{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:25:56Z","timestamp":1743085556623,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319218366"},{"type":"electronic","value":"9783319218373"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21837-3_48","type":"book-chapter","created":{"date-parts":[[2015,7,31]],"date-time":"2015-07-31T13:40:31Z","timestamp":1438350031000},"page":"487-496","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework"],"prefix":"10.1007","author":[{"given":"Xiao","family":"Tang","sequence":"first","affiliation":[]},{"given":"Pinyi","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Qinghe","family":"Du","sequence":"additional","affiliation":[]},{"given":"Li","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,1]]},"reference":[{"issue":"3","key":"48_CR1","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","volume":"16","author":"A Mukherjee","year":"2014","unstructured":"Mukherjee, A., Fakoorian, S.A.A., Huang, J., Swindelhurst, A.L.: Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tuts. 16(3), 1550\u20131573 (2014)","journal-title":"IEEE Commun. Surv. Tuts."},{"issue":"1","key":"48_CR2","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/LSP.2012.2227727","volume":"20","author":"Y Wang","year":"2013","unstructured":"Wang, Y., Ren, P., Gao, F.: Power allocation for statistical QoS provisioning in opportunistic multi-relay DF cognitive networks. IEEE Signal Process. Letts. 20(1), 43\u201346 (2013)","journal-title":"IEEE Signal Process. Letts."},{"issue":"3","key":"48_CR3","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1109\/TWC.2011.010411.100057","volume":"10","author":"H Wang","year":"2011","unstructured":"Wang, H., Zhang, L., Li, T., Tugnait, J.: Spectrally efficient jamming mitigation based on code-controlled frequency hopping. IEEE Trans. Wireless Commun. 10(3), 728\u2013732 (2011)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"48_CR4","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ning, P., Dai, H., Liu, A.: Randomized differential DSSS: jamming-resistant wireless broadcast communication. In: 29th IEEE Conference on Computer Communications, pp. 1\u20135. IEEE Press, New York (2010)","DOI":"10.1109\/INFCOM.2010.5462156"},{"issue":"3","key":"48_CR5","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MNET.2006.1637931","volume":"20","author":"W Xu","year":"2006","unstructured":"Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: attack and defense strategies. IEEE Netw. 20(3), 41\u201347 (2006)","journal-title":"IEEE Netw."},{"key":"48_CR6","doi-asserted-by":"crossref","unstructured":"Wilhelm, M., Martinovic, I., Schmitt, J.B., Lenders, V.: Short paper: reactive jamming in wireless networks: how realistic is the threat?. In: 4th ACM Conference on Wireless Network Security, pp. 47\u201352. ACM, New York (2011)","DOI":"10.1145\/1998412.1998422"},{"key":"48_CR7","doi-asserted-by":"crossref","unstructured":"Su, Z., Xu, Q., Zhu, H., Wang, Y.: A novel design for content delivery over software defined mobile social networks. IEEE Netw. 29(4) (2015)","DOI":"10.1109\/MNET.2015.7166192"},{"issue":"3","key":"48_CR8","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1109\/TWC.2013.013014.131037","volume":"13","author":"M Spuhler","year":"2014","unstructured":"Spuhler, M., Giustiniano, D., Lenders, V., Wilhelm, M., Schmitt, J.B.: Detection of reactive jamming in DSSS-based wireless communications. IEEE Trans. Wirel. Commun. 13(3), 1593\u20131603 (2014)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"5","key":"48_CR9","doi-asserted-by":"publisher","first-page":"2337","DOI":"10.1109\/TWC.2014.2385709","volume":"14","author":"S D\u2019Oro","year":"2015","unstructured":"D\u2019Oro, S., Galluccio, L., Morabito, G., Palazzo, S., Chen, L., Martignon, F.: Defeating jamming with the power of silence: a game-theoretic analysis. IEEE Trans. Wirel. Commun. 14(5), 2337\u20132352 (2015)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"3","key":"48_CR10","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TNET.2012.2210241","volume":"12","author":"A Richa","year":"2013","unstructured":"Richa, A., Scheideler, C., Schmid, S., Zhang, J.: An efficient and fair MAC protocol robust to reactive interference. IEEE\/ACM Trans. Netw. 12(3), 760\u2013771 (2013)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"3","key":"48_CR11","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.1109\/TWC.2013.010214.130797","volume":"13","author":"Y Wang","year":"2014","unstructured":"Wang, Y., Ren, P., Gao, F., Su, Z.: A hybrid underlay\/overlay transmission mode for cognitive radio networks with statistical quality-of-service provisioning. IEEE Trans. Wirel. Commun. 13(3), 1482\u20131498 (2014)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"48_CR12","doi-asserted-by":"publisher","unstructured":"Xu, Q., Su, Z., Han, B., Fang, D., Xu, Z., Gan, Z.: Analytical model with a novel selfishness division of mobile nodes to participate cooperation. Peer-to-Peer Netw. Appl., 1\u20139 (2015). doi:10.1007\/s12083-015-0330-6","DOI":"10.1007\/s12083-015-0330-6"},{"key":"48_CR13","volume-title":"Game Theory","author":"D Fudenberg","year":"1991","unstructured":"Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1991)"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21837-3_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T09:56:48Z","timestamp":1676973408000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21837-3_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319218366","9783319218373"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21837-3_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"1 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}