{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T04:31:51Z","timestamp":1690345911785},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T00:00:00Z","timestamp":1682294400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T00:00:00Z","timestamp":1682294400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s11276-023-03344-2","type":"journal-article","created":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T19:02:08Z","timestamp":1682362928000},"page":"2685-2701","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Jamming-resilient opportunistic QoS-constrained multi-channel routing for green IoT networking"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-6789-6302","authenticated-orcid":false,"given":"Rami","family":"Halloush","sequence":"first","affiliation":[]},{"given":"Haythem Bany","family":"Salameh","sequence":"additional","affiliation":[]},{"given":"Mariam","family":"Al-Tamimi","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Musa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,24]]},"reference":[{"key":"3344_CR1","doi-asserted-by":"crossref","unstructured":"Adem, N., & Hamdaoui, B. (2017). Jamming resiliency and mobility management in cognitive-communication networks. In Proceeding IEEE International Conference on Communications (ICC), pp. 1-6.","DOI":"10.1109\/ICC.2017.7996709"},{"issue":"2","key":"3344_CR2","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1109\/COMST.2016.2631080","volume":"19","author":"A Ali","year":"2017","unstructured":"Ali, A., & Hamouda, W. (2017). Advances on spectrum sensing for cognitive radio networks: Theory and applications. IEEE Communications Surveys and Tutorials, 19(2), 1277\u20131304. https:\/\/doi.org\/10.1109\/COMST.2016.2631080","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"3344_CR3","first-page":"100567","volume":"31","author":"N Ben Halima","year":"2021","unstructured":"Ben Halima, N., & Boujem\u00e2a, H. (2021). Energy harvesting with adaptive transmit power for multi-antenna multihop cognitive radio networks. Sustainable Computing: Informatics and Systems, 31, 100567.","journal-title":"Sustainable Computing: Informatics and Systems"},{"key":"3344_CR4","doi-asserted-by":"crossref","unstructured":"Bhunia, S., Sengupta, S., & Vazquez-Abad, F. (2014) Cr-honeynet: A learning &and decoy based sustenance mechanism against jamming attack in CRN. In IEEE Military Communications Conference (MILCOM), pp. 1173\u2013 1180.","DOI":"10.1109\/MILCOM.2014.197"},{"key":"3344_CR5","doi-asserted-by":"crossref","unstructured":"Chen, Y., Li, Y., Xu, D., & Xiao, L. (2018). Dan-based power control for iot transmission against jamming. In IEEE 87th Vehicular Technology Conference (VTC Spring), pp. 1\u20135.","DOI":"10.1109\/VTCSpring.2018.8417695"},{"key":"3344_CR6","doi-asserted-by":"crossref","unstructured":"Darabkh, K. A., & Amro, O. M. (2020). New routing protocol for half-duplex cognitive radio ad-hoc networks over IoT environment. In: 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), pp. 1\u20135.","DOI":"10.1109\/IEMTRONICS51293.2020.9216340"},{"issue":"3","key":"3344_CR7","doi-asserted-by":"publisher","first-page":"1310","DOI":"10.1109\/TNET.2016.2622002","volume":"25","author":"S D\u2019Oro","year":"2017","unstructured":"D\u2019Oro, S., Ekici, E., & Palazzo, S. (2017). Optimal power allocation and scheduling under jamming attacks. IEEE\/ACM Transactions on Networking, 25(3), 1310\u20131323.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"3344_CR8","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139626514","volume-title":"Stochastic Processes: Theory for Applications","author":"R Gallager","year":"2013","unstructured":"Gallager, R. (2013). Stochastic Processes: Theory for Applications. Cambridge: Cambridge University Press."},{"key":"3344_CR9","doi-asserted-by":"publisher","unstructured":"Halloush, R. D., Salaimeh, R., & Al-Dalqamoni, R. (2022). Availability-aware channel allocation for multi-cell cognitive radio 5G networks. In\u00a0IEEE Transactions on Vehicular Technology (vol. 71, no. 4, pp. 3931\u20133947). https:\/\/doi.org\/10.1109\/TVT.2022.3148063","DOI":"10.1109\/TVT.2022.3148063"},{"key":"3344_CR10","doi-asserted-by":"crossref","unstructured":"Hou, L., Wong, A. K. Y., Yeung, A. K. H., & Choy, S. S. O. (2016). Using trust management to defend against routing disruption attacks for cognitive radio networks. In: IEEE International Conference on Consumer Electronics-China, pp. 1-4.","DOI":"10.1109\/ICCE-China.2016.7849766"},{"issue":"4","key":"3344_CR11","doi-asserted-by":"publisher","first-page":"1722","DOI":"10.1109\/TGCN.2021.3099804","volume":"5","author":"N Hu","year":"2021","unstructured":"Hu, N., Tian, Z., Du, X., & Guizani, M. (2021). An energy-efficient in-network computing paradigm for 6G. IEEE Transactions on Green Communications and Networking, 5(4), 1722\u20131733. https:\/\/doi.org\/10.1109\/TGCN.2021.3099804","journal-title":"IEEE Transactions on Green Communications and Networking"},{"issue":"3","key":"3344_CR12","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MWC.2017.1600404","volume":"24","author":"AA Khan","year":"2017","unstructured":"Khan, A. A., Rehmani, M. H., & Rachedi, A. (2017). Cognitive radio based Internet of Things: Applications architectures spectrum related functionalities and future research directions. IEEE Wireless Communications, 24(3), 17\u201325.","journal-title":"IEEE Wireless Communications"},{"key":"3344_CR13","doi-asserted-by":"crossref","unstructured":"Kim, Y. S., DeBruhl, B., & Tague, P. (2014). JADE: Jamming-averse routing on cognitive radio mesh networks. In 2014 IEEE Conference on Communications and Network Security, pp. 21\u201328.","DOI":"10.1109\/CNS.2014.6997461"},{"issue":"5","key":"3344_CR14","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/TMC.2007.70751","volume":"7","author":"H Kim","year":"2008","unstructured":"Kim, H., & Shin, K. G. (2008). Efficient discovery of spectrum opportunities with mac-layer sensing in cognitive radio networks. IEEE Transactions on Mobile Computing, 7(5), 533\u2013545.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"3344_CR15","first-page":"100678","volume":"35","author":"V Kumar Jain","year":"2022","unstructured":"Kumar Jain, V., Mazumdar, A., Faruki, P., & Govil, M. (2022). Congestion control in Internet of Things: Classification, challenges, and future directions. Sustainable Computing: Informatics and Systems, 35, 100678.","journal-title":"Sustainable Computing: Informatics and Systems"},{"issue":"5","key":"3344_CR16","first-page":"6122","volume":"6","author":"KK Patel","year":"2016","unstructured":"Patel, K. K., Patel, S. M., Scholar, P. G., & Carlos, S. (2016). Internet of Things-IoT: Definition, characteristics, architecture, enabling technologies, application & future challenges. International Journal of Engineering Science and Computing, 6(5), 6122\u20136131.","journal-title":"International Journal of Engineering Science and Computing"},{"issue":"1","key":"3344_CR17","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/IOTM.0001.2000006","volume":"4","author":"C Perera","year":"2021","unstructured":"Perera, C., Barhamgi, M., & Vecchio, M. (2021). Envisioning Tool support for designing privacy-aware internet of thing applications. IEEE Internet of Things Magazine, 4(1), 78\u201383.","journal-title":"IEEE Internet of Things Magazine"},{"key":"3344_CR18","doi-asserted-by":"crossref","unstructured":"Ping, S., Aijaz, A., Holland, O., & Aghvami, A. H. (2014). Energy and interference aware cooperative routing in cognitive radio ad-hoc networks. In 2014 IEEE Wireless Communications and Networking Conference (WCNC), pp. 87\u201392.","DOI":"10.1109\/WCNC.2014.6951927"},{"key":"3344_CR19","doi-asserted-by":"publisher","unstructured":"Ramirez, I.U., & Barboza Tello, N.A. (2014). A survey of challenges in green wireless communications research. In 2014 International Conference on Mechatronics, Electronics and Automotive Engineering, pp. 197-200, https:\/\/doi.org\/10.1109\/ICMEAE.2014.29.","DOI":"10.1109\/ICMEAE.2014.29"},{"key":"3344_CR20","volume-title":"Wireless Communications: Principles and Practice","author":"T Rappaport","year":"2001","unstructured":"Rappaport, T. (2001). Wireless Communications: Principles and Practice (2nd ed.). Upper Saddle River: Prentice Hall PTR.","edition":"2"},{"key":"3344_CR21","unstructured":"Derbas, R. (August 2018). Routing Algorithm for Mutli-hop IoT Cognitive Radio Networks under Proactive Jamming Attacks, [Master Thesis, Yarmouk University, Irbid, Jordan]. Arabic Digital Library-Yarmouk University Publishing."},{"key":"3344_CR22","doi-asserted-by":"publisher","unstructured":"Sheikholeslami, A., Ghaderi, M., Pishro-Nik, H., & Goeckel, D. (2014). Jamming-aware minimum energy routing in wireless networks. In 2014 IEEE International Conference on Communications (ICC), pp. 2313\u20132318. https:\/\/doi.org\/10.1109\/ICC.2014.6883668","DOI":"10.1109\/ICC.2014.6883668"},{"key":"3344_CR23","doi-asserted-by":"crossref","unstructured":"Slimeni, F., Scheers, B., Chtourou, Z., & Le Nir V. (2015). Jamming mitigation in cognitive radio networks using a modified q-learning algorithm. In International Conference on Military Communications and Information Systems, pp. 1\u20137.","DOI":"10.1109\/ICMCIS.2015.7158697"},{"issue":"6","key":"3344_CR24","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MC.2020.2984254","volume":"53","author":"SW Smith","year":"2020","unstructured":"Smith, S. W. (2020). Securing the Internet of Things: An ongoing challenge. Computer, 53(6), 62\u201366.","journal-title":"Computer"},{"issue":"4","key":"3344_CR25","doi-asserted-by":"publisher","first-page":"1176","DOI":"10.1109\/TMC.2016.2582173","volume":"16","author":"J Wang","year":"2017","unstructured":"Wang, J., et al. (2017). Spectrum-aware anypath routing in multi-hop cognitive radio networks. IEEE Transactions on Mobile Computing, 16(4), 1176\u201387.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"6","key":"3344_CR26","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1109\/LCOMM.2015.2418776","volume":"19","author":"L Xiao","year":"2015","unstructured":"Xiao, L., Chen, T., Liu, J., & Dai, H. (2015). Anti-jamming transmission Stackelberg game with observation errors. IEEE Communications Letters, 19(6), 949\u2013952.","journal-title":"IEEE Communications Letters"},{"key":"3344_CR27","unstructured":"Zhu, Z., Qian, Y., & Hu, R. Q. (2015). Delay based channel allocations in multi-hop cognitive radio networks. In Proceedings of IWCMC 2015, Dubrovnik, Croatia."}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03344-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-023-03344-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03344-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T12:13:18Z","timestamp":1690287198000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-023-03344-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,24]]},"references-count":27,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["3344"],"URL":"https:\/\/doi.org\/10.1007\/s11276-023-03344-2","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,24]]},"assertion":[{"value":"4 April 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}