{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:20:24Z","timestamp":1760242824111,"version":"build-2065373602"},"reference-count":34,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2016,11,24]],"date-time":"2016-11-24T00:00:00Z","timestamp":1479945600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006469","name":"Macao Science and Technology Development Fund","doi-asserted-by":"publisher","award":["096\/2013\/A3"],"award-info":[{"award-number":["096\/2013\/A3"]}],"id":[{"id":"10.13039\/501100006469","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672170"],"award-info":[{"award-number":["61672170"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious attacks. In this paper, we propose a novel anti-eavesdropping mechanism by introducing friendly jammers to wireless sensor networks (WSNs). In particular, we establish a theoretical framework to evaluate the eavesdropping risk of WSNs with friendly jammers and that of WSNs without jammers. Our theoretical model takes into account various channel conditions such as the path loss and Rayleigh fading, the placement schemes of jammers and the power controlling schemes of jammers. Extensive results show that using jammers in WSNs can effectively reduce the eavesdropping risk. Besides, our results also show that the appropriate placement of jammers and the proper assignment of emitting power of jammers can not only mitigate the eavesdropping risk but also may have no significant impairment to the legitimate communications.<\/jats:p>","DOI":"10.3390\/s16121987","type":"journal-article","created":{"date-parts":[[2016,11,24]],"date-time":"2016-11-24T10:19:15Z","timestamp":1479982755000},"page":"1987","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks"],"prefix":"10.3390","volume":"16","author":[{"given":"Xuran","family":"Li","sequence":"first","affiliation":[{"name":"Faculty of Information Technology, Macau University of Science and Technology, Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6165-4196","authenticated-orcid":false,"given":"Hong-Ning","family":"Dai","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Macau University of Science and Technology, Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9301-5989","authenticated-orcid":false,"given":"Hao","family":"Wang","sequence":"additional","affiliation":[{"name":"Big Data Lab, Norwegian University of Science and Technology in Aalesund, 6009 Aalesund, Norway"}]},{"given":"Hong","family":"Xiao","sequence":"additional","affiliation":[{"name":"Faculty of Computer, Guangdong University of Technology, Guangzhou 510006, China"}]}],"member":"1968","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"4837","DOI":"10.3390\/s150304837","article-title":"The past, present and future of cyber-physical systems: A focus on models","volume":"15","author":"Lee","year":"2015","journal-title":"Sensors"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Huang, C., Marshall, J., Wang, D., and Dong, M. (2016, January 23\u201327). Towards Reliable Social Sensing in Cyber-Physical-Social Systems. Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Chicago, IL, USA.","DOI":"10.1109\/IPDPSW.2016.132"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1109\/JIOT.2016.2517405","article-title":"RMER: Reliable and Energy-Efficient Data Collection for Large-Scale Wireless Sensor Networks","volume":"3","author":"Dong","year":"2016","journal-title":"IEEE Int. Things J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"6480","DOI":"10.1109\/ACCESS.2016.2611863","article-title":"Social-Aware Data Collection Scheme Through Opportunistic Communication in Vehicular Mobile Networks","volume":"4","author":"Tang","year":"2016","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1160","DOI":"10.1109\/JSYST.2014.2308391","article-title":"Mobile Target Detection in Wireless Sensor Networks with Adjustable Sensing Frequency","volume":"10","author":"Hu","year":"2016","journal-title":"IEEE Syst. J."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1186\/s13638-016-0754-6","article-title":"An unequal redundancy level-based mechanism for reliable data collection in wireless sensor networks","volume":"2016","author":"Zhang","year":"2016","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2013","DOI":"10.1109\/TIFS.2016.2570740","article-title":"ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks","volume":"11","author":"Liu","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_8","unstructured":"Wagner, D., Schneier, B., and Kelsey, J. (1997). Advances in Cryptology\u2013CRYPTO \u201997, Springer."},{"key":"ref_9","unstructured":"3GPP (2009). General Report on the Design, Speification and Evaluation of 3GPP Standard Confidentiality and Integrity Algorithms, 3GPP. Technical Report."},{"key":"ref_10","unstructured":"IEEE Standards Association (1999). 802.11a-1999\u2014IEEE Standard for Telecommunications and Information Exchange Between Systems\u2014 LAN\/MAN Specific Requirements\u2014Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: High Speed Physical Layer in the 5 GHz Band, IEEE. Technical Report."},{"key":"ref_11","unstructured":"IEEE Standards Association (2004). 802.11i-2004\u2014IEEE Standard for Tnformation Technology\u2014Telecommunications and Information Exchange Between Systems\u2014 Local and Metropolitan Area Networks-Specific Requirements\u2014Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment 6: Medium Access Control (MAC) Security Enhancements, IEEE. Technical Report."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/COMST.2015.2459691","article-title":"A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks","volume":"18","author":"Shim","year":"2016","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Han, Z., Marina, N., Debbah, M., and Hj\u00f8rungnes, A. (2009). Physical Layer Security Game: Interaction Between Source, Eavesdropper, and Friendly Jammer. EURASIP J. Wirel. Commun. Netw., 2009.","DOI":"10.1155\/2009\/452907"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Zhu, Q., Saad, W., Han, Z., Poor, H., and Basar, T. (2011, January 7\u201310). Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach. Proceedings of the 2010 Military Communications Conference, Baltimore, MD, USA.","DOI":"10.1109\/MILCOM.2011.6127463"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1109\/TIFS.2011.2111370","article-title":"Wireless Secrecy Regions With Friendly Jamming","volume":"6","author":"Vilela","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Sankararaman, S., Abu-Affash, K., Efrat, A., Eriksson-Bique, S.D., Polishchuk, V., Ramasubramanian, S., and Segal, M. (2012, January 11\u201314). Optimization Schemes for Protective Jamming. Proceedings of the 13th ACM MobiHoc, Hilton Head Island, SC, USA.","DOI":"10.1145\/2248371.2248383"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2631","DOI":"10.1007\/s11276-015-0935-y","article-title":"A Jamming Approach to Enhance Enterprise Wi-Fi Secrecy Through Spatial Access Control","volume":"21","author":"Kim","year":"2015","journal-title":"Wirel. Netw."},{"key":"ref_18","unstructured":"IEEE Standards Association (2011). IEEE 802.15.4 Enabling Pervasive Wireless Sensor Networks, IEEE. Technical Report."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Lakshmanan, S., Tsao, C., Sivakumar, R., and Sundaresan, K. (2008, January 17\u201320). Securing Wireless Data Networks against Eavesdropping using Smart Antennas. Proceedings of the 28th International Conference on Distributed Computing Systems, Beijing, China.","DOI":"10.1109\/ICDCS.2008.87"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","article-title":"A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends","volume":"104","author":"Zou","year":"2016","journal-title":"Proc. IEEE"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MWC.2011.5999759","article-title":"Secret key generation exploiting channel characteristics in wireless communications","volume":"18","author":"Ren","year":"2011","journal-title":"IEEE Wirel. Commun."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1440","DOI":"10.1109\/TNET.2012.2183146","article-title":"Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary","volume":"20","author":"Zafer","year":"2012","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MCOM.2015.7120014","article-title":"Physical layer key generation in wireless networks: Challenges and opportunities","volume":"53","author":"Zeng","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1796","DOI":"10.1109\/TIFS.2016.2543687","article-title":"On the Security of Key Extraction From Measuring Physical Quantities","volume":"11","author":"Edman","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_25","unstructured":"Savry, O., Pebay-Peyroula, F., Dehmas, F., Robert, G., and Reverdy, J. (2007, January 10\u201313). RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?. Proceedings of the 2007 Cryptographic Hardware and Embedded Systems, Vienna, Austria."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","article-title":"Principles of physical layer security in multiuser wireless networks: A survey","volume":"16","author":"Mukherjee","year":"2014","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_27","unstructured":"Hassanieh, H., Wang, J., Katabi, D., and Kohno, T. (2015, January 4\u20136). Securing RFIDs by Randomizing the Modulation and Channel. Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12), Oakland, CA, USA."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.1109\/TC.2007.70759","article-title":"Minimizing Eavesdropping Risk by Transmission Power Control in Multihop Wireless Networks","volume":"56","author":"Kao","year":"2007","journal-title":"IEEE Trans. Comput."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Bashar, S., and Ding, Z. (2009, January 1\u20134). Optimum Power Allocation against Information Leakage in Wireless Network. Proceedings of the 2009 Global Telecommunications Conference, Honolulu, HI, USA.","DOI":"10.1109\/GLOCOM.2009.5425973"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"2568","DOI":"10.1109\/TIT.2006.874379","article-title":"Optimal throughput-delay scaling in wireless networks-part I: The fluid model","volume":"52","author":"Gamal","year":"2006","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"3122","DOI":"10.1109\/TCOMM.2011.100411.100541","article-title":"A Tractable Approach to Coverage and Rate in Cellular Networks","volume":"59","author":"Andrews","year":"2011","journal-title":"IEEE Trans. Commun."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1474","DOI":"10.1109\/TCOMM.2012.041212.110075A","article-title":"Performance Modelling and Analysis of Cognitive Mesh Networks","volume":"60","author":"Min","year":"2012","journal-title":"IEEE Trans. Commun."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1643","DOI":"10.1109\/TWC.2012.030812.111106","article-title":"A New Analytical Model for Multi-Hop Cognitive Radio Networks","volume":"11","author":"Wu","year":"2012","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1109\/TVT.2012.2219890","article-title":"Performance Analysis of Hybrid Wireless Networks Under Bursty and Correlated Traffic","volume":"62","author":"Wu","year":"2013","journal-title":"IEEE Trans. Veh. Technol."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/12\/1987\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T19:27:24Z","timestamp":1760210844000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/12\/1987"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,24]]},"references-count":34,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2016,12]]}},"alternative-id":["s16121987"],"URL":"https:\/\/doi.org\/10.3390\/s16121987","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2016,11,24]]}}}