{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:39:14Z","timestamp":1768523954203,"version":"3.49.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T00:00:00Z","timestamp":1330560000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1186\/1687-1499-2012-73","type":"journal-article","created":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T13:14:21Z","timestamp":1330607661000},"source":"Crossref","is-referenced-by-count":15,"title":["Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype"],"prefix":"10.1186","volume":"2012","author":[{"given":"Alexandros G","family":"Fragkiadakis","sequence":"first","affiliation":[]},{"given":"Elias Z","family":"Tragos","sequence":"additional","affiliation":[]},{"given":"Theo","family":"Tryfonas","sequence":"additional","affiliation":[]},{"given":"Ioannis G","family":"Askoxylakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,3,1]]},"reference":[{"issue":"5","key":"249_CR1","first-page":"931","volume":"31","author":"K Bicacki","year":"2008","unstructured":"Bicacki K, Tavli B: Denial-of-Service attacks and countermeasures. IEEE 802.11 wireless networks Comput Stand Interfaces (Elsevier) 2008, 31(5):931-941.","journal-title":"IEEE 802.11 wireless networks Comput Stand Interfaces (Elsevier)"},{"key":"249_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MILCOM.2007.4455269","volume-title":"Proc of MilCom 2007, IEEE","author":"D Thuente","year":"2007","unstructured":"Thuente D, Newlin B, Acharya M: Jamming vulnerabilities of IEEE 802.11e. In Proc of MilCom 2007, IEEE. Los Alamitos; 2007:1-7."},{"issue":"3","key":"249_CR3","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MNET.2006.1637931","volume":"20","author":"W Xu","year":"2006","unstructured":"Xu W, Ma K, Trappe W, Zhang Y: Jamming sensor networks: attack and defense strategies. IEEE Netw 2006, 20(3):41-47. 10.1109\/MNET.2006.1637931","journal-title":"IEEE Netw"},{"key":"249_CR4","first-page":"2301","volume-title":"Proc of MilCom 2005, IEEE","author":"M Hall","year":"2005","unstructured":"Hall M, Silvennoinen A, Haggman S: Effect of pulse jamming on IEEE 802.11 wireless LAN performance. In Proc of MilCom 2005, IEEE. Los Angeles; 2005:2301-2306."},{"issue":"2","key":"249_CR5","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1109\/TNET.2008.926510","volume":"17","author":"A Cardenas","year":"2009","unstructured":"Cardenas A, Radosavac S, Baras J: Evaluation of detection algorithms for mac layer misbehavior: theory and experiments. IEEE\/ACM Trans Netw 2009, 17(2):605-617.","journal-title":"IEEE\/ACM Trans Netw"},{"key":"249_CR6","first-page":"1","volume-title":"Proc of the Future Network and Mobile Summit 2010","author":"A Fragkiadakis","year":"2010","unstructured":"Fragkiadakis A, Siris V, Traganitis A: Effective and robust detection of jamming attacks. In Proc of the Future Network and Mobile Summit 2010. Florence, Italy; 2010:1-8."},{"key":"249_CR7","first-page":"192","volume-title":"Proc of the 8th International Conference on Wired\/Wireless Internet Communications 2010","author":"A Fragkiadakis","year":"2010","unstructured":"Fragkiadakis A, Siris V, Petroulakis N: Anomaly-based intrusion detection algorithms for wireless networks. In Proc of the 8th International Conference on Wired\/Wireless Internet Communications 2010. Lulea, Sweden; 2010:192-203."},{"key":"249_CR8","first-page":"1433","volume-title":"Application of anomaly detection algorithms for detecting syn flooding attacks","author":"V Siris","year":"2006","unstructured":"Siris V, Papagalou F: Application of anomaly detection algorithms for detecting syn flooding attacks. Volume 29. Comput Commun; 2006:1433-1442."},{"issue":"1","key":"249_CR9","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.inffus.2007.03.001","volume":"9","author":"J Cabrera","year":"2008","unstructured":"Cabrera J, Gutierez C, Mehra R: Ensemble methods for anomaly detection and distributed intrusion detection in mobile ad-hoc networks. Inf Fusion (Elsevier) 2008, 9(1):96-119.","journal-title":"Inf Fusion (Elsevier)"},{"issue":"3","key":"249_CR10","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1016\/j.jnca.2005.07.004","volume":"30","author":"T Peng","year":"2007","unstructured":"Peng T, Leckie C, Ramamohanarao K: Information sharing for distributed intrusion detection systems. J Netw Comput Appl (Elsevier) 2007, 30(3):877-899.","journal-title":"J Netw Comput Appl (Elsevier)"},{"key":"249_CR11","first-page":"6","volume-title":"Proc of USENIX Security Symposium","author":"Y Chen","year":"2007","unstructured":"Chen Y, Hwang K, Ku W: Distributed change-point detection of ddos attacks: experimental results on deter testbed. In Proc of USENIX Security Symposium. Boston, USA; 2007:6-7."},{"key":"249_CR12","first-page":"1","volume-title":"Proc of 3rd Int Conference on Scalable Information Systems","author":"M Cakiroglou","year":"2008","unstructured":"Cakiroglou M, Ozcerit T: Jamming detection mechanisms for wireless sensor networks. In Proc of 3rd Int Conference on Scalable Information Systems. Napoli, Italy; 2008:1-8."},{"issue":"1","key":"249_CR13","doi-asserted-by":"crossref","first-page":"33","DOI":"10.3233\/HSN-2006-276","volume":"15","author":"V Bhuse","year":"2006","unstructured":"Bhuse V, Gupta A: Anomaly intrusion detection in wireless sensor networks. J High Speed Netw 2006, 15(1):33-51.","journal-title":"J High Speed Netw"},{"key":"249_CR14","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1145\/1134680.1134701","volume-title":"ACM MobiSys","author":"A Sheth","year":"2006","unstructured":"Sheth A, Doerr C, Grunwald D, Han R, Sicker D: MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs. In ACM MobiSys. Uppsala, Sweden; 2006:191-204."},{"key":"249_CR15","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/1062689.1062697","volume-title":"Proc of ACM MobiHoc","author":"W Xu","year":"2005","unstructured":"Xu W, Trappe W, Zhang Y, Wood T: The feasibility of launching and detecting jamming attacks in wireless networks. In Proc of ACM MobiHoc. Urbana-Champaign; 2005:46-57."},{"key":"249_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MILCOM.2006.302081","volume-title":"Proc of Milcom 2006","author":"M Thamilarasu","year":"2006","unstructured":"Thamilarasu M, Mishra S, Sridhar R: A cross-layer approach to detect jamming attacks in wireless ad hoc networks. In Proc of Milcom 2006. Washington DC, USA; 2006:1-7."},{"key":"249_CR17","first-page":"181","volume-title":"Proc of CoNEXT 2009","author":"K Pelechrinis","year":"2009","unstructured":"Pelechrinis K, Broustis I, Krishnamurthy S, Gkantsidis C: Ares: an anti-jamming reinforcement system for 802.11 networks. In Proc of CoNEXT 2009. University of California, Riverside; 2009:181-192."},{"key":"249_CR18","first-page":"60","volume-title":"Proc of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)","author":"A Wood","year":"2007","unstructured":"Wood A, Stankovic J, Zhou G: Deejam: defeating energy-efficient jamming in ieee 802.15.4-based wireless networks. In Proc of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON). San Diego, California, USA; 2007:60-69."},{"key":"249_CR19","first-page":"1","volume-title":"Proc of SecureComm 2008","author":"I Krontiris","year":"2008","unstructured":"Krontiris I, Giannetsos T, Dimitriou T: LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. In Proc of SecureComm 2008. Istanbul, Turkey; 2008:1-10."},{"key":"249_CR20","first-page":"309","volume-title":"Proc of MobiCom 2009","author":"F Hugelschofer","year":"2009","unstructured":"Hugelschofer F, Smith P, Race N: OpenLIDS: a lightweight intrusion detection system for wireless mesh networks. In Proc of MobiCom 2009. Beijing, China; 2009:309-320."},{"key":"249_CR21","first-page":"352","volume-title":"Proc of ICCCN 2007","author":"A Sampath","year":"2007","unstructured":"Sampath A, Dai H, Zheng H, Zhao B: Multi-channel jamming attacks using cognitive radios. In Proc of ICCCN 2007. University of California, Santa Barbara; 2007:352-357."},{"key":"249_CR22","unstructured":"Linux wireless drivers, ath5k[ http:\/\/linuxwireless.org\/en\/users\/Drivers\/ath5k ]"},{"key":"249_CR23","unstructured":"Gnu radio homepage[ http:\/\/gnuradio.org\/redmine\/projects\/gnuradio\/wiki ]"},{"key":"249_CR24","unstructured":"Matlab homepage[ http:\/\/www.mathworks.com\/ ]"},{"key":"249_CR25","unstructured":"Iperf homepage[ http:\/\/iperf.sourceforge.net ]"},{"key":"249_CR26","first-page":"134","volume-title":"MCDES 2008","author":"M Nadgir","year":"2008","unstructured":"Nadgir M, Premkumar K, Kumar A, Kuri J: Cusum based distributed detection in wsns. In MCDES 2008. Bangalore, India; 2008:134-140."},{"key":"249_CR27","first-page":"1","volume-title":"Proc of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats","author":"G Yan","year":"2008","unstructured":"Yan G, Xiao Z, Eidenbenz S: Catching instant messaging worms with change-point detection techniques. In Proc of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. San Francisco, CA, April; 2008:1-10."},{"issue":"9","key":"249_CR28","doi-asserted-by":"publisher","first-page":"4161","DOI":"10.1016\/j.csda.2008.01.026","volume":"52","author":"G Verdier","year":"2008","unstructured":"Verdier G, Hilgert N, Vila J: Adaptive threshold computation for cusum-type procedures in change detection and isolation problems. Elsevier Comput Stat Data Anal 2008, 52(9):4161-4174. 10.1016\/j.csda.2008.01.026","journal-title":"Elsevier Comput Stat Data Anal"},{"key":"249_CR29","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1109\/MCOM.2011.5723815","volume":"49","author":"V Angelakis","year":"2011","unstructured":"Angelakis V, Papadakis S, Siris V, Traganitis A: Channel interference in 802.11a is harmful. Testbed validation of a simple quantification model. IEEE Commun Mag 2011, 49: 160-166.","journal-title":"IEEE Commun Mag"},{"key":"249_CR30","unstructured":"The gtk+ project[ http:\/\/www.gtk.org\/ ]"},{"issue":"18","key":"249_CR31","doi-asserted-by":"publisher","first-page":"5036","DOI":"10.1016\/j.comnet.2007.08.008","volume":"51","author":"K Lu","year":"2007","unstructured":"Lu K, Wu D, Fan J: Todorovic S, Nucci A, Robust and efficient detection of ddos attacks for large-scale internet. Comput Netw 2007, 51(18):5036-5056. 10.1016\/j.comnet.2007.08.008","journal-title":"Comput Netw"},{"issue":"12","key":"249_CR32","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1109\/TPDS.2007.1111","volume":"18","author":"Y Chen","year":"2007","unstructured":"Chen Y, Hwang K, Ku WS: Collaborative detection of ddos attacks over multiple network domains. IEEE Trans Parallel Distrib Syst 2007, 18(12):1649-1662.","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"249_CR33","first-page":"1768","volume-title":"Proc of INFOCOM'08","author":"Y Sheng","year":"2008","unstructured":"Sheng Y, Tan K, Chen G, Kotz D, Campbell A: Detecting 802.11 mac layer spoofing using received signal strength. In Proc of INFOCOM'08. Phoenix, AZ; 2008:1768-1776."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2012-73\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2012-73.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2012-73.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T07:47:25Z","timestamp":1742629645000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2012-73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,1]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["249"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2012-73","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,3,1]]},"article-number":"73"}}