{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T20:43:00Z","timestamp":1773088980513,"version":"3.50.1"},"reference-count":31,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T00:00:00Z","timestamp":1528934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006469","name":"Fundo para o Desenvolvimento das Ci\u00eancias e da Tecnologia","doi-asserted-by":"publisher","award":["0026\/2018\/A1"],"award-info":[{"award-number":["0026\/2018\/A1"]}],"id":[{"id":"10.13039\/501100006469","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["6167050421"],"award-info":[{"award-number":["6167050421"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012245","name":"Science and Technology Planning Project of Guangdong Province","doi-asserted-by":"publisher","award":["2017A050501035"],"award-info":[{"award-number":["2017A050501035"]}],"id":[{"id":"10.13039\/501100012245","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Eavesdropping attack is one of the most serious threats in industrial crowdsensing networks. In this paper, we propose a novel anti-eavesdropping scheme by introducing friendly jammers to an industrial crowdsensing network. In particular, we establish a theoretical framework considering both the probability of eavesdropping attacks and the probability of successful transmission to evaluate the effectiveness of our scheme. Our framework takes into account various channel conditions such as path loss, Rayleigh fading, and the antenna type of friendly jammers. Our results show that using jammers in industrial crowdsensing networks can effectively reduce the eavesdropping risk while having no significant influence on legitimate communications.<\/jats:p>","DOI":"10.3390\/s18061938","type":"journal-article","created":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T11:06:06Z","timestamp":1528974366000},"page":"1938","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["A Novel Friendly Jamming Scheme in Industrial Crowdsensing Networks against Eavesdropping Attack"],"prefix":"10.3390","volume":"18","author":[{"given":"Xuran","family":"Li","sequence":"first","affiliation":[{"name":"Faculty of Information Technology, Macau University of Science and Technology, Macau SAR, China"}]},{"given":"Qiu","family":"Wang","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Macau University of Science and Technology, Macau SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6165-4196","authenticated-orcid":false,"given":"Hong-Ning","family":"Dai","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Macau University of Science and Technology, Macau SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9301-5989","authenticated-orcid":false,"given":"Hao","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of ICT and Natural Sciences, Faculty of Information Technology and Electrical Engineering, Norwegian University of Science and Technology, Postboks 1517, NO-6025 Aalesund, Norway"}]}],"member":"1968","published-online":{"date-parts":[[2018,6,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MCOM.2017.1600690CM","article-title":"Promoting Cooperation by the Social Incentive Mechanism in Mobile Crowdsensing","volume":"55","author":"Yang","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/MCOM.2017.1600658CM","article-title":"HySense: A hybrid mobile crowdsensing framework for sensing opportunities compensation under dynamic coverage constraint","volume":"55","author":"Han","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Datta, S.K., da Costa, R.P.F., Bonnet, C., and Hrri, J. (2016, January 27\u201330). oneM2M Architecture Based Iot Framework for Mobile Crowd Sensing in Smart Cities. Proceedings of the 2016 European Conference on Networks and Communications (EuCNC), Athens, Greece.","DOI":"10.1109\/EuCNC.2016.7561026"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Pilloni, V. (2018). How Data Will Transform Industrial Processes: Crowdsensing, Crowdsourcing and Big Data as Pillars of Industry 4.0. Future Intern., 10.","DOI":"10.3390\/fi10030024"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"15300","DOI":"10.1109\/ACCESS.2017.2657820","article-title":"When Mobile Crowd Sensing Meets Traditional Industry","volume":"5","author":"Shu","year":"2017","journal-title":"IEEE Access"},{"key":"ref_6","unstructured":"Li, T., Jung, T., Qiu, Z., Li, H., Cao, L., and Wang, Y. (2018). Scalable Privacy-Preserving Participant Selection for Mobile Crowdsensing Systems: Participant Grouping and Secure Group Bidding. IEEE Trans. Netw. Sci. Eng."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Ma, L., Liu, X., Pei, Q., and Xiang, Y. (2018). Privacy-Preserving Reputation Management for Edge Computing Enhanced Mobile Crowdsensing. IEEE Trans. Serv. Comput.","DOI":"10.1109\/TSC.2018.2825986"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Choo, K., Gritzalis, S., and Park, J.H. (2018). Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities. IEEE Trans. Ind. Inform.","DOI":"10.1109\/TII.2018.2841049"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"4265","DOI":"10.1109\/TWC.2015.2418316","article-title":"Partner Selection and Incentive Mechanism for Physical Layer Security","volume":"14","author":"Zhang","year":"2015","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_10","unstructured":"Hassanieh, H., Wang, J., Katabi, D., and Kohno, T. (2015, January 4\u20136). Securing RFIDs by Randomizing the Modulation and Channel. Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15), Oakland, CA, USA."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MCOM.2015.7263345","article-title":"Securing physical-layer communications for cognitive radio networks","volume":"53","author":"Zou","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2091","DOI":"10.1109\/TIFS.2016.2552146","article-title":"Wireless Physical-Layer Identification: Modeling and Validation","volume":"11","author":"Wang","year":"2016","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"3416","DOI":"10.1109\/TWC.2017.2682245","article-title":"A New Metric for Measuring the Security of an Environment: The Secrecy Pressure","volume":"16","author":"Mucchi","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2631","DOI":"10.1007\/s11276-015-0935-y","article-title":"A Jamming Approach to Enhance Enterprise Wi-Fi Secrecy through Spatial Access Control","volume":"21","author":"Kim","year":"2015","journal-title":"Wirel. Netw."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1109\/TIFS.2011.2111370","article-title":"Wireless Secrecy Regions with Friendly Jamming","volume":"6","author":"Vilela","year":"2011","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1658","DOI":"10.1109\/ACCESS.2017.2653182","article-title":"Artificial-Noise-Aided Secure Transmission with Directional Modulation Based on Random Frequency Diverse Arrays","volume":"5","author":"Hu","year":"2017","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2742","DOI":"10.1109\/TWC.2015.2391261","article-title":"Artificial-Noise-Aided Secure Multi-Antenna Transmission with Limited Feedback","volume":"14","author":"Zhang","year":"2015","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1658","DOI":"10.1109\/TVT.2015.2513003","article-title":"Optimal Power Allocation for Artificial Noise under Imperfect CSI Against Spatially Random Eavesdroppers","volume":"65","author":"Zheng","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Adams, M., and Bhargava, V.K. (May, January 30). Using friendly jamming to improve route security and quality in ad hoc networks. Proceedings of the 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), Windsor, ON, Canada.","DOI":"10.1109\/CCECE.2017.7946684"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"760834","DOI":"10.1155\/2013\/760834","article-title":"On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas","volume":"9","author":"Dai","year":"2013","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s11276-015-1160-4","article-title":"Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas","volume":"23","author":"Kim","year":"2017","journal-title":"Wirel. Netw."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.jnt.2007.05.005","article-title":"Cyclic Polygons with Rational Sides and Area","volume":"128","author":"MacDougall","year":"2008","journal-title":"J. Number Theory"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Sankararaman, S., Abu-Affash, K., Efrat, A., Eriksson-Bique, S.D., Polishchuk, V., Ramasubramanian, S., and Segal, M. (2012, January 11\u201314). Optimization Schemes for Protective Jamming. Proceedings of the ACM MOBIHOC, Hilton Head Island, SC, USA.","DOI":"10.1145\/2248371.2248383"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2196","DOI":"10.1109\/JSAC.2015.2435357","article-title":"Tractable Model for Rate in Self-Backhauled Millimeter Wave Cellular Networks","volume":"33","author":"Singh","year":"2015","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Wang, Q., Dai, H., Zheng, Z., Imran, M., and Vasilakos, A. (2017). On Connectivity of Wireless Sensor Networks with Directional Antennas. Sensors, 17.","DOI":"10.3390\/s17010134"},{"key":"ref_26","unstructured":"Mathai, A. (1999). An Introduction to Geometrical Probability Distributional Aspects with Applications, Gordon and Breach."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Li, X., Dai, H.N., Wang, H., and Xiao, H. (2016). On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks. Sensors, 16.","DOI":"10.3390\/s16121987"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2363","DOI":"10.1109\/TVT.2013.2241092","article-title":"Distance distributions in regular polygons","volume":"62","author":"Khalid","year":"2013","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Chen, L., Wu, J., Dai, H.N., and Huang, X. (2018). BRAINS: Joint Bandwidth-Relay Allocation in Multi-Homing Cooperative D2D Networks. IEEE Trans. Veh. Technol.","DOI":"10.1109\/TVT.2018.2799970"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"6189","DOI":"10.1109\/TWC.2016.2581165","article-title":"Friendly jamming on access points: Analysis and real-world measurements","volume":"15","author":"Berger","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Vo-Huu, T.D., Vo-Huu, T.D., and Noubir, G. (2016, January 18\u201320). Interleaving Jamming in Wi-Fi Networks. Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, Darmstadt, Germany.","DOI":"10.1145\/2939918.2939935"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/6\/1938\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:08:44Z","timestamp":1760195324000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/6\/1938"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,14]]},"references-count":31,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2018,6]]}},"alternative-id":["s18061938"],"URL":"https:\/\/doi.org\/10.3390\/s18061938","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,14]]}}}