{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:09:56Z","timestamp":1753888196060,"version":"3.41.2"},"reference-count":33,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,8,15]],"date-time":"2021-08-15T00:00:00Z","timestamp":1628985600000},"content-version":"vor","delay-in-days":226,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602062","61802274"],"award-info":[{"award-number":["61602062","61802274"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>In this paper, we deal with the eavesdropping issue in Wireless Access in Vehicular Environments\u2010 (WAVE\u2010) based vehicular networks. A proactive flexible interval intermittent jamming (FIJ) approach is proposed which predicts the time length <jats:italic>T<\/jats:italic> of the physical layer packet to be transmitted by the legitimate user and designs flexible jamming interval (JI) and jamming\u2010free interval (JF) based on the predicted <jats:italic>T<\/jats:italic>. Our design prevents eavesdroppers from overhearing the information with low energy cost since the jamming signal is transmitted only within JI. Numerical analysis and simulation study validate the performance of our proactive FIJ, in terms of jamming energy cost and overhearing defense, by comparing with the existing intermittent jamming (IJ) and FIJ.<\/jats:p>","DOI":"10.1155\/2021\/8261808","type":"journal-article","created":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T05:29:26Z","timestamp":1629091766000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Proactive Flexible Interval Intermittent Jamming for WAVE\u2010Based Vehicular Networks"],"prefix":"10.1155","volume":"2021","author":[{"given":"Hao","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0381-1389","authenticated-orcid":false,"given":"Xiaoshuang","family":"Xing","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6831-3933","authenticated-orcid":false,"given":"Anqi","family":"Bi","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Qian","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,8,15]]},"reference":[{"key":"e_1_2_13_1_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.1168"},{"key":"e_1_2_13_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2018.2883008"},{"key":"e_1_2_13_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2926741"},{"key":"e_1_2_13_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2859593"},{"key":"e_1_2_13_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2912611"},{"volume-title":"Intermittent Jamming for Eavesdropping Defense in Wave Based Vehicular Networks","year":"2020","author":"Xing X.","key":"e_1_2_13_6_2"},{"key":"e_1_2_13_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2950057"},{"key":"e_1_2_13_8_2","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15103"},{"key":"e_1_2_13_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.05.001"},{"key":"e_1_2_13_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2015.07.011"},{"key":"e_1_2_13_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.01.002"},{"key":"e_1_2_13_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1800155"},{"key":"e_1_2_13_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2718101"},{"key":"e_1_2_13_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2915794"},{"key":"e_1_2_13_15_2","doi-asserted-by":"publisher","DOI":"10.1080\/00051144.2018.1426294"},{"key":"e_1_2_13_16_2","doi-asserted-by":"crossref","unstructured":"FengL. Xiu-PingY. andJieW. Security transmission routing protocol for MIMO-VANET Proceedings of 2014 International Conference on Cloud Computing and Internet of Things 2014 Changchun China 152\u2013156 https:\/\/doi.org\/10.1109\/CCIOT.2014.7062526 2-s2.0-84927539584.","DOI":"10.1109\/CCIOT.2014.7062526"},{"key":"e_1_2_13_17_2","doi-asserted-by":"crossref","unstructured":"DasGuptaS. ChakiR. andChoudhuryS. SBRPV: security based routing protocol for vehicular ad hoc networks 2019 4th International Conference on Computer Science and Engineering (UBMK) 2019 Samsun Turkey 745\u2013750 https:\/\/doi.org\/10.1109\/UBMK.2019.8907069.","DOI":"10.1109\/UBMK.2019.8907069"},{"key":"e_1_2_13_18_2","unstructured":"FotohiR. EbazadehY. andGeshlagM. S. A new approach for improvement security against DoS attacks in vehicular ad-hoc network 2020 http:\/\/arxiv.org\/abs\/2002.10333."},{"key":"e_1_2_13_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2016.2613521"},{"key":"e_1_2_13_20_2","first-page":"212","volume-title":"International Conference on Security and Privacy in Communication Networks","author":"Deka B.","year":"2014"},{"key":"e_1_2_13_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2839560"},{"key":"e_1_2_13_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2853723"},{"key":"e_1_2_13_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.07.011"},{"key":"e_1_2_13_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2012.2230257"},{"key":"e_1_2_13_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3553-7"},{"key":"e_1_2_13_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700349"},{"key":"e_1_2_13_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00439-012-1194-y"},{"key":"e_1_2_13_28_2","first-page":"774","article-title":"Pattern recognition using generalized portrait method","volume":"24","author":"Vapnik V.","year":"1963","journal-title":"Automation and Remote Control"},{"key":"e_1_2_13_29_2","doi-asserted-by":"crossref","unstructured":"LiK. LuG. LuoG. andCaiZ. Seed-free graph de-anonymiztiation with adversarial learning Proceedings of the 29th ACM International Conference on Information and Knowledge Management 2020 745\u2013754 https:\/\/doi.org\/10.1145\/3340531.3411970.","DOI":"10.1145\/3340531.3411970"},{"volume-title":"Wireless Communications","year":"2004","author":"Goldsmith A.","key":"e_1_2_13_30_2"},{"key":"e_1_2_13_31_2","unstructured":"IEEE Computer Society LAN\/MAN Standards Committee IEEE standard for information technology\u2013telecommunications and information exchange between systems local and metropolitan area networks\u2013specific requirements part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications IEEE Std 802.11-2012 (Revision of IEEE Std 802.11-2007) 2012 1\u20132793."},{"key":"e_1_2_13_32_2","doi-asserted-by":"publisher","DOI":"10.1023\/B:STCO.0000035301.49549.88"},{"key":"e_1_2_13_33_2","first-page":"147","volume-title":"Advances in Neural Information Processing Systems 5","author":"Guyon I.","year":"1993"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/8261808.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/8261808.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/8261808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:52:54Z","timestamp":1723031574000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/8261808"}},"subtitle":[],"editor":[{"given":"Yan","family":"Huang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/8261808"],"URL":"https:\/\/doi.org\/10.1155\/2021\/8261808","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-04-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8261808"}}