A Proposed Algorithm For Avoiding Jammer In Structure-Free Wireless Sensor Networks
Main Article Content
Abstract
Wireless Sensor Networks (WSNs) have emerged as a transformative technology with applications in critical and often inaccessible environments, including military and security domains. These networks comprise cooperative sensor nodes that gather and relay data to a base station. However, their inherent resource constraints—particularly the non-rechargeable nature of energy—pose a major challenge to network longevity and reliability. Conventional fixed-path transmission protocols exacerbate this issue, as energy-depleted or jammed nodes can disrupt communication, leading to partial or complete data loss. The primary objective of this study is to design and evaluate a structure-free transmission protocol that dynamically adapts data routing in order to optimize energy utilization and enhance resilience against jamming attacks. To achieve this, our study examines the impact of four distinct jammer types—Constant, Deceptive, Random, and Reactive—on key performance indicators, including energy consumption, signal-to-jamming ratio, and data rate. Simulation results reveal that jamming increases the number of transmission levels by up to 55%, with Deceptive Jammers generating the fewest and Constant Jammers the most. Energy consumption rises by as much as 62% under jamming, with Random Jammers causing the highest drain. Moreover, data rates increase by approximately 37% in the presence of jamming. These findings highlight the proposed protocol’s effectiveness in mitigating jamming effects while preserving network energy, offering a robust solution for WSNs deployed in hostile or high-risk environments.
Article Details
Issue
Section

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
[1] B. Krishnamachari, Networking Wireless Sensors. Cambridge, U.K.: Cambridge Univ. Press, 2005.
[2] R. Priyadarshi, “Energy-efficient routing in wireless sensor networks: A meta-heuristic and artificial intelligence-based approach: A comprehensive review,” Arch. Comput. Methods Eng., vol. 31, no. 4, pp. 2877–2915, Jan. 2024, doi: 10.1007/s11831-023-10039-6 .
[3] D. W. Wajgi and J. V. Tembhurne, “Localization in wireless sensor networks and wireless multimedia sensor networks using clustering techniques,” Multimedia Tools Appl., vol. 83, no. 3, pp. 6829–6879, Jun. 2023, doi: 10.1007/s11042-023-15956-z .
[4] I. Stojmenovic, Handbook of Sensor Networks. Hoboken, NJ, USA: Wiley, 2005.
[5] A. I. Al-Sulaifanie, B. K. Al-Sulaifanie, and S. Biswas, “Recent trends in clustering algorithms for wireless sensor networks: A comprehensive review,” Comput. Commun., vol. 191, pp. 395–424, Jul. 2022, doi: 10.1016/j.comcom.2022.05.006 .
[6] M. M. Afsar and M.-H. Tayarani-N, “Clustering in sensor networks: A literature survey,” J. Netw. Comput. Appl., vol. 46, pp. 198–226, Nov. 2014, doi: 10.1016/j.jnca.2014.09.005 .
[7] S. A. Hussein et al., “Integrating law, cybersecurity, and AI: Deep learning for securing iris-based biometric systems,” Mesopotamian J. Cybersecurity, vol. 5, no. 2, pp. 319–336, 2025, doi: 10.58496/MJCS/2025/020 .
[8] H. K. Chaiel, Z. S. M. Al-Husseini, and K. I. Arif, “Energy enhancement techniques for structure-free wireless sensor network with encrypted data,” Int. J. Sens. Wireless Commun. Control, vol. 10, no. 3, pp. 402–412, Jun. 2019.
[9] X. Sun, S. Yan, B. Wang, L. Xia, Q. Liu, and H. Zhang, “Air temperature error correction based on solar radiation in an economical meteorological wireless sensor network,” Sensors, vol. 15, no. 8, pp. 18114–18139, Jul. 2015, doi: 10.3390/s150818114 .
[10] M. Albdair, Z. R. Mohsin, A. Saihood, A. M. Hamad, and A. Sahi, “Secured multi-objective optimisation-based protocol for reliable data transmission in underwater wireless sensor networks,” Mesopotamian J. Cybersecurity, vol. 5, no. 1, pp. 216–239, Mar. 2025, doi: 10.58496/MJCS/2025/015 .
[11] S. P. Singh and S. C. Sharma, “A survey on cluster based routing protocols in wireless sensor networks,” Procedia Comput. Sci., vol. 45, pp. 687–695, 2015, doi: 10.1016/j.procs.2015.03.133 .
[12] N. A. Pantazis, S. A. Nikolidakis, and D. D. Vergados, “Energy-efficient routing protocols in wireless sensor networks: A survey,” IEEE Commun. Surv. Tuts., vol. 15, no. 2, pp. 551–591, Second Quart. 2013, doi: 10.1109/SURV.2012.062612.00084 .
[13] S. Ramesh et al., “Optimization of LEACH protocol in wireless sensor network using machine learning,” Comput. Intell. Neurosci., vol. 2022, Art. no. 5393251, Aug. 2022, doi: 10.1155/2022/5393251 .
[14] I. F. Jaleel, R. S. Ali, and G. A. Abed, “Improvement of Internet of Things (IoT) interference based on pre-coding techniques over 5G networks,” Mesopotamian J. Cybersecurity, vol. 5, no. 1, pp. 11–22, Jan. 2025, doi: 10.58496/MJCS/2025/002 .
[15] C.-M. Chao and T.-Y. Hsiao, “Design of structure-free and energy-balanced data aggregation in wireless sensor networks,” J. Netw. Comput. Appl., vol. 37, no. 1, pp. 229–239, Jan. 2014, doi: 10.1016/j.jnca.2013.02.013.
[16] C.-M. Chao and T.-Y. Hsiao, “Design of structure-free and energy-balanced data aggregation in wireless sensor networks,” in Proc. IEEE Int. Conf. High Perform. Comput. Commun., 2009, pp. 222–229, doi: 10.1109/HPCC.2009.63 .
[17] M. H. Yeganeh, H. Yousefi, N. Alinaghipour, and A. Movaghar, “RDAG: A structure-free real-time data aggregation protocol for wireless sensor networks,” in Proc. IEEE 17th Int. Conf. Embedded Real-Time Comput. Syst. Appl. (RTCSA), vol. 1, Aug. 2011, pp. 51–60, doi: 10.1109/RTCSA.2011.70 .
[18] S. A. S. Naem and S. M. Hameed, “Digital watermarking techniques, challenges, and applications: A review,” Mesopotamian J. Cybersecurity, vol. 5, no. 2, pp. 453–476, 2025, doi: 10.58496/MJCS/2025/028 .
[19] Q. Wang and T. Zhang, “A survey on security in wireless sensor networks,” Kristianstad Univ. Res. Portal, pp. 293–320, 2025. [Online]. Available: https://researchportal.hkr.se/en/publications/a-survey-on-security-in-wireless-sensor-networks
[20] A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou, “A survey on jamming attacks and countermeasures in WSNs,” IEEE Commun. Surv. Tuts., vol. 11, no. 4, pp. 42–56, Fourth Quart. 2009, doi: 10.1109/SURV.2009.090404 .
[21] A. D. Wood and J. A. Stankovic, “Denial of service in sensor networks,” Computer, vol. 35, no. 10, pp. 54–62, Oct. 2002, doi: 10.1109/MC.2002.1039518 .
[22] Y. W. Law, L. van Hoesel, J. Doumen, P. H. Hartel, and P. J. M. Havinga, “Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols,” in Proc. 3rd ACM Workshop Secur. Ad Hoc Sensor Netw., Nov. 2005, pp. 1–10, doi: 10.1145/1102219.1102234 .
[23] A. Mpitziopoulos, D. Gavalas, G. Pantziou, and C. Konstantopoulos, “Defending wireless sensor networks from jamming attacks,” in Proc. IEEE 18th Int. Symp. Pers., Indoor Mobile Radio Commun. (PIMRC), Sep. 2007, pp. 1–5, doi: 10.1109/PIMRC.2007.4394775 .
[24] C. W. Commander, P. M. Pardalos, V. Ryabchenko, S. Uryasev, and G. Zrazhevsky, “The wireless network jamming problem,” J. Comb. Optim., vol. 14, no. 4, pp. 481–498, Dec. 2007, doi: 10.1007/s10878-007-9071-7 .
[25] S. M. Shareef and R. F. Hassan, “Improved blockchain technique based on modified SLIM algorithm for cyber security,” Mesopotamian J. Cybersecurity, vol. 5, no. 1, pp. 147–164, Feb. 2025, doi: 10.58496/MJCS/2025/010 .
[26] J. Fan, T. Liang, T. Wang, and J. Liu, “Identification and localization of the jammer in wireless sensor networks,” Comput. J., vol. 62, no. 10, pp. 1515–1527, Oct. 2019, doi: 10.1093/comjnl/bxz055 .
[27] K. Dhivyasri, “Wireless sensor network jammer attack: A detailed review,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 8, no. 8, pp. 233–238, Aug. 2020, doi: 10.22214/ijraset.2020.30844 .
[28] A. Cortés-Leal, C. Del-Valle-Soto, C. Cardenas, L. J. Valdivia, and J. A. Del Puerto-Flores, “Performance metric analysis for a jamming detection mechanism under collaborative and cooperative schemes in industrial wireless sensor networks,” Sensors, vol. 22, no. 1, p. 178, Dec. 2021, doi: 10.3390/s22010178 .
[29] Z. S. M. Al-Husseini, H. K. Chaiel, A. Meddeb, and A. Fakhfakh, “A detailed review of wireless sensor network, jammer, the types, location, detection and countermeasures of jammers,” Serv.-Oriented Comput. Appl., vol. 18, no. 3, pp. 225–247, Apr. 2024, doi: 10.1007/s11761-024-00396-w .
[30] W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The feasibility of launching and detecting jamming attacks in wireless networks,” in Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc), 2005, pp. 46–57, doi: 10.1145/1062689.1062697 .
[31] M. Cheng, Y. Ling, and W. B. Wu, “Time series analysis for jamming attack detection in wireless networks,” in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2017, pp. 1–6. [Online]. Available: https://ieeexplore.ieee.org/document/8254000
[32] M. Li, I. Koutsopoulos, and R. Poovendran, “Optimal jamming attacks and network defense policies in wireless sensor networks,” in Proc. IEEE INFOCOM, May 2007, pp. 1307–1315, doi: 10.1109/INFCOM.2007.155 .
[33] A. W. Wood, J. A. Stankovic, and G. Zhou, “DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks,” in Proc. IEEE SECON, Jun. 2007, pp. 60–69, doi: 10.1109/SAHCN.2007.4292818 .
[34] S. Vadlamani, B. Eksioglu, H. Medal, and A. Nandi, “Jamming attacks on wireless networks: A taxonomic survey,” Int. J. Prod. Econ., vol. 172, pp. 76–94, Feb. 2016, doi: 10.1016/j.ijpe.2015.11.008 .
[35] K. Grover, A. Lim, and Q. Yang, “Jamming and anti-jamming techniques in wireless networks: A survey,” Int. J. Ad Hoc Ubiquitous Comput., vol. 17, no. 4, pp. 197–215, 2014, doi: 10.1504/IJAHUC.2014.066419 .
[36] K. Panyim, T. Hayajneh, P. Krishnamurthy, and D. Tipper, “On limited-range strategic/random jamming attacks in wireless ad hoc networks,” in Proc. IEEE 34th Conf. Local Comput. Netw. (LCN), Zurich, Switzerland, Oct. 2009, pp. 922–929, doi: 10.1109/LCN.2009.5355041 .
[37] N. Z. Khalaf et al., “Development of real-time threat detection systems with AI-driven cybersecurity in critical infrastructure,” Mesopotamian J. Cybersecurity, vol. 5, no. 2, pp. 501–513, 2025, doi: 10.58496/MJCS/2025/031 .
[38] D. Mihaylova, “An overview of methods of reducing the effect of jamming attacks at the physical layer of wireless networks,” in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 283, 2019, pp. 271–284, doi: 10.1007/978-3-030-23976-3_24 .
[39] N. Tandiya, A. Jauhar, V. Marojevic, and J. H. Reed, “Deep predictive coding neural network for RF anomaly detection in wireless networks,” in Proc. IEEE Int. Conf. Commun. Workshops (ICC Workshops), May 2018, pp. 1–6, doi: 10.1109/ICCW.2018.8403654 .
[40] H. Sedjelmaci and M. Feham, “Novel hybrid intrusion detection system for clustered wireless sensor network,” Int. J. Netw. Secur. Appl., vol. 3, no. 4, pp. 1–14, Jul. 2011, doi: 10.5121/IJNSA.2011.3401 .
[41] O. Osanaiye, A. Alfa, and G. Hancke, “A statistical approach to detect jamming attacks in wireless sensor networks,” Sensors, vol. 18, no. 6, p. 1691, May 2018, doi: 10.3390/s18061691 .
[42] M. Çakıroğlu and A. T. Özcerit, “Jamming detection mechanisms for wireless sensor networks,” in Proc. 3rd Int. ICST Conf. Scalable Inf. Syst. (InfoScale), Jan. 2008, pp. 1–8, doi: 10.4108/ICST.INFO SCALE2008.3484 .
[43] P. Ganeshkumar, K. P. Vijayakumar, and M. Anandaraj, “A novel jammer detection framework for cluster-based wireless sensor networks,” EURASIP J. Wireless Commun. Netw., vol. 2016, Art. no. 29, Feb. 2016, doi: 10.1186/s13638-016-0528-1 .
[44] W. Aldosari and M. Zohdy, “Tracking a jammer in wireless sensor networks and selecting boundary nodes by estimating signal-to-noise ratios and using an extended Kalman filter,” J. Sens. Actuator Netw., vol. 7, no. 4, p. 48, Nov. 2018, doi: 10.3390/jsan7040048 .
[45] S. Muthu Mariappan and S. Selvakumar, “A novel location pinpointed anti-jammer with knowledge estimated localizer for secured data transmission in mobile wireless sensor network,” Wireless Pers. Commun., vol. 118, no. 4, pp. 2073–2094, Jun. 2021, doi: 10.1007/s11277-020-07885-z .
[46] W. Zhou, Z. Zhou, Y. Niu, Q. Zhou, and H. Ding, “A fast anti-jamming algorithm based on imitation learning for WSN,” Sensors, vol. 23, no. 22, p. 9240, Nov. 2023, doi: 10.3390/s23229240 .
[47] M. Meenalochani and S. Sudha, “Jammed node detection and routing in a multihop wireless sensor network using hybrid techniques,” Wireless Pers. Commun., vol. 104, no. 2, pp. 663–675, Jan. 2019, doi: 10.1007/s11277-018-6042-5 .
[48] L. Jia, Y. Xu, Y. Sun, S. Feng, and A. Anpalagan, “Stackelberg game approaches for anti-jamming defence in wireless networks,” IEEE Wireless Commun., vol. 25, no. 6, pp. 120–128, Dec. 2018, doi: 10.1109/MWC.2017.1700363 .
[49] Y. Arjoune, F. Salahdine, M. S. Islam, E. Ghribi, and N. Kaabouch, “A novel jamming attacks detection approach based on machine learning for wireless communication,” in Proc. Int. Conf. Inf. Netw. (ICOIN), Jan. 2020, pp. 459–464, doi: 10.1109/ICOIN48656.2020.9016462 .
[50] B. Mbarek, M. Ge, and T. Pitner, “An adaptive anti-jamming system in Hyperledger-based wireless sensor networks,” Wireless Netw., vol. 28, no. 2, pp. 691–703, Feb. 2022, doi: 10.1007/s11276-022-02886-1 .
[51] A. S. Ali, S. Naser, and S. Muhaidat, “Defeating proactive jammers using deep reinforcement learning for resource-constrained IoT networks,” in Proc. IEEE 34th Annu. Int. Symp. Pers., Indoor Mobile Radio Commun. (PIMRC), Sep. 2023, pp. 1–6, doi: 10.1109/PIMRC56721.2023.10293793 .
[52] F. Yang, N. Shu, C. Hu, J. Huang, and Z. Niu, “Jammer location-aware method in wireless sensor networks based on Fibonacci branch search,” J. Sens., vol. 2023, Art. no. 2261730, May 2023, doi: 10.1155/2023/2261730.
[53] L. Jia et al., “Game-theoretic learning anti-jamming approaches in wireless networks,” IEEE Commun. Mag., vol. 60, no. 5, pp. 60–66, May 2022, doi: 10.1109/MCOM.001.00496 .