{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:13:20Z","timestamp":1763468000528},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157622"},{"type":"electronic","value":"9783642157639"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15763-9_17","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T05:48:44Z","timestamp":1282628924000},"page":"179-193","source":"Crossref","is-referenced-by-count":33,"title":["A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks"],"prefix":"10.1007","author":[{"given":"Andrea","family":"Richa","sequence":"first","affiliation":[]},{"given":"Christian","family":"Scheideler","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Schmid","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Alnifie, G., Simon, R.: A multi-channel defense against jamming attacks in wireless sensor networks. In: Proc. of Q2SWinet \u201907, pp. 95\u2013104 (2007)","DOI":"10.1145\/1298239.1298257"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Awerbuch, B., Richa, A., Scheideler, C.: A jamming-resistant MAC protocol for single-hop wireless networks. In: Proc. of PODC \u201908 (2008)","DOI":"10.1145\/1400751.1400759"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R., Thapa, B.: On the performance of IEEE 802.11 under jamming. In: Proc. of IEEE Infocom \u201908, pp. 1265\u20131273 (2008)","DOI":"10.1109\/INFOCOM.2008.183"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Bender, M.A., Farach-Colton, M., He, S., Kuszmaul, B.C., Leiserson, C.E.: Adversarial contention resolution for simple channels. In: Proc. of SPAA \u201905 (2005)","DOI":"10.1145\/1073970.1074023"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Brown, T., James, J., Sethi, A.: Jamming and sensing of encrypted wireless ad hoc networks. In: Proc. of MobiHoc \u201906, pp. 120\u2013130 (2006)","DOI":"10.1145\/1132905.1132919"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Chiang, J., Hu, Y.-C.: Cross-layer jamming detection and mitigation in wireless broadcast networks. In: Proc. of MobiCom \u201907, pp. 346\u2013349 (2007)","DOI":"10.1145\/1287853.1287901"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Chlebus, B.S., Kowalski, D.R., Rokicki, M.A.: Adversarial queuing on the multiple-access channel. In: Proc. of PODC \u201906 (2006)","DOI":"10.1145\/1146381.1146398"},{"issue":"2","key":"17_CR8","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.jalgor.2004.08.001","volume":"60","author":"A. Czumaj","year":"2006","unstructured":"Czumaj, A., Rytter, W.: Broadcasting algorithms in radio networks with unknown topology. Journal of Algorithms\u00a060(2), 115 (2006)","journal-title":"Journal of Algorithms"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Dolev, S., Gilbert, S., Guerraoui, R., Kowalski, D., Newport, C., Kuhn, F., Lynch, N.: Reliable distributed computing on unreliable radio channels. In: Proc. 2009 MobiHoc S3 Workshop (2009)","DOI":"10.1145\/1540358.1540360"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Dolev, S., Gilbert, S., Guerraoui, R., Kuhn, F., Newport, C.C.: The wireless synchronization problem. In: Proc. 28th Annual ACM Symposium on Principles of Distributed Computing (PODC), pp. 190\u2013199 (2009)","DOI":"10.1145\/1582716.1582749"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-540-75142-7_18","volume-title":"Distributed Computing","author":"S. Dolev","year":"2007","unstructured":"Dolev, S., Gilbert, S., Guerraoui, R., Newport, C.: Gossiping in a multi-channel radio network: An oblivious approach to coping with malicious interference. In: Pelc, A. (ed.) DISC 2007. LNCS, vol.\u00a04731, pp. 208\u2013222. Springer, Heidelberg (2007)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Dolev, S., Gilbert, S., Guerraoui, R., Newport, C.: Secure communication over radio channels. In: Proc. 27th ACM Symposium on Principles of Distributed Computing (PODC), pp. 105\u2013114 (2008)","DOI":"10.1145\/1400751.1400767"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-540-75142-7_18","volume-title":"Distributed Computing","author":"S. Dolev","year":"2007","unstructured":"Dolev, S., Gilbert, S., Guerraoui, R., Newport, C.C.: Gossiping in a multi-channel radio network. In: Pelc, A. (ed.) DISC 2007. LNCS, vol.\u00a04731, pp. 208\u2013222. Springer, Heidelberg (2007)"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Gilbert, S., Guerraoui, R., Kowalski, D., Newport, C.: Interference-resilient information exchange. In: Proc.\u00a0of the 28th Conference on Computer Communications, IEEE Infocom 2009 (2009)","DOI":"10.1109\/INFCOM.2009.5062150"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Gilbert, S., Guerraoui, R., Kowalski, D.R., Newport, C.C.: Interference-resilient information exchange. In: Proc. 28th IEEE International Conference on Computer Communications (INFOCOM), pp. 2249\u20132257 (2009)","DOI":"10.1109\/INFCOM.2009.5062150"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/11945529_16","volume-title":"Principles of Distributed Systems","author":"S. Gilbert","year":"2006","unstructured":"Gilbert, S., Guerraoui, R., Newport, C.: Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. In: Shvartsman, M.M.A.A. (ed.) OPODIS 2006. LNCS, vol.\u00a04305, pp. 215\u2013229. Springer, Heidelberg (2006)"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Goldberg, L.A., Mackenzie, P.D., Paterson, M., Srinivasan, A.: Contention resolution with constant expected delay. J. ACM\u00a047(6) (2000)","DOI":"10.1145\/355541.355567"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Hastad, J., Leighton, T., Rogoff, B.: Analysis of backoff protocols for mulitiple accesschannels. SIAM Journal on Computing\u00a025(4) (1996)","DOI":"10.1137\/S0097539792233828"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Heusse, M., Rousseau, F., Guillier, R., Duda, A.: Idle sense: An optimal access method for high throughput and fairness in rate diverse wireless lans. In: Proc. SIGCOMM (2005)","DOI":"10.1145\/1080091.1080107"},{"key":"17_CR20","unstructured":"IEEE: Medium access control (MAC) and physical specifications. In: IEEE P802.11\/D10 (1999)"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Jain, K., Padhye, J., Padmanabhan, V.N., Qiu, L.: Impact of interference on multi-hop wireless network performance. In: Proc. 9th Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 66\u201380 (2003)","DOI":"10.1145\/938985.938993"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Jiang, S., Xue, Y.: Providing survivability against jamming attack via joint dynamic routing and channel assigment. In: Proc. 7th Workshop on Design of Reliable Communication Networks, DRCN (2009)","DOI":"10.1109\/DRCN.2009.5340005"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Koo, C.Y., Bhandari, V., Katz, J., Vaidya, N.H.: Reliable broadcast in radio networks: The bounded collision case. In: Proc. of PODC \u201906 (2006)","DOI":"10.1145\/1146381.1146420"},{"key":"17_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/b13902","volume-title":"Algorithms \u2013 ESA 2004","author":"F. Kuhn","year":"2004","unstructured":"Kuhn, F., Moscibroda, T., Wattenhofer, R.: Radio network clustering from scratch. In: Albers, S., Radzik, T. (eds.) ESA 2004. LNCS, vol.\u00a03221, Springer, Heidelberg (2004)"},{"issue":"2","key":"17_CR25","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/TNET.2005.845533","volume":"13","author":"B.-J. Kwak","year":"2005","unstructured":"Kwak, B.-J., Song, N.-O., Miller, L.E.: Performance analysis of exponential backoff. IEEE\/ACM Transactions on Networking\u00a013(2), 343\u2013355 (2005)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Law, Y., van Hoesel, L., Doumen, J., Hartel, P., Havinga, P.: Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. In: Proc. of SASN \u201905, pp. 76\u201388 (2005)","DOI":"10.1145\/1102219.1102234"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Li, M., Koutsopoulos, I., Poovendran, R.: Optimal jamming attacks and network defense policies in wireless sensor networks. In: Proc. of Infocom \u201907, pp. 1307\u20131315 (2007)","DOI":"10.1109\/INFCOM.2007.155"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Liu, X., Noubir, G., Sundaram, R., Tan, S.: Spread: Foiling smart jammers using multi-layer agility. In: Proc. of Infocom \u201907, pp. 2536\u20132540 (2007)","DOI":"10.1109\/INFCOM.2007.316"},{"key":"17_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02085-8_1","volume-title":"Distributed Computing in Sensor Systems","author":"D. Meier","year":"2009","unstructured":"Meier, D., Pignolet, Y.A., Schmid, S., Wattenhofer, R.: Speed dating despite jammers. In: Krishnamachari, B., Suri, S., Heinzelman, W., Mitra, U. (eds.) DCOSS 2009. LNCS, vol.\u00a05516, Springer, Heidelberg (2009)"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Navda, V., Bohra, A., Ganguly, S., Rubenstein, D.: Using channel hopping to increase 802.11 resilience to jamming attacks. In: Proc. of Infocom \u201907, pp. 2526\u20132530 (2007)","DOI":"10.1109\/INFCOM.2007.314"},{"key":"17_CR31","unstructured":"Negi, R., Perrig, A.: Jamming analysis of MAC protocols. Technical report, Carnegie Mellon University (2003)"},{"key":"17_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-540-24643-5_17","volume-title":"Wired\/Wireless Internet Communications","author":"G. Noubir","year":"2004","unstructured":"Noubir, G.: On connectivity in ad hoc networks under jamming using directional antennas and mobility. In: Langendoerfer, P., Liu, M., Matta, I., Tsaoussidis, V. (eds.) WWIC 2004. LNCS, vol.\u00a02957, pp. 186\u2013200. Springer, Heidelberg (2004)"},{"key":"17_CR33","doi-asserted-by":"crossref","unstructured":"Pelc, A., Peleg, D.: Feasibility and complexity of broadcasting with random transmission failures. In: Proc. of PODC \u201905 (2005)","DOI":"10.1145\/1073814.1073879"},{"issue":"2","key":"17_CR34","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1137\/S0097539795285333","volume":"28","author":"P. Raghavan","year":"1999","unstructured":"Raghavan, P., Upfal, E.: Stochastic contention resolution with short delays. SIAM Journal on Computing\u00a028(2), 709\u2013719 (1999)","journal-title":"SIAM Journal on Computing"},{"issue":"2","key":"17_CR35","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1137\/S089548019223872X","volume":"8","author":"J. Schmidt","year":"1995","unstructured":"Schmidt, J., Siegel, A., Srinivasan, A.: Chernoff-Hoeffding bounds for applications with limited independence. SIAM Journal on Discrete Mathematics\u00a08(2), 223\u2013250 (1995)","journal-title":"SIAM Journal on Discrete Mathematics"},{"key":"17_CR36","volume-title":"Spread Spectrum Communications Handbook","author":"M.K. Simon","year":"2001","unstructured":"Simon, M.K., Omura, J.K., Schultz, R.A., Levin, B.K.: Spread Spectrum Communications Handbook. McGraw-Hill, New York (2001)"},{"key":"17_CR37","unstructured":"Thuente, D., Acharya, M.: Intelligent jamming in wireless networks with applications to 802.11b and other networks. In: Proc. of MILCOM \u201906 (2006)"},{"key":"17_CR38","doi-asserted-by":"crossref","unstructured":"Wood, A., Stankovic, J., Zhou, G.: DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In: Proc. of SECON \u201907 (2007)","DOI":"10.1109\/SAHCN.2007.4292818"},{"issue":"3","key":"17_CR39","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MNET.2006.1637931","volume":"20","author":"W. Xu","year":"2006","unstructured":"Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: attack and defense strategies. IEEE Network\u00a020(3), 41\u201347 (2006)","journal-title":"IEEE Network"},{"key":"17_CR40","doi-asserted-by":"crossref","unstructured":"Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proc. of MobiHoc \u201905, pp. 46\u201357 (2005)","DOI":"10.1145\/1062689.1062697"},{"key":"17_CR41","doi-asserted-by":"crossref","unstructured":"Xu, W., Wood, T., Zhang, Y.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proc. of Workshop on Wireless Security (2004)","DOI":"10.1145\/1023646.1023661"},{"key":"17_CR42","unstructured":"Ye, S., Wang, Y., Tseng, Y.: A jamming-based MAC protocol for wireless multihop ad hoc networks. In: Proc. IEEE 58th Vehicular Technology Conference (2003)"},{"issue":"1","key":"17_CR43","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1002\/wcm.170","volume":"4","author":"S.-R. Ye","year":"2004","unstructured":"Ye, S.-R., Wang, Y.-C., Tseng, Y.-C.: A jamming-based MAC protocol to improve the performance of wireless multihop ad-hoc networks. Wirel. Commun. Mob. Comput.\u00a04(1), 75\u201384 (2004)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"10","key":"17_CR44","first-page":"1525","volume":"39","author":"J. Zander","year":"1991","unstructured":"Zander, J.: Jamming in slotted ALOHA multihop packed radio networks. IEEE Transactions on Networking\u00a039(10), 1525\u20131531 (1991)","journal-title":"IEEE Transactions on Networking"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15763-9_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:39:42Z","timestamp":1606167582000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15763-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157622","9783642157639"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15763-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}