{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T04:03:19Z","timestamp":1748836999209,"version":"3.41.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,1,14]],"date-time":"2016-01-14T00:00:00Z","timestamp":1452729600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s10586-015-0529-6","type":"journal-article","created":{"date-parts":[[2016,1,14]],"date-time":"2016-01-14T01:25:06Z","timestamp":1452734706000},"page":"87-97","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Scrutiny of unruly and abuse in wireless networks to mitigate physical layer threats using discriminate based misbehavior prevention"],"prefix":"10.1007","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3036-0993","authenticated-orcid":false,"given":"S. Raja","family":"Ratna","sequence":"first","affiliation":[]},{"given":"R.","family":"Ravi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,14]]},"reference":[{"issue":"12","key":"529_CR1","doi-asserted-by":"crossref","first-page":"3172","DOI":"10.1109\/JPROC.2012.2208211","volume":"100","author":"A Attar","year":"2012","unstructured":"Attar, A., et al.: A survey of security challenges in cognitive radio networks: solutions and future research directions. Proc. IEEE. 100(12), 3172\u20133186 (2012)","journal-title":"Proc. IEEE."},{"key":"529_CR2","doi-asserted-by":"crossref","unstructured":"Bayraktaroglu, E., et al.: On the performance of IEEE 802.11 under jamming. In: Proceedings of IEEE INFOCOM, pp. 1265\u20131273 (2008)","DOI":"10.1109\/INFOCOM.2008.183"},{"issue":"6","key":"529_CR3","doi-asserted-by":"crossref","first-page":"1543","DOI":"10.1007\/s11276-011-0363-6","volume":"17","author":"I Broustis","year":"2011","unstructured":"Broustis, I., et al.: A software framework for alleviating the effects of MAC-aware jamming attacks in wireless access networks. Wirel. Netw. 17(6), 1543\u20131560 (2011)","journal-title":"Wirel. Netw."},{"issue":"1","key":"529_CR4","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/TMC.2007.250674","volume":"6","author":"M Cagalj","year":"2007","unstructured":"Cagalj, M., et al.: Wormhole-based anti jamming techniques in sensor networks. IEEE Trans. Mob. Comput. 6(1), 100\u2013114 (2007)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"1","key":"529_CR5","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1109\/TNET.2010.2068576","volume":"19","author":"J Chiang","year":"2011","unstructured":"Chiang, J., et al.: Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE\/ACM Trans. Netw. 19(1), 286\u2013289 (2011)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"529_CR6","unstructured":"Christina, P., et al.: Jamming-resistant broadcast communication without shared keys. In: Proceedings USENIX Security Symposium (2009)"},{"issue":"5","key":"529_CR7","doi-asserted-by":"crossref","first-page":"1223","DOI":"10.1007\/s11276-013-0673-y","volume":"20","author":"R Daidone","year":"2014","unstructured":"Daidone, R., et al.: A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks. Wirel. Netw. 20(5), 1223\u20131235 (2014)","journal-title":"Wirel. Netw."},{"key":"529_CR8","unstructured":"Han, J., et al.: Data Mining: Concepts and Techniques, 3rd edn. Morgan Kaufmann Publishers (2001)"},{"issue":"4","key":"529_CR9","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1109\/TITB.2012.2194788","volume":"16","author":"D He","year":"2012","unstructured":"He, D., et al.: ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. 16(4), 623\u2013632 (2012)","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"issue":"8","key":"529_CR10","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing, Q., et al.: Security of the Internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481\u20132501 (2014)","journal-title":"Wirel. Netw."},{"key":"529_CR11","doi-asserted-by":"crossref","unstructured":"Konstantinos, P., et al.: A measurement-driven anti-jamming system for 802.11 networks. IEEE\/ ACM Trans. Netw. 19(4):1208\u20131222 (2011)","DOI":"10.1109\/TNET.2011.2106139"},{"issue":"10","key":"529_CR12","doi-asserted-by":"crossref","first-page":"3258","DOI":"10.1109\/TWC.2010.082310.100113","volume":"9","author":"P Konstantinos","year":"2010","unstructured":"Konstantinos, P., et al.: On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks. IEEE Trans. Wirel. Commun. 9(10), 3258\u20133271 (2010)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"2","key":"529_CR13","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1109\/SURV.2011.041110.00022","volume":"13","author":"P Konstantinos","year":"2011","unstructured":"Konstantinos, P., et al.: Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Surv. Tutor. 13(2), 245\u2013257 (2011)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"529_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1464420.1464426","volume":"5","author":"YW Law","year":"2009","unstructured":"Law, Y.W., et al.: Energy efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Trans. Sens. Netw. 5(1), 1\u201338 (2009)","journal-title":"ACM Trans. Sens. Netw."},{"issue":"10","key":"529_CR15","doi-asserted-by":"crossref","first-page":"5281","DOI":"10.1109\/TSP.2012.2206589","volume":"60","author":"C Li","year":"2012","unstructured":"Li, C., et al.: Communication efficiency of anti-jamming broadcast in large-scale multi-channel wireless networks. IEEE Trans. Signal Process. 60(10), 5281\u20135292 (2012)","journal-title":"IEEE Trans. Signal Process."},{"issue":"6","key":"529_CR16","doi-asserted-by":"crossref","first-page":"924","DOI":"10.1109\/TIFS.2013.2240299","volume":"8","author":"X Li","year":"2013","unstructured":"Li, X., et al.: LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensic. Security 8(6), 924\u2013935 (2013)","journal-title":"IEEE Trans. Inf. Forensic. Security"},{"issue":"3","key":"529_CR17","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1109\/TIFS.2013.2296437","volume":"9","author":"B Liu","year":"2014","unstructured":"Liu, B., et al.: Toward incentivizing anti-spoofing deployment. IEEE Trans. Inf. Forensics Security 9(3), 436\u2013450 (2014)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"529_CR18","doi-asserted-by":"crossref","unstructured":"Nguyen, H., et al.: Alibi framework for identifying reactive jamming nodes in wireless LAN. In: IEEE Global Telecommunication Conference (GLOBECOM 2011), pp. 1\u20136 (2011)","DOI":"10.1109\/GLOCOM.2011.6134240"},{"issue":"1","key":"529_CR19","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/TDSC.2011.41","volume":"9","author":"A Proano","year":"2012","unstructured":"Proano, A., et al.: Packet-hiding methods for preventing selective jamming attacks. IEEE Trans. Dependable Secure Comput. 9(1), 101\u2013114 (2012)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"3","key":"529_CR20","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1109\/TNET.2012.2210241","volume":"21","author":"A Richa","year":"2013","unstructured":"Richa, A., et al.: An efficient and fair MAC protocol robust to reactive interference. IEEE\/ACM Trans. Netw. 21(3), 760\u2013771 (2013)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"529_CR21","doi-asserted-by":"crossref","unstructured":"Shiu, Y.S., et al.: Physical layer security in wireless networks: a tutorial. IEEE Wirel. Commun. 18(2):66\u201374 (2011)","DOI":"10.1109\/MWC.2011.5751298"},{"issue":"3","key":"529_CR22","first-page":"201","volume":"9","author":"J Singh","year":"2012","unstructured":"Singh, J., et al.: A cross-layer based intrusion detection technique for wireless networks. Int. Arab J. Inf. Technol. 9(3), 201\u2013207 (2012)","journal-title":"Int. Arab J. Inf. Technol."},{"issue":"1","key":"529_CR23","first-page":"57","volume":"3","author":"G Thamilarasu","year":"2011","unstructured":"Thamilarasu, G., et al.: Improving reliability of jamming attack detection in ad hoc networks. Int. J. Commun. Netw. Inf. 3(1), 57\u201366 (2011)","journal-title":"Int. J. Commun. Netw. Inf."},{"key":"529_CR24","doi-asserted-by":"crossref","unstructured":"Wang L., et al.: A combined approach for distinguishing different types of jamming attacks against wireless networks. In: IEEE Pacific Rim (PacRim) Conference on Communications, Computers and Signal Processing (2011)","DOI":"10.1109\/PACRIM.2011.6032998"},{"key":"529_CR25","doi-asserted-by":"crossref","unstructured":"Wilhelm, M., et al.: Reactive jamming in wireless networks: how realistic is the threat $$\\tau $$ \u03c4 . In: Proceedings of WiSec, pp. 47\u201352 (2011)","DOI":"10.1145\/1998412.1998422"},{"key":"529_CR26","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yan","year":"2014","unstructured":"Yan, Z., et al.: A survey on trust management for Internet of things. J. Netw. Comput. Appl. 42, 120\u2013134 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"529_CR27","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.comnet.2013.08.020","volume":"58","author":"H Yang","year":"2014","unstructured":"Yang, H., et al.: Provably secure three-party authenticated key agreement protocol using smart cards. Comput. Netw. 58, 29\u201338 (2014)","journal-title":"Comput. Netw."},{"issue":"3","key":"529_CR28","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1109\/TIFS.2014.2381873","volume":"10","author":"G Yao","year":"2015","unstructured":"Yao, G., et al.: Passive IP traceback: disclosing the locations of ip spoofers from path backscatter. IEEE Trans. Inf. Forensics Security 10(3), 471\u2013484 (2015)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"issue":"6","key":"529_CR29","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1109\/TITB.2012.2206115","volume":"16","author":"Z Zhang","year":"2012","unstructured":"Zhang, Z., et al.: ECG-cryptography and authentication in body area networks. IEEE Trans. Inf. Technol. Biomed. 16(6), 1070\u20131078 (2012)","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"529_CR30","doi-asserted-by":"crossref","unstructured":"Zhou, J., et al.: Securing m-healthcare social networks: challenges, countermeasures and future directions. IEEE Wirel. Commun. 20(4) (2013)","DOI":"10.1109\/MWC.2013.6590046"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-015-0529-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-015-0529-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-015-0529-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T03:50:31Z","timestamp":1748749831000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-015-0529-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,14]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["529"],"URL":"https:\/\/doi.org\/10.1007\/s10586-015-0529-6","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2016,1,14]]}}}