{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T16:45:50Z","timestamp":1725813950426},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319144719"},{"type":"electronic","value":"9783319144726"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-14472-6_14","type":"book-chapter","created":{"date-parts":[[2014,12,9]],"date-time":"2014-12-09T09:44:09Z","timestamp":1418118249000},"page":"202-216","source":"Crossref","is-referenced-by-count":3,"title":["A Disruption-Resistant MAC Layer for Multichannel Wireless Networks"],"prefix":"10.1007","author":[{"given":"Henry","family":"Tan","sequence":"first","affiliation":[]},{"given":"Chris","family":"Wacek","sequence":"additional","affiliation":[]},{"given":"Calvin","family":"Newport","sequence":"additional","affiliation":[]},{"given":"Micah","family":"Sherr","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Awerbuch, B., Richa, A., Scheideler, C.: A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks. In: PODC (2008)","DOI":"10.1145\/1400751.1400759"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Barri\u00e9re, L., Fraigniaud, P., Narayanan, L.: Robust position-based routing in wireless ad hoc networks with unstable transmission ranges. In: DIAL M, pp. 19\u201327 (2001)","DOI":"10.1145\/381448.381451"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Daum, S., Gilbert, S., Kuhn, F., Newport, C.: Leader Election in Shared Spectrum Radio Networks. In: PODC (2012)","DOI":"10.1145\/2332432.2332470"},{"issue":"6","key":"14_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"14_CR5","unstructured":"Foerster, J.: The Performance of a Direct-Sequence Spread Ultra-Wideband System in the Presence of Multipath, Narrowband Interference, and Multiuser Interference. In: IEEE Conference on Ultra Wideband Systems and Technologies (2002)"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-642-35476-2_13","volume-title":"Principles of Distributed Systems","author":"M. Ghaffari","year":"2012","unstructured":"Ghaffari, M., Gilbert, S., Newport, C., Tan, H.: Optimal Broadcast in Shared Spectrum Radio Networks. In: Baldoni, R., Flocchini, P., Binoy, R. (eds.) OPODIS 2012. LNCS, vol.\u00a07702, pp. 181\u2013195. Springer, Heidelberg (2012)"},{"issue":"6-7","key":"14_CR7","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1016\/j.tcs.2008.10.008","volume":"410","author":"S. Gilbert","year":"2009","unstructured":"Gilbert, S., Guerraoui, R., Newport, C.: Of Malicious Motes and Suspicious Sensors: On the Efficiency of Malicious Interference in Wireless Networks. Theoretical Computer Science\u00a0410(6-7), 546\u2013569 (2009)","journal-title":"Theoretical Computer Science"},{"key":"14_CR8","unstructured":"Tan, H., Wacek, C., Newport, C., Sherr, M.: A Disruption-Resistant MAC Layer for Multichannel Wireless Networks, \n                    \n                      http:\/\/people.cs.georgetown.edu\/~cnewport\/publications.html"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Jin, T., Noubir, G., Thapa, B.: Zero Pre-Shared Secret Key Establishment in the Presence of Jammers. In: MOBIHOC (2009)","DOI":"10.1145\/1530748.1530779"},{"issue":"2","key":"14_CR10","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1109\/TCOM.1987.1096746","volume":"35","author":"M. Kavehrad","year":"1987","unstructured":"Kavehrad, M., Ramamurthi, B.: Direct-Sequence Spread Spectrum with DPSK Modulation and Diversity for Indoor Wireless Communications. IEEE Transactions on Communications\u00a035(2), 224\u2013236 (1987)","journal-title":"IEEE Transactions on Communications"},{"issue":"3","key":"14_CR11","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1145\/354871.354874","volume":"18","author":"E. Kohler","year":"2000","unstructured":"Kohler, E., Morris, R., Chen, B., Jannotti, J., Kaashoek, M.: The Click Modular Router. ACM Transactions on Computer Systems (TOCS)\u00a018(3), 263\u2013297 (2000)","journal-title":"ACM Transactions on Computer Systems (TOCS)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Kuhn, F., Moscibroda, T., Wattenhofer, R.: On the locality of bounded growth. In: PODC, pp. 60\u201368 (2005)","DOI":"10.1145\/1073814.1073826"},{"issue":"5","key":"14_CR13","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/s11276-007-0045-6","volume":"14","author":"F. Kuhn","year":"2008","unstructured":"Kuhn, F., Wattenhofer, R., Zollinger, A.: Ad hoc networks beyond unit disk graphs. Wireless Networks\u00a014(5), 715\u2013729 (2008)","journal-title":"Wireless Networks"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Liu, A., Ning, P., Dai, H., Liu, Y.: USD-FH: Jamming-Resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure. In: MASS (2010a)","DOI":"10.1109\/MASS.2010.5663968"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Liu, A., Ning, P., Dai, H., Liu, Y., Wang, C.: Defending DSSS-Based Broadcast Communication Against Insider Jammers via Delayed Seed-Disclosure. In: ACSAC (2010b)","DOI":"10.1145\/1920261.1920315"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ning, P., Dai, H., Liu, A.: Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication. In: INFOCOM (2010c)","DOI":"10.1109\/INFCOM.2010.5462156"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Moscibroda, T., Wattenhofer, R.: Maximal independent sets in radio networks. In: PODC, pp. 148\u2013157. ACM (2005)","DOI":"10.1145\/1073814.1073842"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Navda, V., Bohra, A., Ganguly, S., Rubenstein, D.: Using channel hopping to increase 802.11 resilience to jamming attacks. In: INFOCOM (2007)","DOI":"10.1109\/INFCOM.2007.314"},{"key":"14_CR19","unstructured":"P\u00f6pper, C., Strasser, M., \u010capkun, S.: Jamming-Resistant Broadcast Communication without Shared Keys. In: USENIX Security Symposium (2009)"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Richa, A., Scheideler, C., Schmid, S., Zhang, J.: Competitive and Fair Throughput for Co-Existing Networks Under Adversarial Interference. In: PODC (2012)","DOI":"10.1145\/2332432.2332488"},{"issue":"3","key":"14_CR21","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s00446-012-0180-x","volume":"26","author":"A. Richa","year":"2013","unstructured":"Richa, A., Scheideler, C., Schmid, S., Zhang, J.: Competitive Throughput in Multi-Hop Wireless Networks Despite Adaptive Jamming. Distributed Computing\u00a026(3), 159\u2013171 (2013)","journal-title":"Distributed Computing"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Schmid, S., Wattenhofer, R.: Algorithmic models for sensor networks. In: Proc. 14th Int. Workshop on Parallel and Distributed Real-Time Systems, pp. 1\u201311 (2006)","DOI":"10.1109\/IPDPS.2006.1639417"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Sharma, A., Belding, E.M.: FreeMAC: Framework for Multi-channel MAC Development on 802.11 Hardware. In: ACM Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO) (2008)","DOI":"10.1145\/1397718.1397734"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Slater, D., Tague, P., Poovendran, R., Matt, B.: A Coding-Theoretic Approach for Efficient Message Verification over Insecure Channels. In: WiSec (2009)","DOI":"10.1145\/1514274.1514297"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Strasser, M., Capkun, S., Popper, C., Cagalj, M.: Jamming-Resistant Key Establishment using Uncoordinated Frequency Hopping. In: IEEE Symposium on Security and Privacy (2008)","DOI":"10.1109\/SP.2008.9"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Strasser, M., P\u00f6pper, C., \u010capkun, S.: Efficient Uncoordinated FHSS Anti-Jamming Communication. In: MOBIHOC (2009)","DOI":"10.1145\/1530748.1530778"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel surfing and spatial retreats: Defenses against wireless denial of service. In: ACM Workshop on Wireless Security (2004)","DOI":"10.1145\/1023646.1023661"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Xu, W., Trappe, W., Zhang, Y.: Channel Surfing: Defending Wireless Sensor Networks from Interference. In: ACM IPSN (2007)","DOI":"10.1109\/IPSN.2007.4379710"}],"container-title":["Lecture Notes in Computer Science","Principles of Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14472-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T00:14:42Z","timestamp":1559088882000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-14472-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319144719","9783319144726"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14472-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}