{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T17:52:01Z","timestamp":1773769921279,"version":"3.50.1"},"publisher-location":"New York, New York, USA","reference-count":9,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1145\/2831296.2831320","type":"proceedings-article","created":{"date-parts":[[2016,3,14]],"date-time":"2016-03-14T13:11:18Z","timestamp":1457961078000},"page":"1-5","source":"Crossref","is-referenced-by-count":9,"title":["An Experimental Study of Jamming Attacks in Underwater Acoustic Communication"],"prefix":"10.1145","author":[{"given":"Peng","family":"Xiao","sequence":"first","affiliation":[{"name":"University of Connecticut, Storrs, CT 06268, USA"}]},{"given":"Michael","family":"Kowalski","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT 06268, USA"}]},{"given":"Daniel","family":"McCulley","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT 06268, USA"}]},{"given":"Michael","family":"Zuba","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT 06268, USA"}]}],"member":"320","reference":[{"key":"key-10.1145\/2831296.2831320-1","doi-asserted-by":"crossref","unstructured":"M. Zuba, Z. Shi, Z. Peng, and J.-H. Cui. Launching denial-of-service jamming attacks in underwater sensor networks. In Proceedings of the Sixth ACM International Workshop on Underwater Networks, page 12. ACM, 2011.","DOI":"10.1145\/2076569.2076581"},{"key":"key-10.1145\/2831296.2831320-2","doi-asserted-by":"crossref","unstructured":"I. F. Akyildiz, D. Pompili, and T. Melodia. Underwater acoustic sensor networks: research challenges. Ad hoc networks, 3(3):257--279, 2005.","DOI":"10.1016\/j.adhoc.2005.01.004"},{"key":"key-10.1145\/2831296.2831320-3","doi-asserted-by":"crossref","unstructured":"J.-H. Cui, J. Kong, M. Gerla, and S. Zhou. The challenges of building mobile underwater wireless networks for aquatic applications. Network, IEEE, 20(3):12--18, 2006.","DOI":"10.1109\/MNET.2006.1637927"},{"key":"key-10.1145\/2831296.2831320-4","doi-asserted-by":"crossref","unstructured":"Y. Huang, P. Xiao, S. Zhou, and Z. Shi. A half-duplex self-protection jamming approach for improving secrecy of block transmissions in underwater acoustic channels. In IEEE Sensors Journal, June, 2015","DOI":"10.1109\/JSEN.2015.2446465"},{"key":"key-10.1145\/2831296.2831320-5","doi-asserted-by":"crossref","unstructured":"J. Kong, Z. Ji, W. Wang, M. Gerla, R. Bagrodia, and B. Bhargava. Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks. In Proceedings of the 4th ACM workshop on Wireless security, pages 87--96. ACM, 2005.","DOI":"10.1145\/1080793.1080808"},{"key":"key-10.1145\/2831296.2831320-6","doi-asserted-by":"crossref","unstructured":"M. Zuba. Connecting with oceans using underwater acoustic networks. XRDS: Crossroads, The ACM Magazine for Students, 20(3):32--37, 2014.","DOI":"10.1145\/2590642"},{"key":"key-10.1145\/2831296.2831320-7","doi-asserted-by":"crossref","unstructured":"M. C. Domingo. Securing underwater wireless communication networks. Wireless Communications, IEEE, 18(1):22--28, 2011.","DOI":"10.1109\/MWC.2011.5714022"},{"key":"key-10.1145\/2831296.2831320-8","doi-asserted-by":"crossref","unstructured":"S. Misra, S. Dash, M. Khatua, A. V. Vasilakos, and M. S. Obaidat. Jamming in underwater sensor networks: detection and mitigation. IET communications, 6(14):2178--2188, 2012.","DOI":"10.1049\/iet-com.2011.0641"},{"key":"key-10.1145\/2831296.2831320-9","doi-asserted-by":"crossref","unstructured":"M. Samir, M. Kowalski, S. Zhou, and Z. Shi. An experimental study of effective jamming in underwater acoustic links. In Mobile Ad Hoc and Sensor Systems (MASS), 2014 IEEE 11th International Conference on, pages 737--742. IEEE, 2014.","DOI":"10.1109\/MASS.2014.80"}],"event":{"name":"the 10th International Conference","location":"Arlington, VA, USA","acronym":"WUWNET '15","number":"10","sponsor":["ONRGlobal, U.S. Office of Naval Research Global","SIGMOBILE, ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ASA, American Statistical Association"],"start":{"date-parts":[[2015,10,22]]},"end":{"date-parts":[[2015,10,24]]}},"container-title":["Proceedings of the 10th International Conference on Underwater Networks &amp; Systems - WUWNET '15"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2831296.2831320","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2831320&amp;ftid=1698491&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:12Z","timestamp":1750225692000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2831296.2831320"}},"subtitle":[],"proceedings-subject":"Underwater Networks & Systems","short-title":[],"issued":{"date-parts":[[2015]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1145\/2831296.2831320","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}