{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T18:42:53Z","timestamp":1649011373896},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,6,28]],"date-time":"2016-06-28T00:00:00Z","timestamp":1467072000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1007\/s11276-016-1324-x","type":"journal-article","created":{"date-parts":[[2016,6,28]],"date-time":"2016-06-28T09:40:06Z","timestamp":1467106806000},"page":"151-171","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive wireless communications under competition and jamming in energy constrained networks"],"prefix":"10.1007","volume":"24","author":[{"given":"Zaheer","family":"Khan","sequence":"first","affiliation":[]},{"given":"Janne","family":"Lehtom\u00e4ki","sequence":"additional","affiliation":[]},{"given":"Athanasios V.","family":"Vasilakos","sequence":"additional","affiliation":[]},{"given":"Allen B.","family":"MacKenzie","sequence":"additional","affiliation":[]},{"given":"Markku","family":"Juntti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,28]]},"reference":[{"issue":"1","key":"1324_CR1","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/SURV.2012.040412.00105","volume":"15","author":"P Huang","year":"2013","unstructured":"Huang, P., Xiao, L., Soltani, S., Mutka, M., & Ning, X. (2013). The evolution of MAC protocols in wireless sensor networks: A survey. IEEE Communications Surveys Tutorials, 15(1), 101\u2013120. First.","journal-title":"IEEE Communications Surveys Tutorials"},{"issue":"2","key":"1324_CR2","first-page":"3911","volume":"15","author":"F V\u00e1zquez-Gallego","year":"2015","unstructured":"V\u00e1zquez-Gallego, F., Alonso, L., & Alonso-Zarate, J. (2015). Modeling and analysis of reservation frame slotted-aloha in wireless machine-to-machine area networks for data collection. Sensors, Special Issue Wireless Sensor Networks and the Internet of Things, 15(2), 3911\u20133931.","journal-title":"Sensors, Special Issue Wireless Sensor Networks and the Internet of Things"},{"issue":"5","key":"1324_CR3","doi-asserted-by":"crossref","first-page":"2128","DOI":"10.1109\/TVT.2014.2336807","volume":"64","author":"W Jeon","year":"2015","unstructured":"Jeon, W., & Jeong, D. (2015). Combined channel access and sensing in cognitive radio slotted-aloha networks. IEEE Transactions on Vehicular Technology, 64(5), 2128\u20132133.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"1324_CR4","first-page":"72","volume":"60","author":"H Okada","year":"1977","unstructured":"Okada, H., Igarashi, Y., & Nakanishi, Y. (1977). Analysis and application of framed ALOHA channel in satellite packet switching networks-FADRA method. Electronics Communications of Japan, 60, 72\u201380.","journal-title":"Electronics Communications of Japan"},{"key":"1324_CR5","doi-asserted-by":"crossref","unstructured":"Munari, A., Heindlmaier, M., Liva, G., & Berioli, M. (2013). The throughput of slotted aloha with diversity. In Proceedings of the 51st annual allerton conference on communication, control, and computing (Allerton) (pp. 698\u2013706).","DOI":"10.1109\/Allerton.2013.6736593"},{"key":"1324_CR6","doi-asserted-by":"crossref","unstructured":"Bajovic, D., Jakovetic, D., Vukobratovic, D., & V.\u00a0S. Crnojevic, (2014). Slotted Aloha for networked base stations. In Proceedings of the IEEE international conference on communications workshops (ICC) (pp. 520\u2013526).","DOI":"10.1109\/ICCW.2014.6881251"},{"key":"1324_CR7","doi-asserted-by":"crossref","unstructured":"MacKenzie, A., & Wicker, S. (2003). Stability of multipacket slotted aloha with selfish users and perfect information. In Proceedings of the twenty-second annual joint conference of the IEEE computer and communications (INFOCOM) (pp. 1583\u20131590).","DOI":"10.1109\/INFCOM.2003.1209181"},{"issue":"6","key":"1324_CR8","doi-asserted-by":"crossref","first-page":"1904","DOI":"10.1109\/TNET.2013.2241076","volume":"21","author":"H Wu","year":"2013","unstructured":"Wu, H., Zhu, C., La, R., Liu, X., & Zhang, Y. (2013). Fasa: Accelerated S-ALOHA using access history for event-driven M2M communications. IEEE\/ACM Transactions on Networking, 21(6), 1904\u20131917.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"1324_CR9","doi-asserted-by":"crossref","unstructured":"Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing (MobiHoc) (pp. 46\u201357.","DOI":"10.1145\/1062689.1062697"},{"key":"1324_CR10","doi-asserted-by":"crossref","unstructured":"Wilhelm, M., Martinovic, I., Schmitt, J.B., & Lenders, V. (2011). Short paper: Reactive jamming in wireless networks: How realistic is the threat? In Proceedings of the fourth ACM conference on wireless network security (WiSec) (pp. 47\u201352).","DOI":"10.1145\/1998412.1998422"},{"issue":"1","key":"1324_CR11","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MPRV.2008.6","volume":"7","author":"R Raymond","year":"2008","unstructured":"Raymond, R., & Midkiff, S. (2008). Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 7(1), 74\u201381.","journal-title":"IEEE Pervasive Computing"},{"key":"1324_CR12","doi-asserted-by":"crossref","unstructured":"Proano, A., Lazos, L. (2010). Selective jamming attacks in wireless networks. In Proceedings of the IEEE international conference on communications (ICC) (pp. 1\u20136).","DOI":"10.1109\/ICC.2010.5502322"},{"issue":"3","key":"1324_CR13","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1109\/TNET.2012.2210241","volume":"21","author":"A Richa","year":"2013","unstructured":"Richa, A., Scheideler, C., Schmid, S., & Zhang, J. (2013). An efficient and fair mac protocol robust to reactive interference. IEEE\/ACM Transactions on Networking, 21(3), 760\u2013771.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"2","key":"1324_CR14","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1109\/SURV.2011.041110.00022","volume":"13","author":"K Pelechrinis","year":"2011","unstructured":"Pelechrinis, K., Iliofotou, M., & Krishnamurthy, S. (2011). Denial of service attacks in wireless networks: The case of jammers. IEEE Communications Surveys Tutorials, 13(2), 245\u2013257.","journal-title":"IEEE Communications Surveys Tutorials"},{"issue":"3","key":"1324_CR15","doi-asserted-by":"crossref","first-page":"936","DOI":"10.1109\/TNET.2008.925633","volume":"17","author":"R Ma","year":"2009","unstructured":"Ma, R., Misra, V., & Rubenstein, D. (2009). An analysis of generalized slotted-aloha protocols. IEEE\/ACM Transactions on Networking, 17(3), 936\u2013949.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"1","key":"1324_CR16","first-page":"6:1","volume":"5","author":"Y Law","year":"2009","unstructured":"Law, Y., Palaniswami, M., Hoesel, L., Doumen, J., Hartel, P., & Havinga, P. (2009). Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Transactions on Sensor Networks, 5(1), 6:1\u20136:38.","journal-title":"ACM Transactions on Sensor Networks"},{"issue":"4","key":"1324_CR17","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1109\/SURV.2011.041311.00156","volume":"13","author":"M Young","year":"2011","unstructured":"Young, M., & Boutaba, R. (2011). Overcoming adversaries in sensor networks: A survey of theoretical models and algorithmic approaches for tolerating malicious interference. IEEE Communications Surveys Tutorials, 13(4), 617\u2013641.","journal-title":"IEEE Communications Surveys Tutorials"},{"key":"1324_CR18","doi-asserted-by":"crossref","unstructured":"King, V., Saia, J., Young, M. (2011). Conflict on a communication channel. In Proceedings of the 30th annual symposium on Principles of distributed computing (PODC) (pp. 277\u2013286).","DOI":"10.1145\/1993806.1993855"},{"key":"1324_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2385709","author":"S D\u2019Oro","year":"2015","unstructured":"D\u2019Oro, S., Galluccio, L., Morabito, G., Palazzo, S., Chen, L., & Martignon, F. (2015). Defeating jamming with the power of silence: A game-theoretic analysis. IEEE Transactions on Wireless Communications. doi:\n                        10.1109\/TWC.2014.2385709\n                        \n                    .","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"1324_CR20","doi-asserted-by":"crossref","unstructured":"Boukerche, A., & Li, X. (2005). An agent-based trust and reputation management scheme for wireless sensor networks. In IEEE global telecommunications conference, (GLOBECOM) (Vol.\u00a03, pp. 1\u20135).","DOI":"10.1109\/GLOCOM.2005.1577970"},{"issue":"4","key":"1324_CR21","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1109\/JSAC.2009.090504","volume":"27","author":"A Boukerche","year":"2009","unstructured":"Boukerche, A., & Ren, Y. (2009). A secure mobile healthcare system using trust-based multicast scheme. IEEE Journal on Selected Areas in Communications, 27(4), 387\u2013399.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"1324_CR22","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/MWC.2010.5416351","volume":"17","author":"Y Ren","year":"2010","unstructured":"Ren, Y., Werner, R., Pazzi, N., & Boukerche, A. (2010). Monitoring patients via a secure and mobile healthcare system. IEEE Wireless Communications, 17(1), 59\u201365.","journal-title":"IEEE Wireless Communications"},{"key":"1324_CR23","doi-asserted-by":"crossref","unstructured":"Boukerche, A., Cheng, X., & Linus, J. (2003). Energy-aware data-centric routing in microsensor networks. In Proceedings of the 6th ACM international workshop on modeling analysis and simulation of wireless and mobile systems, ser. MSWIM \u201903 (pp. 42\u201349).","DOI":"10.1145\/940991.941000"},{"key":"1324_CR24","volume-title":"Handbook of algorithms for wireless networking and mobile computing","year":"2005","unstructured":"Boukerche, A. (Ed.). (2005). Handbook of algorithms for wireless networking and mobile computing. Boca Raton: Taylor and Francis Group, CRC Press."},{"issue":"1","key":"1324_CR25","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/s11235-015-9979-7","volume":"62","author":"J Liu","year":"2015","unstructured":"Liu, J., Wan, J., Wang, Q., Deng, P., Zhou, K., & Qiao, Y. (2015). A survey on position-based routing for vehicular ad hoc networks. Telecommunication Systems, 62(1), 15\u201330.","journal-title":"Telecommunication Systems"},{"issue":"1","key":"1324_CR26","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/SURV.2013.110113.00249","volume":"16","author":"M Chen","year":"2014","unstructured":"Chen, M., Wan, J., Gonzalez, S., Liao, X., & Leung, V. C. M. (2014). A survey of recent developments in home M2M networks. IEEE Communications Surveys Tutorials, 16(1), 98\u2013114.","journal-title":"IEEE Communications Surveys Tutorials"},{"key":"1324_CR27","doi-asserted-by":"publisher","unstructured":"Li, X., Li, D., Wan, J., Vasilakos, A. V., Lai, C.-F., & Wang, S. (2015). A review of industrial wireless networks in the context of Industry 4.0. Wireless Networks, 1\u201319. doi:\n                        10.1007\/s11276-015-1133-7\n                        \n                    .","DOI":"10.1007\/s11276-015-1133-7"},{"key":"1324_CR28","unstructured":"Fang, M., Malone, D., Duffy, K. R., Leith, D. J. (2010). Decentralised learning MACs for collision-free access in WLANs. \n                        http:\/\/arxiv.org\/abs\/1009.4386v1"},{"issue":"3","key":"1324_CR29","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1109\/TIT.1987.1057315","volume":"33","author":"RL Rivest","year":"1987","unstructured":"Rivest, R. L. (1987). Network control by bayesian broadcast. IEEE Transactions on Information Theory, 33(3), 323\u2013328.","journal-title":"IEEE Transactions on Information Theory"},{"key":"1324_CR30","doi-asserted-by":"crossref","unstructured":"Dolev, S., Gilbert, S., Guerraoui, R., & Newport, C. (2008). Secure communication over radio channels. In Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing (PODC) (pp. 105\u2013114).","DOI":"10.1145\/1400751.1400767"},{"key":"1324_CR31","doi-asserted-by":"crossref","unstructured":"Mohi, M., Movaghar, A., & Zadeh, P. (2009). A Bayesian game approach for preventing DoS attacks in wireless sensor networks. In Proceedings of the international conference on communications and mobile computing (pp. 507\u2013511).","DOI":"10.1109\/CMC.2009.325"},{"key":"1324_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Wu, J., Deng, J., & Qiu, M. (2008). Jamming ACK attack to wireless networks and a mitigation approach. In Proceedings of the IEEE global telecommunications conference (GLOBECOM) (pp. 4966\u20134970).","DOI":"10.1109\/GLOCOM.2008.ECP.950"},{"key":"1324_CR33","unstructured":"Chen, J., Sen, S., Chiang, M., & Dorsey, D. (2013). A framework for energy-efficient adaptive jamming of adversarial communications. In Proceedings of the 47th annual conference on information sciences and systems (CISS) (pp. 1\u20136)."},{"key":"1324_CR34","doi-asserted-by":"crossref","unstructured":"Xiao, Y., & Pan, Y. (2009). Emerging wireless LANs, wireless PANs, and wireless MANs: IEEE 802.11, IEEE 802.15, 802.16 wireless standard family, Wiley Series on Parallel and Distributed Computing. Hoboken, NJ: Wiley.","DOI":"10.1002\/9780470403686"},{"key":"1324_CR35","unstructured":"Linnenbank, G. (1997). A power dissipation comparison of the R-TDMA and the slotted-aloha wireless MAC protocols. Enschede, Moby Dick Project Report. \n                        http:\/\/doc.utwente.nl\/20249\/"},{"issue":"3","key":"1324_CR36","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1016\/j.adhoc.2008.06.003","volume":"7","author":"G Anastasi","year":"2009","unstructured":"Anastasi, G., Conti, M., Francesco, M., & Passarella, A. (2009). Energy conservation in wireless sensor networks: A survey. Ad Hoc Networks, 7(3), 537\u2013568.","journal-title":"Ad Hoc Networks"},{"issue":"1","key":"1324_CR37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-1499-2013-208","volume":"2013","author":"N Sufyan","year":"2013","unstructured":"Sufyan, N., Saqib, N., & Zia, M. (2013). Detection of jamming attacks in 802.11b wireless networks. EURASIP Journal on Wireless Communications and Networking, 2013(1), 1\u201318.","journal-title":"EURASIP Journal on Wireless Communications and Networking"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-016-1324-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1324-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1324-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1324-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,8]],"date-time":"2018-01-08T22:58:19Z","timestamp":1515452299000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-016-1324-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,28]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["1324"],"URL":"https:\/\/doi.org\/10.1007\/s11276-016-1324-x","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,28]]}}}