{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T10:43:56Z","timestamp":1768560236218,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T00:00:00Z","timestamp":1131321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,7]]},"DOI":"10.1145\/1102219.1102234","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"76-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":71,"title":["Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols"],"prefix":"10.1145","author":[{"given":"Yee Wei","family":"Law","sequence":"first","affiliation":[{"name":"University of Twente, Enschede, The Netherlands"}]},{"given":"Lodewijk","family":"van Hoesel","sequence":"additional","affiliation":[{"name":"University of Twente, Enschede, The Netherlands"}]},{"given":"Jeroen","family":"Doumen","sequence":"additional","affiliation":[{"name":"University of Twente, Enschede, The Netherlands"}]},{"given":"Pieter","family":"Hartel","sequence":"additional","affiliation":[{"name":"University of Twente, Enschede, The Netherlands"}]},{"given":"Paul","family":"Havinga","sequence":"additional","affiliation":[{"name":"University of Twente, Enschede, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2005,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"EW 102: A Second Course in Electronic Warfare","author":"Adamy D. L.","year":"2004","unstructured":"D. L. Adamy and D. Adamy . EW 102: A Second Course in Electronic Warfare . Artech House Publishers , 2004 . D. L. Adamy and D. Adamy. EW 102: A Second Course in Electronic Warfare. Artech House Publishers, 2004."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2004.04.003"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-306-47720-3_2"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1008908.1008911"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029107"},{"key":"e_1_3_2_1_7_1","volume-title":"Information-centric and Lightweight MAC Protocol for Wireless Sensor Networks. In Proceedings of the DEST International Workshop on Signal Processing for Sensor Networks. IEEE Computer Society Press","author":"Chatterjea S.","year":"2004","unstructured":"S. Chatterjea , L. van Hoesel , and P. Havinga . AI-LMAC: An Adaptive , Information-centric and Lightweight MAC Protocol for Wireless Sensor Networks. In Proceedings of the DEST International Workshop on Signal Processing for Sensor Networks. IEEE Computer Society Press , 2004 . S. Chatterjea, L. van Hoesel, and P. Havinga. AI-LMAC: An Adaptive, Information-centric and Lightweight MAC Protocol for Wireless Sensor Networks. In Proceedings of the DEST International Workshop on Signal Processing for Sensor Networks. IEEE Computer Society Press, 2004."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1977.tb01600.x"},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE International Conference on Communications. IEEE Press","author":"El-Hoiydi A.","year":"2000","unstructured":"A. El-Hoiydi . Aloha with preamble sampling for sporadic traffic in ad hoc wireless sensor networks . In IEEE International Conference on Communications. IEEE Press , Apr. 2000 . A. El-Hoiydi. Aloha with preamble sampling for sporadic traffic in ad hoc wireless sensor networks. In IEEE International Conference on Communications. IEEE Press, Apr. 2000."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958531"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2002.1134340"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808417"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570651"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"e_1_3_2_1_16_1","series-title":"LNCS","first-page":"1141","volume-title":"NETWORKING 2002: Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols","author":"Konorski J.","year":"2002","unstructured":"J. Konorski . Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations . In NETWORKING 2002: Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols ; Performance of Computer and Communication Networks; and Mobile and Wireless Communications, volume 2345 of LNCS , pages 1141 -- 1146 . Springer-Verlag , 2002 . J. Konorski. Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations. In NETWORKING 2002: Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications, volume 2345 of LNCS, pages 1141--1146. Springer-Verlag, 2002."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2004.1284094"},{"key":"e_1_3_2_1_18_1","first-page":"173","volume-title":"Detection and Handling of MAC Layer Misbehavior in Wireless Networks. In Int. Conf. on Dependable Systems and Networks (DSN'03)","author":"Kyasanur P.","year":"2003","unstructured":"P. Kyasanur and N. Vaidya . Detection and Handling of MAC Layer Misbehavior in Wireless Networks. In Int. Conf. on Dependable Systems and Networks (DSN'03) , pages 173 -- 182 . IEEE Computer Society Press , 2003 . P. Kyasanur and N. Vaidya. Detection and Handling of MAC Layer Misbehavior in Wireless Networks. In Int. Conf. on Dependable Systems and Networks (DSN'03), pages 173--182. IEEE Computer Society Press, 2003."},{"key":"e_1_3_2_1_19_1","volume-title":"Embedded Systems Handbook","author":"Langendoen K.","year":"2005","unstructured":"K. Langendoen and G. Halkes . Embedded Systems Handbook , chapter Energy-Efficient Medium Access Control. CRC Press , 2005 . To appear. K. Langendoen and G. Halkes. Embedded Systems Handbook, chapter Energy-Efficient Medium Access Control. CRC Press, 2005. To appear."},{"key":"e_1_3_2_1_20_1","first-page":"217","volume-title":"2nd European Workshop on Wireless Sensor Networks (EWSN 2005","author":"Law Y.","year":"2005","unstructured":"Y. Law , P. Hartel , J. den Hartog , and P. Havinga . Link-layer jamming attacks on S-MAC . In 2nd European Workshop on Wireless Sensor Networks (EWSN 2005 ), pages 217 -- 225 . IEEE, 2005 . Y. Law, P. Hartel, J. den Hartog, and P. Havinga. Link-layer jamming attacks on S-MAC. In 2nd European Workshop on Wireless Sensor Networks (EWSN 2005), pages 217--225. IEEE, 2005."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984631"},{"key":"e_1_3_2_1_22_1","volume-title":"An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Networks. 18th International Parallel and Distributed Processing Symposium (IPDPS'04) - Workshop 12","author":"Lu G.","year":"2004","unstructured":"G. Lu , B. Krishnamachari , and C. S. Raghavendra . An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Networks. 18th International Parallel and Distributed Processing Symposium (IPDPS'04) - Workshop 12 , 13(13), 2004 . G. Lu, B. Krishnamachari, and C. S. Raghavendra. An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Networks. 18th International Parallel and Distributed Processing Symposium (IPDPS'04) - Workshop 12, 13(13), 2004."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570751"},{"key":"e_1_3_2_1_24_1","volume-title":"Information Theory, Inference, and Learning Algorithms","author":"McKay D.","year":"2003","unstructured":"D. McKay . Information Theory, Inference, and Learning Algorithms . Cambridge University Press , 2003 . D. McKay. Information Theory, Inference, and Learning Algorithms. Cambridge University Press, 2003."},{"key":"e_1_3_2_1_25_1","unstructured":"M. Mysore M. Golan E. Osterweil D. Estrin and M. Rahimi. TinyDiffusion in the Extensible Sensing System at the James Reserve. http:\/\/www.cens.ucla.edu\/~mmysore\/Design\/OPP May 2003.  M. Mysore M. Golan E. Osterweil D. Estrin and M. Rahimi. TinyDiffusion in the Extensible Sensing System at the James Reserve. http:\/\/www.cens.ucla.edu\/~mmysore\/Design\/OPP May 2003."},{"key":"e_1_3_2_1_26_1","volume-title":"Carnegie Mellon Technical Memo","author":"Negi R.","year":"2003","unstructured":"R. Negi and A. Perrig . Jamming analysis of MAC protocols . Carnegie Mellon Technical Memo , 2003 . R. Negi and A. Perrig. Jamming analysis of MAC protocols. Carnegie Mellon Technical Memo, 2003."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24643-5_17"},{"key":"e_1_3_2_1_28_1","first-page":"347","volume-title":"Military Communications Conference (MILCOM 2001","volume":"1","author":"Pei G.","year":"2001","unstructured":"G. Pei and C. Chien . Low power TDMA in large wireless sensor networks . In Military Communications Conference (MILCOM 2001 ), volume 1 , pages 347 -- 351 . IEEE, 2001 . G. Pei and C. Chien. Low power TDMA in large wireless sensor networks. In Military Communications Conference (MILCOM 2001), volume 1, pages 347--351. IEEE, 2001."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031508"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958513"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2004.1392161"},{"key":"e_1_3_2_1_32_1","unstructured":"RF Monolithics Inc. ASH Transceiver Software Designers Guide 2002.  RF Monolithics Inc. ASH Transceiver Software Designers Guide 2002."},{"key":"e_1_3_2_1_33_1","volume-title":"Datasheet","author":"Monolithics RF","year":"2002","unstructured":"RF Monolithics , Inc. TR1001 : 868.35 MHz Hybrid Transceiver . Datasheet , 2002 . RF Monolithics, Inc. TR1001: 868.35 MHz Hybrid Transceiver. Datasheet, 2002."},{"key":"e_1_3_2_1_34_1","unstructured":"RF Monolithics Inc. ASH Transceiver Designers Guide 2004.  RF Monolithics Inc. ASH Transceiver Designers Guide 2004."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the Helsinki University of Technology. Seminar on Network Security. Mobile Security","author":"St\u00e5rahlberg M.","year":"2000","unstructured":"M. St\u00e5rahlberg . Radio jamming attacks against two popular mobile networks. In H. Lipmaa and H. Pehu-Lehtonen, editors , Proceedings of the Helsinki University of Technology. Seminar on Network Security. Mobile Security . Helsinki University of Technology , Fall 2000 . M. St\u00e5rahlberg. Radio jamming attacks against two popular mobile networks. In H. Lipmaa and H. Pehu-Lehtonen, editors, Proceedings of the Helsinki University of Technology. Seminar on Network Security. Mobile Security. Helsinki University of Technology, Fall 2000."},{"key":"e_1_3_2_1_36_1","unstructured":"Texas Instruments Inc. MSP430x13x MSP430x14x Mixed Signal Microcontroller. Datasheet 2001.  Texas Instruments Inc. MSP430x13x MSP430x14x Mixed Signal Microcontroller. Datasheet 2001."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958512"},{"key":"e_1_3_2_1_38_1","volume-title":"INSS","author":"van Hoesel L.","year":"2004","unstructured":"L. van Hoesel and P. Havinga . A Lightweight Medium Access Protocol (LMAC) for Wireless Sensor Networks: Reducing Preamble Transmissions and Transceiver State Switches . In INSS , June 2004 . L. van Hoesel and P. Havinga. A Lightweight Medium Access Protocol (LMAC) for Wireless Sensor Networks: Reducing Preamble Transmissions and Transceiver State Switches. In INSS, June 2004."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511987045","volume-title":"A course in combinatorics","author":"van Lint J.","year":"2001","unstructured":"J. van Lint and R. Wilson . A course in combinatorics . Cambridge University Press , 2 nd edition, 2001 . J. van Lint and R. Wilson. A course in combinatorics. Cambridge University Press, 2nd edition, 2001.","edition":"2"},{"key":"e_1_3_2_1_40_1","article-title":"WolfPack Proves Strength","author":"Vantran K.","year":"2003","unstructured":"K. Vantran . WolfPack Proves Strength in Numbers. DefenseLINK News , Aug. 2003 . K. Vantran. WolfPack Proves Strength in Numbers. DefenseLINK News, Aug. 2003.","journal-title":"Numbers. DefenseLINK News"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023661"},{"key":"e_1_3_2_1_46_1","first-page":"1567","volume-title":"Proc. IEEE Infocom","author":"Ye W.","year":"2002","unstructured":"W. Ye , J. Heidemann , and D. Estrin . An Energy-Efficient MAC protocol for Wireless Sensor Networks . In Proc. IEEE Infocom , pages 1567 -- 1576 , New York, NY, USA , June 2002 . USC\/Information Sciences Institute, IEEE. W. Ye, J. Heidemann, and D. Estrin. An Energy-Efficient MAC protocol for Wireless Sensor Networks. In Proc. IEEE Infocom, pages 1567--1576, New York, NY, USA, June 2002. USC\/Information Sciences Institute, IEEE."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.828953"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/989459.989475"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958493"}],"event":{"name":"CCS05: 12th ACM Conference on Computer and Communications Security 2005","location":"Alexandria VA USA","acronym":"CCS05","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102219.1102234","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1102219.1102234","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:08Z","timestamp":1750262888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102219.1102234"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,7]]},"references-count":47,"alternative-id":["10.1145\/1102219.1102234","10.1145\/1102219"],"URL":"https:\/\/doi.org\/10.1145\/1102219.1102234","relation":{},"subject":[],"published":{"date-parts":[[2005,11,7]]},"assertion":[{"value":"2005-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}