{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:13Z","timestamp":1763468233751,"version":"3.41.0"},"reference-count":38,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2015,3,9]],"date-time":"2015-03-09T00:00:00Z","timestamp":1425859200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2015,3,27]]},"abstract":"<jats:p>\n            Jamming techniques require only moderate resources to be deployed, while their effectiveness in disrupting communications is unprecedented. In this article, we introduce several contributions to jamming mitigation. In particular, we introduce a novel adversary model that has both (unlimited) jamming reactive capabilities as well as powerful (but limited) proactive jamming capabilities. Under this adversary model, to the best of our knowledge more powerful than any other adversary model addressed in the literature, the communication bandwidth provided by current anti-jamming solutions drops to zero. We then present Silence is Golden (\n            <jats:italic>SiG<\/jats:italic>\n            ): a novel anti-jamming protocol that, introducing a tunable, asymmetric communication channel, is able to mitigate the adversary capabilities, enabling the parties to communicate. For instance, with\n            <jats:italic>SiG<\/jats:italic>\n            it is possible to deliver a 128-bits-long message with a probability greater than 99% in 4096 time slots despite the presence of a jammer that jams all on-the-fly communications and 74% of the silent radio spectrum\u2014while competing proposals simply fail. Moreover, when\n            <jats:italic>SiG<\/jats:italic>\n            is used in a scenario in which the adversary can jam only a subset of all the available frequencies, performance experiences a boost: a 128-bits-long message is delivered within just 17 time slots for an adversary able to jam 90% of the available frequencies. We present a thorough theoretical analysis for the solution, which is supported by extensive simulation results, showing the viability of our proposal.\n          <\/jats:p>","DOI":"10.1145\/2699906","type":"journal-article","created":{"date-parts":[[2015,3,9]],"date-time":"2015-03-09T19:03:01Z","timestamp":1425927781000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Silence is Golden"],"prefix":"10.1145","volume":"17","author":[{"given":"Roberto Di","family":"Pietro","sequence":"first","affiliation":[{"name":"Bell Labs, Paris, France"}]},{"given":"Gabriele","family":"Oligeri","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Physics, Universit\u00e0 di Roma Tre, Rome, Italy"}]}],"member":"320","published-online":{"date-parts":[[2015,3,9]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400751.1400759"},{"volume-title":"Proceedings of the Information Assurance and Security Workshop (IAW\u201907)","author":"Baird L. C.","key":"e_1_2_1_2_1"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.929965"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.11"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.136"},{"key":"e_1_2_1_6_1","first-page":"1","article-title":"Energy efficiency of cooperative jamming strategies in secure wireless networks","volume":"99","author":"Dehghan M.","year":"2012","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1981.1056290"},{"volume-title":"Proceedings of the 2006 IEEE International Symposium on Information Theory. 212--216","author":"Dhulipala A. K.","key":"e_1_2_1_8_1"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2226718"},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"R. Di Pietro and G. Oligeri. 2013b. Jamming mitigation in cognitive radio networks. IEEE Network Magazine Special Issue on Security in Cognitive Radio Networks.  R. Di Pietro and G. Oligeri. 2013b. Jamming mitigation in cognitive radio networks. IEEE Network Magazine Special Issue on Security in Cognitive Radio Networks.","DOI":"10.1109\/MNET.2013.6523802"},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","unstructured":"D. Eastlake 3rd and P. Jones. 2001. RFC 3174 US Secure Hash Algorithm 1 (SHA1).   D. Eastlake 3rd and P. Jones. 2001. RFC 3174 US Secure Hash Algorithm 1 (SHA1).","DOI":"10.17487\/rfc3174"},{"key":"e_1_2_1_12_1","unstructured":"ETSI EN 300 910. GSM 05.05 version 6.7.1 release 1997.  ETSI EN 300 910. GSM 05.05 version 6.7.1 release 1997."},{"volume-title":"Proceedings of the 43rd Annual Allerton Conference on Communication, Control, and Computing. 1026--1035","author":"Fragouli C.","key":"e_1_2_1_13_1"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1380564.1380571"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.10.008"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2012.6152247"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.006"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.v5:3"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998420"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.165"},{"volume-title":"Proceedings of INFOCOM","year":"2012","author":"Liu Y.","key":"e_1_2_1_22_1"},{"key":"e_1_2_1_23_1","unstructured":"NIST. 2001. Announcing the Advanced Encryption Standard (AES).  NIST. 2001. Announcing the Advanced Encryption Standard (AES)."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.35"},{"key":"e_1_2_1_25_1","unstructured":"Phantom Technologies LTD. 2014. MP806. Retrieved from http:\/\/www.phantom.co.il.  Phantom Technologies LTD. 2014. MP806. Retrieved from http:\/\/www.phantom.co.il."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2006.275200"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100608"},{"key":"e_1_2_1_28_1","unstructured":"T. Rappaport. 2001. Wireless Communications: Principles and Practice. Prentice Hall PTR Upper Saddle River NJ.   T. Rappaport. 2001. Wireless Communications: Principles and Practice. Prentice Hall PTR Upper Saddle River NJ."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2210241"},{"key":"e_1_2_1_31_1","unstructured":"P. A. Richard. 2003. Modern Communications Jamming Principles and Techniques (The Artech House Information Warfare Library). Artech House Publishers Norwood MA.  P. A. Richard. 2003. Modern Communications Jamming Principles and Techniques (The Artech House Information Warfare Library). Artech House Publishers Norwood MA."},{"volume":"1","volume-title":"Proceedings of the 2005 Military Communications Conference (MILCOM\u201905)","author":"Shafiee S.","key":"e_1_2_1_32_1"},{"volume-title":"NIST IR 6483","author":"Soto J.","key":"e_1_2_1_33_1"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1824766.1824772"},{"volume-title":"Proceedings of the 2007 Military Communications Conference (MILCOM\u201907)","author":"Thuente D. J.","key":"e_1_2_1_35_1"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462103"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.86"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080829.1080844"}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2699906","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2699906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:59Z","timestamp":1750227419000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2699906"}},"subtitle":["Exploiting Jamming and Radio Silence to Communicate"],"short-title":[],"issued":{"date-parts":[[2015,3,9]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,3,27]]}},"alternative-id":["10.1145\/2699906"],"URL":"https:\/\/doi.org\/10.1145\/2699906","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"type":"print","value":"1094-9224"},{"type":"electronic","value":"1557-7406"}],"subject":[],"published":{"date-parts":[[2015,3,9]]},"assertion":[{"value":"2013-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-03-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}