{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T11:10:15Z","timestamp":1741345815184,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227288"},{"type":"electronic","value":"9783642227295"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22729-5_30","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T15:49:17Z","timestamp":1311608957000},"page":"349-361","source":"Crossref","is-referenced-by-count":2,"title":["Secure Interleaving - Physical Layer Security Enhancement of OFDM Based System"],"prefix":"10.1007","author":[{"given":"Muhammad","family":"Asif Khan","sequence":"first","affiliation":[]},{"given":"Varun","family":"Jeoti","sequence":"additional","affiliation":[]},{"given":"Rana","family":"Shahid Manzoor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"Liu, C., Yu, J.: A Solution to WLAN Authentication and Association DoS Attacks. IAENG International Journal of Computer Science\u00a034(1) (2007)"},{"key":"30_CR2","unstructured":"Malekzadeh, M., Abdul Ghani, A.A., Ahmad Zulkarnain, Z., Muda, Z.: Security Improvement for Management Frames in IEEE 802.11 Wireless Networks. IJCSNS International Journal of Computer Science and Network Security\u00a07(6) (June 2007)"},{"key":"30_CR3","unstructured":"Asif Khan, M., Asim, M., Jeoti, V.: Chaos Based Constellation Scrambling: Security and Interleaving Issues. In: ITSIM 2008, pp. 1\u20137 (August 26-28, 2008) ISBN: 978-1-4244-2327-9"},{"key":"30_CR4","unstructured":"Hiltunen, K.: WLAN attacks and risks, http:\/\/www.comlab.hut.fi\/opetus\/333\/2004slides\/topic30.pdf"},{"issue":"3\/4","key":"30_CR5","first-page":"276","volume":"1","author":"Y. Xiao","year":"2005","unstructured":"Xiao, Y., Pan, Y., Du, X., Bandela, C., Dass, K.: Security mechanism, attacks, and security enhancements for the IEEE 802.11 WLANs. International Journal of Wireless and Mobile Computing, special issue on Medium Access Control for WLANs, PANs and Sensor Network\u00a01(3\/4), 276\u2013288 (2005)","journal-title":"International Journal of Wireless and Mobile Computing, special issue on Medium Access Control for WLANs, PANs and Sensor Network"},{"key":"30_CR6","unstructured":"He, C., Mitchell, J.C.: Security analysis and improvements for 802.11i. In: The 12th Annual Network and Distributed System Security Symposium, NDSS 2005, pp. 90\u2013110 (February 2005)"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Baranovsky, A., Daems, D.: The design of one dimensional chaotic maps with prescribed statistical properties. International Journal of Bifurcation of Chaos & Fractals\u00a05(6) (1995)","DOI":"10.1142\/S0218127495001198"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Asim, M., Jeoti, V.: Hybrid chaotic image encryption scheme based on S-box and ciphertext feedback. In: IEEE International Conference on Intelligent and Advanced Systems, pp. 736\u2013741 (November 2007) ISBN: 978-1-4244-1355-3","DOI":"10.1109\/ICIAS.2007.4658484"},{"key":"30_CR9","unstructured":"Asif Khan, M.: A Novel Seed Based Random Interleaver Design for OFDM System and its PHY layer Security Issues, Master\u2019s Thesis, Universiti Teknologi PETRONAS (2009)"},{"key":"30_CR10","unstructured":"Bellardo, J., Savage, S.: 802.11 Denial-of-Service attacks: Real vulnerabilities and practical solution. In: Usenix Security Symposium, pp. 15\u201328 (August 4-8, 2003)"},{"key":"30_CR11","first-page":"539","volume":"59","author":"C. Liu","year":"2006","unstructured":"Liu, C., Yu, J.T.: Review and Analysis of Wireless LAN Security Attacks and Solutions. Journal of International Engineering Consortium\u00a059, 539\u2013554 (2006) ISBN: 978-1-931695-53-4","journal-title":"Journal of International Engineering Consortium"},{"key":"30_CR12","unstructured":"Liu, C., Yu, J.T.: An Analysis of DoS Attacks on Wireless LAN. In: IASTED International Conferences on Wireless Networks and Emerging Technologies (WNET 2006), Banff, Canada (2006)"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Ding, P., Holliday, J., Celik, A.: Improving the Security of Wireless LANs by Managing 802.1X Disassociaion. In: Proceedings of the IEEE Consumer Communications and Networking Conference, Las Vegas, NV, pp. 53\u201358 (2004)","DOI":"10.1109\/CCNC.2004.1286832"},{"key":"30_CR14","volume-title":"The 9th Nordic Workshop on Secure IT-systems","author":"S. Grech","year":"2004","unstructured":"Grech, S., Nikkanen, J.: A Security Analysis of Wi-Fi Protected Access. In: The 9th Nordic Workshop on Secure IT-systems. Helsinki University of Technology, Finland (2004)"},{"key":"30_CR15","unstructured":"Ge, W., Sampalli, S.: A Novel Scheme For Prevention of Management Frame Attacks on Wireless LANs (2005)"},{"key":"30_CR16","unstructured":"Chen, D., Deng, J., Varshney, P.K.: Protecting Wireless Networks against a Denial of Service Attack Based on Virtual Jamming. In: ACM MobiCom 2003, Poster, San Diego, CA, USA (2003)"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Gupta, V., Krishnamurthy, S., Faloutsos, M.: Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks. In: Proceedings of 2002 MILCOM Conference, vol.\u00a02 (2002)","DOI":"10.1109\/MILCOM.2002.1179634"},{"key":"30_CR18","unstructured":"Vladimirov, A.A., Gavrilenko, K.V., Mikhailovsky, A.A., Wi-Foo: The Secrets of Wireless Hacking, pp. 159\u2013195. Pearson\/Addison Wesley (June 2004)"},{"key":"30_CR19","unstructured":"Mishra, A., Arbaugh, W.A.: An Initial Security Analysis of the 802.1X Standard. University of Maryland, CS-TR-4328, UMIACS-TR-2002-10 (February 2002)"},{"key":"30_CR20","unstructured":"Walker, J.: Status of Project IEEE 802.11 Task Group w, Protected Management Frames (2007), http:\/\/grouper.ieee.org\/groups\/802\/11\/Reports\/tgw_update.htm"}],"container-title":["Communications in Computer and Information Science","e-Technologies and Networks for Development"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22729-5_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T10:53:29Z","timestamp":1741344809000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22729-5_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227288","9783642227295"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22729-5_30","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}