{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T03:26:22Z","timestamp":1764645982491},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2011,8,2]],"date-time":"2011-08-02T00:00:00Z","timestamp":1312243200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1007\/s11036-011-0340-4","type":"journal-article","created":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T07:18:01Z","timestamp":1312183081000},"page":"678-696","source":"Crossref","is-referenced-by-count":51,"title":["Performance of IEEE 802.11 under Jamming"],"prefix":"10.1007","volume":"18","author":[{"given":"Emrah","family":"Bayraktaroglu","sequence":"first","affiliation":[]},{"given":"Christopher","family":"King","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Guevara","family":"Noubir","sequence":"additional","affiliation":[]},{"given":"Rajmohan","family":"Rajaraman","sequence":"additional","affiliation":[]},{"given":"Bishal","family":"Thapa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,2]]},"reference":[{"key":"340_CR1","unstructured":"Acharya M, Sharma T, Thuente D, Sizemore D (2004) Intelligent jamming in 802.11b wireless networks. In: OPNETWORK"},{"key":"340_CR2","unstructured":"Agilent Technologies Rf Channel Simulator. http:\/\/www.home.agilent.com\/agilent\/product.jspx?pn=11759C . Accessed date October 2010"},{"key":"340_CR3","unstructured":"Bellardo J, Savage S (2003) 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In: USENIX"},{"issue":"3","key":"340_CR4","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1109\/49.840210","volume":"18","author":"G Bianchi","year":"2000","unstructured":"Bianchi G (2000) Performance analysis of the IEEE802.11 distributed coordination function. IEEE J Sel Areas Commun 18(3):535\u2013547","journal-title":"IEEE J Sel Areas Commun"},{"key":"340_CR5","doi-asserted-by":"crossref","unstructured":"Carvalho MM, Garcia-Luna-Aceve JJ (2003) Delay analysis of IEEE 802.11 in single-hop networks. In: ICNP","DOI":"10.14209\/jcis.2004.10"},{"key":"340_CR6","unstructured":"GNU Software Defined Radio. http:\/\/gnuradio.org\/redmine\/projects\/gnuradio\/wiki . Accessed date November 2010"},{"key":"340_CR7","unstructured":"Hall M, Silvennoinen A, H\u00e4ggman S-G (2005) Effect of pulse jamming on IEEE 802.11 wireless LAN performance. In: MILCOM"},{"key":"340_CR8","doi-asserted-by":"crossref","unstructured":"Hu YC, Perrig A, Johnson D (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In: MOBICOM","DOI":"10.1145\/570645.570648"},{"key":"340_CR9","unstructured":"IEEE (1999) Medium access control (mac) and physical specifications. IEEE P802.11\/D10"},{"key":"340_CR10","doi-asserted-by":"crossref","unstructured":"Law YW, van Hoesel L, Doumen J, Hartel P, Havinga P (2005) Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. In: SASN\u201805","DOI":"10.1145\/1102219.1102234"},{"key":"340_CR11","doi-asserted-by":"crossref","unstructured":"Li M, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: INFOCOM","DOI":"10.1109\/INFCOM.2007.155"},{"key":"340_CR12","doi-asserted-by":"crossref","unstructured":"Lin G, Noubir G (2003) Low-power dos attack in data wireless lans and countermeasures. In: MobiHoc","DOI":"10.1145\/961268.961277"},{"issue":"3","key":"340_CR13","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1002\/wcm.221","volume":"5","author":"G Lin","year":"2004","unstructured":"Lin G, Noubir G (2004) On link layer denial of service in data wireless lans. Wirel Commun Mob Comput 5(3):273\u2013284","journal-title":"Wirel Commun Mob Comput"},{"key":"340_CR14","doi-asserted-by":"crossref","unstructured":"Liu X, Noubir G, Sundaram R, Tan S (2007) SPREAD: foiling smart jammers using multi-layer agility. In: INFOCOM minisymposium","DOI":"10.1109\/INFCOM.2007.316"},{"key":"340_CR15","doi-asserted-by":"crossref","unstructured":"Monks J, Bharghavan V, Hwu W (2001) A power controlled multiple access protocol for wireless packet networks. In: INFOCOM (2001)","DOI":"10.1109\/INFCOM.2001.916704"},{"key":"340_CR16","unstructured":"Moteiv Tmote Sky. http:\/\/www.sentilla.com . Accessed date July 2010"},{"key":"340_CR17","unstructured":"Multiband Atheros Driver for WiFi. http:\/\/madwifi.org\/ . Accessed date May 2010"},{"key":"340_CR18","doi-asserted-by":"crossref","unstructured":"Navda V, Bohra A, Ganguly S, Rubenstein D (2007) Using channel hopping to increase 802.11 resilience to jamming attacks. In: INFOCOM minisymposium","DOI":"10.1109\/INFCOM.2007.314"},{"key":"340_CR19","unstructured":"Negi R, Perrig A (2003) Jamming analysis of MAC protocols. Tech rep, Carnegie Mellon University (2003)"},{"key":"340_CR20","doi-asserted-by":"crossref","unstructured":"Noubir G, Rajaraman R, Sheng B, Thapa B (2011) Robustness of IEEE802.11 rate adaptation algorithms against smart jamming. In: ACM WiSec","DOI":"10.1145\/1998412.1998430"},{"key":"340_CR21","unstructured":"Scalable Network Technologies. http:\/\/www.scalable-networks.com\/ . Accessed date July 2010"},{"key":"340_CR22","unstructured":"Schleher DC (1999) Electronic warfare in the information age. Artech House Inc"},{"key":"340_CR23","unstructured":"Simon MK, Omura JK, Scholtz RA, Levitt BK (2001) Spread spectrum communications handbook. McGraw-Hill"},{"key":"340_CR24","unstructured":"Thuente D, Acharya M (2006) Intelligent jamming in wireless networks with applications to 802.11b and other networks. In: MILCOM"},{"key":"340_CR25","unstructured":"Universal Software Radio Peripheral. http:\/\/www.ettus.com . Accessed date July 2010"},{"key":"340_CR26","unstructured":"Ware C, Wysocki T, Chicharo J (2011) On the hidden terminal jamming problem in IEEE 802.11 mobile ad hoc networks. In: ICC"},{"issue":"10","key":"340_CR27","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"AD Wood","year":"2002","unstructured":"Wood AD, Stankovic, JA (2002) Denial of service in sensor networks. IEEE Computer 35(10):54\u201362","journal-title":"IEEE Computer"},{"issue":"5","key":"340_CR28","first-page":"605","volume":"18","author":"H Wu","year":"2003","unstructured":"Wu H, Cheng S, Peng Y, Long K, Ma J (2003) IEEE 802.11 distributed coordination function: enhancement and analysis. J Comput Sci Technol 18(5):605\u2013609","journal-title":"J Comput Sci Technol"},{"key":"340_CR29","doi-asserted-by":"crossref","unstructured":"Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: MOBIHOC (2005)","DOI":"10.1145\/1062689.1062697"},{"issue":"3","key":"340_CR30","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1145\/581291.581312","volume":"6","author":"M Zapata","year":"2002","unstructured":"Zapata M, Asokan N (2002) Secure ad hoc on-demand distance vector routing. Mobile Comput Commun Rev 6(3):106\u2013107","journal-title":"Mobile Comput Commun Rev"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-011-0340-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-011-0340-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-011-0340-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T16:25:50Z","timestamp":1560443150000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-011-0340-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8,2]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2013,10]]}},"alternative-id":["340"],"URL":"https:\/\/doi.org\/10.1007\/s11036-011-0340-4","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8,2]]}}}