{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:06:34Z","timestamp":1746057994409,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540499909"},{"type":"electronic","value":"9783540499916"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11945529_16","type":"book-chapter","created":{"date-parts":[[2006,11,27]],"date-time":"2006-11-27T12:18:52Z","timestamp":1164629932000},"page":"215-229","source":"Crossref","is-referenced-by-count":32,"title":["Of Malicious Motes and Suspicious Sensors: On the Efficiency of Malicious Interference in Wireless Networks"],"prefix":"10.1007","author":[{"given":"Seth","family":"Gilbert","sequence":"first","affiliation":[]},{"given":"Rachid","family":"Guerraoui","sequence":"additional","affiliation":[]},{"given":"Calvin","family":"Newport","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Brown, T.X., James, J.E., Sethi, A.: Jamming and sensing of encrypted wireless ad hoc networks. Technical Report CU-CS-1005-06, UC Boulder (2006)","DOI":"10.1145\/1132905.1132919"},{"issue":"5","key":"16_CR2","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: Security protocols for sensor networks. Wireless Networks\u00a08(5), 521\u2013534 (2002)","journal-title":"Wireless Networks"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: Tinysec: A link layer security architecture for wireless sensor networks. In: Embedded Networked Sensor Systems (2004)","DOI":"10.1145\/1031495.1031515"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Koo, C.Y.: Broadcast in radio networks tolerating byzantine adversarial behavior. In: Principles of Distributed Computing, pp. 275\u2013282 (2004)","DOI":"10.1145\/1011767.1011807"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Bhandari, V., Vaidya, N.H.: On reliable broadcast in a radio network. In: Principles of Distributed Computing, pp. 138\u2013147 (2005)","DOI":"10.1145\/1073814.1073841"},{"issue":"3","key":"16_CR6","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.ipl.2004.10.007","volume":"93","author":"A. Pelc","year":"2005","unstructured":"Pelc, A., Peleg, D.: Broadcasting with locally bounded byzantine faults. Information Processing Letters\u00a093(3), 109\u2013115 (2005)","journal-title":"Information Processing Letters"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Drabkin, V., Friedman, R., Segal, M.: Efficient byzantine broadcast in wireless ad hoc networks. In: Dependable Systems and Networks, pp. 160\u2013169 (2005)","DOI":"10.1109\/DSN.2005.42"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Pelc, A., Peleg, D.: Feasibility and complexity of broadcasting with random transmission failures. In: Principles of Distributed Computing, pp. 334\u2013341 (2005)","DOI":"10.1145\/1073814.1073879"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/3-540-36136-7_29","volume-title":"Algorithms and Computation","author":"A.E.F. Clementi","year":"2002","unstructured":"Clementi, A.E.F., Monti, A., Silvestri, R.: Optimal F-reliable protocols for the do-all problem on single-hop wireless networks. In: Bose, P., Morin, P. (eds.) ISAAC 2002. LNCS, vol.\u00a02518, pp. 320\u2013331. Springer, Heidelberg (2002)"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Chlebus, B.S., Kowalski, D.R., Lingas, A.: The do-all problem in broadcast networks. In: Principles of Distributed Computing, pp. 117\u2013127 (2001)","DOI":"10.1145\/383962.384000"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Kranakis, E., Krizanc, D., Pelc, A.: Fault-tolerant broadcasting in radio networks. In: European Symposium on Algorithms, pp. 283\u2013294 (1998)","DOI":"10.1007\/3-540-68530-8_24"},{"issue":"1","key":"16_CR12","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.jpdc.2003.09.002","volume":"64","author":"A. Clementi","year":"2004","unstructured":"Clementi, A., Monti, A., Silvestri, R.: Round robin is optimal for fault-tolerant broadcasting on wireless networks. J. Parallel Distributed Computing\u00a064(1), 89\u201396 (2004)","journal-title":"J. Parallel Distributed Computing"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Koo, C.Y., Bhandari, V., Katz, J., Vaidya, N.H.: Relibable broadcast in radio networks: The bounded collision case. In: Principles of Distributed Computing (2006)","DOI":"10.1145\/1146381.1146420"},{"key":"16_CR14","unstructured":"Stahlberg, M.: Radio jamming attacks against two popular mobile networks. In: Helsinki University of Technology Seminar on Network Security (2000)"},{"key":"16_CR15","unstructured":"Negi, R., Perrig, A.: Jamming analysis of mac protocols. Technical report, Carnegie Mellon University (2003)"},{"issue":"3","key":"16_CR16","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2004.1","volume":"02","author":"Y. Hu","year":"2004","unstructured":"Hu, Y., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Security and Privacy Magazine\u00a002(3), 28\u201339 (2004)","journal-title":"IEEE Security and Privacy Magazine"},{"key":"16_CR17","unstructured":"Gupta, V., Krishnamurthy, S., Faloutsos, S.: Denial of service attacks at the mac layer in wireless ad hoc networks. In: Military Communications Conference (2002)"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Abramson, N.: The aloha system - another approach for computer communications. In: Proceedings of Fall Joint Computer Conference, AFIPS, vol.\u00a037, pp. 281\u2013285 (1970)","DOI":"10.21236\/AD0707853"},{"issue":"7","key":"16_CR19","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1145\/360248.360253","volume":"19","author":"R.M. Metcalf","year":"1976","unstructured":"Metcalf, R.M., Boggs, D.R.: Ethernet: Distributed packet switching for local computer networks. Communications of the ACM\u00a019(7), 395\u2013404 (1976)","journal-title":"Communications of the ACM"},{"issue":"1","key":"16_CR20","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/0022-0000(92)90042-H","volume":"45","author":"R. Bar-Yehuda","year":"1992","unstructured":"Bar-Yehuda, R., Goldreich, O., Itai, A.: On the time-complexity of broadcast in multi-hop radio networks: An exponential gap between determinism and randomization. Journal of Computer and System Sciences\u00a045(1), 104\u2013126 (1992)","journal-title":"Journal of Computer and System Sciences"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Woo, A., Whitehouse, K., Jiang, F., Polastre, J., Culler, D.: Exploiting the capture effect for collision detection and recovery. In: Workshop on Embedded Networked Sensors, pp. 45\u201352 (2005)","DOI":"10.1109\/EMNETS.2005.1469098"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Clementi, A., Monti, A., Silvestri, R.: Selective families, superimposed codes, and broadcasting on unknown radio networks. In: Symposium on Discrete algorithms, Philadelphia, PA, USA, pp. 709\u2013718 (2001)","DOI":"10.1145\/383962.384040"},{"key":"16_CR23","first-page":"158","volume-title":"Principles of Distributed Computing","author":"D.R. Kowalski","year":"2005","unstructured":"Kowalski, D.R.: On selection problem in radio networks. In: Principles of Distributed Computing, pp. 158\u2013166. ACM Press, New York (2005)"}],"container-title":["Lecture Notes in Computer Science","Principles of Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11945529_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T04:37:00Z","timestamp":1736656620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11945529_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540499909","9783540499916"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/11945529_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}