{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T10:19:25Z","timestamp":1760523565850,"version":"3.41.0"},"reference-count":90,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2017,9,19]],"date-time":"2017-09-19T00:00:00Z","timestamp":1505779200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,9,19]],"date-time":"2017-09-19T00:00:00Z","timestamp":1505779200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["1613772","1217338"],"award-info":[{"award-number":["1613772","1217338"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["1318294"],"award-info":[{"award-number":["1318294"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["1514383","1637546"],"award-info":[{"award-number":["1514383","1637546"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["0644058"],"award-info":[{"award-number":["0644058"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000083","name":"Directorate for Computer and Information Science and Engineering","doi-asserted-by":"publisher","award":["0313160"],"award-info":[{"award-number":["0313160"]}],"id":[{"id":"10.13039\/100000083","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1017509"],"award-info":[{"award-number":["1017509"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["Discovery Grant"],"award-info":[{"award-number":["Discovery Grant"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Distrib. Comput."],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s00446-017-0313-3","type":"journal-article","created":{"date-parts":[[2017,9,19]],"date-time":"2017-09-19T14:43:07Z","timestamp":1505832187000},"page":"419-439","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A resource-competitive jamming defense"],"prefix":"10.1007","volume":"31","author":[{"given":"Valerie","family":"King","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Seth","family":"Pettie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jared","family":"Saia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5251-8595","authenticated-orcid":false,"given":"Maxwell","family":"Young","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,9,19]]},"reference":[{"issue":"2","key":"313_CR1","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1998037.1998055","volume":"42","author":"I Abraham","year":"2011","unstructured":"Abraham, I., Alvisi, L., Halpern, J.Y.: Distributed computing meets game theory: combining insights from two fields. SIGACT News 42(2), 69\u201376 (2011)","journal-title":"SIGACT News"},{"key":"313_CR2","doi-asserted-by":"crossref","unstructured":"Aiyer, A.S., Alvisi, L., Clement, A., Dahlin, M., Martin, J.-P., Porth, C.: BAR fault tolerance for cooperative services. In: Proceedings of the 20th ACM Symposium on Operating Systems Principles, pp. 45\u201358 (2005)","DOI":"10.1145\/1095809.1095816"},{"key":"313_CR3","doi-asserted-by":"crossref","unstructured":"Alistarh, D., Gilbert, S., Guerraoui, R., Milosevic, Z., Newport, C.: Securing your every bit: reliable broadcast in byzantine wireless networks. In: Proceedings of the Symposium on Parallelism in Algorithms and Architectures (SPAA), pp. 50\u201359 (2010)","DOI":"10.1145\/1810479.1810489"},{"key":"313_CR4","doi-asserted-by":"crossref","unstructured":"Anantharamu, L., Chlebus, B.S., Kowalski, D.R., Rokicki, M.A.: Medium access control for adversarial channels with jamming. In: Proceedings of the 18th International Colloquium on Structural Information and Communication Complexity (SIROCCO), pp. 89\u2013100 (2011)","DOI":"10.1007\/978-3-642-22212-2_9"},{"key":"313_CR5","doi-asserted-by":"crossref","unstructured":"Aschenbruck, N., Gerhards-Padilla, E., Martini, P.: Simulative evaluation of adaptive jamming detection in wireless multi-hop networks. In: Proceedings of the 30th International Conference on Distributed Computing Systems Workshops, pp. 213\u2013220 (2010)","DOI":"10.1109\/ICDCSW.2010.57"},{"key":"313_CR6","doi-asserted-by":"crossref","unstructured":"Ashraf, F., Hu, Y.-C., Kravets, R.: Demo: bankrupting the jammer. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys) (2011)","DOI":"10.1145\/1999995.2000044"},{"key":"313_CR7","doi-asserted-by":"crossref","unstructured":"Awerbuch, B., Richa, A., Scheideler, C.: A jamming-resistant MAC protocol for single-hop wireless networks. In: Proceedings of the 27th ACM Symposium on Principles of Distributed Computing (PODC), pp. 45\u201354 (2008)","DOI":"10.1145\/1400751.1400759"},{"key":"313_CR8","unstructured":"Bardwell, J.: Converting Signal Strength Percentage to dBm Values (2002)"},{"key":"313_CR9","doi-asserted-by":"crossref","unstructured":"Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R., Thapa, B.: On the performance of IEEE 802.11 under jamming. In: Proceedings of the International Conference on Computer Communications (INFOCOM), pp. 1265\u20131273 (2008)","DOI":"10.1109\/INFOCOM.2008.183"},{"key":"313_CR10","doi-asserted-by":"crossref","unstructured":"Bender, M.A., Fineman, J.T., Gilbert, S., Young, M.: How to scale exponential backoff: constant throughput, polylog access attempts, and robustness. In: Proceedings of the 27th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 636\u2013654 (2016)","DOI":"10.1137\/1.9781611974331.ch47"},{"issue":"3","key":"313_CR11","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/2818936.2818949","volume":"46","author":"MA Bender","year":"2015","unstructured":"Bender, M.A., Fineman, J.T., Movahedi, M., Saia, J., Dani, V., Gilbert, S., Pettie, S., Young, M.: Resource-competitive algorithms. SIGACT News 46(3), 57\u201371 (2015)","journal-title":"SIGACT News"},{"key":"313_CR12","doi-asserted-by":"crossref","unstructured":"Bertier, M., Kermarrec, A.-M., Tan, G.: Brief announcement: reliable broadcast tolerating byzantine faults in a message-bounded radio network. In: Proceedings of the 22nd International Symposium on Distributed Computing (DISC), pp. 516\u2013517 (2008)","DOI":"10.1007\/978-3-540-87779-0_43"},{"key":"313_CR13","doi-asserted-by":"crossref","unstructured":"Bertier, M., Kermarrec, A.-M., Tan, G.: Message-efficient byzantine fault-tolerant broadcast in a multi-hop wireless sensor network. In: Proceedings of the International Conference on Distributed Computing Systems (ICDCS), pp. 408\u2013417 (2010)","DOI":"10.1109\/ICDCS.2010.30"},{"key":"313_CR14","doi-asserted-by":"crossref","unstructured":"Bhandari, V., Vaidya, N.H.: On reliable broadcast in a radio network. In: Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), pp. 138\u2013147 (2005)","DOI":"10.1145\/1073814.1073841"},{"key":"313_CR15","doi-asserted-by":"crossref","unstructured":"Bhandari, V., Vaidya, N.H.: On reliable broadcast in a radio network: a simplified characterization. Technical Report. CSL, UIUC (2005)","DOI":"10.1145\/1073814.1073841"},{"key":"313_CR16","doi-asserted-by":"crossref","unstructured":"Bhandari, V., Vaidya, N.H.: Reliable broadcast in wireless networks with probabilistic failures. In: Proceedings of the International Conference on Computer Communications (INFOCOM), pp. 715\u2013723 (2007)","DOI":"10.1109\/INFCOM.2007.89"},{"key":"313_CR17","doi-asserted-by":"crossref","unstructured":"Bhandhari, V., Katz, J., Koo, C.-Y., Vaidya, N.: Reliable broadcast in radio networks: the bounded collision case. In: Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), pp. 258\u2013264 (2006)","DOI":"10.1145\/1146381.1146420"},{"key":"313_CR18","doi-asserted-by":"crossref","unstructured":"Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. In: 5th Usenix Symposium on Operating Systems Design and Implementation (OSDI), pp. 299\u2013314 (2002)","DOI":"10.1145\/844128.844156"},{"key":"313_CR19","doi-asserted-by":"crossref","unstructured":"Clement, A., Napper, J., Li, H., Martin, J.-P., Alvisi, L., Dahlin, M.: Theory of BAR games. In: Proceedings of the 26th Annual ACM Symposium on Principles of Distributed Computing, pp. 358\u2013359 (2007)","DOI":"10.1145\/1281100.1281172"},{"key":"313_CR20","unstructured":"Crossbow: MICAz Wireless Measurement System. http:\/\/www.openautomation.net\/uploadsproductos\/micaz_datasheet.pdf"},{"key":"313_CR21","unstructured":"David Goldman CNN: FCC to Marriott: Never Try to Block Wi-Fi Again (2015). http:\/\/money.cnn.com\/2015\/01\/27\/technology\/fcc-wifi-hotel\/"},{"key":"313_CR22","doi-asserted-by":"crossref","unstructured":"Dani, V.: Resource-competitive error correction. In: Proceedings of the 10th ACM International Workshop on Foundations of Mobile Computing, pp. 53\u201358 (2014)","DOI":"10.1145\/2634274.2634280"},{"key":"313_CR23","doi-asserted-by":"crossref","unstructured":"Dani, V., Hayes, T., Movahedi, M., Saia, J., Young, M.: Interactive communication with unknown noise rate. Inf. Comput. (2017) (In press)","DOI":"10.1016\/j.ic.2018.02.018"},{"key":"313_CR24","doi-asserted-by":"crossref","unstructured":"Dani, V., Movahedi, M., Saia, J., Young, M.: Interactive communication with unknown noise rate. In: Proceedings of the 42nd International Colloquium on Automata, Languages, and Programming (ICALP), pp. 575\u2013587 (2015)","DOI":"10.1007\/978-3-662-47666-6_46"},{"key":"313_CR25","unstructured":"Deng, J., Varshney, P.K., Haas, Z.J.: A New Backoff Algorithm for the IEEE 802.11 Distributed Coordination Function. http:\/\/surface.syr.edu\/eecs\/85\/"},{"key":"313_CR26","doi-asserted-by":"crossref","unstructured":"Dolev, S., Gilbert, S., Guerraoui, R., Kuhn, F., Newport, C.: The wireless synchronization problem. In: Proceedings of the 28th ACM symposium on Principles of distributed computing, Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), pp. 190\u2013199 (2009)","DOI":"10.1145\/1582716.1582749"},{"key":"313_CR27","doi-asserted-by":"crossref","unstructured":"Dolev, S., Gilbert, S., Guerraoui, R., Newport, C.: Gossiping in a multi-channel radio network: an oblivious approach to coping with malicious interference. In: Proceedings of the International Symposium on Distributed Computing (DISC), pp. 208\u2013222 (2007)","DOI":"10.1007\/978-3-540-75142-7_18"},{"key":"313_CR28","doi-asserted-by":"crossref","unstructured":"Dolev, S., Gilbert, S., Guerraoui, R., Newport, C.: Secure communication over radio channels. In: Proceedings of the Symposium on Principles of Distributed Computing (PODC), pp. 105\u2013114 (2008)","DOI":"10.1145\/1400751.1400767"},{"key":"313_CR29","doi-asserted-by":"crossref","unstructured":"Douceur, J.: The sybil attack. In: Proceedings of the Second International Peer-to-Peer Symposium (IPTPS), pp. 251\u2013260 (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"313_CR30","doi-asserted-by":"crossref","unstructured":"Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, pp. 139\u2013147 (1993)","DOI":"10.1007\/3-540-48071-4_10"},{"key":"313_CR31","doi-asserted-by":"crossref","unstructured":"Emek, Y., Wattenhofer, R.: Frequency hopping against a powerful adversary. In: Proceedings of the 27th International Symposium Distributed Computing (DISC), pp. 329\u2013343 (2013)","DOI":"10.1007\/978-3-642-41527-2_23"},{"key":"313_CR32","unstructured":"Federal Communications Commission (FCC): Jammer Enforcement (2017). https:\/\/www.fcc.gov\/general\/jammer-enforcement"},{"key":"313_CR33","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/1380564.1380571","volume":"11","author":"S Ganeriwal","year":"2008","unstructured":"Ganeriwal, S., P\u00f6pper, C., C\u0306apkun, S., Srivastava, M.B.: Secure time synchronization in sensor networks. ACM Trans. Inf. Syst. Secur. 11, 23 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"313_CR34","doi-asserted-by":"crossref","unstructured":"Gilbert, S., Guerraoui, R., Kowalski, D., Newport, C.: Interference-resilient information exchange. In: Proceedings of the International Conference on Computer Communications (INFOCOM), pp. 2249\u20132257 (2009)","DOI":"10.1109\/INFCOM.2009.5062150"},{"key":"313_CR35","doi-asserted-by":"crossref","unstructured":"Gilbert, S., Guerraoui, R., Newport, C.C.: Of malicious motes and suspicious sensors: on the efficiency of malicious interference in wireless networks. In: International Conference On Principles Of Distributed Systems (OPODIS), pp. 215\u2013229 (2006)","DOI":"10.1007\/11945529_16"},{"key":"313_CR36","doi-asserted-by":"crossref","unstructured":"Gilbert, S., King, V., Pettie, S., Porat, E., Saia, J., Young, M.: (Near) optimal resource-competitive broadcast with jamming. In: Proceedings of the 26th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA \u201914, pp. 257\u2013266 (2014)","DOI":"10.1145\/2612669.2612679"},{"key":"313_CR37","doi-asserted-by":"crossref","unstructured":"Gilbert, Seth, King, Valerie, Saia, Jared, Young, Maxwell: Resource-Competitive Analysis: A New Perspective on Attack-Resistant Distributed Computing. In: Proceedings of the $$8^{th}$$ ACM International Workshop on Foundations of Mobile Computing, (2012)","DOI":"10.1145\/2335470.2335471"},{"key":"313_CR38","doi-asserted-by":"crossref","unstructured":"Gilbert, S., Kowalski, D.R.: Trusted computing for fault-prone wireless networks. In: Proceedings of the 24th International Symposium, Distributed Computing (DISC), pp. 359\u2013373 (2010)","DOI":"10.1007\/978-3-642-15763-9_33"},{"key":"313_CR39","doi-asserted-by":"crossref","unstructured":"Gilbert, S., Newport, C., Zheng, C.: Who are you? Secure identities in ad hoc networks. In: Proceedings of the 28th International Symposium on Distributed Computing (DISC), pp. 227\u2013242 (2014)","DOI":"10.1007\/978-3-662-45174-8_16"},{"key":"313_CR40","doi-asserted-by":"crossref","unstructured":"Gilbert, S., Young, M.: Making evildoers pay: resource-competitive broadcast in sensor networks. In: Proceedings of the 31th Symposium on Principles of Distributed Computing (PODC), pp. 145\u2013154 (2012)","DOI":"10.1145\/2332432.2332461"},{"key":"313_CR41","doi-asserted-by":"crossref","unstructured":"Gilbert, S., Zheng, C.: SybilCast: broadcast on the open airwaves. In: Proceedings of the 25th Annual ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), pp. 130\u2013139 (2013)","DOI":"10.1145\/2486159.2486172"},{"key":"313_CR42","unstructured":"Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS), pp. 3005\u20133014 (2000)"},{"issue":"4","key":"313_CR43","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1145\/347476.347479","volume":"47","author":"B Kalyanasundaram","year":"2000","unstructured":"Kalyanasundaram, B., Pruhs, K.: Speed is as powerful as clairvoyance. J. ACM 47(4), 617\u2013643 (2000)","journal-title":"J. ACM"},{"key":"313_CR44","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys), pp. 162\u2013175 (2004)","DOI":"10.1145\/1031495.1031515"},{"key":"313_CR45","doi-asserted-by":"crossref","unstructured":"King, V., Phillips, C., Saia, J., Young, M.: Sleeping on the job: energy-efficient and robust broadcast for radio networks. In: Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), pp. 243\u2013252 (2008)","DOI":"10.1145\/1400751.1400784"},{"issue":"3","key":"313_CR46","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1007\/s00453-010-9422-0","volume":"61","author":"V King","year":"2011","unstructured":"King, V., Phillips, C.A., Saia, J., Young, M.: Sleeping on the job: energy-efficient and robust broadcast for radio networks. Algorithmica 61(3), 518\u2013554 (2011)","journal-title":"Algorithmica"},{"key":"313_CR47","doi-asserted-by":"crossref","unstructured":"King, V., Saia, J., Young, M.: Conflict on a communication channel. In: Proceedings of the 30th Symposium on Principles of Distributed Computing (PODC), pp. 277\u2013286 (2011)","DOI":"10.1145\/1993806.1993855"},{"key":"313_CR48","doi-asserted-by":"crossref","unstructured":"Koo, C.-Y.: Broadcast in radio networks tolerating byzantine adversarial behavior. In: Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), pp. 275\u2013282 (2004)","DOI":"10.1145\/1011767.1011807"},{"issue":"1","key":"313_CR49","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1138127.1138130","volume":"2","author":"YW Law","year":"2006","unstructured":"Law, Y.W., Doumen, J., Hartel, P.: Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. ACM Trans. Sens. Netw. 2(1), 65\u201393 (2006)","journal-title":"ACM Trans. Sens. Netw."},{"key":"313_CR50","doi-asserted-by":"crossref","unstructured":"Li, F., Mittal, P., Caesar, M., Borisov, N.: SybilControl: practical sybil defense with computational puzzles. In: Proceedings of the Seventh ACM Workshop on Scalable Trusted Computing, STC \u201912, pp. 67\u201378 (2012)","DOI":"10.1145\/2382536.2382548"},{"key":"313_CR51","unstructured":"Li, H.C., Clement, A., Wong, E.L., Napper, J., Roy, I., Alvisi, L., Dahlin, M.: BAR gossip. In: Proceedings of the Seventh Symposium on Operating Systems Design and Implementation, pp. 191\u2013204 (2006)"},{"key":"313_CR52","unstructured":"Li, Y., Ye, W., Heidemann, J.: Energy and latency control in low duty cycle MAC protocols. In: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), pp. 676\u2013682 (2005)"},{"key":"313_CR53","doi-asserted-by":"crossref","unstructured":"Lichtman, M., Reed, J.H., Clancy, T.C., Norton, M.: Vulnerability of LTE to hostile interference. In: IEEE Global Conference on Signal and Information Processing, pp. 285\u2013288 (2013)","DOI":"10.1109\/GlobalSIP.2013.6736871"},{"issue":"3","key":"313_CR54","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1002\/wcm.221","volume":"5","author":"G Lin","year":"2005","unstructured":"Lin, G., Noubir, G.: On link layer denial of service in data wireless LANs. Wirel. Commun. Mob. Comput. 5(3), 273\u2013284 (2005)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"313_CR55","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1145\/1027794.1027800","volume":"3","author":"D Liu","year":"2004","unstructured":"Liu, D., Ning, P.: Multi-level $$\\mu $$TESLA: broadcast authentication for distributed sensor networks. ACM Trans. Embed. Comput. Syst. 3, 800\u2013836 (2004)","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"313_CR56","doi-asserted-by":"crossref","unstructured":"Liu, X., Noubir, G., Sundaram, R., Tan, S.: SPREAD: foiling smart jammers using multi-layer agility. In: Proceedings of the International Conference on Computer Communications (INFOCOM), pp. 2536\u20132540 (2007)","DOI":"10.1109\/INFCOM.2007.316"},{"key":"313_CR57","doi-asserted-by":"crossref","unstructured":"Liu, X., Yang, X., Xia, Y.: NetFence: preventing internet denial of service from inside out. In: Proceedings of the ACM SIGCOMM 2010 Conference, pp. 255\u2013266 (2010)","DOI":"10.1145\/1851275.1851214"},{"issue":"3","key":"313_CR58","doi-asserted-by":"publisher","first-page":"25:1","DOI":"10.1145\/2480741.2480742","volume":"45","author":"MH Manshaei","year":"2013","unstructured":"Manshaei, M.H., Zhu, Q., Tansu, A., Bac\u015far, T., Hubaux, J.-P.: Game theory meets network security and privacy. ACM Comput. Surv. 45(3), 25:1\u201325:39 (2013)","journal-title":"ACM Comput. Surv."},{"key":"313_CR59","doi-asserted-by":"crossref","unstructured":"Meier, D., Pignolet, Y.A., Schmid, S., Wattenhofer, R.: Speed dating despite jammers. In: Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 1\u201314 (2009)","DOI":"10.1007\/978-3-642-02085-8_1"},{"issue":"4","key":"313_CR60","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1145\/359460.359473","volume":"21","author":"RC Merkle","year":"1978","unstructured":"Merkle, R.C.: Secure communications over insecure channels. Commun. ACM 21(4), 294\u2013299 (1978)","journal-title":"Commun. ACM"},{"key":"313_CR61","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814075","volume-title":"Randomized Algorithms","author":"R Motwani","year":"1995","unstructured":"Motwani, R., Raghavan, P.: Randomized Algorithms. Cambridge University Press, Cambridge (1995)"},{"key":"313_CR62","doi-asserted-by":"crossref","unstructured":"Navda, V., Bohra, A., Ganguly, S., Rubenstein, D.: Using channel hopping to increase 802.11 resilience to jamming attacks. In: Proceedings of the International Conference on Computer Communications (INFOCOM), pp. 2526\u20132530 (2007)","DOI":"10.1109\/INFCOM.2007.314"},{"key":"313_CR63","doi-asserted-by":"crossref","unstructured":"Niculescu, D.: Interference map for 802.11 networks. In: Internet Measurement Conference (IMC), pp. 339\u2013350 (2007)","DOI":"10.1145\/1298306.1298355"},{"key":"313_CR64","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481","volume-title":"Algorithmic Game Theory","author":"N Nisan","year":"2007","unstructured":"Nisan, N., Roughgarden, T., Tardos, \u00c9., Vazirani, V.V.: Algorithmic Game Theory. Cambridge University Press, Cambridge (2007)"},{"key":"313_CR65","doi-asserted-by":"crossref","unstructured":"Ogierman, A., Richa, A., Scheideler, C., Schmid, S., Zhang, J.: Competitive MAC under adversarial SINR. In: Proceedings of the International Conference on Computer Communications (INFOCOM), pp. 2751\u20132759 (2014)","DOI":"10.1109\/INFOCOM.2014.6848224"},{"key":"313_CR66","doi-asserted-by":"crossref","unstructured":"Parno, B., Wendlandt, D., Shi, E., Perrig, A., Maggs, B., Hu, Y.-C.: Portcullis: protecting connection setup from denial-of-capability attacks. In: Proceedings of the ACM SIGCOMM 2007 Conference, pp. 289\u2013300 (2007)","DOI":"10.1145\/1282380.1282413"},{"key":"313_CR67","doi-asserted-by":"crossref","unstructured":"Pelc, A., Peleg, D.: Feasibility and complexity of broadcasting with random transmission failures. In: Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), pp. 334\u2013341 (2005)","DOI":"10.1145\/1073814.1073879"},{"key":"313_CR68","doi-asserted-by":"crossref","unstructured":"Phillips, C.A., Stein, C., Torng, E., Wein, J.: Optimal time-critical scheduling via resource augmentation. In: Proceedings of the 29th Annual ACM Symposium on Theory of Computing (STOC), pp. 140\u2013149 (1997)","DOI":"10.1145\/258533.258570"},{"key":"313_CR69","unstructured":"Polastre, J., Szewczyk, R., Culler, D.: Telos: enabling ultra-low power wireless research. In: IPSN (2005)"},{"issue":"1","key":"313_CR70","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/1210669.1210673","volume":"3","author":"I Ramachandran","year":"2007","unstructured":"Ramachandran, I., Das, A.K., Roy, S.: Analysis of the contention access period of IEEE 802.15.4 MAC. ACM Trans. Sens. Netw. 3(1), 4 (2007)","journal-title":"ACM Trans. Sens. Netw."},{"issue":"3","key":"313_CR71","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MWC.2007.386615","volume":"14","author":"I Ramachandran","year":"2007","unstructured":"Ramachandran, I., Roy, S.: Clear channel assessment in energy-constrained wideband wireless networks. IEEE Wirel. Commun. 14(3), 70\u201378 (2007)","journal-title":"IEEE Wirel. Commun."},{"key":"313_CR72","doi-asserted-by":"crossref","unstructured":"Richa, A., Scheideler, C., Schmid, S., Zhang, J.: A jamming-resistant mac protocol for multi-hop wireless networks. In: Proceedings of the International Symposium on Distributed Computing (DISC), pp. 179\u2013193 (2010)","DOI":"10.1007\/978-3-642-15763-9_17"},{"key":"313_CR73","doi-asserted-by":"crossref","unstructured":"Richa, A., Scheideler, C., Schmid, S., Zhang, J.: Competitive and fair medium access despite reactive jamming. In: Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS), pp. 507\u2013516 (2011)","DOI":"10.1109\/ICDCS.2011.8"},{"key":"313_CR74","doi-asserted-by":"crossref","unstructured":"Richa, A., Scheideler, C., Schmid, S., Zhang, J.: Competitive and fair throughput for co-existing networks under adversarial interference. In: Proceedings of the 31st ACM Symposium on Principles of Distributed Computing (PODC), pp. 291\u2013300 (2012)","DOI":"10.1145\/2332432.2332488"},{"issue":"5","key":"313_CR75","first-page":"1","volume":"37","author":"S Robinson","year":"2004","unstructured":"Robinson, S.: The price of anarchy. SIAM News 37(5), 1\u20134 (2004)","journal-title":"SIAM News"},{"issue":"2","key":"313_CR76","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1145\/2786.2793","volume":"28","author":"D Sleator","year":"1985","unstructured":"Sleator, D., Tarjan, R.: Amortized efficiency of list update and paging rules. Commun. ACM 28(2), 202\u2013208 (1985)","journal-title":"Commun. ACM"},{"key":"313_CR77","unstructured":"Srinivasan, K., Levis, P.: RSSI is under appreciated. In: EmNets (2006)"},{"key":"313_CR78","unstructured":"Steve Schmadeke Chicago Tribune: Man accused of jamming calls on red line \u2018disturbed by people talking around him\u2019 (2016). http:\/\/www.chicagotribune.com\/news\/local\/breaking\/ct-cell-phone-jamming-red-line-20160309-story.html"},{"key":"313_CR79","doi-asserted-by":"crossref","unstructured":"Tegeler, F., Fu, X.: SybilConf: computational puzzles for confining sybil attacks. In: Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM), pp. 1\u20132 (2010)","DOI":"10.1109\/INFCOMW.2010.5466685"},{"key":"313_CR80","doi-asserted-by":"crossref","unstructured":"Vaikuntanathan, V.: Brief announcement: broadcast in radio networks in the presence of byzantine adversaries. In: Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC) (2005)","DOI":"10.1145\/1073814.1073844"},{"key":"313_CR81","doi-asserted-by":"crossref","unstructured":"Vila\u00e7a, X., Denysyuk, O., Rodrigues, L.: Asynchrony and collusion in the n-party BAR transfer problem. In: Proceedings of the 19th International Conference on Structural Information and Communication Complexity (SIROCCO), pp. 183\u2013194 (2012)","DOI":"10.1007\/978-3-642-31104-8_16"},{"key":"313_CR82","doi-asserted-by":"crossref","unstructured":"Walfish, M., Vutukuru, M., Balakrishnan, H., Karger, D., Shenker, S.: DDoS Defense by Offense. In: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), pp. 303\u2013314 (2006)","DOI":"10.1145\/1159913.1159948"},{"key":"313_CR83","series-title":"Chapter 16: Wireless Sensor Network Security: A Survey","volume-title":"Security in Distributed, Grid, Mobile, and Pervasive Computing","author":"JP Walters","year":"2007","unstructured":"Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Security in Distributed, Grid, Mobile, and Pervasive Computing. Chapter 16: Wireless Sensor Network Security: A Survey. Auerbach Publications, Boca Raton (2007)"},{"key":"313_CR84","doi-asserted-by":"crossref","unstructured":"Watro, R., Kong, D., Cuti, S., Gariner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology . In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pp. 59\u201364 (2004)","DOI":"10.1145\/1029102.1029113"},{"key":"313_CR85","doi-asserted-by":"crossref","unstructured":"Wilhelm, M., Martinovic, I., Schmitt, J.B., Lenders, V.: Short paper: reactive jamming in wireless networks: how realistic is the threat? In: Proceedings of the Fourth ACM Conference on Wireless Network Security, pp. 47\u201352. WiSec (2011)","DOI":"10.1145\/1998412.1998422"},{"issue":"10","key":"313_CR86","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"AD Wood","year":"2002","unstructured":"Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer 35(10), 54\u201362 (2002)","journal-title":"Computer"},{"issue":"3","key":"313_CR87","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MNET.2006.1637931","volume":"20","author":"W Xu","year":"2006","unstructured":"Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: attack and defense strategies. IEEE Netw. 20(3), 41\u201347 (2006)","journal-title":"IEEE Netw."},{"key":"313_CR88","doi-asserted-by":"crossref","unstructured":"Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 46\u201357 (2005)","DOI":"10.1145\/1062689.1062697"},{"key":"313_CR89","unstructured":"Ye, W., Heidemann, J., Estrin, D.: An energy-efficient MAC protocol for wireless sensor networks. In: Proceedings of the International Conference on Computer Communications (INFOCOM), pp. 1567\u20131576 (2002)"},{"issue":"4","key":"313_CR90","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1109\/SURV.2011.041311.00156","volume":"13","author":"M Young","year":"2011","unstructured":"Young, M., Boutaba, R.: Overcoming adversaries in sensor networks: a survey of theoretical models and algorithmic approaches for tolerating malicious interference. IEEE Commun. Surv. Tutor. 13(4), 617\u2013641 (2011)","journal-title":"IEEE Commun. Surv. Tutor."}],"container-title":["Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00446-017-0313-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00446-017-0313-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00446-017-0313-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T20:24:48Z","timestamp":1750883088000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00446-017-0313-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,19]]},"references-count":90,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["313"],"URL":"https:\/\/doi.org\/10.1007\/s00446-017-0313-3","relation":{},"ISSN":["0178-2770","1432-0452"],"issn-type":[{"type":"print","value":"0178-2770"},{"type":"electronic","value":"1432-0452"}],"subject":[],"published":{"date-parts":[[2017,9,19]]},"assertion":[{"value":"1 February 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}