":"Yang, H., Luo, H., Yang, Y., Lu, S., and Zhang, L. (, January July). HOURS: Achieving DoS Resilience in an Open Service Hierarchy. Florence, Italy."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E., and Das, S. (2003). Ad hoc On-Demand Distance Vector (AODV) Routing. IETF RFC, 3561.","DOI":"10.17487\/rfc3561"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"808","DOI":"10.3390\/s100100808","article-title":"Effective Route Maintenance and Restoration Schemes in Mobile Ad Hoc Networks","volume":"1","author":"Kang","year":"2010","journal-title":"Sensors"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"445","DOI":"10.3390\/s90100445","article-title":"An Energy-Aware Routing Protocol in Wireless Sensor Networks","volume":"1","author":"Liu","year":"2009","journal-title":"Sensors"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.3390\/s100301619","article-title":"An Enhanced Backbone-Assisted Reliable Framework for Wireless Sensor Networks","volume":"3","author":"Tufail","year":"2010","journal-title":"Sensors"},{"key":"ref_15","unstructured":"Al-Karaki, J.N., Ul-Mustafa, R., and Kamal, A.E. (, January February). Data Aggregation in Wireless Sensor Networks - Exact and Approximate Algorithms. Phoenix, AZ, USA."},{"key":"ref_16","unstructured":"Xu, W., Trappe, W., Zhang, Y., and Wood, T. (, January May). The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. Urbana-Champaign, IL, USA."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MNET.2006.1637931","article-title":"Jamming Sensor Networks: Attack and Defense Strategies","volume":"20","author":"Xu","year":"2006","journal-title":"IEEE Network"},{"key":"ref_18","unstructured":"Chiang, J., and Hu, Y. (, January September). Cross-layer jamming detection and mitigation in wireless broadcast networks. Montreal, QC, Canada."},{"key":"ref_19","unstructured":"Chiang, J., and Hu, Y. (, January April). Dynamic jamming mitigation for wireless broadcast networks. Phoenix, AZ, USA."},{"key":"ref_20","unstructured":"Strasser, M., P\u00f6pper, C., Capkun, S., and Cagalj, M. (, January May). Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. San Francisco, CA, USA."},{"key":"ref_21","unstructured":"Wood, A.D., Stankovic, J.A., and Zhou, G. (, January June). DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. Glasgow, Scotland."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Xu, W., Trappe, W., and Zhang, Y. (, 2007). Channel surfing: defending wireless sensor networks from interference. New York, NY, USA.","DOI":"10.1109\/IPSN.2007.4379710"},{"key":"ref_23","unstructured":"Khattab, S., Mosse, D., and Melhem, R. (, January September). Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive?. Istanbul, Turkey."},{"key":"ref_24","unstructured":"Ma, K., Zhang, Y., and Trappe, W. (, January November). Mobile Network Management and Robust Spatial Retreats Via Network Dynamics. Washington, DC, USA."},{"key":"ref_25","unstructured":"Tague, P., Li, M., and Poovendran, R. (, January September). Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution. Athens, Greece."},{"key":"ref_26","unstructured":"Lazos, L., Liu, S., and Krunz, M. (, January March). Mitigating control-channel jamming attacks in multi-channel ad hoc networks. Zurich, Switzerland."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"836","DOI":"10.1109\/TCE.2005.1510492","article-title":"An Energy-Efficient Sensor Routing Scheme for Home Automation Networks","volume":"51","author":"Oh","year":"2005","journal-title":"IEEE Trans. Consum. Electron"},{"key":"ref_28","unstructured":"Available online: http:\/\/pcl.cs.ucla.edu\/projects\/glomosim\/ (accessed on January 1, 2010)."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/10\/4\/3626\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T22:02:06Z","timestamp":1760220126000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/10\/4\/3626"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,12]]},"references-count":28,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2010,4]]}},"alternative-id":["s100403626"],"URL":"https:\/\/doi.org\/10.3390\/s100403626","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2010,4,12]]}}}