{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:20:12Z","timestamp":1769905212625,"version":"3.49.0"},"reference-count":27,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2020,4,18]],"date-time":"2020-04-18T00:00:00Z","timestamp":1587168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Wireless Sensor Networks (WSNs) are vulnerable to various security threats. One of the most common types of vulnerability threat is the jamming attack, where the attacker uses the same frequency signals to jam the network transmission. In this paper, an edge node scheme is proposed to address the issue of jamming attack in WSNs. Three edge nodes are used in the deployed area of WSN, which have different transmission frequencies in the same bandwidth. The different transmission frequencies and Round Trip Time (RTT) of transmitting signal makes it possible to identify the jamming attack channel in WSNs transmission media. If an attacker jams one of the transmission channels, then the other two edge nodes verify the media serviceability by means of transmitting information from the same deployed WSNs. Furthermore, the RTT of the adjacent channel is also disturbed from its defined interval of time, due to high frequency interference in the adjacent channels, which is the indication of a jamming attack in the network. The simulation result was found to be quite consistent during analysis by jamming the frequency channel of each edge node in a step-wise process. The detection rate of jamming attacks was about 94% for our proposed model, which was far better than existing schemes. Moreover, statistical analyses were undertaken for field-proven schemes, and were found to be quite convincing compared with the existing schemes, with an average of 6% improvement.<\/jats:p>","DOI":"10.3390\/s20082311","type":"journal-article","created":{"date-parts":[[2020,4,21]],"date-time":"2020-04-21T04:49:38Z","timestamp":1587444578000},"page":"2311","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":69,"title":["An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4494-8576","authenticated-orcid":false,"given":"Muhammad","family":"Adil","sequence":"first","affiliation":[{"name":"Department of Computer Science, Virtual University of Pakistan, 54\u2013Lawrence Road, Lahore 54000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2215-2481","authenticated-orcid":false,"given":"Mohammed Amin","family":"Almaiah","sequence":"additional","affiliation":[{"name":"Department of Computer Science, King Faisal University, Al-Ahsa 31982, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3044-799X","authenticated-orcid":false,"given":"Alhuseen","family":"Omar Alsayed","sequence":"additional","affiliation":[{"name":"Deanship of Scientific Research, King Abdul Aziz University, Jeddah 21589, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3160-6542","authenticated-orcid":false,"given":"Omar","family":"Almomani","sequence":"additional","affiliation":[{"name":"Computer Network and Information Systems Department, The World Islamic Sciences and Education University, Amman 11947, Jordan"}]}],"member":"1968","published-online":{"date-parts":[[2020,4,18]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Ahmad, T., Li, X.J., and Seet, B.C. (2017). Parametric loop division for 3D localization in wireless sensor networks. Sensors, 17.","DOI":"10.3390\/s17071697"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"6975","DOI":"10.1109\/ACCESS.2018.2793841","article-title":"Denial of service defence for resource availability in wireless sensor networks","volume":"6","author":"Osanaiye","year":"2018","journal-title":"IEEE Access"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"44459","DOI":"10.1109\/ACCESS.2020.2978303","article-title":"MAC-AODV based Mutual Authentication Scheme for Constraint Oriented Networks","volume":"8","author":"Adil","year":"2020","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1119","DOI":"10.1109\/TMC.2010.75","article-title":"Optimal jamming attack strategies and network defense policies in wireless sensor networks","volume":"9","author":"Li","year":"2010","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.jnca.2016.01.001","article-title":"Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework","volume":"67","author":"Osanaiye","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1109\/SURV.2011.041110.00022","article-title":"Denial of service attacks in wireless networks: The case of jammers","volume":"13","author":"Pelechrinis","year":"2010","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Pu\u00f1al, O., Akta\u015f, I., Schnelke, C.J., Abidin, G., Wehrle, K., and Gross, J. (2014, January 19). Machine learning-based jamming detection for IEEE 802.11: Design and experimental evaluation. Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, Sydney, NSW, Australia.","DOI":"10.1109\/WoWMoM.2014.6918964"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1208","DOI":"10.1109\/TNET.2011.2106139","article-title":"A measurement-driven anti-jamming system for 802.11 networks","volume":"19","author":"Pelechrinis","year":"2011","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1186\/1687-1499-2013-208","article-title":"Detection of jamming attacks in 802.11 b wireless networks","volume":"2013","author":"Sufyan","year":"2013","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"3023","DOI":"10.1109\/TAC.2015.2409905","article-title":"Optimal denial-of-service attack scheduling with energy constraint","volume":"60","author":"Zhang","year":"2015","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Li, M., Koutsopoulos, I., and Poovendran, R. (2007, January 6\u201312). Optimal jamming attacks and network defense policies in wireless sensor networks. Proceedings of the IEEE INFOCOM 2007-26th IEEE International Conference on Computer Communications, Barcelona, Spain.","DOI":"10.1109\/INFCOM.2007.155"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1109\/TIFS.2016.2607695","article-title":"Stealthy attacks in dynamical systems: Tradeoffs between utility and detectability with application in anonymous systems","volume":"12","author":"Pradhan","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2015","DOI":"10.1587\/transfun.E102.A.2015","article-title":"Security performance analysis of joint multi-relay and jammer selection for physical-layer security under Nakagami-m fading channel","volume":"102","author":"Zhang","year":"2019","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1273","DOI":"10.1109\/TCYB.2016.2544062","article-title":"Distributed secure coordinated control for multiagent systems under strategic attacks","volume":"47","author":"Feng","year":"2016","journal-title":"IEEE Trans. Cybern."},{"key":"ref_15","unstructured":"Tang, Y., Zhang, D., Ho, D.W., Yang, W., and Wang, B. (2018). Event-based tracking control of mobile robot with denial-of-service attacks. IEEE Trans. Syst. Man Cybernet. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"118556","DOI":"10.1109\/ACCESS.2019.2917135","article-title":"BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems","volume":"7","author":"Sharma","year":"2019","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","article-title":"A survey of intrusion detection in Internet of Things","volume":"84","author":"Miani","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Ma, Y., Nie, Z., Hu, S., Li, Z., Malekian, R., and Sotelo, M. (2020). Fault Detection Filter and Controller Co-Design for Unmanned Surface Vehicles Under DoS Attacks. IEEE Trans. Intell. Transp. Syst.","DOI":"10.1109\/TITS.2020.2970472"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Ge, X., Han, Q.L., Zhang, X.M., Ding, L., and Yang, F. (2019). Distributed event-triggered estimation over sensor networks: A survey. IEEE Trans. Cybernet.","DOI":"10.1109\/TCYB.2019.2917179"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Al-Shammari, H.Q., Lawey, A., El-Gorashi, T., and Elmirghani, J.M. (2019). Resilient Service Embedding In IoT Networks. arXiv.","DOI":"10.1109\/ICTON.2019.8840429"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"151295","DOI":"10.1109\/ACCESS.2019.2948078","article-title":"Proactive Eavesdropping via Covert Pilot Spoofing Attack in Multi-Antenna Systems","volume":"7","author":"Lu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2990499","article-title":"Intelligent intrusion detection in low-power IoTs","volume":"16","author":"Saeed","year":"2016","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Xiang, Z., Yang, W., Pan, G., Cai, Y., Song, Y., and Zou, Y. (2019). Secure Transmission in HARQ-Assisted Non-orthogonal Multiple Access Networks. IEEE Trans. Inf. Forensics Secur.","DOI":"10.1109\/ICEICT.2019.8846258"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","article-title":"Security of the Internet of Things: Perspectives and challenges","volume":"20","author":"Jing","year":"2014","journal-title":"Wirel. Netw."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"102496","DOI":"10.1016\/j.jnca.2019.102496","article-title":"LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment","volume":"150","author":"Wazid","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1016\/j.future.2018.09.017","article-title":"Design of secure key management and user authentication scheme for fog computing services","volume":"91","author":"Wazid","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_27","first-page":"1","article-title":"Performance analysis of round trip time in narrowband RF networks for remote wireless communications","volume":"5","author":"Ghoumid","year":"2013","journal-title":"Int. J. Comput. Sci. Inf. Technol."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/8\/2311\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T13:31:29Z","timestamp":1760362289000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/8\/2311"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,18]]},"references-count":27,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2020,4]]}},"alternative-id":["s20082311"],"URL":"https:\/\/doi.org\/10.3390\/s20082311","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,18]]}}}