{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T08:58:35Z","timestamp":1754557115999,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176494"},{"type":"electronic","value":"9783642176500"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17650-0_11","type":"book-chapter","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T10:22:11Z","timestamp":1291630931000},"page":"140-154","source":"Crossref","is-referenced-by-count":6,"title":["Compromise-Resilient Anti-jamming for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Xuan","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Wenhui","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Guohong","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","volume-title":"Digital Communications","author":"J.G. Proakis","year":"2000","unstructured":"Proakis, J.G.: Digital Communications, 4th edn. McGraw-Hill, New York (2000)","edition":"4"},{"key":"11_CR2","volume-title":"Electronic Warfare in the Information Age","author":"C. Schleher","year":"1999","unstructured":"Schleher, C.: Electronic Warfare in the Information Age. Artech House, Norwood (1999)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Strasser, M., Popper, C., Capkun, S., Cagalj, M.: Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. In: IEEE Symposium on Security and Privacy (2008)","DOI":"10.1109\/SP.2008.9"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Strasser, M., Popper, C., Capkun, S.: Efficient Uncoordinated FHSS Anti-Jamming Communication. In: ACM Mobihoc (2009)","DOI":"10.1145\/1530748.1530778"},{"key":"11_CR5","unstructured":"Popper, C., Strasser, M., Capkun, S.: Jamming-resistant Broadcast Communication without Shared Keys. In: USENIX Security Symposium (2009)"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Xu, W., Trappe, W., Zhang, Y.: Channel Surfing: Defending Wireless Sensor Networks from Jamming and Interference. In: ACM IPSN (2007)","DOI":"10.1109\/IPSN.2007.4379710"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Li, M., Koutsopoulos, I., Poovendran, R.: Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks. In: IEEE Infocom (2007)","DOI":"10.1109\/INFCOM.2007.155"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Xu, W., Trappe, W., Zhang, Y., Wood, T.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: ACM Mobihoc (2005)","DOI":"10.1145\/1062689.1062697"},{"key":"11_CR9","unstructured":"Wood, A.D., Stankovic, J.A., Son, S.H.: JAM: A Jammed-Area Mapping Service for Sensor Networks. In: Proc. of the 24th IEEE International Real-Time Systems Symposium (2003)"},{"key":"11_CR10","volume-title":"Modern Communications Jamming Principles and Techniques","author":"R. Poisel","year":"2006","unstructured":"Poisel, R.: Modern Communications Jamming Principles and Techniques. Artech House Publisher, Norwood (2006)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Brown, T., James, J., Sethi, A.: Jamming and sensing of encrypted wireless ad hoc networks. In: ACM Mobihoc (2006)","DOI":"10.1145\/1132905.1132919"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Lazos, L., Liu, S., Krunz, M.: Mitigating Control-Channel Jamming Attacks in Multi-Channel Ad Hoc Networks. In: ACM WiSec (2009)","DOI":"10.1145\/1514274.1514299"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Tague, P., Li, M., Poovendran, R.: Mitigation of Control Channel Jamming under Node Capture Attacks. IEEE Transactions on Mobile Computing (2009)","DOI":"10.1109\/TMC.2009.33"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Xu, W., Trappe, W., Zhang, Y.: AntiJamming Timing Channels for Wireless Networks. In: ACM WiSec (2008)","DOI":"10.1145\/1352533.1352567"},{"key":"11_CR15","unstructured":"Chipcon CC1000 Radio\u2019s Datasheet, \n                    \n                      http:\/\/www.chipcon.com"},{"key":"11_CR16","unstructured":"Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Security and Privacy Symposim (2003)"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. In: ACM CCS (2003)","DOI":"10.1145\/948117.948119"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., Jajodia, S.: LEAP+: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks. In: ACM TOSN (2006)","DOI":"10.1145\/1218556.1218559"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: ACM SenSys (2004)","DOI":"10.1145\/1031495.1031515"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Proc. of CRYPTO, Advances in Cryptology (1993)","DOI":"10.1007\/3-540-48071-4_33"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Navda, V., Bohra, A., Ganguly, S., Rubenstein, D.: Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks. In: IEEE Infocom (2007)","DOI":"10.1109\/INFCOM.2007.314"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Ureten, O., Serinken, N.: Wireless security through RF fingerprinting. Canadian Journal of Electrical and Computer Engineering (2007)","DOI":"10.1109\/CJECE.2007.364330"},{"key":"11_CR23","unstructured":"Tinyos homepage, \n                    \n                      http:\/\/webs.cs.berkeley.edu\/tos\/"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Wood, A., Stankovic, J., Zhou, G.: DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks. In: IEEE SECON (2007)","DOI":"10.1109\/SAHCN.2007.4292818"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Towsley, D., Kurose, J., Pingali, S.: A Comparison of Sender-Initiated and Receiver-Initiated Reliable Multicast Protocols. IEEE Journal on Selected Areas in Communications (1997)","DOI":"10.1109\/49.564137"},{"key":"11_CR26","unstructured":"Danev, B., Capkun, S.: Transient-based identification of wireless sensor nodes. In: ACM\/IEEE IPSN (2009)"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Sun, Y., Wang, X.: Jammer localization in wireless sensor networks. In: Proc. of the 5th International Conference on Wireless Communications, Networking and Mobile Computing (2009)","DOI":"10.1109\/WICOM.2009.5302614"},{"key":"11_CR28","unstructured":"Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: Swatt: Software-based attestation for embedded devices. In: IEEE Symposium on Security and Privacy (2004)"},{"key":"11_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/11601494_3","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"M. Shaneck","year":"2005","unstructured":"Shaneck, M., Mahadevan, K., Kher, V., Kim, Y.: Remote software-based attestation for wireless sensors. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol.\u00a03813, pp. 27\u201341. Springer, Heidelberg (2005)"},{"key":"11_CR30","unstructured":"Park, T., Shin, K.G.: Soft tamper-proofing via program integrity verification in wireless sensor networks. IEEE Transactions on Mobile Computing (2005)"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Yang, Y., Wang, X., Zhu, S., Cao, G.: Distributed softwarebased attestation for node compromise detection in sensor networks. In: IEEE SRDS (2007)","DOI":"10.1109\/SRDS.2007.31"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Fang, Y.: A two-layer key establishment scheme for wireless sensor networks. IEEE Transactions on Mobile Computing (2007)","DOI":"10.1109\/TMC.2007.1008"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17650-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:17:01Z","timestamp":1566764221000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17650-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176494","9783642176500"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17650-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}