{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T15:30:56Z","timestamp":1767108656019,"version":"3.37.3"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T00:00:00Z","timestamp":1695686400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T00:00:00Z","timestamp":1695686400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,26]]},"DOI":"10.1109\/elit61488.2023.10310815","type":"proceedings-article","created":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T18:49:37Z","timestamp":1699642177000},"page":"270-274","source":"Crossref","is-referenced-by-count":6,"title":["Bluetooth Low-Energy Beacon Resistance to Jamming Attack"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9349-7946","authenticated-orcid":false,"given":"Volodymyr","family":"Sokolov","sequence":"first","affiliation":[{"name":"Borys Grinchenko Kyiv University,Dept. of Inform. and Cyber Security,Kyiv,Ukraine"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7775-6039","authenticated-orcid":false,"given":"Pavlo","family":"Skladannyi","sequence":"additional","affiliation":[{"name":"Borys Grinchenko Kyiv University,Dept. of Inform. and Cyber Security,Kyiv,Ukraine"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0124-216X","authenticated-orcid":false,"given":"Volodymyr","family":"Astapenya","sequence":"additional","affiliation":[{"name":"Borys Grinchenko Kyiv University,Dept. of Inform. and Cyber Security,Kyiv,Ukraine"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30859-9_2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/picst47496.2019.9061551"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tcset49122.2020.235583"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7737"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ukrmico52950.2021.9716665"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ukrmico52950.2021.9716700"},{"issue":"1","key":"ref7","first-page":"14","article-title":"Using 2.4 GHz Wireless Botnets to Implement Denial-of-Service Attacks","volume":"6","author":"Buryachok","year":"2018","journal-title":"Web of Scholar"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3455453"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2865607"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/tccn.2018.2884910"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103206"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15035-8_44"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s18010057"},{"volume-title":"FeasyBeacon 5Mart FSC-BP104 Bluetooth 5.0 Battery Powered Beacon Datasheet","key":"ref14"},{"volume-title":"Proximity Beacon Specification","year":"2015","key":"ref15"},{"volume-title":"Eddystone","year":"2016","key":"ref16"},{"volume-title":"Spec","year":"2019","key":"ref17"},{"volume-title":"2.4-GHz Bluetooth Low Energy and Proprietary System-on-Chip","year":"2013","key":"ref18"},{"volume-title":"CC- Debugger. Debugger and Programmer for RF System-on-Chips","year":"2019","key":"ref19"},{"volume-title":"SmartRF Packet Sniffer. Users Manual","year":"2014","key":"ref20"},{"volume-title":"nRF24L01+. Single Chip 2.4 GHz Tranceiver. Preliminary Product Specification","year":"2008","key":"ref21"},{"volume-title":"BLE-jammer","year":"2020","author":"Ler","key":"ref22"},{"volume-title":"BladeRF Windows Install Guide. Installing BladeRF Software with MatLab and Simulink Support","year":"2016","author":"Szymaniak","key":"ref23"},{"volume-title":"Is Bluetooth Low Energy Jamming Possible with an SDR Like the HackRF on GNURadio?","year":"2020","key":"ref24"},{"volume-title":"V3.2 Release Notes","year":"2022","author":"Brown","key":"ref25"},{"volume-title":"SDRSharp-BladeRF","year":"2019","author":"Picod","key":"ref26"},{"volume-title":"Generate Nearby Notifications using Beacon Simulator","year":"2017","author":"Hiribarren","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.4018\/IJDST.2017100104"},{"volume-title":"Beacon Transmission Power, Range, and RSSI","year":"2020","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/picst57299.2022.10238518"}],"event":{"name":"2023 IEEE 13th International Conference on Electronics and Information Technologies (ELIT)","start":{"date-parts":[[2023,9,26]]},"location":"Lviv, Ukraine","end":{"date-parts":[[2023,9,28]]}},"container-title":["2023 IEEE 13th International Conference on Electronics and Information Technologies (ELIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10310175\/10310663\/10310815.pdf?arnumber=10310815","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T23:48:33Z","timestamp":1710373713000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10310815\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,26]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/elit61488.2023.10310815","relation":{},"subject":[],"published":{"date-parts":[[2023,9,26]]}}}