{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T02:22:11Z","timestamp":1774750931007,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,7,27]],"date-time":"2017-07-27T00:00:00Z","timestamp":1501113600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Distrib. Comput."],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s00446-017-0307-1","type":"journal-article","created":{"date-parts":[[2017,7,27]],"date-time":"2017-07-27T07:16:33Z","timestamp":1501139793000},"page":"241-254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Sade: competitive MAC under adversarial SINR"],"prefix":"10.1007","volume":"31","author":[{"given":"Adrian","family":"Ogierman","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Richa","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Scheideler","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Schmid","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,27]]},"reference":[{"key":"307_CR1","doi-asserted-by":"crossref","unstructured":"Alistarh, D.,\u00a0Gilbert, S.,\u00a0Guerraoui, R.,\u00a0Milosevic, Z.,\u00a0Newport, C.: Securing your every bit: reliable broadcast in byzantine wireless networks. In: Proceedings Symposium on Parallelism in Algorithms and Architectures (SPAA), pp. 50\u201359 (2010)","DOI":"10.1145\/1810479.1810489"},{"key":"307_CR2","doi-asserted-by":"crossref","unstructured":"Alnifie, G., Simon, R.: A multi-channel defense against jamming attacks in wireless sensor networks. In: Proceedings of Q2SWinet, pp. 95\u2013104 (2007)","DOI":"10.1145\/1298239.1298257"},{"key":"307_CR3","doi-asserted-by":"crossref","unstructured":"Awerbuch, B., Richa, A.,\u00a0Scheideler, C.: A jamming-resistant MAC protocol for single-hop wireless networks. In: Proceedings of ACM PODC (2008)","DOI":"10.1145\/1400751.1400759"},{"key":"307_CR4","doi-asserted-by":"crossref","unstructured":"Bayraktaroglu, E.,\u00a0King, C., Liu, X., Noubir, G.,\u00a0Rajaraman, R., \u00a0Thapa, B.: On the performance of IEEE 802.11 under jamming. In: Proceedings of IEEE INFOCOM, pp. 1265\u20131273 (2008)","DOI":"10.1109\/INFOCOM.2008.183"},{"key":"307_CR5","doi-asserted-by":"crossref","unstructured":"Bender, M.A.,\u00a0Farach-Colton, M.,\u00a0He, S., Kuszmaul, B.C., Leiserson, C.E.: Adversarial contention resolution for simple channels. In: Proceedings of ACM SPAA (2005)","DOI":"10.1145\/1073970.1074023"},{"key":"307_CR6","doi-asserted-by":"crossref","unstructured":"Bender, M.A., Fineman, J.T., Gilbert, S.,\u00a0Young, M.: How to scale exponential backoff: constant throughput, polylog access attempts, and robustness. In: Proceedings of ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 636\u2013654 (2016)","DOI":"10.1137\/1.9781611974331.ch47"},{"key":"307_CR7","doi-asserted-by":"crossref","unstructured":"Bertier, M., Kermarrec, A.-M.,\u00a0Tan, G.: Message-efficient byzantine fault-tolerant broadcast in a multi-hop wireless sensor network. In: Proceedings of IEEE 30th International Conference on Distributed Computing Systems (ICDCS), pp. 408\u2013417 (2010)","DOI":"10.1109\/ICDCS.2010.30"},{"key":"307_CR8","doi-asserted-by":"crossref","unstructured":"Brown, T.,\u00a0James, J.,\u00a0Sethi, A.: Jamming and sensing of encrypted wireless ad hoc networks. In: Proceedings of ACM International Symposium on Mobile Ad hoc Networking and Computing (MOBIHOC), pp. 120\u2013130 (2006)","DOI":"10.1145\/1132905.1132919"},{"key":"307_CR9","doi-asserted-by":"crossref","unstructured":"Chiang, J., Hu, Y.-C.: Cross-layer jamming detection and mitigation in wireless broadcast networks. In: Proceedings of MOBICOM, pp. 346\u2013349 (2007)","DOI":"10.1145\/1287853.1287901"},{"key":"307_CR10","doi-asserted-by":"crossref","unstructured":"Chlebus, B.S., Kowalski, D.R., Rokicki, M.A.: Adversarial queuing on the multiple-access channel. In: Proceedings of ACM PODC (2006)","DOI":"10.1145\/1146381.1146398"},{"issue":"2","key":"307_CR11","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.jalgor.2004.08.001","volume":"60","author":"A Czumaj","year":"2006","unstructured":"Czumaj, A., Rytter, W.: Broadcasting algorithms in radio networks with unknown topology. J. Algorithms 60(2), 115\u2013143 (2006)","journal-title":"J. Algorithms"},{"key":"307_CR12","doi-asserted-by":"crossref","unstructured":"Dams, J.,\u00a0Hoefer, M.,\u00a0Kesselheim, T.: Jamming-resistant learning in wireless networks. In: Proceedings of International Colloquium on Automata, Languages, and Programming (ICALP), pp. 447\u2013458 (2014)","DOI":"10.1007\/978-3-662-43951-7_38"},{"key":"307_CR13","doi-asserted-by":"crossref","unstructured":"Dolev, S.,\u00a0Gilbert, S.,\u00a0Guerraoui, R.,\u00a0Kowalski, D.,\u00a0Newport, C.,\u00a0Kuhn, F.,\u00a0Lynch, N.: Reliable distributed computing on unreliable radio channels. In: Proceedings of 2009 MOBIHOC S3 Workshop (2009)","DOI":"10.1145\/1540358.1540360"},{"key":"307_CR14","doi-asserted-by":"crossref","unstructured":"Dolev, S.,\u00a0Gilbert, S.,\u00a0Guerraoui, R.,\u00a0Kuhn, F., Newport, C.C.: The wireless synchronization problem. In: Proceedings of 28th Annual ACM Symposium on Principles of Distributed Computing (PODC), pp. 190\u2013199 (2009)","DOI":"10.1145\/1582716.1582749"},{"key":"307_CR15","doi-asserted-by":"crossref","unstructured":"Dolev, S.,\u00a0Gilbert, S.,\u00a0Guerraoui, R.,\u00a0Newport, C.: Gossiping in a multi-channel radio network: an oblivious approach to coping with malicious interference. In: Proceedings of the Symposium on Distributed Computing (DISC) (2007)","DOI":"10.1007\/978-3-540-75142-7_18"},{"key":"307_CR16","doi-asserted-by":"crossref","unstructured":"Dolev, S.,\u00a0Gilbert, S.,\u00a0Guerraoui, R.,\u00a0Newport, C.: Secure communication over radio channels. In: Proceedings of 27th ACM Symposium on Principles of Distributed Computing (PODC), pp. 105\u2013114 (2008)","DOI":"10.1145\/1400751.1400767"},{"key":"307_CR17","doi-asserted-by":"crossref","unstructured":"Dolev, S.,\u00a0Gilbert, S.,\u00a0Guerraoui, R.,\u00a0Newport, C.C.: Gossiping in a multi-channel radio network. In: Proceedings of 21st International Symposium on Distributed Computing (DISC), pp. 208\u2013222 (2007)","DOI":"10.1007\/978-3-540-75142-7_18"},{"key":"307_CR18","doi-asserted-by":"crossref","unstructured":"Gilbert, S.,\u00a0Guerraoui, R., Kowalski, D.,\u00a0Newport, C.: Interference-resilient information exchange. In: Proceedings of the 28th Conference on Computer Communications. IEEE INFOCOM (2009)","DOI":"10.1109\/INFCOM.2009.5062150"},{"key":"307_CR19","doi-asserted-by":"crossref","unstructured":"Gilbert, S.,\u00a0Guerraoui, R., Kowalski, D.,\u00a0Newport, C.C.: Interference-resilient information exchange. In: proceedings of 28th IEEE International Conference on Computer Communications (INFOCOM), pp. 2249\u20132257 (2009)","DOI":"10.1109\/INFCOM.2009.5062150"},{"key":"307_CR20","doi-asserted-by":"crossref","unstructured":"Gilbert, S.,\u00a0Guerraoui, R.,\u00a0Newport, C.: Of malicious motes and suspicious sensors: on the efficiency of malicious interference in wireless networks. In: Proceedings of OPODIS (2006)","DOI":"10.1007\/11945529_16"},{"key":"307_CR21","doi-asserted-by":"crossref","unstructured":"Gilbert, S.,\u00a0King, V.,\u00a0Pettie, S.,\u00a0Porat, E.,\u00a0Saia, J.,\u00a0Young, M.: (Near) Optimal resource-competitive broadcast with jamming. In: Proceedings of ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), pp. 257\u2013266 (2014)","DOI":"10.1145\/2612669.2612679"},{"key":"307_CR22","doi-asserted-by":"crossref","unstructured":"Gilbert, S.L.,\u00a0Zheng, C.: Sybilcast: broadcast on the open airwaves. In: Proceedings of ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), pp. 130\u2013139 (2013)","DOI":"10.1145\/2486159.2486172"},{"issue":"6","key":"307_CR23","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1145\/355541.355567","volume":"47","author":"LA Goldberg","year":"2000","unstructured":"Goldberg, L.A., Mackenzie, P.D., Paterson, M., Srinivasan, A.: Contention resolution with constant expected delay. J. ACM 47(6), 1048 (2000)","journal-title":"J. ACM"},{"issue":"2","key":"307_CR24","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1109\/18.825799","volume":"46","author":"P Gupta","year":"2000","unstructured":"Gupta, P., Kumar, P.: The capacity of wireless networks. IEEE Trans. Inf. Theory 46(2), 388\u2013404 (2000)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"307_CR25","doi-asserted-by":"crossref","first-page":"740","DOI":"10.1137\/S0097539792233828","volume":"25","author":"J Hastad","year":"1996","unstructured":"Hastad, J., Leighton, T., Rogoff, B.: Analysis of backoff protocols for mulitiple accesschannels. SIAM J. Comput. 25(4), 740 (1996)","journal-title":"SIAM J. Comput."},{"key":"307_CR26","unstructured":"IEEE: Medium access control (MAC) and physical specifications. In: IEEE P802.11\/D10 (1999)"},{"key":"307_CR27","doi-asserted-by":"crossref","unstructured":"King, V., Saia, J.,\u00a0Young, M.: Conflict on a communication channel. In: Proceedings of ACM Symposium on Principles of Distributed Computing (PODC), pp. 277\u2013286 (2011)","DOI":"10.1145\/1993806.1993855"},{"key":"307_CR28","doi-asserted-by":"crossref","unstructured":"Koo, C., Bhandari, V.,\u00a0Katz, J.,\u00a0Vaidya, N.: Reliable broadcast in radio networks: the bounded collision case. In: Proceedings of ACM PODC (2006)","DOI":"10.1145\/1146381.1146420"},{"key":"307_CR29","doi-asserted-by":"crossref","unstructured":"Kuhn, F., Moscibroda, T.,\u00a0Wattenhofer, R.: Radio network clustering from scratch. In: Proceedings of ESA (2004)","DOI":"10.1007\/978-3-540-30140-0_42"},{"key":"307_CR30","doi-asserted-by":"crossref","unstructured":"Kwak, B.-J., Song, N.-O., Miller, L.E.: Performance analysis of exponential backoff. IEEE\/ACM Trans. Netw. 13(2), 343\u2013355 (2005)","DOI":"10.1109\/TNET.2005.845533"},{"key":"307_CR31","doi-asserted-by":"crossref","unstructured":"Li, M.,\u00a0Koutsopoulos, I.,\u00a0Poovendran, R.: Optimal jamming attacks and network defense policies in wireless sensor networks. In: Proceedings of IEEE INFOCOM, pp. 1307\u20131315 (2007)","DOI":"10.1109\/INFCOM.2007.155"},{"key":"307_CR32","doi-asserted-by":"crossref","unstructured":"Liu, X., Noubir, G.,\u00a0Sundaram, R.,\u00a0Tan, S.: Spread: foiling smart jammers using multi-layer agility. In: Proceedings of IEEE INFOCOM, pp. 2536\u20132540 (2007)","DOI":"10.1109\/INFCOM.2007.316"},{"key":"307_CR33","doi-asserted-by":"crossref","unstructured":"Meier, D., Pignolet, Y.A., Schmid, S.,\u00a0Wattenhofer, R.: Speed dating despite jammers. In: Proceedings of DCOSS (2009)","DOI":"10.1007\/978-3-642-02085-8_1"},{"key":"307_CR34","doi-asserted-by":"crossref","unstructured":"Navda, V.,\u00a0Bohra, A.,\u00a0Ganguly, S.,\u00a0Rubenstein, D.: Using channel hopping to increase 802.11 resilience to jamming attacks. In: Proceedings of IEEE INFOCOM, pp. 2526\u20132530 (2007)","DOI":"10.1109\/INFCOM.2007.314"},{"key":"307_CR35","doi-asserted-by":"crossref","unstructured":"Ogierman, A.,\u00a0Richa, A., Scheideler, C.,\u00a0Schmid, S.,\u00a0Zhang, J.: Competitive mac under adversarial sinr. In: Proceedings of IEEE INFOCOM (2014)","DOI":"10.1109\/INFOCOM.2014.6848224"},{"key":"307_CR36","doi-asserted-by":"crossref","unstructured":"Pelc, A.,\u00a0Peleg, D.: Feasibility and complexity of broadcasting with random transmission failures. In: Proceedings of ACM PODC (2005)","DOI":"10.1145\/1073814.1073879"},{"issue":"2","key":"307_CR37","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1137\/S0097539795285333","volume":"28","author":"P Raghavan","year":"1999","unstructured":"Raghavan, P., Upfal, E.: Stochastic contention resolution with short delays. SIAM J. Comput. 28(2), 709\u2013719 (1999)","journal-title":"SIAM J. Comput."},{"key":"307_CR38","volume-title":"Wireless Communications","author":"T Rappaport","year":"2002","unstructured":"Rappaport, T.: Wireless Communications. Prentice Hall PTR, Upper Saddle River (2002)"},{"key":"307_CR39","doi-asserted-by":"crossref","unstructured":"Richa, A.,\u00a0Scheideler, C.,\u00a0Schmid, S.,\u00a0Zhang, J.: A jamming-resistant MAC protocol for multi-hop wireless networks. In: Proceedings of DISC (2010)","DOI":"10.1007\/978-3-642-15763-9_17"},{"key":"307_CR40","doi-asserted-by":"crossref","unstructured":"Richa, A.,\u00a0Scheideler, C.,\u00a0Schmid, S.,\u00a0Zhang, J.: Competitive and fair medium access despite reactive jamming. In: Proceedings of 31st International Conference on Distributed Computing Systems (ICDCS) (2011)","DOI":"10.1109\/ICDCS.2011.8"},{"key":"307_CR41","doi-asserted-by":"crossref","unstructured":"Richa, A.,\u00a0Scheideler, C.,\u00a0Schmid, S.,\u00a0Zhang, J.: Self-stabilizing leader election for single-hop wireless networks despite jamming. In: Proceedings of 12th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC) (2011)","DOI":"10.1145\/2107502.2107522"},{"key":"307_CR42","doi-asserted-by":"crossref","unstructured":"Richa, A.,\u00a0Scheideler, C.,\u00a0Schmid, S.,\u00a0Zhang, J.: Competitive and fair throughput for co-existing networks under adversarial interference. In: Proceedings of 31st Annual ACM Symposium on Principles of Distributed Computing (PODC) (2012)","DOI":"10.1145\/2332432.2332488"},{"key":"307_CR43","doi-asserted-by":"crossref","unstructured":"Scheideler, C.,\u00a0Richa, A.,\u00a0Santi, P.: An $$O(\\log n)$$ O ( log n ) dominating set protocol for wireless ad-hoc networks under the physical interference model. In: Proceedings of ACM International Symposium on Mobile Ad hoc Networking and Computing (MOBIHOC) (2008)","DOI":"10.1145\/1374618.1374632"},{"key":"307_CR44","volume-title":"Spread Spectrum Communications Handbook","author":"MK Simon","year":"2001","unstructured":"Simon, M.K., Omura, J.K., Schultz, R.A., Levin, B.K.: Spread Spectrum Communications Handbook. McGraw-Hill, New York (2001)"},{"key":"307_CR45","doi-asserted-by":"crossref","unstructured":"Tan, H.,\u00a0Wacek, C.,\u00a0Newport, C.,\u00a0Sherr, M.: A disruption-resistant mac layer for multichannel wireless networks. In: Proceedings of International Conference on Principles of Distributed Systems (OPODIS), pp. 202\u2013216 (2014)","DOI":"10.1007\/978-3-319-14472-6_14"},{"key":"307_CR46","doi-asserted-by":"crossref","unstructured":"Wood, A.,\u00a0Stankovic, J.,\u00a0Zhou, G.: DEEJAM: defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In: Proceedings of SECON (2007)","DOI":"10.1109\/SAHCN.2007.4292818"},{"key":"307_CR47","doi-asserted-by":"crossref","unstructured":"Xu, W.,\u00a0Wood, T.,\u00a0Zhang, Y.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceedings of Workshop on Wireless Security (2004)","DOI":"10.1145\/1023646.1023661"}],"container-title":["Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00446-017-0307-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00446-017-0307-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00446-017-0307-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T13:51:01Z","timestamp":1569937861000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00446-017-0307-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,27]]},"references-count":47,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["307"],"URL":"https:\/\/doi.org\/10.1007\/s00446-017-0307-1","relation":{},"ISSN":["0178-2770","1432-0452"],"issn-type":[{"value":"0178-2770","type":"print"},{"value":"1432-0452","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,27]]}}}