{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:41:01Z","timestamp":1767339661135,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T00:00:00Z","timestamp":1510012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,7]]},"DOI":"10.1145\/3144457.3144478","type":"proceedings-article","created":{"date-parts":[[2018,8,21]],"date-time":"2018-08-21T12:22:08Z","timestamp":1534854128000},"page":"363-372","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":75,"title":["Selective Jamming of LoRaWAN using Commodity Hardware"],"prefix":"10.1145","author":[{"given":"Emekcan","family":"Aras","sequence":"first","affiliation":[{"name":"imec-DistriNet, KU Leuven, Belgium"}]},{"given":"Nicolas","family":"Small","sequence":"additional","affiliation":[{"name":"imec-DistriNet, KU Leuven, Belgium"}]},{"given":"Gowri Sankar","family":"Ramachandran","sequence":"additional","affiliation":[{"name":"imec-DistriNet, KU Leuven, Belgium"}]},{"given":"St\u00e9phane","family":"Delbruel","sequence":"additional","affiliation":[{"name":"imec-DistriNet, KU Leuven, Belgium"}]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[{"name":"imec-DistriNet, KU Leuven, Belgium"}]},{"given":"Danny","family":"Hughes","sequence":"additional","affiliation":[{"name":"imec-DistriNet, KU Leuven, Belgium and VersaSense, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2017,11,7]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1007\/s11277-017-4419-5"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/IMIS.2012.26"},{"key":"e_1_3_2_1_3_1","volume-title":"Exploring The Security Vulnerabilities of LoRa. In Workshop on Security and Privacy in Cyber-Physical Systems","author":"Aras Emekcan","year":"2017","unstructured":"Emekcan Aras , Gowri Sankar Ramachandran , Piers Lawrence , and Danny Hughes . 2017 . Exploring The Security Vulnerabilities of LoRa. In Workshop on Security and Privacy in Cyber-Physical Systems 2017. Emekcan Aras, Gowri Sankar Ramachandran, Piers Lawrence, and Danny Hughes. 2017. Exploring The Security Vulnerabilities of LoRa. In Workshop on Security and Privacy in Cyber-Physical Systems 2017."},{"key":"e_1_3_2_1_4_1","volume-title":"Low Power Wide Area Network Analysis: Can LoRa Scale? IEEE Wireless Communications Letters","author":"Georgiou Orestis","year":"2017","unstructured":"Orestis Georgiou and Usman Raza . 2017. Low Power Wide Area Network Analysis: Can LoRa Scale? IEEE Wireless Communications Letters ( 2017 ). Orestis Georgiou and Usman Raza. 2017. Low Power Wide Area Network Analysis: Can LoRa Scale? IEEE Wireless Communications Letters (2017)."},{"key":"e_1_3_2_1_5_1","volume-title":"Dedicated Networks for IoT: PHY\/MAC State of the Art and Challenges. EAI endorsed transactions on Internet of Things","author":"Goursaud Claire","year":"2015","unstructured":"Claire Goursaud and Jean-Marie Gorce . 2015. Dedicated Networks for IoT: PHY\/MAC State of the Art and Challenges. EAI endorsed transactions on Internet of Things ( 2015 ). Claire Goursaud and Jean-Marie Gorce. 2015. Dedicated Networks for IoT: PHY\/MAC State of the Art and Challenges. EAI endorsed transactions on Internet of Things (2015)."},{"volume-title":"Evaluation of LPWAN Technologies for Smart Cities: River Monitoring Use-Case. In 2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW). 1--5.","author":"Guibene W.","unstructured":"W. Guibene , J. Nowack , N. Chalikias , K. Fitzgibbon , M. Kelly , and D. Prendergast . 2017 . Evaluation of LPWAN Technologies for Smart Cities: River Monitoring Use-Case. In 2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW). 1--5. W. Guibene, J. Nowack, N. Chalikias, K. Fitzgibbon, M. Kelly, and D. Prendergast. 2017. Evaluation of LPWAN Technologies for Smart Cities: River Monitoring Use-Case. In 2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW). 1--5.","key":"e_1_3_2_1_6_1"},{"volume-title":"2017 IEEE International Workshop of Electronics, Control, Measurement, Signals and their Application to Mechatronics (ECMSM). 1--6.","author":"Hernandez D. M.","unstructured":"D. M. Hernandez , G. Peralta , L. Manero , R. Gomez , J. Bilbao , and C. Zubia . 2017. Energy and coverage study of LPWAN schemes for Industry 4.0 . In 2017 IEEE International Workshop of Electronics, Control, Measurement, Signals and their Application to Mechatronics (ECMSM). 1--6. D. M. Hernandez, G. Peralta, L. Manero, R. Gomez, J. Bilbao, and C. Zubia. 2017. Energy and coverage study of LPWAN schemes for Industry 4.0. In 2017 IEEE International Workshop of Electronics, Control, Measurement, Signals and their Application to Mechatronics (ECMSM). 1--6.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","volume-title":"Johnson","author":"Hu Yih-Chun","year":"2002","unstructured":"Yih-Chun Hu , Adrian Perrig , and David B . Johnson . 2002 . Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. Technical Report. Rice University Department of Computer Science . Yih-Chun Hu, Adrian Perrig, and David B. Johnson. 2002. Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. Technical Report. Rice University Department of Computer Science."},{"key":"e_1_3_2_1_9_1","volume-title":"Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1","author":"Karlof Chris","year":"2003","unstructured":"Chris Karlof and David Wagner . 2003. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1 ( 2003 ). Chris Karlof and David Wagner. 2003. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1 (2003)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/iThings\/CPSCom.2011.83"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/IECON.2007.4460126"},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/www.lora-alliance.org\/portals\/0\/specs\/LoRaWAN%20Specification%201R0.pdf","author":"Alliance LoRa","year":"2015","unstructured":"LoRa Alliance . 2015. LoRa WAN Specification . ( 2015 ). https:\/\/www.lora-alliance.org\/portals\/0\/specs\/LoRaWAN%20Specification%201R0.pdf LoRa Alliance. 2015. LoRaWAN Specification. (2015). https:\/\/www.lora-alliance.org\/portals\/0\/specs\/LoRaWAN%20Specification%201R0.pdf"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/EuCNC.2017.7980757"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/961268.961277"},{"key":"e_1_3_2_1_15_1","volume-title":"Does Bidirectional Traffic Do More Harm Than Good in LoRaWAN Based LPWA Networks? arXiv preprint arXiv:1704.04174","author":"Pop Alexandru-Ioan","year":"2017","unstructured":"Alexandru-Ioan Pop , Usman Raza , Parag Kulkarni , and Mahesh Sooriyabandara . 2017. Does Bidirectional Traffic Do More Harm Than Good in LoRaWAN Based LPWA Networks? arXiv preprint arXiv:1704.04174 ( 2017 ). https:\/\/arxiv.org\/abs\/1704.04174 Alexandru-Ioan Pop, Usman Raza, Parag Kulkarni, and Mahesh Sooriyabandara. 2017. Does Bidirectional Traffic Do More Harm Than Good in LoRaWAN Based LPWA Networks? arXiv preprint arXiv:1704.04174 (2017). https:\/\/arxiv.org\/abs\/1704.04174"},{"key":"e_1_3_2_1_16_1","volume-title":"Selective Jamming Attacks in Wireless Networks. In 2010 IEEE International Conference on Communications (ICC). IEEE, 1--6.","author":"Proano Alejandro","year":"2010","unstructured":"Alejandro Proano and Loukas Lazos . 2010 . Selective Jamming Attacks in Wireless Networks. In 2010 IEEE International Conference on Communications (ICC). IEEE, 1--6. Alejandro Proano and Loukas Lazos. 2010. Selective Jamming Attacks in Wireless Networks. In 2010 IEEE International Conference on Communications (ICC). IEEE, 1--6."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/TDSC.2011.41"},{"volume-title":"2017 9th International Conference on Communication Systems and Networks (COMSNETS). 63--70","author":"Ramachandran G. S.","unstructured":"G. S. Ramachandran , F. Yang , P. Lawrence , S. Michiels , W. Joosen , and D. Hughes . 2017. uPnP-WAN: Experiences with LoRa and its deployment in DR Congo . In 2017 9th International Conference on Communication Systems and Networks (COMSNETS). 63--70 . G. S. Ramachandran, F. Yang, P. Lawrence, S. Michiels, W. Joosen, and D. Hughes. 2017. uPnP-WAN: Experiences with LoRa and its deployment in DR Congo. In 2017 9th International Conference on Communication Systems and Networks (COMSNETS). 63--70.","key":"e_1_3_2_1_18_1"},{"volume-title":"Range and Coexistence Analysis of Long Range Unlicensed Communication. In 2016 23rd International Conference on Telecommunications (ICT). 1--6.","author":"Reynders B.","unstructured":"B. Reynders , W. Meert , and S. Pollin . 2016 . Range and Coexistence Analysis of Long Range Unlicensed Communication. In 2016 23rd International Conference on Telecommunications (ICT). 1--6. B. Reynders, W. Meert, and S. Pollin. 2016. Range and Coexistence Analysis of Long Range Unlicensed Communication. In 2016 23rd International Conference on Telecommunications (ICT). 1--6.","key":"e_1_3_2_1_19_1"},{"unstructured":"Semtech. 2013. SX1272\/3\/6\/7\/8: LoRa Modem Designer's Guide. (2013). https:\/\/www.semtech.com\/images\/datasheet\/LoraDesignGuide_STD.pdf  Semtech. 2013. SX1272\/3\/6\/7\/8: LoRa Modem Designer's Guide. (2013). https:\/\/www.semtech.com\/images\/datasheet\/LoraDesignGuide_STD.pdf","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","volume-title":"International Journal of Production Economics","author":"Vadlamani Satish","year":"2015","unstructured":"Satish Vadlamani , Burak Eksioglu , Hugh Medal , and Apurba Nandi . 2015. Jamming attacks on wireless networks: A taxonomic survey . International Journal of Production Economics ( 2015 ). Satish Vadlamani, Burak Eksioglu, Hugh Medal, and Apurba Nandi. 2015. Jamming attacks on wireless networks: A taxonomic survey. International Journal of Production Economics (2015)."},{"key":"e_1_3_2_1_22_1","volume-title":"Long-Range IoT Technologies: The Dawn of LoRa. Future Access Enablers of Ubiquitous and Intelligent Infrastructures","author":"Vangelista Lorenzo","year":"2015","unstructured":"Lorenzo Vangelista , Andrea Zanella , and Michele Zorzi . 2015. Long-Range IoT Technologies: The Dawn of LoRa. Future Access Enablers of Ubiquitous and Intelligent Infrastructures ( 2015 ). Lorenzo Vangelista, Andrea Zanella, and Michele Zorzi. 2015. Long-Range IoT Technologies: The Dawn of LoRa. Future Access Enablers of Ubiquitous and Intelligent Infrastructures (2015)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/2664243.2664260"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/1998412.1998422"},{"key":"e_1_3_2_1_25_1","volume-title":"2010 International Conference on Advances in Energy Engineering.","author":"Yun Miao","year":"2010","unstructured":"Miao Yun and Bu Yuxin . 2010 . Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid . In 2010 International Conference on Advances in Energy Engineering. Miao Yun and Bu Yuxin. 2010. Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid. In 2010 International Conference on Advances in Energy Engineering."},{"key":"e_1_3_2_1_26_1","volume-title":"Internet of Things for Smart Cities","author":"Zanella Andrea","year":"2013","unstructured":"Andrea Zanella , Nicola Bui , Angelo Castellani , Lorenzo Vangelista , and Michele Zorzi . 2013. Internet of Things for Smart Cities . IEEE INTERNET OF THINGS JOURNAL ( 2013 ). Andrea Zanella, Nicola Bui, Angelo Castellani, Lorenzo Vangelista, and Michele Zorzi. 2013. Internet of Things for Smart Cities. IEEE INTERNET OF THINGS JOURNAL (2013)."}],"event":{"sponsor":["EAI The European Alliance for Innovation","SIGMM ACM Special Interest Group on Multimedia"],"acronym":"MobiQuitous 2017","name":"MobiQuitous 2017: Computing, Networking and Services","location":"Melbourne VIC Australia"},"container-title":["Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3144457.3144478","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3144457.3144478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:22Z","timestamp":1750212802000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3144457.3144478"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,7]]},"references-count":26,"alternative-id":["10.1145\/3144457.3144478","10.1145\/3144457"],"URL":"https:\/\/doi.org\/10.1145\/3144457.3144478","relation":{},"subject":[],"published":{"date-parts":[[2017,11,7]]},"assertion":[{"value":"2017-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}